Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm
(Articles)
Youhai Shao
,
Yong Wang
,
Yun Yang
,
Xiang Wang
Journal of Computer and Communications
Vol.10 No.1
,January 17, 2022
DOI:
10.4236/jcc.2022.101003
203
Downloads
1,274
Views
Citations
Research and Practice on Security Protection and Disaster Recovery Strategy of Oracle Database in Colleges and Universities
(Articles)
Man Liu
,
Lei Yu
Intelligent Information Management
Vol.14 No.2
,March 14, 2022
DOI:
10.4236/iim.2022.142005
222
Downloads
1,032
Views
Citations
Freedom of Religious Beliefs and Protection of Cultural Heritage: A Comparative Study between Four EU Member States and Recommendations for Training, Education and Awareness Raising
(Articles)
Panayiota Constanti
,
Mandy Stalder-Thon
,
Eliza Patouris
Open Journal of Social Sciences
Vol.11 No.4
,April 10, 2023
DOI:
10.4236/jss.2023.114001
70
Downloads
393
Views
Citations
The Impact of Religious Fundamentalism on Places of Worship
(Articles)
Nikolaos Dimitriadis
,
Catia Cruz
,
Ioanara Silva
,
José Paulo Oliveira
,
Eliza Patouris
Open Journal of Social Sciences
Vol.11 No.4
,April 19, 2023
DOI:
10.4236/jss.2023.114019
75
Downloads
2,428
Views
Citations
Current Status of the Use of Cloud Computing in SMEs in the City of Latacunga, Ecuador
(Articles)
Gabriela Cajamarca-Palomo
,
Mauricio Quisimalin-Santamaría
,
Patricio Medina-Chicaiza
Open Journal of Business and Management
Vol.7 No.2
,April 4, 2019
DOI:
10.4236/ojbm.2019.72043
1,089
Downloads
2,446
Views
Citations
A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable
(Articles)
Hossein Jadidoleslamy
Wireless Sensor Network
Vol.3 No.7
,July 28, 2011
DOI:
10.4236/wsn.2011.37026
9,371
Downloads
20,016
Views
Citations
Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable
(Articles)
Hossein Jadidoleslamy
Int'l J. of Communications, Network and System Sciences
Vol.4 No.8
,August 19, 2011
DOI:
10.4236/ijcns.2011.48064
6,008
Downloads
10,950
Views
Citations
Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite
(Articles)
Arif Sari
Int'l J. of Communications, Network and System Sciences
Vol.8 No.3
,March 20, 2015
DOI:
10.4236/ijcns.2015.83004
3,941
Downloads
5,309
Views
Citations
Cybersecurity: A Statistical Predictive Model for the Expected Path Length
(Articles)
Pubudu Kalpani Kaluarachchi
,
Chris P. Tsokos
,
Sasith M. Rajasooriya
Journal of Information Security
Vol.7 No.3
,April 5, 2016
DOI:
10.4236/jis.2016.73008
3,309
Downloads
5,251
Views
Citations
Practical Security of the Continuous-Variable Quantum Key Distribution with Locally-Generated Local Oscillators
(Articles)
Biao Huang
,
Yongjun Zhu
,
Pu Tang
,
Yongmei Huang
,
Zhenming Peng
Journal of Applied Mathematics and Physics
Vol.7 No.11
,November 13, 2019
DOI:
10.4236/jamp.2019.711188
488
Downloads
1,113
Views
Citations
Small and Safe
(Articles)
Rathna N. Koman
Beijing Law Review
Vol.8 No.4
,December 29, 2017
DOI:
10.4236/blr.2017.84030
1,046
Downloads
2,067
Views
Citations
Integrated Water Resources Management (IWRM) Impacts in South West Coastal Zone of Bangladesh and Fact-Finding on Tidal River Management (TRM)
(Articles)
Fahad Khan Khadim
,
Kanak Kanti Kar
,
Pronab Kumar Halder
,
Md. Atiqur Rahman
,
A.K.M. Mostafa Morshed
Journal of Water Resource and Protection
Vol.5 No.10
,October 21, 2013
DOI:
10.4236/jwarp.2013.510098
5,821
Downloads
11,936
Views
Citations
QoS-Guaranteed Secure Multicast Routing Protocol for Satellite IP Networks Using Hierarchical Architecture
(Articles)
Zhizhong Yin
,
Long Zhang
,
Xianwei Zhou
,
Peng Xu
,
Yu Deng
Int'l J. of Communications, Network and System Sciences
Vol.3 No.4
,April 30, 2010
DOI:
10.4236/ijcns.2010.34045
5,562
Downloads
10,685
Views
Citations
New Proposed Robust, Scalable and Secure Network Cloud Computing Storage Architecture
(Articles)
Fawaz S. Al-Anzi
,
Ayed A. Salman
,
Noby K. Jacob
Journal of Software Engineering and Applications
Vol.7 No.5
,May 6, 2014
DOI:
10.4236/jsea.2014.75031
5,086
Downloads
7,023
Views
Citations
Forensics Issues in Cloud Computing
(Articles)
Aqil Burney
,
Muhammad Asif
,
Zain Abbas
Journal of Computer and Communications
Vol.4 No.10
,August 22, 2016
DOI:
10.4236/jcc.2016.410007
3,236
Downloads
7,550
Views
Citations
Oil, Risk Analysis Techniques, Maritime Security and Safe Passage in Pirate Infested Gulf of Guinea Waters
(Articles)
Nana Raymond Lawrence Ofosu-Boateng
Open Journal of Social Sciences
Vol.5 No.12
,December 14, 2017
DOI:
10.4236/jss.2017.512008
1,114
Downloads
1,990
Views
Citations
Public Service Delivery in the Context of Disaster Risk Reduction for Sustainable Human Security with Special Reference to the City of Mutare, Zimbabwe
(Articles)
David Chibhoyi
,
Tafadzwa Hatidani Machaka
,
Absai Chakaipa
,
Rumbidzai Chibhoyi
,
Nevermind Muchongwe
,
Charity Ranganayi
,
Norman Tavengwa
,
Itai Zvawanda
,
Norah Gwesu
Open Access Library Journal
Vol.11 No.3
,March 22, 2024
DOI:
10.4236/oalib.1111123
31
Downloads
138
Views
Citations
Non-Homogeneous Stochastic Model for Cyber Security Predictions
(Articles)
Pubudu Kalpani Kaluarachchi
,
Chris P. Tsokos
,
Sasith M. Rajasooriya
Journal of Information Security
Vol.9 No.1
,November 30, 2017
DOI:
10.4236/jis.2018.91002
909
Downloads
1,992
Views
Citations
Petrogenesis and Geochemical Characterization of the Granitoids of the Magba Shear Zone West Cameroon Central Africa
(Articles)
Benjamin Ntiéche
,
M. Ram Mohan
,
Amidou Moundi
,
Mahomed Aziz Mounjouohou
Open Journal of Geology
Vol.6 No.8
,August 18, 2016
DOI:
10.4236/ojg.2016.68063
2,417
Downloads
3,982
Views
Citations
Secure Chained Threshold Proxy Signature without and with Supervision
(Articles)
Zoe L. JIANG
,
S. M. YIU
,
Y. DONG
,
L. C. K. HUI
,
S. H. Y. WONG
Journal of Software Engineering and Applications
Vol.2 No.4
,November 27, 2009
DOI:
10.4236/jsea.2009.24034
4,673
Downloads
8,163
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top