Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462
(WhatsApp)
1655362766
SCIRP WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Robust Non-Blind Watermarking for Biomedical Images Based on Chaos
(Articles)
Noura Alexendre
,
Ntsama Eloundou Pascal
,
Simo Thierry
,
Welba Colince
Journal of Computer and Communications
Vol.9 No.2
, February 3, 2021
DOI:
10.4236/jcc.2021.92001
621
Downloads
1,883
Views
Citations
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm
(Articles)
Youhai Shao
,
Yong Wang
,
Yun Yang
,
Xiang Wang
Journal of Computer and Communications
Vol.10 No.1
, January 17, 2022
DOI:
10.4236/jcc.2022.101003
400
Downloads
2,199
Views
Citations
Algorithms and Tools for Securing and Protecting Academic Data in the Democratic Republic of the Congo
(Articles)
Gulain Mugaruka Buduge
,
Jérémie Ndikumagenge
,
Justin Buhendwa Nyenyezi
Journal of Information Security
Vol.13 No.4
, September 30, 2022
DOI:
10.4236/jis.2022.134017
266
Downloads
1,096
Views
Citations
Blockchain-Based Islamic Marriage Certification with the Supremacy of Web 3.0
(Articles)
Md. Al-Sajiduzzaman Akand
,
Sarwar Azmain Reza
,
Amatul Bushra Akhi
Intelligent Control and Automation
Vol.13 No.4
, November 30, 2022
DOI:
10.4236/ica.2022.134004
318
Downloads
1,903
Views
Citations
Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange
(Articles)
Pawan Kumar
,
Vipin Saxena
Journal of Computer and Communications
Vol.12 No.2
, February 29, 2024
DOI:
10.4236/jcc.2024.122012
244
Downloads
966
Views
Citations
Design and Simulation of a Secure and Robust Underwater Acoustic Communication System in the Persian Gulf
(Articles)
Abdollah Doosti Aref
,
Mohammad Javad Jannati
,
Vahid Tabataba Vakili
Communications and Network
Vol.3 No.2
, May 19, 2011
DOI:
10.4236/cn.2011.32012
6,807
Downloads
13,549
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
International Journal of Communications, Network and System Sciences
Vol.8 No.13
, December 30, 2015
DOI:
10.4236/ijcns.2015.813051
4,155
Downloads
5,590
Views
Citations
Efficient FPGA implementation of AES 128 bit for IEEE 802.16e mobile WiMax standards
(Articles)
P. Rajasekar
,
Dr. H. Mangalam
Circuits and Systems
Vol.7 No.4
, April 28, 2016
DOI:
10.4236/cs.2016.74032
2,512
Downloads
4,691
Views
Citations
Enhancing Mobile Cloud Computing Security Using Steganography
(Articles)
Hassan Reza
,
Madhuri Sonawane
Journal of Information Security
Vol.7 No.4
, July 19, 2016
DOI:
10.4236/jis.2016.74020
3,872
Downloads
7,237
Views
Citations
Data Security of Mobile Cloud Computing on Cloud Server
(Articles)
Mohammad Waseem
,
Abdullah Lakhan
,
Irfan Ali Jamali
Open Access Library Journal
Vol.3 No.4
, April 28, 2016
DOI:
10.4236/oalib.1102377
1,919
Downloads
9,196
Views
Citations
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
(Articles)
P. Premkumar
,
D. Shanthi
Circuits and Systems
Vol.7 No.11
, September 13, 2016
DOI:
10.4236/cs.2016.711307
2,078
Downloads
3,842
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
, August 9, 2017
DOI:
10.4236/cn.2017.93012
2,527
Downloads
5,885
Views
Citations
A Fast FPGA Implementation for Triple DES Encryption Scheme
(Articles)
Edni Del Rosal
,
Sanjeev Kumar
Circuits and Systems
Vol.8 No.9
, September 25, 2017
DOI:
10.4236/cs.2017.89016
2,376
Downloads
6,044
Views
Citations
A New Digital Image Encryption Algorithm Based on Improved Logistic Mapping and Josephus Circle
(Articles)
Zhiben Zhuang
,
Jing Wang
,
Jingyi Liu
,
Dingding Yang
,
Shiqiang Chen
Journal of Computer and Communications
Vol.6 No.6
, June 21, 2018
DOI:
10.4236/jcc.2018.66003
1,199
Downloads
3,353
Views
Citations
A Modern Method for Constructing the S-Box of Advanced Encryption Standard
(Articles)
W. Eltayeb Ahmed
Applied Mathematics
Vol.10 No.4
, April 29, 2019
DOI:
10.4236/am.2019.104018
1,244
Downloads
10,005
Views
Citations
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
(Articles)
Mohammad Anwar Hossain
,
Ahsan Ullah
,
Newaz Ibrahim Khan
,
Md Feroz Alam
Journal of Information Security
Vol.10 No.4
, October 14, 2019
DOI:
10.4236/jis.2019.104012
1,576
Downloads
6,363
Views
Citations
Image Encryption and Decryption Based on Chaotic Algorithm
(Articles)
Yue Hu
,
Ruyue Tian
Journal of Applied Mathematics and Physics
Vol.8 No.9
, September 15, 2020
DOI:
10.4236/jamp.2020.89136
1,148
Downloads
4,703
Views
Citations
Use Two Hybrid SCA-AOA and Fuzzy SCA-AOA Algorithms in Information Security
(Articles)
Ayad Hamad Khalaf
,
Ban Ahmed Mitras
Open Access Library Journal
Vol.8 No.4
, April 30, 2021
DOI:
10.4236/oalib.1107339
225
Downloads
1,082
Views
Citations
AES RSA-SM2 Algorithm against Man-in-the-Middle Attack in IEC 60870-5-104 Protocol
(Articles)
Shan Shi
,
Yong Wang
,
Cunming Zou
,
Yingjie Tian
Journal of Computer and Communications
Vol.10 No.1
, January 13, 2022
DOI:
10.4236/jcc.2022.101002
396
Downloads
2,638
Views
Citations
Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture
(Articles)
Carlisle Adams
Journal of Information Security
Vol.13 No.4
, October 12, 2022
DOI:
10.4236/jis.2022.134018
289
Downloads
1,551
Views
Citations
This article belongs to the Special Issue on
Cryptography and Network Security
First
<
...
3
4
5
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
SCIRP Newsletter
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
News
About SCIRP
Ethics
Editorial Policies
For Authors
Peer-Review Issues
Publication Fees
Special Issues
Service
Manuscript Tracking System
Order Print Copies
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top