Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Information Protection Based on Extraction of Square Roots of Gaussian Integers
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.3
,March 10, 2011
DOI:
10.4236/ijcns.2011.43016
4,563
Downloads
8,763
Views
Citations
Deterministic Algorithm Computing All Generators: Application in Cryptographic Systems Design
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.5 No.11
,November 26, 2012
DOI:
10.4236/ijcns.2012.511074
4,459
Downloads
6,490
Views
Citations
Cryptanalysis of the Double-Moduli Cryptosystem
(Articles)
Sonia Mihaela Bogos
,
Serge Vaudenay
Int'l J. of Communications, Network and System Sciences
Vol.5 No.12
,December 20, 2012
DOI:
10.4236/ijcns.2012.512088
4,815
Downloads
7,066
Views
Citations
Public-Key Cryptosystems with Secret Encryptor and Digital Signature
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61001
4,267
Downloads
6,312
Views
Citations
Faster Method for Secure Transmission of Information with Sender Identification
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.6 No.2
,February 26, 2013
DOI:
10.4236/ijcns.2013.62009
3,945
Downloads
5,924
Views
Citations
Formation of Forests under Contrast Environmental Conditions in South-Western Pre-Baikal, South-Western Trans-Baikal and North-East Pre-Baikal (Some Aspects of Structure and Dynamics)
(Articles)
Alexander P. Sizykh
Open Access Library Journal
Vol.5 No.2
,February 26, 2018
DOI:
10.4236/oalib.1104400
402
Downloads
945
Views
Citations
Using the Balanced Scorecard and the Analytic Hierarchy Process to Rank the Key Performance Factors in the Iranian Banking Industry
(Articles)
Hadi Keshavarznia
,
Mario Wallace
Open Journal of Business and Management
Vol.11 No.3
,May 31, 2023
DOI:
10.4236/ojbm.2023.113075
257
Downloads
1,092
Views
Citations
Strategic Alignment Framework (SAF): A Data-Driven Approach to Aligning Mission, Vision, and Financial Metrics with OKRs and CSFs
(Articles)
Sasan Sepasi
Open Journal of Business and Management
Vol.12 No.1
,January 29, 2024
DOI:
10.4236/ojbm.2024.121024
289
Downloads
1,087
Views
Citations
Enhanced Euclid Algorithm for Modular Multiplicative Inverse and Its Application in Cryptographic Protocols
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.3 No.12
,December 27, 2010
DOI:
10.4236/ijcns.2010.312123
6,882
Downloads
12,334
Views
Citations
Space Complexity of Algorithm for Modular Multiplicative Inverse
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.6
,June 17, 2011
DOI:
10.4236/ijcns.2011.46041
4,250
Downloads
8,030
Views
Citations
Double-Moduli Gaussian Encryption/Decryption with Primary Residues and Secret Controls
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.7
,July 25, 2011
DOI:
10.4236/ijcns.2011.47058
4,691
Downloads
8,683
Views
Citations
Modelling Key Population Attrition in the HIV and AIDS Programme in Kenya Using Random Survival Forests with Synthetic Minority Oversampling Technique-Nominal Continuous
(Articles)
Evan Kahacho
,
Charity Wamwea
,
Bonface Malenje
,
Gordon Aomo
Journal of Data Analysis and Information Processing
Vol.11 No.1
,January 31, 2023
DOI:
10.4236/jdaip.2023.111002
183
Downloads
854
Views
Citations
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152008
504
Downloads
2,584
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
<
...
6
7
8
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top