Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks
(Articles)
Hossein Fereidooni
,
Hassan Taheri
,
Mehran Mahramian
Int'l J. of Communications, Network and System Sciences
Vol.5 No.4
,April 19, 2012
DOI:
10.4236/ijcns.2012.54030
6,834
Downloads
11,248
Views
Citations
A Two-Party Password-Authenticated Key Exchange Protocol with Verifier
(Articles)
Shunbo Xiang
,
Bing Xu
,
Ke Chen
Journal of Computer and Communications
Vol.9 No.4
,April 29, 2021
DOI:
10.4236/jcc.2021.94007
330
Downloads
1,073
Views
Citations
This article belongs to the Special Issue on
Information Technology and Applications
An Optimization Technique for Inverse Crack Detection
(Articles)
Håkan Wirdelius
Journal of Modern Physics
Vol.5 No.13
,July 30, 2014
DOI:
10.4236/jmp.2014.513121
2,744
Downloads
3,504
Views
Citations
This article belongs to the Special Issue on
Nondestructive Testing
Shape Identification for Stokes-Oseen Problem Based on Domain Derivative Method
(Articles)
Wenjing Yan
,
Jiangyong Hou
Journal of Applied Mathematics and Physics
Vol.3 No.12
,December 29, 2015
DOI:
10.4236/jamp.2015.312191
3,420
Downloads
4,045
Views
Citations
Inverse Problems for an Euler-Bernoulli Beam: Identification of Bending Rigidity and External Loads
(Articles)
Hiroaki Katori
World Journal of Mechanics
Vol.8 No.5
,May 21, 2018
DOI:
10.4236/wjm.2018.85014
1,019
Downloads
2,301
Views
Citations
A Simulated Annealing Algorithm for Scheduling Problems
(Articles)
Crescenzio Gallo
,
Vito Capozzi
Journal of Applied Mathematics and Physics
Vol.7 No.11
,November 5, 2019
DOI:
10.4236/jamp.2019.711176
1,050
Downloads
6,888
Views
Citations
Structures, Fields and Methods of Identification of Nonlinear Static Systems in the Conditions of Uncertainty
(Articles)
Nikolay Karabutov
Intelligent Control and Automation
Vol.1 No.2
,November 26, 2010
DOI:
10.4236/ica.2010.12007
4,333
Downloads
6,863
Views
Citations
Modelling and Wavelet-Based Identification of 3-DOF Vehicle Suspension System
(Articles)
Khaled Nouri
,
Hichem Loussifi
,
Naceur Benhadj Braiek
Journal of Software Engineering and Applications
Vol.4 No.12
,December 5, 2011
DOI:
10.4236/jsea.2011.412079
5,540
Downloads
10,165
Views
Citations
Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
(Articles)
Debnath BHATTACHARYYA
,
Jhuma DUTTA
,
Poulami DAS
,
Samir Kumar BANDYOPADHYAY
,
Tai-hoon KIM
Int'l J. of Communications, Network and System Sciences
Vol.2 No.5
,August 21, 2009
DOI:
10.4236/ijcns.2009.25040
5,406
Downloads
9,776
Views
Citations
Double-Moduli Gaussian Encryption/Decryption with Primary Residues and Secret Controls
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.7
,July 25, 2011
DOI:
10.4236/ijcns.2011.47058
4,565
Downloads
8,552
Views
Citations
Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression
(Articles)
Shinichi Murata
,
Yasunari Yoshitomi
,
Hiroaki Ishii
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23010
6,830
Downloads
13,855
Views
Citations
Development of a Post Quantum Encryption Key Generation Algorithm Using Electromagnetic Wave Propagation Theory
(Articles)
Vincent Mbonigaba
,
Fulgence Nahayo
,
Octave Moutsinga
,
Okalas-Ossami Dieudonné
Journal of Information Security
Vol.15 No.1
,January 31, 2024
DOI:
10.4236/jis.2024.151005
59
Downloads
269
Views
Citations
Genetic Algorithm for Arbitrage with More than Three Currencies
(Articles)
Adrián Fernández-Pérez
,
Fernando Fernández-Rodríguez
,
Simón Sosvilla-Rivero
Technology and Investment
Vol.3 No.3
,August 31, 2012
DOI:
10.4236/ti.2012.33025
8,039
Downloads
12,115
Views
Citations
Dual Authentication Hashing for Security Enhancement in MANET
(Articles)
L. Raja
,
Dr. P. S. Periasamy
Circuits and Systems
Vol.7 No.4
,April 28, 2016
DOI:
10.4236/cs.2016.74030
1,588
Downloads
2,444
Views
Citations
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
(Articles)
P. Premkumar
,
D. Shanthi
Circuits and Systems
Vol.7 No.11
,September 13, 2016
DOI:
10.4236/cs.2016.711307
1,827
Downloads
3,251
Views
Citations
Peak-to-Average Power Ratio Performance Analysis for Orthogonal Chirp Division Multiplexing Multicarrier Systems Based on Discrete Fractional Cosine Transform
(Articles)
Hani Attar
Int'l J. of Communications, Network and System Sciences
Vol.9 No.12
,December 22, 2016
DOI:
10.4236/ijcns.2016.912043
1,442
Downloads
2,460
Views
Citations
Identification of Small and Discriminative Gene Signatures for Chemosensitivity Prediction in Breast Cancer
(Articles)
Wei Hu
Journal of Cancer Therapy
Vol.2 No.2
,June 29, 2011
DOI:
10.4236/jct.2011.22025
6,250
Downloads
9,946
Views
Citations
Computing the Moore-Penrose Inverse of a Matrix Through Symmetric Rank-One Updates
(Articles)
Xuzhou Chen
,
Jun Ji
American Journal of Computational Mathematics
Vol.1 No.3
,September 19, 2011
DOI:
10.4236/ajcm.2011.13016
7,739
Downloads
16,736
Views
Citations
New Approach for the Inversion of Structured Matrices via Newton’s Iteration
(Articles)
Mohammad M. Tabanjeh
Advances in Linear Algebra & Matrix Theory
Vol.5 No.1
,February 10, 2015
DOI:
10.4236/alamt.2015.51001
3,295
Downloads
4,343
Views
Citations
A Normal Weighted Inverse Gaussian Distribution for Skewed and Heavy-Tailed Data
(Articles)
Calvin B. Maina
,
Patrick G. O. Weke
,
Carolyne A. Ogutu
,
Joseph A. M. Ottieno
Applied Mathematics
Vol.13 No.2
,February 21, 2022
DOI:
10.4236/am.2022.132013
135
Downloads
767
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top