Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
(Articles)
P. Premkumar
,
D. Shanthi
Circuits and Systems
Vol.7 No.11
,September 13, 2016
DOI:
10.4236/cs.2016.711307
1,829
Downloads
3,268
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
1,908
Downloads
5,193
Views
Citations
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
(Articles)
Mohammad Anwar Hossain
,
Ahsan Ullah
,
Newaz Ibrahim Khan
,
Md Feroz Alam
Journal of Information Security
Vol.10 No.4
,October 14, 2019
DOI:
10.4236/jis.2019.104012
1,229
Downloads
5,459
Views
Citations
Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture
(Articles)
Carlisle Adams
Journal of Information Security
Vol.13 No.4
,October 12, 2022
DOI:
10.4236/jis.2022.134018
150
Downloads
943
Views
Citations
This article belongs to the Special Issue on
Cryptography and Network Security
Balance of Power between Copyright Owners and Music Teachers
(Articles)
Givewell Munyaradzi
,
Richard Makoni
Creative Education
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/ce.2012.32032
3,804
Downloads
6,460
Views
Citations
Developing Sustainable High Strength Concrete Mixtures Using Local Materials and Recycled Concrete
(Articles)
Anthony Torres
,
Alex Burkhart
Materials Sciences and Applications
Vol.7 No.2
,February 29, 2016
DOI:
10.4236/msa.2016.72013
5,635
Downloads
8,708
Views
Citations
This article belongs to the Special Issue on
Construction Materials
Analysis of the Fruit Value Chain of Two Priority Food Woody Species of Central Southern Niger, West Africa
(Articles)
Massaoudou Moussa
,
Tougiani Abasse
,
Habou Rabiou
,
Moussa Aboubacar
,
Larwanou Mahamane
Open Journal of Forestry
Vol.10 No.3
,May 20, 2020
DOI:
10.4236/ojf.2020.103018
500
Downloads
1,506
Views
Citations
Design and Implementation of End to End Encrypted Short Message Service (SMS) Using Hybrid Cipher Algorithm
(Articles)
Emmanuel Nwabueze Ekwonwune
,
Victor Chibunna Enyinnaya
Journal of Software Engineering and Applications
Vol.13 No.3
,March 31, 2020
DOI:
10.4236/jsea.2020.133003
1,020
Downloads
4,854
Views
Citations
Research on Copyright Ownership Based on Template Writing Works
(Articles)
Rumin Wen
,
Yingbo Zhai
,
Jizhe Cui
Open Access Library Journal
Vol.11 No.1
,January 31, 2024
DOI:
10.4236/oalib.1111159
35
Downloads
190
Views
Citations
Accessible Copies of Copyright Work for Visually Impaired Persons in India
(Articles)
Priya R. Pillai
Creative Education
Vol.3 No.6A
,October 26, 2012
DOI:
10.4236/ce.2012.326159
5,547
Downloads
8,282
Views
Citations
This article belongs to the Special Issue on
Higher Education
Role of Copyright Institutions and Enforcement Agencies in the Digital and Online Dissemination of Copyright Works
(Articles)
Okubor Cecil Nwachukwu
,
Omonemu Edewor Tony
Beijing Law Review
Vol.13 No.3
,September 20, 2022
DOI:
10.4236/blr.2022.133038
141
Downloads
1,725
Views
Citations
Regulatory Response to Copyright Protection in an Online and Digital Environment: A Comparative Analysis
(Articles)
Okubor Cecil Nwachukwu
,
Kwubosu Ikechukwu
Beijing Law Review
Vol.13 No.4
,December 30, 2022
DOI:
10.4236/blr.2022.134063
148
Downloads
1,418
Views
Citations
The “Copyright Troll” of Photographic Works in the Internet Era: A Study of Countermeasures and Legal Regulation
(Articles)
Huiyu Zhang
Open Journal of Social Sciences
Vol.11 No.5
,May 25, 2023
DOI:
10.4236/jss.2023.115017
76
Downloads
329
Views
Citations
Comparative Study of the Reliability and Complexity of Symmetrical and Asymmetrical Cryptosystems for the Protection of Academic Data in the Democratic Republic of Congo
(Articles)
Mugaruka Buduge Gulain
,
Jeremie Ndikumagenge
,
Buhendwa Nyenyezi Justin
,
Bulonza Masumbuko Alexis
,
Katho Seba Jacques
Journal of Information Security
Vol.15 No.3
,May 17, 2024
DOI:
10.4236/jis.2024.153017
3
Downloads
23
Views
Citations
Discussion of New Padding Method in DES Encryption
(Articles)
Chengxia Liu
Journal of Software Engineering and Applications
Vol.5 No.12B
,January 17, 2013
DOI:
10.4236/jsea.2012.512B004
4,088
Downloads
6,404
Views
Citations
Ambiguous Multi-Symmetric Scheme and Applications
(Articles)
Richard Bassous
,
Ahmad Mansour
,
Roger Bassous
,
Huirong Fu
,
Ye Zhu
,
George Corser
Journal of Information Security
Vol.8 No.4
,October 31, 2017
DOI:
10.4236/jis.2017.84024
1,193
Downloads
2,614
Views
Citations
Implementation of a Hybrid Triple-Data Encryption Standard and Blowfish Algorithms for Enhancing Image Security in Cloud Environment
(Articles)
Mohan Nagamunthala
,
Ramakrishnan Manjula
Journal of Computer and Communications
Vol.11 No.10
,October 31, 2023
DOI:
10.4236/jcc.2023.1110009
73
Downloads
494
Views
Citations
An Overview of the Copyright Protection Laws in Bangladesh—A Critical Analysis of the Copyright Act, 2000 with Its Loopholes and Recommendations
(Articles)
Muhammad Farhad Hosen
Beijing Law Review
Vol.8 No.2
,June 29, 2017
DOI:
10.4236/blr.2017.82011
2,666
Downloads
21,471
Views
Citations
Copyright Protection of Digital Movies Using the Coalition of Technology and Law in China
(Articles)
Xia Liu
,
Yunfei Zha
Chinese Studies
Vol.7 No.4
,September 13, 2018
DOI:
10.4236/chnstd.2018.74023
1,389
Downloads
4,210
Views
Citations
Research on Key Technology of General Embedded GIS
(Articles)
Zhanya XU
,
Zhong XIE
Journal of Geographic Information System
Vol.2 No.1
,January 27, 2010
DOI:
10.4236/jgis.2010.21004
6,538
Downloads
10,543
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top