Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Is Public Co-Ordination of Investment in Information Security Desirable?
(Articles)
Christos Ioannidis
,
David Pym
,
Julian Williams
Journal of Information Security
Vol.7 No.2
,March 30, 2016
DOI:
10.4236/jis.2016.72005
2,983
Downloads
3,919
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
Information Availability: An Insight into the Most Important Attribute of Information Security
(Articles)
Suhail Qadir
,
S. M. K. Quadri
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73014
7,085
Downloads
20,328
Views
Citations
Information Systems Security Threats and Vulnerabilities: A Case of the Institute of Accountancy Arusha (IAA)
(Articles)
Adam Aloyce Semlambo
,
Didas Malekia Mfoi
,
Yona Sangula
Journal of Computer and Communications
Vol.10 No.11
,November 3, 2022
DOI:
10.4236/jcc.2022.1011003
224
Downloads
2,319
Views
Citations
Public-Key Cryptosystems with Secret Encryptor and Digital Signature
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61001
4,165
Downloads
6,082
Views
Citations
Analysis of the Problems of Ensuring Information Security in the Terms of the Contemporary Society
(Articles)
Dmitrii S. Brazevich
,
Zhanna S. Safronova
,
Tatyana N. Kosheleva
,
Alla V. Biryukova
Open Journal of Social Sciences
Vol.8 No.2
,February 28, 2020
DOI:
10.4236/jss.2020.82018
766
Downloads
2,579
Views
Citations
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.2
,February 26, 2011
DOI:
10.4236/ijcns.2011.42009
4,233
Downloads
7,718
Views
Citations
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles
(Articles)
Joe Mutebi
,
Margaret Kareyo
,
Umezuruike Chinecherem
,
Akampurira Paul
Journal of Computer and Communications
Vol.10 No.8
,August 17, 2022
DOI:
10.4236/jcc.2022.108004
172
Downloads
823
Views
Citations
Classification of Big Data Security Based on Ontology Web Language
(Articles)
Alsadig Mohammed Adam Abdallah
,
Amir Mohamed Talib
Journal of Information Security
Vol.14 No.1
,January 31, 2023
DOI:
10.4236/jis.2023.141006
156
Downloads
748
Views
Citations
Protection of Sensitive Messages Based on Quadratic Roots of Gaussians: Groups with Complex Modulus
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.5
,May 12, 2011
DOI:
10.4236/ijcns.2011.45033
3,845
Downloads
7,268
Views
Citations
Nelder-Mead Based Iterative Algorithm for Optimal Antenna Beam Patterns in Ad Hoc Networks
(Articles)
Vinay B. Ramakrishnaiah
,
Robert F. Kubichek
,
Suresh S. Muknahallipatna
Journal of Computer and Communications
Vol.5 No.7
,May 23, 2017
DOI:
10.4236/jcc.2017.57012
1,172
Downloads
2,098
Views
Citations
Performance Analysis of Techniques Used for Determining Land Mines
(Articles)
Yavuz Ege
,
Adnan Kakilli
,
Osman Kılıç
,
Hüseyin Çalık
,
Hakan Çıtak
,
Sedat Nazlıbilek
,
Osman Kalender
International Journal of Geosciences
Vol.5 No.10
,September 26, 2014
DOI:
10.4236/ijg.2014.510098
4,088
Downloads
5,986
Views
Citations
This article belongs to the Special Issue on
Geomagnetic Field
Robust Performance of Scene Matching Algorithm
(Articles)
Zhaohui Xia
,
Xiaogang Yang
,
Fei Meng
,
Shicheng Wang
Journal of Software Engineering and Applications
Vol.6 No.5B
,October 12, 2013
DOI:
10.4236/jsea.2013.65B002
3,751
Downloads
5,083
Views
Citations
A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers
(Articles)
Muhammad Ariful Islam
,
Md. Ashraful Islam
,
Nazrul Islam
,
Boishakhi Shabnam
Journal of Computer and Communications
Vol.6 No.3
,March 23, 2018
DOI:
10.4236/jcc.2018.63006
3,000
Downloads
8,262
Views
Citations
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm
(Articles)
Youhai Shao
,
Yong Wang
,
Yun Yang
,
Xiang Wang
Journal of Computer and Communications
Vol.10 No.1
,January 17, 2022
DOI:
10.4236/jcc.2022.101003
197
Downloads
1,301
Views
Citations
Impact of Information Technology on the Supply Chain Performance of the Car Segmentation Companies with Emphasis on the Integrity and Flexibility
(Articles)
Mahshid Mashreghi
,
Ebrahim Kalani
,
Alireza Elhami
,
Abas Farajpoor Alamdari
,
Iraj Bakhtiyari
,
Ehsan Kamrani
American Journal of Industrial and Business Management
Vol.8 No.2
,February 26, 2018
DOI:
10.4236/ajibm.2018.82021
1,053
Downloads
7,798
Views
Citations
Selection of Investment Basis Using Neural Networks in Stock Exchange
(Articles)
Ebrahim Kalani
,
Alireza Elhami
,
Reza Baradaran Kazem-Zadeh
,
Ehsan Kamrani
American Journal of Industrial and Business Management
Vol.8 No.3
,March 20, 2018
DOI:
10.4236/ajibm.2018.83036
718
Downloads
1,836
Views
Citations
Effects of Quality and Quantity of Information Processing on Design Coordination Performance
(Articles)
R. Zhang
,
A. M. M. Liu
,
I. Y. S. Chan
World Journal of Engineering and Technology
Vol.6 No.2B
,May 22, 2018
DOI:
10.4236/wjet.2018.62B005
637
Downloads
1,757
Views
Citations
Playing against Hedge
(Articles)
Miltiades E. Anagnostou
,
Maria A. Lambrou
Int'l J. of Communications, Network and System Sciences
Vol.7 No.12
,December 3, 2014
DOI:
10.4236/ijcns.2014.712050
2,479
Downloads
3,262
Views
Citations
Knowledge Economics: Summary and Rationality
(Articles)
Bhekuzulu Khumalo
Modern Economy
Vol.8 No.12
,December 19, 2017
DOI:
10.4236/me.2017.812102
758
Downloads
2,261
Views
Citations
On Secure Digital Image Watermarking Techniques
(Articles)
Manjit Thapa
,
Sandeep Kumar Sood
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24017
8,268
Downloads
18,390
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top