Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Effect of Planting Methods on the Yield and Yield Attributes of Short Duration
Aman
Rice
(Articles)
Md. Masud Rana
,
Md. Abdullah Al Mamun
,
Afruz Zahan
,
Md. Nayeem Ahmed
,
Md. Abdul Jalil Mridha
American Journal of Plant Sciences
Vol.5 No.3
,January 26, 2014
DOI:
10.4236/ajps.2014.53033
6,126
Downloads
11,263
Views
Citations
Reference Encryption for Access Right Segregation and Domain Representation
(Articles)
Lanfranco Lopriore
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32010
3,444
Downloads
6,004
Views
Citations
An Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks
(Articles)
Benamar Kadri
,
Djilalli Moussaoui
,
Mohammed Feham
,
Abdellah Mhammed
Wireless Sensor Network
Vol.4 No.6
,June 13, 2012
DOI:
10.4236/wsn.2012.46022
5,423
Downloads
10,852
Views
Citations
New Practical Algebraic Public-Key Cryptosystem and Some Related Algebraic and Computational Aspects
(Articles)
S. K. Rososhek
Applied Mathematics
Vol.4 No.7
,July 11, 2013
DOI:
10.4236/am.2013.47142
3,560
Downloads
5,259
Views
Citations
Simulation Based Prospective Productivity Assessment of Complex Services
(Articles)
Andreas Petz
,
Sönke Duckwitz
,
Susanne Mütze-Niewöhner
,
Christopher M. Schlick
iBusiness
Vol.5 No.3B
,November 8, 2013
DOI:
10.4236/ib.2013.53B008
3,907
Downloads
5,067
Views
Citations
Population, Development and Deforestation in Songea District, Tanzania
(Articles)
Michael J. Haule
Natural Resources
Vol.5 No.1
,January 26, 2014
DOI:
10.4236/nr.2014.51004
4,395
Downloads
6,778
Views
Citations
Complexity and Uncertainty regarding Superannuation Do Not Explain Key Decisions Taken by Members
(Articles)
Necmi K. Avkiran
,
Elizabeth Zhu
Theoretical Economics Letters
Vol.8 No.11
,August 2, 2018
DOI:
10.4236/tel.2018.811135
717
Downloads
1,552
Views
Citations
This article belongs to the Special Issue on
Social Economics
A Clustering Algorithm for Key Frame Extraction Based on Density Peak
(Articles)
Hong Zhao
,
Tao Wang
,
Xiangyan Zeng
Journal of Computer and Communications
Vol.6 No.12
,December 26, 2018
DOI:
10.4236/jcc.2018.612012
961
Downloads
2,413
Views
Citations
Progress in Analysis of Key Technologies for Dynamic Wireless Charging of Electric Vehicles
(Articles)
Wanqing Li
,
Kai Wang
,
Pinduan Hu
Energy and Power Engineering
Vol.11 No.5
,May 24, 2019
DOI:
10.4236/epe.2019.115012
1,218
Downloads
2,262
Views
Citations
The Significant and Profound Impacts of Chou’s Distorted Key Theory for Developing Peptide Drugs
(Articles)
Kuo-Chen Chou
Natural Science
Vol.12 No.9
,September 10, 2020
DOI:
10.4236/ns.2020.129049
230
Downloads
666
Views
Citations
The Integration of Mainstream Psychotherapies in an Epistemological Framework
(Articles)
Zhizhong Kai
Open Journal of Social Sciences
Vol.9 No.1
,January 15, 2021
DOI:
10.4236/jss.2021.91005
519
Downloads
1,446
Views
Citations
A Complex Encryption System Design Implemented by AES
(Articles)
Zhimao Lu
,
Houmed Mohamed
Journal of Information Security
Vol.12 No.2
,April 30, 2021
DOI:
10.4236/jis.2021.122009
561
Downloads
3,656
Views
Citations
New Progress in CPK Public Key
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.8 No.8
,August 19, 2021
DOI:
10.4236/oalib.1107440
59
Downloads
521
Views
Citations
Analysis and Countermeasure Research on the Development Status of Guangdong Culture Tourism Industry
(Articles)
Guang Yang
Open Journal of Social Sciences
Vol.11 No.2
,February 10, 2023
DOI:
10.4236/jss.2023.112006
92
Downloads
543
Views
Citations
Description of Four New Species for the Genus Damasippus Stål, 1875 (Phasmida: Prisopodidae)
(Articles)
Marcela Sánchez-Ocampo
,
Diego Monge-Villegas
Advances in Entomology
Vol.11 No.2
,April 28, 2023
DOI:
10.4236/ae.2023.112009
82
Downloads
339
Views
Citations
Optimizing Business Performance through KPI Alignment: A Comprehensive Analysis of Key Performance Indicators and Strategic Objectives
(Articles)
Thea Thomas Mtau
,
Nelsen A. Rahul
American Journal of Industrial and Business Management
Vol.14 No.1
,January 31, 2024
DOI:
10.4236/ajibm.2024.141003
124
Downloads
681
Views
Citations
E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks
(Articles)
Hossein Fereidooni
,
Hassan Taheri
,
Mehran Mahramian
Int'l J. of Communications, Network and System Sciences
Vol.5 No.4
,April 19, 2012
DOI:
10.4236/ijcns.2012.54030
6,830
Downloads
11,237
Views
Citations
How a Key Currency Functions as an International Liquidity Provision and Insurance System
(Articles)
Masayuki Otaki
Theoretical Economics Letters
Vol.3 No.1
,February 26, 2013
DOI:
10.4236/tel.2013.31007
4,510
Downloads
7,485
Views
Citations
Timing Attack Analysis on AA
β
Cryptosystem
(Articles)
A. H. A. Ghafar
,
M. R. K. Ariffin
Journal of Computer and Communications
Vol.2 No.4
,March 17, 2014
DOI:
10.4236/jcc.2014.24001
3,499
Downloads
5,100
Views
Citations
Cryptographic Protocols Based on Nielsen Transformations
(Articles)
Benjamin Fine
,
Anja I. S. Moldenhauer
,
Gerhard Rosenberger
Journal of Computer and Communications
Vol.4 No.12
,October 31, 2016
DOI:
10.4236/jcc.2016.412004
1,531
Downloads
2,417
Views
Citations
This article belongs to the Special Issue on
Coding and Cryptography
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top