Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Analysis of Database Security
(Articles)
Xueying Pan
,
Anthony Obahiaghon
,
Brendan Makar
,
Samuel Wilson
,
Christian Beard
Open Access Library Journal
Vol.11 No.4
,April 15, 2024
DOI:
10.4236/oalib.1111366
23
Downloads
179
Views
Citations
HiMAC: Hierarchical Message Authentication Code for Secure Data Dissemination in Mobile Ad Hoc Networks
(Articles)
Khaleel Mershad
,
Ali Hamie
,
Mohamad Hamze
Int'l J. of Communications, Network and System Sciences
Vol.10 No.12
,December 15, 2017
DOI:
10.4236/ijcns.2017.1012018
1,007
Downloads
2,099
Views
Citations
A Geographic Information System Applied to Coverage Maps of 3G Cellular Communications Networks
(Articles)
Jazmín Ponce-Rojas
,
Sergio Vidal-Beltrán
,
Marco A. Acevedo-Mosqueda
,
Montserrat Jimenez-Licea
Journal of Geographic Information System
Vol.3 No.2
,April 18, 2011
DOI:
10.4236/jgis.2011.32010
5,624
Downloads
10,309
Views
Citations
Corporate Intranet Security: Packet-Level Protocols for Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic
(Articles)
Boris S. Verkhovsky
,
Roberto D. Rubino
Int'l J. of Communications, Network and System Sciences
Vol.5 No.5
,May 30, 2012
DOI:
10.4236/ijcns.2012.55033
4,921
Downloads
7,211
Views
Citations
Face Recognition across Time Lapse Using Convolutional Neural Networks
(Articles)
Hachim El Khiyari
,
Harry Wechsler
Journal of Information Security
Vol.7 No.3
,April 11, 2016
DOI:
10.4236/jis.2016.73010
5,788
Downloads
9,806
Views
Citations
Dual Authentication Hashing for Security Enhancement in MANET
(Articles)
L. Raja
,
Dr. P. S. Periasamy
Circuits and Systems
Vol.7 No.4
,April 28, 2016
DOI:
10.4236/cs.2016.74030
1,586
Downloads
2,439
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
1,894
Downloads
5,145
Views
Citations
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations
(Articles)
Ezer Osei Yeboah-Boateng
,
Grace Dzifa Kwabena-Adade
Journal of Information Security
Vol.11 No.3
,July 17, 2020
DOI:
10.4236/jis.2020.113011
1,191
Downloads
3,220
Views
Citations
Modified Vanstone’s Construction of lightweight MAC for Vehicular On-Board IT Systems
(Articles)
István Vajda
Journal of Computer and Communications
Vol.8 No.12
,December 30, 2020
DOI:
10.4236/jcc.2020.812019
248
Downloads
722
Views
Citations
Use of AI Voice Authentication Technology Instead of Traditional Keypads in Security Devices
(Articles)
Deepak Ramesh Chandran
Journal of Computer and Communications
Vol.10 No.6
,June 13, 2022
DOI:
10.4236/jcc.2022.106002
246
Downloads
2,164
Views
Citations
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network
(Articles)
Conrad K. Simatimbe
,
Smart Charles Lubobya
Journal of Computer and Communications
Vol.8 No.9
,September 25, 2020
DOI:
10.4236/jcc.2020.89009
609
Downloads
2,863
Views
Citations
TUP: A New eCK-Secure AKE Protocol under the CDH Assumption
(Articles)
Qinglei Zhou
,
Zengfu Yang
Int'l J. of Communications, Network and System Sciences
Vol.5 No.6
,June 12, 2012
DOI:
10.4236/ijcns.2012.56043
3,429
Downloads
5,984
Views
Citations
A Simple Security Proof for Entanglement-Based Quantum Key Distribution
(Articles)
Mhlambululi Mafu
Journal of Quantum Information Science
Vol.6 No.4
,December 21, 2016
DOI:
10.4236/jqis.2016.64018
1,994
Downloads
4,608
Views
Citations
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
(Articles)
Mohammad Anwar Hossain
,
Ahsan Ullah
,
Newaz Ibrahim Khan
,
Md Feroz Alam
Journal of Information Security
Vol.10 No.4
,October 14, 2019
DOI:
10.4236/jis.2019.104012
1,227
Downloads
5,427
Views
Citations
Practical Security of the Continuous-Variable Quantum Key Distribution with Locally-Generated Local Oscillators
(Articles)
Biao Huang
,
Yongjun Zhu
,
Pu Tang
,
Yongmei Huang
,
Zhenming Peng
Journal of Applied Mathematics and Physics
Vol.7 No.11
,November 13, 2019
DOI:
10.4236/jamp.2019.711188
482
Downloads
1,192
Views
Citations
Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing
(Articles)
Danwei Chen
,
Xizhou Yu
,
Xianghui Dong
Wireless Sensor Network
Vol.2 No.5
,May 27, 2010
DOI:
10.4236/wsn.2010.24049
5,505
Downloads
9,852
Views
Citations
Address Resolution Protocol (ARP): Spoofing Attack and Proposed Defense
(Articles)
Ghazi Al Sukkar
,
Ramzi Saifan
,
Sufian Khwaldeh
,
Mahmoud Maqableh
,
Iyad Jafar
Communications and Network
Vol.8 No.3
,July 14, 2016
DOI:
10.4236/cn.2016.83012
3,659
Downloads
9,072
Views
Citations
A Control Mechanism of Stream Media Based on 3G Network
(Articles)
Wei Jiang
,
Liming Meng
,
Songxiang Ying
,
Hong Peng
,
Zhijiang Xu
Journal of Software Engineering and Applications
Vol.5 No.12B
,January 17, 2013
DOI:
10.4236/jsea.2012.512B002
3,634
Downloads
5,355
Views
Citations
Design of On-Line Monitoring System for UHVDC Earth Electrode
(Articles)
Pinghao Ni
,
Wei Wang
,
Peng Wei
Journal of Power and Energy Engineering
Vol.4 No.2
,February 18, 2016
DOI:
10.4236/jpee.2016.42002
3,620
Downloads
4,495
Views
Citations
Design and Implementation of End to End Encrypted Short Message Service (SMS) Using Hybrid Cipher Algorithm
(Articles)
Emmanuel Nwabueze Ekwonwune
,
Victor Chibunna Enyinnaya
Journal of Software Engineering and Applications
Vol.13 No.3
,March 31, 2020
DOI:
10.4236/jsea.2020.133003
1,006
Downloads
4,809
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top