Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Improvement of Chen-Zhang-Liu’s IRPB Signature Scheme
(Articles)
Dezhi Gao
Intelligent Information Management
Vol.2 No.9
, October 13, 2010
DOI:
10.4236/iim.2010.29064
6,973
Downloads
10,578
Views
Citations
SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET
(Articles)
Tat Wing Chim
,
Jeanno Chin Long Cheung
,
Siu Ming Yiu
,
Lucas Chi Kwong Hui
,
Victor On Kwok Li
Journal of Information Security
Vol.3 No.1
, December 31, 2011
DOI:
10.4236/jis.2012.31007
5,084
Downloads
9,602
Views
Citations
HiMAC: Hierarchical Message Authentication Code for Secure Data Dissemination in Mobile Ad Hoc Networks
(Articles)
Khaleel Mershad
,
Ali Hamie
,
Mohamad Hamze
International Journal of Communications, Network and System Sciences
Vol.10 No.12
, December 15, 2017
DOI:
10.4236/ijcns.2017.1012018
1,177
Downloads
2,564
Views
Citations
Under What Condition Do We Get Improved Equalization Performance in the Residual ISI with Non-Biased Input Signals Compared with the Biased Version
(Articles)
Monika Pinchas
Journal of Signal and Information Processing
Vol.6 No.2
, April 2, 2015
DOI:
10.4236/jsip.2015.62008
3,561
Downloads
4,329
Views
Citations
Convolutional Noise Analysis via Large Deviation Technique
(Articles)
Monika Pinchas
Journal of Signal and Information Processing
Vol.6 No.4
, November 13, 2015
DOI:
10.4236/jsip.2015.64024
4,376
Downloads
5,251
Views
Citations
A Comparative Study of “as” and “Which” in Non-Restrictive Relative Clauses
(Articles)
Jiancheng Wang
,
Junhong Tang
Open Journal of Modern Linguistics
Vol.3 No.4
, November 8, 2013
DOI:
10.4236/ojml.2013.34046
4,604
Downloads
7,573
Views
Citations
Bright light enhances the efficiency of physical activity in combination with a restrictive diet
(Articles)
Boris B. Pinkhasov
,
Vera G. Selyatitskaya
,
Ani R. Karapetyan
Health
Vol.6 No.3
, February 8, 2014
DOI:
10.4236/health.2014.63030
3,645
Downloads
5,890
Views
Citations
This article belongs to the Special Issue on
Diet and Health
Quantum Group Signature Scheme Based on Chinese Remainder Theorem
(Articles)
Xin Sun
,
Ying Guo
,
Jinjing Shi
,
Wei Zhang
,
Qin Xiao
,
Moon Ho Lee
Journal of Software Engineering and Applications
Vol.6 No.5B
, October 12, 2013
DOI:
10.4236/jsea.2013.65B004
3,828
Downloads
5,810
Views
Citations
Trusted Blockchain Oracle Scheme Based on Aggregate Signature
(Articles)
Xiaodong Liu
,
Jun Feng
Journal of Computer and Communications
Vol.9 No.3
, March 30, 2021
DOI:
10.4236/jcc.2021.93007
901
Downloads
3,176
Views
Citations
A Collusion-Resistant Distributed Agent-Based Signature Delegation (CDASD) Protocol for E-Commerce Applications
(Articles)
Omaima Bamasak
Intelligent Information Management
Vol.2 No.4
, May 7, 2010
DOI:
10.4236/iim.2010.23031
4,160
Downloads
7,993
Views
Citations
Legal Analysis on Exchange of Right to Contract for the Rural Lands’ Management
(Articles)
Yang Yang
Advances in Applied Sociology
Vol.5 No.12
, December 29, 2015
DOI:
10.4236/aasoci.2015.512031
6,827
Downloads
7,829
Views
Citations
Restrictive versus Liberal Blood Transfusion Strategies in Egyptian Patients with Esophageal Variceal Bleeding
(Articles)
Sherif M. Galal
,
Soha A. Elhawari
,
Hosam M. Dawod
,
Ibrahim M. Ibrahim
Open Journal of Gastroenterology
Vol.6 No.5
, May 23, 2016
DOI:
10.4236/ojgas.2016.65020
2,015
Downloads
4,030
Views
Citations
Numerical Solution of the Diffusion Equation with Restrictive Pade Approximation
(Articles)
Ahmet Boz
,
Fevziye Gülsever
Journal of Applied Mathematics and Physics
Vol.4 No.11
, November 15, 2016
DOI:
10.4236/jamp.2016.411202
1,529
Downloads
3,173
Views
Citations
A Content Analysis of Serena Williams and Angelique Kerber’s Racial and Sexist Microagressions
(Articles)
Cynthia M. Frisby
Open Journal of Social Sciences
Vol.5 No.5
, May 23, 2017
DOI:
10.4236/jss.2017.55019
5,808
Downloads
14,328
Views
Citations
The Propositional Meaning, Implicature, and Restrictive Conditions of Ironic Discourse
(Articles)
Qianjun Luo
Open Access Library Journal
Vol.12 No.5
, May 30, 2025
DOI:
10.4236/oalib.1113446
44
Downloads
295
Views
Citations
A New Fast Iterative Blind Deconvolution Algorithm
(Articles)
Mamdouh F. Fahmy
,
Gamal M. Abdel Raheem
,
Usama S. Mohamed
,
Omar F. Fahmy
Journal of Signal and Information Processing
Vol.3 No.1
, February 29, 2012
DOI:
10.4236/jsip.2012.31013
8,928
Downloads
15,538
Views
Citations
Secure Chained Threshold Proxy Signature without and with Supervision
(Articles)
Zoe L. JIANG
,
S. M. YIU
,
Y. DONG
,
L. C. K. HUI
,
S. H. Y. WONG
Journal of Software Engineering and Applications
Vol.2 No.4
, November 27, 2009
DOI:
10.4236/jsea.2009.24034
4,901
Downloads
8,725
Views
Citations
Minimal Repair Redundancy for Coherent Systemin its Signatures Representation
(Articles)
Vanderlei da Costa Bueno
American Journal of Operations Research
Vol.1 No.1
, March 25, 2011
DOI:
10.4236/ajor.2011.11002
6,077
Downloads
10,940
Views
Citations
Techniques for the Extraction of Vibrational Signature: A New Method of Pottery Shard Identification
(Articles)
Baxton R. Chen
Archaeological Discovery
Vol.6 No.3
, June 19, 2018
DOI:
10.4236/ad.2018.63013
2,247
Downloads
3,424
Views
Citations
Exploration of Core Technologies of Cyber Security
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.8 No.9
, September 26, 2021
DOI:
10.4236/oalib.1107795
193
Downloads
1,349
Views
Citations
First
<
1
2
3
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top