Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Multiple Architectural Approach for Urban Development Using Wearable IoT Devices: A Combined Machine Learning Approach
(Articles)
Raghu T Mylavarapu
,
Bharadwaja Krishnadev Mylavarapu
Advances in Internet of Things
Vol.8 No.3
,July 31, 2018
DOI:
10.4236/ait.2018.83003
1,256
Downloads
2,863
Views
Citations
Identity Authentication Based on Sensors of Smartphone and Neural Networks
(Articles)
Jingyong Zhu
,
Hanbing Fan
,
Yichen Huang
,
Miaomiao Lin
,
Tao Xu
,
Junqiang Cai
,
Zhengjie Wang
Journal of Computer and Communications
Vol.10 No.7
,July 29, 2022
DOI:
10.4236/jcc.2022.107006
109
Downloads
520
Views
Citations
Dynamic Programming for Estimating Acceptance Probability of Credit Card Products
(Articles)
Lai Soon Lee
,
Ya Mei Tee
,
Hsin Vonn Seow
Journal of Computer and Communications
Vol.5 No.14
,December 29, 2017
DOI:
10.4236/jcc.2017.514006
906
Downloads
1,966
Views
Citations
Public's Trade-off between a New Risk-based Airport Screening and Asserted Terror Risk Impact: A Stated Choice Survey from Norway
(Articles)
Knut Veisten
,
Stefan Flügel
,
Torkel Bjørnskau
Journal of Transportation Technologies
Vol.1 No.2
,April 28, 2011
DOI:
10.4236/jtts.2011.12003
4,987
Downloads
10,713
Views
Citations
Raising Local Architecture Identity through “Gotong-Royong” Work in Bajo Settings in Central Sulawesi, Indonesia
(Articles)
Zaenal Siradjuddin
Advances in Applied Sociology
Vol.10 No.6
,June 23, 2020
DOI:
10.4236/aasoci.2020.106015
435
Downloads
1,102
Views
Citations
This article belongs to the Special Issue on
Area Studies
Identity and Mobility in a Digital World
(Articles)
Ali M. Al-Khouri
Technology and Investment
Vol.4 No.1
,February 26, 2013
DOI:
10.4236/ti.2013.41002
5,837
Downloads
9,174
Views
Citations
The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols
(Articles)
Zhicai Shi
,
Shitao Ren
,
Fei Wu
,
Changzhi Wang
Journal of Computer and Communications
Vol.4 No.8
,June 17, 2016
DOI:
10.4236/jcc.2016.48001
2,029
Downloads
3,159
Views
Citations
A User Identity Management Protocol for Cloud Computing Paradigm
(Articles)
Safiriyu Eludiora
,
Olatunde Abiona
,
Ayodeji Oluwatope
,
Adeniran Oluwaranti
,
Clement Onime
,
Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences
Vol.4 No.3
,March 10, 2011
DOI:
10.4236/ijcns.2011.43019
9,475
Downloads
19,231
Views
Citations
A W-EAP Algorithm for IEC 61850 Protocol against DoS/Replay Attack
(Articles)
Minmin Xie
,
Yong Wang
,
Chunming Zou
,
Yingjie Tian
,
Naiwang Guo
Journal of Computer and Communications
Vol.8 No.11
,November 24, 2020
DOI:
10.4236/jcc.2020.811007
357
Downloads
1,031
Views
Citations
Research and Practice on High Availability Scheme of Unified Identity Authentication System Based on CAS in Colleges and Universities
(Articles)
Man Liu
,
Lei Yu
Journal of Information Security
Vol.14 No.1
,December 29, 2022
DOI:
10.4236/jis.2023.141002
131
Downloads
669
Views
Citations
Vehicle Relay Attack Avoidance Methods Using RF Signal Strength
(Articles)
Gyu-Ho Kim
,
Kwan-Hyung Lee
,
Shim-Soo Kim
,
Ju-Min Kim
Communications and Network
Vol.5 No.3C
,October 7, 2013
DOI:
10.4236/cn.2013.53B2103
7,226
Downloads
11,438
Views
Citations
An Anti-Eavesdropping Method in Data Collection of Smart Meter
(Articles)
Weiwei Dong
,
Yong Wang
,
Lin Zhou
,
Kanghua Cao
,
Haiming Li
Journal of Computer and Communications
Vol.7 No.9
,September 20, 2019
DOI:
10.4236/jcc.2019.79004
540
Downloads
1,456
Views
Citations
Home Automation Device Protocol (HADP): A Protocol Standard for Unified Device Interactions
(Articles)
Thomas Gonnot
,
Won-Jae Yi
,
Ehsan Monsef
,
Jafar Saniie
Advances in Internet of Things
Vol.5 No.4
,October 30, 2015
DOI:
10.4236/ait.2015.54005
5,476
Downloads
8,607
Views
Citations
Adaptation of Smart Antenna with AODV Routing Protocol for Ad Hoc Wireless Networks
(Articles)
Mebratu Fana Bedasa
,
Asrat Sime Bedada
,
Wesenu Bekele Mulatu
Open Access Library Journal
Vol.7 No.7
,July 28, 2020
DOI:
10.4236/oalib.1106504
333
Downloads
1,623
Views
Citations
Smart Grid Communication Using Open Smart Grid Protocol
(Articles)
Mazhar Hussain
,
Ali Zohair
,
Umar Saeed
,
Sohrab Mirsaeidi
,
Sijia Wang
Energy and Power Engineering
Vol.13 No.4B
,April 30, 2021
DOI:
10.4236/epe.2021.134B006
283
Downloads
1,791
Views
Citations
A Realistic ICT Network Design and Implementation in the Neighbourhood Area of the Smart Grid
(Articles)
Zoya Pourmirza
,
John M. Brooke
Smart Grid and Renewable Energy
Vol.4 No.6
,September 3, 2013
DOI:
10.4236/sgre.2013.46050
4,725
Downloads
6,809
Views
Citations
The Analysis and Amendment of Security System in 3G
(Articles)
Min ZHAO
,
Ling SHI
Intelligent Information Management
Vol.1 No.1
,July 31, 2009
DOI:
10.4236/iim.2009.11001
7,653
Downloads
11,792
Views
Citations
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model
(Articles)
Zhengtao JIANG
,
Yongbin WANG
,
Yong WANG
,
Yumin WANG
Intelligent Information Management
Vol.1 No.1
,July 31, 2009
DOI:
10.4236/iim.2009.11002
4,750
Downloads
8,278
Views
Citations
Application of a Dynamic Identity Authentication Model Based on an Improved Keystroke Rhythm Algorithm
(Articles)
Wenchuan YANG
,
Fang FANG
Int'l J. of Communications, Network and System Sciences
Vol.2 No.8
,November 17, 2009
DOI:
10.4236/ijcns.2009.28082
6,149
Downloads
10,125
Views
Citations
Saviynt Meets GCP: A Deep Dive into Integrated IAM for Modern Cloud Security
(Articles)
Sampath Talluri
Journal of Information Security
Vol.15 No.1
,December 25, 2023
DOI:
10.4236/jis.2024.151001
68
Downloads
314
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top