Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Design and Implementation of End to End Encrypted Short Message Service (SMS) Using Hybrid Cipher Algorithm
(Articles)
Emmanuel Nwabueze Ekwonwune
,
Victor Chibunna Enyinnaya
Journal of Software Engineering and Applications
Vol.13 No.3
,March 31, 2020
DOI:
10.4236/jsea.2020.133003
1,007
Downloads
4,812
Views
Citations
Proactive Security Mechanism and Design for Firewall
(Articles)
Saleem-Ullah Lar
,
Xiaofeng Liao
,
Aqeel ur Rehman
,
MA Qinglu
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23012
7,016
Downloads
13,030
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
1,011
Downloads
3,173
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
Research on New English Mobile Teaching Mode under the Impact of Mobile Internet Age
(Articles)
Dan Xu
Open Journal of Social Sciences
Vol.7 No.5
,May 13, 2019
DOI:
10.4236/jss.2019.75008
1,098
Downloads
2,491
Views
Citations
Application of Mobile Learning System in Operating System Course
(Articles)
Lingling Guo
,
Yu Fu
,
Xiaozhe Yin
,
Man Yuan
,
Fangzhou Zhang
,
Juntao Gao
Communications and Network
Vol.5 No.2
,May 10, 2013
DOI:
10.4236/cn.2013.52017
4,641
Downloads
8,231
Views
Citations
The Effect of Online-to-Mobile Trust Transfer on the Foundation of Mobile Banking Trust
(Articles)
Bangjun Wang
,
Chu Shan
Communications and Network
Vol.5 No.1B
,May 12, 2014
DOI:
10.4236/cn.2013.51B025
4,782
Downloads
6,257
Views
Citations
Adaptive Mobile Applications to Dynamic Context
(Articles)
Mao Zheng
,
Boheng Wei
,
Zhenyu Zhang
,
Xi Yan
Journal of Computer and Communications
Vol.2 No.9
,July 11, 2014
DOI:
10.4236/jcc.2014.29002
3,502
Downloads
4,789
Views
Citations
The Digital Age of Campus Maps on Mobile Devices
(Articles)
Fan Wu
,
Dwayne Clarke
,
Jian Jiang
,
Asif Baba
,
Sherman Buford
Journal of Computer and Communications
Vol.4 No.7
,May 19, 2016
DOI:
10.4236/jcc.2016.47004
2,640
Downloads
4,859
Views
Citations
Towards a Technology Agnostic Approach to Developing Mobile Applications and Services
(Articles)
Ian Warren
,
Andrew Meads
Journal of Software Engineering and Applications
Vol.10 No.6
,June 16, 2017
DOI:
10.4236/jsea.2017.106028
1,409
Downloads
2,425
Views
Citations
Load Density Analysis of Mobile Zigbee Coordinator in Hexagonal Configuration
(Articles)
S. R. Ramyah
Wireless Sensor Network
Vol.4 No.3
,March 30, 2012
DOI:
10.4236/wsn.2012.43009
6,021
Downloads
9,919
Views
Citations
Editorial: When the Cloud Computing Becomes Mobile!
(Editorial)
Al-Sakib Khan Pathan
International Journal of Internet and Distributed Systems
Vol.1 No.3
,July 16, 2013
DOI:
10.4236/ijids.2013.13003
4,544
Downloads
10,878
Views
Citations
Investigating the Relationship between Attachment Styles and the Manner of Mobile Phone Usage among Iranian Students
(Articles)
Hoseini Shadi
,
Toozandehjani Hassan
Social Networking
Vol.6 No.2
,April 30, 2017
DOI:
10.4236/sn.2017.62013
1,429
Downloads
2,947
Views
Citations
Self-Referencing Method for Relative Color Intensity Analysis Using Mobile-Phone
(Articles)
Wellington S. Souza
,
Marcos A. S. de Oliveira
,
Gabrielli M. F. de Oliveira
,
Dalton P. de Santana
,
Renato E. de Araujo
Optics and Photonics Journal
Vol.8 No.7
,July 27, 2018
DOI:
10.4236/opj.2018.87022
1,123
Downloads
2,614
Views
Citations
Histomorphological Changes in the Skin and Eye Induced by Sub-Chronic Exposure of Wistar Rats to 3G Cell Phone Radiation
(Articles)
Stephen Talba Diyong
,
Emmanuel Vandi Tizhe
,
Stephen Dasam Songden
Open Journal of Biophysics
Vol.8 No.4
,October 8, 2018
DOI:
10.4236/ojbiphy.2018.84015
809
Downloads
1,722
Views
Citations
Mobile Banking Adoption among Undergraduate Students in Kuwait University
(Articles)
Salha Alghareeb
Open Access Library Journal
Vol.9 No.6
,June 20, 2022
DOI:
10.4236/oalib.1106458
155
Downloads
1,431
Views
Citations
Research on the Contents and Indexes of Reservoir Operational Security
(Articles)
Jingchun Feng
,
Zhongnan Duan
Journal of Water Resource and Protection
Vol.2 No.11
,November 29, 2010
DOI:
10.4236/jwarp.2010.211115
6,086
Downloads
9,360
Views
Citations
Food Is Security: The Nexus of Health Security in Fragile and Failed States
(Articles)
John Quinn
,
Tomas Zeleny
,
Vladimir Bencko
Food and Nutrition Sciences
Vol.5 No.19
,October 14, 2014
DOI:
10.4236/fns.2014.519197
4,867
Downloads
6,342
Views
Citations
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach
(Articles)
Joseph E. Mbowe
,
Simon S. Msanjila
,
George S. Oreku
,
Khamisi Kalegele
Journal of Software Engineering and Applications
Vol.9 No.12
,December 30, 2016
DOI:
10.4236/jsea.2016.912041
1,691
Downloads
2,727
Views
Citations
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
(Articles)
Shawn Josette Roberts
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54014
6,412
Downloads
9,711
Views
Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
7,310
Downloads
10,467
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top