Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Cryptographic Protocols Based on Nielsen Transformations
(Articles)
Benjamin Fine
,
Anja I. S. Moldenhauer
,
Gerhard Rosenberger
Journal of Computer and Communications
Vol.4 No.12
,October 31, 2016
DOI:
10.4236/jcc.2016.412004
1,531
Downloads
2,416
Views
Citations
This article belongs to the Special Issue on
Coding and Cryptography
Double Autocorrelation in Two Way Error Component Models
(Articles)
J. M. Bosson Brou
,
Eugene Kouassi
,
Kern O. Kymn
Open Journal of Statistics
Vol.1 No.3
,October 20, 2011
DOI:
10.4236/ojs.2011.13022
4,125
Downloads
7,462
Views
Citations
Network Connectivity Probability of Linear Vehicular Ad Hoc Networks on Two-Way Street
(Articles)
P. C. Neelakantan
,
A. V. Babu
Communications and Network
Vol.4 No.4
,November 30, 2012
DOI:
10.4236/cn.2012.44038
5,894
Downloads
9,294
Views
Citations
Secure Communications for Two-Way Relay Networks Via Relay Chatting
(Articles)
Jun Xiong
,
Dongtang Ma
,
Chunguo Liu
,
Xin Wang
Communications and Network
Vol.5 No.3C
,November 7, 2013
DOI:
10.4236/cn.2013.53B2009
2,541
Downloads
4,013
Views
Citations
The Correlation of Brand Equity and Crisis: A Review and Directions for Future Research
(Articles)
Liuying He
,
Yaxuan Ran
Modern Economy
Vol.6 No.3
,March 18, 2015
DOI:
10.4236/me.2015.63036
4,955
Downloads
7,282
Views
Citations
Diabetes and Periodontal Diseases: An Established Two-Way Relationship
(Articles)
Carlos Arana Molina
,
Luna Florencio Ojeda
,
María Sevillano Jiménez
,
Cristóbal Morales Portillo
,
Isabel Serrano Olmedo
,
Tomás Martín Hernández
,
Gerardo Gómez Moreno
Journal of Diabetes Mellitus
Vol.6 No.4
,September 13, 2016
DOI:
10.4236/jdm.2016.64024
3,500
Downloads
11,689
Views
Citations
Numerical Simulation of Fluid Structure Interaction between Flow and Steel Pipe Pile Platform in Deep Water
(Articles)
Wenyue Yan
,
Fengwu Lv
World Journal of Engineering and Technology
Vol.4 No.3C
,September 28, 2016
DOI:
10.4236/wjet.2016.43C011
1,412
Downloads
2,221
Views
Citations
An “Embedded” Mode of International Talent Training Boosts the Two-Way Opening of Higher Education
(Articles)
Weibo Zheng
,
Yilei Wen
,
Lu Zheng
Open Journal of Social Sciences
Vol.7 No.3
,March 13, 2019
DOI:
10.4236/jss.2019.73010
713
Downloads
1,308
Views
Citations
An Anti-Eavesdropping Method in Data Collection of Smart Meter
(Articles)
Weiwei Dong
,
Yong Wang
,
Lin Zhou
,
Kanghua Cao
,
Haiming Li
Journal of Computer and Communications
Vol.7 No.9
,September 20, 2019
DOI:
10.4236/jcc.2019.79004
529
Downloads
1,426
Views
Citations
Profile Generation Methods for Reinforcing Robustness of Keystroke Authentication in Free Text Typing
(Articles)
Yoshitomo Matsubara
,
Toshiharu Samura
,
Haruhiko Nishimura
Journal of Information Security
Vol.6 No.2
,April 16, 2015
DOI:
10.4236/jis.2015.62014
4,919
Downloads
6,238
Views
Citations
Simulated Minimum Cramér-Von Mises Distance Estimation for Some Actuarial and Financial Models
(Articles)
Andrew Luong
,
Christopher Blier-Wong
Open Journal of Statistics
Vol.7 No.5
,October 25, 2017
DOI:
10.4236/ojs.2017.75058
992
Downloads
1,866
Views
Citations
Electrical Energy Quality Analysis in Hospital Centres
(Articles)
Abdourahimoun Daouda
,
Sani Idi Boubabacar
,
Moctar Mossi Idrissa
,
Saidou Madougou
Smart Grid and Renewable Energy
Vol.12 No.4
,April 30, 2021
DOI:
10.4236/sgre.2021.124004
262
Downloads
1,048
Views
Citations
Continuous Controller Design for Quantum Shannon Entropy
(Articles)
Yifan Xing
,
Wensen Huang
,
Jinhui Zhao
Intelligent Control and Automation
Vol.7 No.3
,July 14, 2016
DOI:
10.4236/ica.2016.73007
1,790
Downloads
2,511
Views
Citations
The Deutsch-Jozsa Algorithm Can Be Used for Quantum Key Distribution
(Articles)
Koji Nagata
,
Tadao Nakamura
Open Access Library Journal
Vol.2 No.8
,August 14, 2015
DOI:
10.4236/oalib.1101798
1,529
Downloads
2,953
Views
Citations
Efficient Three-Party Quantum Secure Direct Communication with EPR Pairs
(Articles)
Xunru Yin
,
Wenping Ma
,
Dongsu Shen
,
Chaoyang Hao
Journal of Quantum Information Science
Vol.3 No.1
,March 29, 2013
DOI:
10.4236/jqis.2013.31001
3,466
Downloads
6,605
Views
Citations
Improved Riemann Ladder Function
(Articles)
Dan Liu
Journal of Applied Mathematics and Physics
Vol.9 No.4
,April 16, 2021
DOI:
10.4236/jamp.2021.94042
234
Downloads
640
Views
Citations
General Operational Protocol for Coherence. Central Limit Theorem as Approximation
(Articles)
Maria K. Koleva
Journal of Modern Physics
Vol.12 No.5
,April 16, 2021
DOI:
10.4236/jmp.2021.125039
221
Downloads
699
Views
Citations
Uniformly Minimum-Variance Unbiased Estimator (UMVUE) for the Gamma Cumulative Distribution Function with Known and Integer Scale Parameter
(Articles)
Jessica Kubrusly
Open Journal of Statistics
Vol.12 No.2
,April 2, 2022
DOI:
10.4236/ojs.2022.122011
163
Downloads
2,518
Views
Citations
The Analysis and Amendment of Security System in 3G
(Articles)
Min ZHAO
,
Ling SHI
Intelligent Information Management
Vol.1 No.1
,July 31, 2009
DOI:
10.4236/iim.2009.11001
7,641
Downloads
11,771
Views
Citations
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model
(Articles)
Zhengtao JIANG
,
Yongbin WANG
,
Yong WANG
,
Yumin WANG
Intelligent Information Management
Vol.1 No.1
,July 31, 2009
DOI:
10.4236/iim.2009.11002
4,745
Downloads
8,268
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top