Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Atomic-Scale AES-EELS Analysis of Structure-Phase State and Growth Mechanism of Layered Nanostructures
(Articles)
Nikolay I. Plusnin
Advances in Materials Physics and Chemistry
Vol.6 No.7
,July 5, 2016
DOI:
10.4236/ampc.2016.67020
1,770
Downloads
2,679
Views
Citations
This article belongs to the Special Issue on
Surface and Interface Science
Efficient DPA Attacks on AES Hardware Implementations
(Articles)
Yu HAN
,
Xuecheng ZOU
,
Zhenglin LIU
,
Yicheng CHEN
Int'l J. of Communications, Network and System Sciences
Vol.1 No.1
,June 6, 2008
DOI:
10.4236/ijcns.2008.11010
7,764
Downloads
16,697
Views
Citations
Iterating with Fuzzy Parameters to Produce Exact Results
(Articles)
Edwin Eugene Klingman
Applied Mathematics
Vol.11 No.11
,November 6, 2020
DOI:
10.4236/am.2020.1111072
297
Downloads
794
Views
Citations
Higher Order Iteration Schemes for Unconstrained Optimization
(Articles)
Yangyang Shi
,
Pingqi Pan
American Journal of Operations Research
Vol.1 No.3
,September 30, 2011
DOI:
10.4236/ajor.2011.13011
6,326
Downloads
10,795
Views
Citations
An Iteration Method to Solve the Boundary Layer Flow past a Flat Plate
(Articles)
Ken-ichi Kusukawa
,
Shigeaki Suwa
,
Takeo R. M. Nakagawa
Journal of Applied Mathematics and Physics
Vol.2 No.4
,March 13, 2014
DOI:
10.4236/jamp.2014.24005
3,649
Downloads
6,951
Views
Citations
Exploring the Origin of Mathematical Economics
(Articles)
Balbir S. Sihag
Theoretical Economics Letters
Vol.6 No.1
,February 16, 2016
DOI:
10.4236/tel.2016.61011
4,778
Downloads
8,764
Views
Citations
Secure File Multi Transfer Protocol Design
(Articles)
Murali Krishna
,
Pradeep Jamwal
,
K. S. R. Chaitanya
,
B. Vinod Kumar
Journal of Software Engineering and Applications
Vol.4 No.5
,May 26, 2011
DOI:
10.4236/jsea.2011.45034
5,145
Downloads
9,070
Views
Citations
Analyzing Computational Components of Standard Block Encryption Schemes
(Articles)
Chu-Wen Cheng
,
Miranda Heather Cantu
,
Sanjeev Kumar
Journal of Computer and Communications
Vol.10 No.6
,June 30, 2022
DOI:
10.4236/jcc.2022.106007
103
Downloads
611
Views
Citations
This article belongs to the Special Issue on
Data Science and Applications
On the Infinite Products of Matrices
(Articles)
Yousry S. Hanna
,
Samya F. Ragheb
Advances in Pure Mathematics
Vol.2 No.5
,September 26, 2012
DOI:
10.4236/apm.2012.25050
3,869
Downloads
7,433
Views
Citations
Applied Orthogonal Experiment Design for the Optimum Extraction Conditions of High Concentration Selenium from Maifanite
(Articles)
Hailin Liao
,
Lingfeng Jiang
,
Chunjie Wei
,
Hua Huang
,
Jing Pan
,
Chuntao Luo
Detection
Vol.5 No.1
,January 31, 2017
DOI:
10.4236/detection.2017.51001
2,845
Downloads
3,566
Views
Citations
Novel Hybrid Encryption Algorithm Based on Aes, RSA, and Twofish for Bluetooth Encryption
(Articles)
Marwan Ali Albahar
,
Olayemi Olawumi
,
Keijo Haataja
,
Pekka Toivanen
Journal of Information Security
Vol.9 No.2
,April 9, 2018
DOI:
10.4236/jis.2018.92012
1,960
Downloads
6,419
Views
Citations
A Complex Encryption System Design Implemented by AES
(Articles)
Zhimao Lu
,
Houmed Mohamed
Journal of Information Security
Vol.12 No.2
,April 30, 2021
DOI:
10.4236/jis.2021.122009
561
Downloads
3,652
Views
Citations
A Note on Discontinuous Functions with Continuous Second Iterate
(Articles)
Pingping Zhang
,
Xiaobing Gong
Journal of Applied Mathematics and Physics
Vol.3 No.6
,June 30, 2015
DOI:
10.4236/jamp.2015.36082
3,614
Downloads
4,356
Views
Citations
Higher Order Aitken Extrapolation with Application to Converging and Diverging Gauss-Seidel Iterations
(Articles)
Ababu Teklemariam Tiruneh
Journal of Applied Mathematics and Physics
Vol.1 No.5
,November 12, 2013
DOI:
10.4236/jamp.2013.15019
3,741
Downloads
7,098
Views
Citations
Investigation by AES, EELS and TRIM Simulation Method of InP(100) Subjected to He
+
and H
+
Ions Bombardment
(Articles)
Mohamed Ghaffour
,
Abdellaoui Abdellaoui
,
Abdellah Ouerdane
,
M'Hammed Bouslama
,
Christian Jardin
Materials Sciences and Applications
Vol.2 No.5
,May 23, 2011
DOI:
10.4236/msa.2011.25055
4,890
Downloads
8,614
Views
Citations
Improvement of the Round Key Generation of AES
(Articles)
Junshe Wang
,
Han Xu
,
Mingqiu Yao
Int'l J. of Communications, Network and System Sciences
Vol.5 No.12
,December 27, 2012
DOI:
10.4236/ijcns.2012.512090
4,189
Downloads
6,497
Views
Citations
The Effect of Storage Solutions on Mineral Content of Enamel
(Articles)
Asli Secilmis
,
Erhan Dilber
,
Nilgun Ozturk
,
Fatma Gokmen Yilmaz
Materials Sciences and Applications
Vol.4 No.7
,July 2, 2013
DOI:
10.4236/msa.2013.47053
6,642
Downloads
10,662
Views
Citations
Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm
(Articles)
Omer K. Jasim
,
Safia Abbas
,
El-Sayed M. Horbaty
,
Abdel-Badeeh M. Salem
Journal of Information Security
Vol.6 No.2
,March 12, 2015
DOI:
10.4236/jis.2015.62009
4,682
Downloads
6,183
Views
Citations
Ant Routing Protocol with Location Services in Intermittently Connected MANETs
(Articles)
S. Ramesh
,
R. Indira
Circuits and Systems
Vol.7 No.7
,May 27, 2016
DOI:
10.4236/cs.2016.77092
1,735
Downloads
2,678
Views
Citations
This article belongs to the Special Issue on
Emerging Technology Trends in Circuits and Systems
Security Framework for Distributed Database System
(Articles)
Allajabu Dafalla Khamis
,
Saad Subair
Journal of Data Analysis and Information Processing
Vol.7 No.1
,December 17, 2018
DOI:
10.4236/jdaip.2019.71001
1,224
Downloads
2,965
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top