Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols
(Articles)
Zhicai Shi
,
Shitao Ren
,
Fei Wu
,
Changzhi Wang
Journal of Computer and Communications
Vol.4 No.8
,June 17, 2016
DOI:
10.4236/jcc.2016.48001
2,035
Downloads
3,048
Views
Citations
The Research of Influence Factors of Online Behavioral Advertising Avoidance
(Articles)
Wen Li
,
Ziying Huang
American Journal of Industrial and Business Management
Vol.6 No.9
,September 14, 2016
DOI:
10.4236/ajibm.2016.69092
6,290
Downloads
10,948
Views
Citations
A Review of Gaps between Usability and Security/Privacy
(Articles)
Majed Alshamari
Int'l J. of Communications, Network and System Sciences
Vol.9 No.10
,October 25, 2016
DOI:
10.4236/ijcns.2016.910034
2,234
Downloads
6,052
Views
Citations
A Study on Differential Private Online Learning
(Articles)
Weilin Nie
,
Cheng Wang
Journal of Computer and Communications
Vol.5 No.2
,February 21, 2017
DOI:
10.4236/jcc.2017.52004
1,568
Downloads
2,431
Views
Citations
Survey on Three Components of Mobile Cloud Computing: Offloading, Distribution and Privacy
(Articles)
Anirudh Paranjothi
,
Mohammad S. Khan
,
Mais Nijim
Journal of Computer and Communications
Vol.5 No.6
,April 6, 2017
DOI:
10.4236/jcc.2017.56001
2,726
Downloads
6,752
Views
Citations
Internet of Things Behavioral-Economic Security Design, Actors & Cyber War
(Articles)
Robert L. Shuler
,
Billy G. Smith
Advances in Internet of Things
Vol.7 No.2
,April 30, 2017
DOI:
10.4236/ait.2017.72003
2,191
Downloads
3,942
Views
Citations
Error Analysis and Variable Selection for Differential Private Learning Algorithm
(Articles)
Weilin Nie
,
Cheng Wang
Journal of Applied Mathematics and Physics
Vol.5 No.4
,April 30, 2017
DOI:
10.4236/jamp.2017.54079
1,036
Downloads
1,596
Views
Citations
Optimized Homomorphic Scheme on Map Reduce for Data Privacy Preserving
(Articles)
Konan Martin
,
Wenyong Wang
,
Brighter Agyemang
Journal of Information Security
Vol.8 No.3
,July 25, 2017
DOI:
10.4236/jis.2017.83017
858
Downloads
1,911
Views
Citations
Security and Privacy-Preserving Metering Service in the Smart Grid
(Articles)
Zhongwei Sun
,
Chuqi Song
Int'l J. of Communications, Network and System Sciences
Vol.10 No.8B
,August 14, 2017
DOI:
10.4236/ijcns.2017.108B033
1,075
Downloads
2,309
Views
Citations
End-to-End Encryption in Messaging Services and National Security—Case of WhatsApp Messenger
(Articles)
Robert E. Endeley
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91008
10,930
Downloads
17,745
Views
Citations
Phishing Techniques in Mobile Devices
(Articles)
Belal Amro
Journal of Computer and Communications
Vol.6 No.2
,February 13, 2018
DOI:
10.4236/jcc.2018.62003
1,994
Downloads
5,158
Views
Citations
Associated Risks in Mobile Applications Permissions
(Articles)
Mohammed Al Jutail
,
Mousa Al-Akhras
,
Abdulaziz Albesher
Journal of Information Security
Vol.10 No.2
,March 26, 2019
DOI:
10.4236/jis.2019.102004
1,702
Downloads
5,686
Views
Citations
Privacy Level in Private Community Pharmacies in Saudi Arabia: A Simulated Client Survey
(Articles)
Hani M. J. Khojah
Pharmacology & Pharmacy
Vol.10 No.10
,October 22, 2019
DOI:
10.4236/pp.2019.1010036
827
Downloads
1,674
Views
Citations
Modeling Secure Home Area Network Based on IoT for Resource Constraints Environment
(Articles)
Minsu Park
,
Mwawi Kayuni
,
Tiwonge Manda
,
Hyunsung Kim
Journal of Computer and Communications
Vol.8 No.1
,January 10, 2020
DOI:
10.4236/jcc.2020.81004
640
Downloads
1,553
Views
Citations
Privacy Preservation of Smart Meters Based on Identity Authentication
(Articles)
Hongbo Hu
,
Xin Zhao
,
Yalian Wu
,
Mengbiao Huang
,
Ziqi Zhu
,
Qingyu Yang
Energy and Power Engineering
Vol.12 No.4B
,April 10, 2020
DOI:
10.4236/epe.2020.124B006
478
Downloads
1,194
Views
Citations
A Semantically Sensitive Privacy Protection Method for Trajectory Publishing
(Articles)
Zhijian Shao
,
Bingwen Feng
,
Xingzheng Li
Journal of Computer and Communications
Vol.9 No.4
,April 16, 2021
DOI:
10.4236/jcc.2021.94003
328
Downloads
997
Views
Citations
Transparency in a Digitally Intertwined World: A Hybrid Approach to Consumers’ Protection
(Articles)
Lydia Montalbano
Open Journal of Social Sciences
Vol.9 No.8
,August 31, 2021
DOI:
10.4236/jss.2021.98031
275
Downloads
1,164
Views
Citations
AudiTEE: Efficient, General-Purpose and Privacy-Preserving Audit for Distributed Ledgers
(Articles)
Zhufeng Ye
,
Zhenghao Wu
,
Xianglan Tian
Journal of Computer and Communications
Vol.9 No.8
,August 31, 2021
DOI:
10.4236/jcc.2021.98007
223
Downloads
816
Views
Citations
Data Misuse, Data Theft and Data Protection in Nigeria: A Call for a More Robust and More Effective Legislation
(Articles)
Abiodun Odusote
Beijing Law Review
Vol.12 No.4
,December 29, 2021
DOI:
10.4236/blr.2021.124066
334
Downloads
3,386
Views
Citations
This article belongs to the Special Issue on
Legal Awareness and Legal Culture
A Verifiable Credentials System with Privacy-Preserving Based on Blockchain
(Articles)
Zhiji Li
Journal of Information Security
Vol.13 No.2
,February 28, 2022
DOI:
10.4236/jis.2022.132003
519
Downloads
2,925
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top