Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Research on compound chaos image encryption method with clock- varying
(Articles)
Xing MENG
,
XiaoMan WANG
,
Ying CHU
Open Journal of Applied Sciences
Vol.2 No.4B
,January 9, 2013
DOI:
10.4236/ojapps.2012.24B003
3,478
Downloads
5,009
Views
Citations
Parallel Key Insulated ID-Based Public Key Cryptographic Primitive with Outsourced Equality Test
(Articles)
Seth Alornyo
,
Mustapha Adamu Mohammed
,
Bright Anibrika Selorm Kodzo
,
Pious Akwasi Sarpong
,
Michael Asante
Journal of Computer and Communications
Vol.8 No.12
,December 30, 2020
DOI:
10.4236/jcc.2020.812018
366
Downloads
997
Views
Citations
Efficient FPGA implementation of AES 128 bit for IEEE 802.16e mobile WiMax standards
(Articles)
P. Rajasekar
,
Dr. H. Mangalam
Circuits and Systems
Vol.7 No.4
,April 28, 2016
DOI:
10.4236/cs.2016.74032
2,304
Downloads
3,930
Views
Citations
AES RSA-SM2 Algorithm against Man-in-the-Middle Attack in IEC 60870-5-104 Protocol
(Articles)
Shan Shi
,
Yong Wang
,
Cunming Zou
,
Yingjie Tian
Journal of Computer and Communications
Vol.10 No.1
,January 13, 2022
DOI:
10.4236/jcc.2022.101002
229
Downloads
1,712
Views
Citations
Distributed File System Based on a Relational Database
(Articles)
Vladyslav Kutsman
Open Journal of Applied Sciences
Vol.13 No.5
,May 16, 2023
DOI:
10.4236/ojapps.2023.135051
75
Downloads
636
Views
Citations
On Rijndael ByteSub Transformation
(Articles)
W. Eltayeb Ahmed
Applied Mathematics
Vol.10 No.3
,March 28, 2019
DOI:
10.4236/am.2019.103010
719
Downloads
1,803
Views
Citations
Parity Violation in Weak Nuclear Interactions
(Articles)
Brian Albert Robson
Journal of High Energy Physics, Gravitation and Cosmology
Vol.8 No.2
,April 11, 2022
DOI:
10.4236/jhepgc.2022.82027
148
Downloads
1,245
Views
Citations
Transmission over Cognitive Radio Channel with Novel Secure LT Code
(Articles)
Elham Hosseini
,
Abolfazl Falahati
Communications and Network
Vol.5 No.3
,August 2, 2013
DOI:
10.4236/cn.2013.53023
4,804
Downloads
6,786
Views
Citations
Frequency Hopping Spread Spectrum Security Improvement with Encrypted Spreading Codes in a Partial Band Noise Jamming Environment
(Articles)
Amirhossein Ebrahimzadeh
,
Abolfazl Falahati
Journal of Information Security
Vol.4 No.1
,January 30, 2013
DOI:
10.4236/jis.2013.41001
5,898
Downloads
10,796
Views
Citations
Establishment and Application of Cryptographic Library Model
(Articles)
Tie-Ming Liu
,
Lie-Hui Jiang
,
Jing Jing
,
Yuan-Yuan Zhang
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35003
3,828
Downloads
4,759
Views
Citations
Improved Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords
(Articles)
Ping Zhang
,
Jianzhong Wang
Journal of Computer and Communications
Vol.3 No.9
,September 28, 2015
DOI:
10.4236/jcc.2015.39010
3,542
Downloads
4,366
Views
Citations
Blockchain-Based Islamic Marriage Certification with the Supremacy of Web 3.0
(Articles)
Md. Al-Sajiduzzaman Akand
,
Sarwar Azmain Reza
,
Amatul Bushra Akhi
Intelligent Control and Automation
Vol.13 No.4
,November 30, 2022
DOI:
10.4236/ica.2022.134004
126
Downloads
878
Views
Citations
Analysis of Secured Cloud Data Storage Model for Information
(Articles)
Emmanuel Nwabueze Ekwonwune
,
Udo Chukwuebuka Chigozie
,
Duroha Austin Ekekwe
,
Georgina Chekwube Nwankwo
Journal of Software Engineering and Applications
Vol.17 No.5
,May 28, 2024
DOI:
10.4236/jsea.2024.175017
20
Downloads
79
Views
Citations
A Modern Method for Constructing the S-Box of Advanced Encryption Standard
(Articles)
W. Eltayeb Ahmed
Applied Mathematics
Vol.10 No.4
,April 29, 2019
DOI:
10.4236/am.2019.104018
1,022
Downloads
6,707
Views
Citations
Standard Model Particles with Mass Treated as Spheres with Finite Radii
(Articles)
T. R. Mongan
Journal of Modern Physics
Vol.11 No.12
,December 21, 2020
DOI:
10.4236/jmp.2020.1112126
390
Downloads
1,072
Views
Citations
A Homomorphic Crypto System for Electronic Election Schemes
(Articles)
Kannan Balasubramanian
,
M. Jayanthi
Circuits and Systems
Vol.7 No.10
,August 23, 2016
DOI:
10.4236/cs.2016.710272
2,397
Downloads
4,381
Views
Citations
Enhanced Euclid Algorithm for Modular Multiplicative Inverse and Its Application in Cryptographic Protocols
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.3 No.12
,December 27, 2010
DOI:
10.4236/ijcns.2010.312123
6,661
Downloads
11,901
Views
Citations
Space Complexity of Algorithm for Modular Multiplicative Inverse
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.6
,June 17, 2011
DOI:
10.4236/ijcns.2011.46041
4,133
Downloads
7,757
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
3,942
Downloads
4,887
Views
Citations
Enhancing Mobile Cloud Computing Security Using Steganography
(Articles)
Hassan Reza
,
Madhuri Sonawane
Journal of Information Security
Vol.7 No.4
,July 19, 2016
DOI:
10.4236/jis.2016.74020
3,548
Downloads
6,350
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top