Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Design and Implementation of Secure Nodes in the Based-Internet-of-Things Intelligent Household
(Articles)
Xiangdong Hu
,
Hongru Xu
,
Kaimin Han
Journal of Computer and Communications
Vol.2 No.7
,May 21, 2014
DOI:
10.4236/jcc.2014.27001
3,353
Downloads
4,451
Views
Citations
Analysis of Recent Secure Scan Test Techniques
(Articles)
Cheng Xing
,
Sungju Park
,
Ji Zhao
Journal of Software Engineering and Applications
Vol.9 No.3
,March 31, 2016
DOI:
10.4236/jsea.2016.93008
3,197
Downloads
4,150
Views
Citations
Secure Operation and Optimal Generation Scheduling Considering Battery Life for an Isolated Northwest Grid of Saudi Arabia
(Articles)
Hani Albalawi
,
Karthikeyan Balasubramaniam
,
Elham Makram
Journal of Power and Energy Engineering
Vol.5 No.1
,January 17, 2017
DOI:
10.4236/jpee.2017.51004
1,400
Downloads
2,312
Views
Citations
Towards the Development of Best Data Security for Big Data
(Articles)
Yuan Tian
Communications and Network
Vol.9 No.4
,November 30, 2017
DOI:
10.4236/cn.2017.94020
1,801
Downloads
4,900
Views
Citations
Highly Secure Residents Life Event Management System Based on Blockchain by Hyperledger Fabric
(Articles)
Ragouguelaba Agoda Koussema
,
Hirohide Haga
Journal of Computer and Communications
Vol.9 No.9
,September 17, 2021
DOI:
10.4236/jcc.2021.99003
284
Downloads
1,613
Views
Citations
Hyperchaotic Impulsive Synchronization and Digital Secure Communication
(Articles)
Mingjun Wang
,
Yujun Niu
,
Bing Gao
,
Qijie Zou
Journal of Applied Mathematics and Physics
Vol.10 No.12
,December 5, 2022
DOI:
10.4236/jamp.2022.1012230
83
Downloads
291
Views
Citations
Blockchain-Based Certificate Authentication System with Enabling Correction
(Articles)
Md. Mijanur Rahman
,
Md. Tanzinul Kabir Tonmoy
,
Saifur Rahman Shihab
,
Riya Farhana
Journal of Computer and Communications
Vol.11 No.3
,March 31, 2023
DOI:
10.4236/jcc.2023.113006
199
Downloads
2,112
Views
Citations
Opportunistic Relaying Technique over Rayleigh Fading Channel to Improve Multicast Security
(Articles)
Md. Shamim Hossain
,
Md. Zahurul Islam Sarkar
Journal of Computer and Communications
Vol.11 No.8
,August 29, 2023
DOI:
10.4236/jcc.2023.118010
66
Downloads
294
Views
Citations
General Purpose Wireless Communication System Using Data Acquisition
(Articles)
Abdullah Eroglu
,
Bill Westrick
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41007
7,063
Downloads
11,583
Views
Citations
A Space Unrestricted Multi-Robot Combat Internet of Things System
(Articles)
Omar Said
,
Mehedi Masud
Advances in Internet of Things
Vol.2 No.3
,July 26, 2012
DOI:
10.4236/ait.2012.23007
7,252
Downloads
13,451
Views
Citations
Impact of a Radio Frequency Electronic Article Surveillance (EAS) System on Active Implants
(Articles)
Norbert Leitgeb
,
Florian Niedermayr
,
Christoph Fuchs
Journal of Electromagnetic Analysis and Applications
Vol.4 No.9
,September 20, 2012
DOI:
10.4236/jemaa.2012.49049
5,503
Downloads
8,015
Views
Citations
Cost Analysis of Introducing a Log Identification System Using RFID in the Wood Supply Chain: A Case Study at a Swedish Forest Company
(Articles)
Daniel Timpe
,
Leif Olsson
,
Johan Sidén
American Journal of Industrial and Business Management
Vol.2 No.4
,October 31, 2012
DOI:
10.4236/ajibm.2012.24017
5,243
Downloads
8,472
Views
Citations
Dynamic 3-D Indoor Radio Propagation Model and Applications with Radios from 433 MHZ to 2.4 GHz
(Articles)
Yiming Ji
Int'l J. of Communications, Network and System Sciences
Vol.5 No.11
,November 26, 2012
DOI:
10.4236/ijcns.2012.511079
6,246
Downloads
9,065
Views
Citations
RFID Applications: Prospects and Challenges in Bangladesh
(Articles)
Abdul Kadar Muhammad Masum
,
Faruk Bhuiyan
,
Kazi Golam Azam
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42009
6,898
Downloads
10,720
Views
Citations
A Wireless Inductive-Capacitive Resonant Circuit Sensor Array for Force Monitoring
(Articles)
Andrew J. DeRouin
,
Brandon D. Pereles
,
Thadeus M. Sansom
,
Peng Zang
,
Keat Ghee Ong
Journal of Sensor Technology
Vol.3 No.3
,September 12, 2013
DOI:
10.4236/jst.2013.33011
5,453
Downloads
9,077
Views
Citations
A Single-Chip UHF RFID Reader Transceiver IC
(Articles)
Runxi Zhang
,
Chunqi Shi
,
Zongsheng Lai
Communications and Network
Vol.5 No.3C
,October 7, 2013
DOI:
10.4236/cn.2013.53B2101
5,262
Downloads
9,356
Views
Citations
Tri-Band Fractal Antennas for RFID Applications
(Articles)
Abdelati Reha
,
Ahmed Oulad Said
Wireless Engineering and Technology
Vol.4 No.4
,October 15, 2013
DOI:
10.4236/wet.2013.44025
7,765
Downloads
12,170
Views
Citations
Performance Analysis of RFID Framed Slotted Aloha Anti-Collision Protocol
(Articles)
Emad Felemban
Journal of Computer and Communications
Vol.2 No.1
,December 26, 2013
DOI:
10.4236/jcc.2014.21003
5,071
Downloads
7,879
Views
Citations
Recharging RFID Tags for Environmental Monitoring Using UAVs: A Feasibility Analysis
(Articles)
Marco Allegretti
,
Silvano Bertoldo
Wireless Sensor Network
Vol.7 No.2
,February 4, 2015
DOI:
10.4236/wsn.2015.72002
7,581
Downloads
8,829
Views
Citations
The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols
(Articles)
Zhicai Shi
,
Shitao Ren
,
Fei Wu
,
Changzhi Wang
Journal of Computer and Communications
Vol.4 No.8
,June 17, 2016
DOI:
10.4236/jcc.2016.48001
2,036
Downloads
3,064
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top