Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Decrypting the Digital Security Act of 2018 and Disclosing Its Unconstitutionality
(Articles)
Syed Menhazul Bari
Beijing Law Review
Vol.14 No.2
,June 25, 2023
DOI:
10.4236/blr.2023.142050
108
Downloads
961
Views
Citations
Dissent under Siege: Case Studies of Repression in the Digital Era of Bangladesh
(Articles)
Ahmed Tahsin Shams
Advances in Journalism and Communication
Vol.12 No.1
,March 29, 2024
DOI:
10.4236/ajc.2024.121011
37
Downloads
176
Views
Citations
Conventional and Improved Digital Signature Scheme: A Comparative Study
(Articles)
Alaa D. Alrehily
,
Asmaa F. Alotaibi
,
Suzan B. Almutairy
,
Mashael S. Alqhtani
,
Jayaprakash Kar
Journal of Information Security
Vol.6 No.1
,January 22, 2015
DOI:
10.4236/jis.2015.61007
6,049
Downloads
7,899
Views
Citations
Ethical and Legal Arguments about Telemedicine in Colombia
(Articles)
José Antonio García Pereáñez
Journal of Computer and Communications
Vol.5 No.3
,March 13, 2017
DOI:
10.4236/jcc.2017.53013
1,353
Downloads
2,663
Views
Citations
Exploration of Core Technologies of Cyber Security
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.8 No.9
,September 26, 2021
DOI:
10.4236/oalib.1107795
111
Downloads
894
Views
Citations
SCADA Framework Incorporating MANET and IDP for Cyber Security of Residential Microgrid Communication Network
(Articles)
Goutham K. Chalamasetty
,
Paras Mandal
,
Tzu-Liang (Bill) Tseng
Smart Grid and Renewable Energy
Vol.7 No.3
,March 29, 2016
DOI:
10.4236/sgre.2016.73007
2,505
Downloads
3,973
Views
Citations
Flaws in the Field of Digital Security in the Workplace: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Open Journal of Applied Sciences
Vol.12 No.12
,December 29, 2022
DOI:
10.4236/ojapps.2022.1212146
89
Downloads
384
Views
Citations
Combining Public Key Encryption with Schnorr Digital Signature
(Articles)
Laura Savu
Journal of Software Engineering and Applications
Vol.5 No.2
,February 27, 2012
DOI:
10.4236/jsea.2012.52016
9,319
Downloads
14,338
Views
Citations
Enhancing Police Officers’ Cybercrime Investigation Skills Using a Checklist Tool
(Articles)
Abdelkhalek Ibrahim Alastal
,
Ashraf Hassan Shaqfa
Journal of Data Analysis and Information Processing
Vol.11 No.2
,April 4, 2023
DOI:
10.4236/jdaip.2023.112008
246
Downloads
2,218
Views
Citations
An Analysis of Digital Records and Their Juridical Ramifications: Bangladesh Perspective
(Articles)
Mohammad Khabbab Taki
Beijing Law Review
Vol.14 No.4
,December 7, 2023
DOI:
10.4236/blr.2023.144106
47
Downloads
238
Views
Citations
Sensitive Information Security Based on Elliptic Curves
(Articles)
Nadine Nibigira
,
Vincent Havyarimana
,
Zhu Xiao
World Journal of Engineering and Technology
Vol.12 No.2
,April 23, 2024
DOI:
10.4236/wjet.2024.122018
41
Downloads
141
Views
Citations
On Secure Digital Image Watermarking Techniques
(Articles)
Manjit Thapa
,
Sandeep Kumar Sood
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24017
8,285
Downloads
17,882
Views
Citations
Features of Virus Detection Mechanism in Microsoft Security Essentials (Microsoft Forefront Endpoint Protection)
(Articles)
Dmitry Silnov
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42014
5,156
Downloads
8,392
Views
Citations
Dual Authentication Hashing for Security Enhancement in MANET
(Articles)
L. Raja
,
Dr. P. S. Periasamy
Circuits and Systems
Vol.7 No.4
,April 28, 2016
DOI:
10.4236/cs.2016.74030
1,594
Downloads
2,387
Views
Citations
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
(Articles)
P. Premkumar
,
D. Shanthi
Circuits and Systems
Vol.7 No.11
,September 13, 2016
DOI:
10.4236/cs.2016.711307
1,831
Downloads
3,104
Views
Citations
Geospatial Technology Potentials in Reawakening the Consciousness of Soil Distribution in Nigeria’s North-Central Region and Mediating the Herdsmen-Farmers Conflicts
(Articles)
Ugonna C. Nkwunonwo
,
Francis I. Okeke
,
Emmanuel N. Chiemelu
,
Elijah S. Ebinne
Journal of Geoscience and Environment Protection
Vol.7 No.2
,February 27, 2019
DOI:
10.4236/gep.2019.72011
796
Downloads
1,687
Views
Citations
Alteration of liver N-glycome in patients with hepatocellular carcinoma
(Articles)
Ling Wang
,
Valerie Vanhooren
,
Sylviane Dewaele
,
Xue-En Liu
,
Claude Libert
,
Feng-Min Lu
,
Hui Zhuang
,
Cuiying Chitty Chen
Open Journal of Gastroenterology
Vol.2 No.1
,February 15, 2012
DOI:
10.4236/ojgas.2012.21001
4,437
Downloads
8,401
Views
Citations
Electrochemical and Photoelectrochemical Decoloration of Amaranth Dye Azo Using Composited Dimensional Stable Anodes
(Articles)
Moisés I. Salazar-Gastélum
,
Edgar A. Reynoso-Soto
,
Shui W. Lin
,
Sergio Perez-Sicairos
,
Rosa M. Félix-Navarro
Journal of Environmental Protection
Vol.4 No.1
,January 29, 2013
DOI:
10.4236/jep.2013.41016
4,737
Downloads
7,195
Views
Citations
The CARES Act: Are the Tax and Financial Relief Provisions Sufficient in a Time of Economic Crisis?
(Articles)
Constance J. Crawford
,
Corinne L. Crawford
,
Glenn C. Vallach
Modern Economy
Vol.11 No.9
,September 21, 2020
DOI:
10.4236/me.2020.119108
491
Downloads
1,106
Views
Citations
Enhanced Spectrum Utilization for Existing Cellular Technologies Based on Genetic Algorithm in Preview of Cognitive Radio
(Articles)
K. SRIDHARA
,
Aritra NAYAK
,
Vikas SINGH
,
P. K. DALELA
Int'l J. of Communications, Network and System Sciences
Vol.2 No.9
,December 21, 2009
DOI:
10.4236/ijcns.2009.29107
4,960
Downloads
9,373
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top