Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
An Improved Multiple to One Fully Homomorphic Encryption on the Integers
(Articles)
Chaoju Hu
,
Jianwei Zhao
Journal of Computer and Communications
Vol.6 No.9
,September 12, 2018
DOI:
10.4236/jcc.2018.69005
1,292
Downloads
2,946
Views
Citations
An Unbounded Fully Homomorphic Encryption Scheme Based on Ideal Lattices and Chinese Remainder Theorem
(Articles)
Zhiyong Zheng
,
Fengxia Liu
,
Kun Tian
Journal of Information Security
Vol.14 No.4
,October 11, 2023
DOI:
10.4236/jis.2023.144021
216
Downloads
916
Views
Citations
An Application of Linear Automata to Near Rings
(Articles)
Songfa You
,
Yijun Feng
,
Ming Cao
,
Yaping Wei
Applied Mathematics
Vol.3 No.11
,November 14, 2012
DOI:
10.4236/am.2012.311223
3,193
Downloads
5,243
Views
Citations
Jordan Semi-Triple Multiplicative Maps on the Symmetric Matrices
(Articles)
Xiaoning Hao
,
Pengxiang Ren
,
Runling An
Advances in Linear Algebra & Matrix Theory
Vol.3 No.2
,June 14, 2013
DOI:
10.4236/alamt.2013.32003
3,230
Downloads
7,414
Views
Citations
Complexity of Injective Homomorphisms to Small Tournaments, and of Injective Oriented Colourings
(Articles)
Russell J. Campbell
,
Nancy E. Clarke
,
Gary MacGillivray
Open Journal of Discrete Mathematics
Vol.13 No.1
,November 9, 2022
DOI:
10.4236/ojdm.2023.131001
144
Downloads
651
Views
Citations
Comparative Study of the Reliability and Complexity of Symmetrical and Asymmetrical Cryptosystems for the Protection of Academic Data in the Democratic Republic of Congo
(Articles)
Mugaruka Buduge Gulain
,
Jeremie Ndikumagenge
,
Buhendwa Nyenyezi Justin
,
Bulonza Masumbuko Alexis
,
Katho Seba Jacques
Journal of Information Security
Vol.15 No.3
,May 17, 2024
DOI:
10.4236/jis.2024.153017
115
Downloads
407
Views
Citations
Applications of Homomorphism on the Structure of Semigroups
(Articles)
Huishu Yuan
,
Xiangzhi Kong
Advances in Pure Mathematics
Vol.4 No.2
,February 28, 2014
DOI:
10.4236/apm.2014.42010
5,288
Downloads
8,869
Views
Citations
Application of the Todd-Coxeter Algorithm in the Computation of Group Theory
(Articles)
Moumouni Djassibo Woba
Advances in Linear Algebra & Matrix Theory
Vol.13 No.3
,October 25, 2024
DOI:
10.4236/alamt.2023.133003
62
Downloads
278
Views
Citations
Research on θ -Intuitionistic Fuzzy Homomorphism Theory
(Articles)
Yue Wang
,
Yan Yan
,
Xinru Shang
Journal of Applied Mathematics and Physics
Vol.12 No.10
,October 30, 2024
DOI:
10.4236/jamp.2024.1210213
29
Downloads
159
Views
Citations
Reduction in the Corrosion Rate of Magnesium and Magnesium Alloy Specimens and Implications for Plain Fully Bioresorbable Coronary Artery Stents: A Review
(Articles)
Gladius Lewis
World Journal of Engineering and Technology
Vol.4 No.4
,November 9, 2016
DOI:
10.4236/wjet.2016.44055
2,226
Downloads
4,256
Views
Citations
Discussion of New Padding Method in DES Encryption
(Articles)
Chengxia Liu
Journal of Software Engineering and Applications
Vol.5 No.12B
,January 17, 2013
DOI:
10.4236/jsea.2012.512B004
4,383
Downloads
6,467
Views
Citations
Improved High Definition Multimedia Interface Authentication Mechanism
(Articles)
R. N. Iyare
,
S. D. Walker
Journal of Computer and Communications
Vol.2 No.12
,October 22, 2014
DOI:
10.4236/jcc.2014.212003
3,494
Downloads
4,354
Views
Citations
Ambiguous Multi-Symmetric Scheme and Applications
(Articles)
Richard Bassous
,
Ahmad Mansour
,
Roger Bassous
,
Huirong Fu
,
Ye Zhu
,
George Corser
Journal of Information Security
Vol.8 No.4
,October 31, 2017
DOI:
10.4236/jis.2017.84024
1,271
Downloads
2,652
Views
Citations
Implementation of a Hybrid Triple-Data Encryption Standard and Blowfish Algorithms for Enhancing Image Security in Cloud Environment
(Articles)
Mohan Nagamunthala
,
Ramakrishnan Manjula
Journal of Computer and Communications
Vol.11 No.10
,October 31, 2023
DOI:
10.4236/jcc.2023.1110009
140
Downloads
762
Views
Citations
One Wire Is always Better
(Articles)
Michael Bank
,
Vladimir Tsingauz
Engineering
Vol.13 No.6
,June 25, 2021
DOI:
10.4236/eng.2021.136022
313
Downloads
1,339
Views
Citations
Image Encryption Algorithm Based on a Chaotic Iterative Process
(Articles)
Michael François
,
Thomas Grosges
,
Dominique Barchiesi
,
Robert Erra
Applied Mathematics
Vol.3 No.12
,December 17, 2012
DOI:
10.4236/am.2012.312262
6,072
Downloads
9,718
Views
Citations
Image Encryption Scheme Based on Filter Bank and Lifting
(Articles)
Saleh Saraireh
,
Yazeed Al-Sbou
,
Ja’afer Al-Saraireh
,
Othman Alsmadi
Int'l J. of Communications, Network and System Sciences
Vol.7 No.1
,January 24, 2014
DOI:
10.4236/ijcns.2014.71006
4,462
Downloads
6,920
Views
Citations
An Image Encryption Method Based on Quantum Fourier Transformation
(Articles)
Ying Liu
,
Bing Zhou
,
Zijing Li
,
Jiangnan Deng
,
Zhengying Cai
International Journal of Intelligence Science
Vol.8 No.3
,July 30, 2018
DOI:
10.4236/ijis.2018.83004
989
Downloads
2,069
Views
Citations
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform
(Articles)
Ashraful Tauhid
,
Maisha Tasnim
,
Saima Arifin Noor
,
Nuruzzaman Faruqui
,
Mohammad Abu Yousuf
Journal of Information Security
Vol.10 No.3
,July 2, 2019
DOI:
10.4236/jis.2019.103007
1,343
Downloads
4,506
Views
Citations
This article belongs to the Special Issue on
Security and Cryptography
CPK Public Key and Its Basic Functions
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.9 No.1
,January 14, 2022
DOI:
10.4236/oalib.1108287
78
Downloads
1,015
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top