Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Diffusion Analysis of Message Expansion in STITCH-256
(Articles)
Norziana Jamil
,
Ramlan Mahmod
,
Muhammad Reza Z’aba
,
Nur Izura Udzir
,
Zuriati Ahmad Zukarnain
Journal of Information Security
Vol.4 No.3
,July 12, 2013
DOI:
10.4236/jis.2013.43015
3,486
Downloads
5,776
Views
Citations
The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols
(Articles)
Zhicai Shi
,
Shitao Ren
,
Fei Wu
,
Changzhi Wang
Journal of Computer and Communications
Vol.4 No.8
,June 17, 2016
DOI:
10.4236/jcc.2016.48001
2,103
Downloads
3,247
Views
Citations
Tree-Based Revocation for Certificateless Authentication in Vehicular Ad-Hoc Networks
(Articles)
Pino Caballero-Gil
,
Francisco Martín-Fernández
,
Cándido Caballero-Gil
Journal of Computer and Communications
Vol.2 No.9
,July 11, 2014
DOI:
10.4236/jcc.2014.29003
3,770
Downloads
4,703
Views
Citations
Deployment of Hash Function to Enhance Message Integrity in Wireless Body Area Network (WBAN)
(Articles)
Ahmed Alzubi
,
Arif Sari
Int'l J. of Communications, Network and System Sciences
Vol.9 No.12
,December 30, 2016
DOI:
10.4236/ijcns.2016.912047
1,769
Downloads
3,384
Views
Citations
Image Retrieval Using Deep Convolutional Neural Networks and Regularized Locality Preserving Indexing Strategy
(Articles)
Xiaoxiao Ma
,
Jiajun Wang
Journal of Computer and Communications
Vol.5 No.3
,March 13, 2017
DOI:
10.4236/jcc.2017.53004
1,504
Downloads
3,313
Views
Citations
Hybrid Key Duplication Hashing Techniques for IP Address Lookup
(Articles)
Rujiroj Tiengtavat
,
Wei-Ming Lin
Int'l J. of Communications, Network and System Sciences
Vol.4 No.5
,May 12, 2011
DOI:
10.4236/ijcns.2011.45037
4,346
Downloads
8,320
Views
Citations
Security of Password Hashing in Cloud
(Articles)
Parves Kamal
Journal of Information Security
Vol.10 No.2
,February 28, 2019
DOI:
10.4236/jis.2019.102003
2,556
Downloads
9,024
Views
Citations
Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network
(Articles)
Xiaomin Zhao
,
Keji Mao
,
Shaohua Cai
,
Qingzhang Chen
Wireless Sensor Network
Vol.2 No.9
,September 30, 2010
DOI:
10.4236/wsn.2010.29086
6,211
Downloads
11,101
Views
Citations
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
(Articles)
Yaser Jararweh
,
Lo’ai Tawalbeh
,
Hala Tawalbeh
,
Abidalrahman Moh’d
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32008
9,043
Downloads
14,074
Views
Citations
A Scalable and Robust DHT Protocol for Structured P2P Network
(Articles)
Xiao Shu
,
Xining Li
Int'l J. of Communications, Network and System Sciences
Vol.5 No.12
,December 14, 2012
DOI:
10.4236/ijcns.2012.512084
4,429
Downloads
7,119
Views
Citations
Decentralization of a Multi Data Source Distributed Processing System Using a Distributed Hash Table
(Articles)
Grzegorz Chmaj
,
Shahram Latifi
Int'l J. of Communications, Network and System Sciences
Vol.6 No.10
,October 25, 2013
DOI:
10.4236/ijcns.2013.610047
3,431
Downloads
5,344
Views
Citations
A Complete and Accurate Short Sequence Alignment Algorithm for Repeats
(Articles)
Shuaibin Lian
,
Tianliang Liu
,
Ke Gong
,
Xinwu Chen
,
Gang Zheng
Journal of Biosciences and Medicines
Vol.4 No.12
,December 14, 2016
DOI:
10.4236/jbm.2016.412018
1,585
Downloads
2,970
Views
Citations
Blockchain Application in Banking System
(Articles)
Minhaj Uddin Chowdhury
,
Khairunnahar Suchana
,
Syed Md Eftekhar Alam
,
Mohammad Monirujjaman Khan
Journal of Software Engineering and Applications
Vol.14 No.7
,July 15, 2021
DOI:
10.4236/jsea.2021.147018
2,563
Downloads
17,897
Views
Citations
A Secure Model for Preventing the Spread of COVID-19 in Bangladesh
(Articles)
Shaznin Sultana
,
Raisa Tahsin Taspia
,
Md. Farhad Hossain
,
Md. Nahiduzzaman
,
Roksana Akter
,
Rashed Mazumder
E-Health Telecommunication Systems and Networks
Vol.11 No.1
,March 17, 2022
DOI:
10.4236/etsn.2022.111003
249
Downloads
1,344
Views
Citations
Numeric Identifier Transmission Algorithm Using Hash Function
(Articles)
Vladyslav Kutsman
Open Journal of Applied Sciences
Vol.13 No.9
,September 26, 2023
DOI:
10.4236/ojapps.2023.139125
103
Downloads
417
Views
Citations
Research and Implementation of Time Synchronous Dynamic Password Based on SM3 Hash Algorithm
(Articles)
Dognery Sinaly Silue
,
Wanggen Wan
,
Muhammad Rizwan
Open Journal of Applied Sciences
Vol.6 No.13
,December 28, 2016
DOI:
10.4236/ojapps.2016.613077
1,837
Downloads
3,050
Views
Citations
P2P Overlay Performance in Large-Scale MANETs
(Articles)
Thomas Kunz
,
Babak Esfandiari
,
Silas Ngozi
,
Frank Ockenfeld
Int'l J. of Communications, Network and System Sciences
Vol.11 No.7
,July 31, 2018
DOI:
10.4236/ijcns.2018.117009
1,039
Downloads
2,080
Views
Citations
Forensics: Collection of Sound Digital Evidence
(Articles)
Richard Kabanda
,
Harihar Thapa
,
Luis Rivera
Journal of Information Security
Vol.14 No.4
,October 25, 2023
DOI:
10.4236/jis.2023.144025
259
Downloads
1,845
Views
Citations
Examination of a Special Function Defined by an Integral
(Articles)
H. Volkan Ersoy
American Journal of Computational Mathematics
Vol.2 No.1
,March 21, 2012
DOI:
10.4236/ajcm.2012.21008
7,806
Downloads
16,959
Views
Citations
Performance and Improvement of Production Line Function Using Computer Simulation (Case Study: An Iron Foundry)
(Articles)
Alireza Abedi Saidabad
,
Houshang Taghizadeh
American Journal of Computational Mathematics
Vol.5 No.4
,December 11, 2015
DOI:
10.4236/ajcm.2015.54038
4,884
Downloads
6,237
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top