Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Public-Key Cryptosystems with Secret Encryptor and Digital Signature
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61001
4,257
Downloads
6,272
Views
Citations
Is Public Co-Ordination of Investment in Information Security Desirable?
(Articles)
Christos Ioannidis
,
David Pym
,
Julian Williams
Journal of Information Security
Vol.7 No.2
,March 30, 2016
DOI:
10.4236/jis.2016.72005
3,063
Downloads
4,106
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
Information Availability: An Insight into the Most Important Attribute of Information Security
(Articles)
Suhail Qadir
,
S. M. K. Quadri
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73014
7,801
Downloads
21,573
Views
Citations
Information Systems Security Threats and Vulnerabilities: A Case of the Institute of Accountancy Arusha (IAA)
(Articles)
Adam Aloyce Semlambo
,
Didas Malekia Mfoi
,
Yona Sangula
Journal of Computer and Communications
Vol.10 No.11
,November 3, 2022
DOI:
10.4236/jcc.2022.1011003
338
Downloads
3,296
Views
Citations
Analysis of the Problems of Ensuring Information Security in the Terms of the Contemporary Society
(Articles)
Dmitrii S. Brazevich
,
Zhanna S. Safronova
,
Tatyana N. Kosheleva
,
Alla V. Biryukova
Open Journal of Social Sciences
Vol.8 No.2
,February 28, 2020
DOI:
10.4236/jss.2020.82018
903
Downloads
2,820
Views
Citations
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.2
,February 26, 2011
DOI:
10.4236/ijcns.2011.42009
4,317
Downloads
7,827
Views
Citations
Protection of Sensitive Messages Based on Quadratic Roots of Gaussians: Groups with Complex Modulus
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.5
,May 12, 2011
DOI:
10.4236/ijcns.2011.45033
3,937
Downloads
7,391
Views
Citations
Nelder-Mead Based Iterative Algorithm for Optimal Antenna Beam Patterns in Ad Hoc Networks
(Articles)
Vinay B. Ramakrishnaiah
,
Robert F. Kubichek
,
Suresh S. Muknahallipatna
Journal of Computer and Communications
Vol.5 No.7
,May 23, 2017
DOI:
10.4236/jcc.2017.57012
1,249
Downloads
2,178
Views
Citations
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles
(Articles)
Joe Mutebi
,
Margaret Kareyo
,
Umezuruike Chinecherem
,
Akampurira Paul
Journal of Computer and Communications
Vol.10 No.8
,August 17, 2022
DOI:
10.4236/jcc.2022.108004
251
Downloads
1,020
Views
Citations
Classification of Big Data Security Based on Ontology Web Language
(Articles)
Alsadig Mohammed Adam Abdallah
,
Amir Mohamed Talib
Journal of Information Security
Vol.14 No.1
,January 31, 2023
DOI:
10.4236/jis.2023.141006
219
Downloads
942
Views
Citations
Performance Analysis of Techniques Used for Determining Land Mines
(Articles)
Yavuz Ege
,
Adnan Kakilli
,
Osman Kılıç
,
Hüseyin Çalık
,
Hakan Çıtak
,
Sedat Nazlıbilek
,
Osman Kalender
International Journal of Geosciences
Vol.5 No.10
,September 26, 2014
DOI:
10.4236/ijg.2014.510098
4,264
Downloads
6,242
Views
Citations
This article belongs to the Special Issue on
Geomagnetic Field
Robust Performance of Scene Matching Algorithm
(Articles)
Zhaohui Xia
,
Xiaogang Yang
,
Fei Meng
,
Shicheng Wang
Journal of Software Engineering and Applications
Vol.6 No.5B
,October 12, 2013
DOI:
10.4236/jsea.2013.65B002
3,854
Downloads
5,212
Views
Citations
A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers
(Articles)
Muhammad Ariful Islam
,
Md. Ashraful Islam
,
Nazrul Islam
,
Boishakhi Shabnam
Journal of Computer and Communications
Vol.6 No.3
,March 23, 2018
DOI:
10.4236/jcc.2018.63006
3,284
Downloads
8,524
Views
Citations
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm
(Articles)
Youhai Shao
,
Yong Wang
,
Yun Yang
,
Xiang Wang
Journal of Computer and Communications
Vol.10 No.1
,January 17, 2022
DOI:
10.4236/jcc.2022.101003
272
Downloads
1,663
Views
Citations
Modeling and Implementation of a Data Security and Protection Medium Using the Generated Key Based on Electromagnetic Wave Propagation Theories
(Articles)
Vincent Mbonigaba
,
Fulgence Nahayo
,
Octave Moutsinga
,
Dieudonné Okalas-Ossami
,
Romeo Nibitanga
,
Thérence Niyonsaba
Journal of Computer and Communications
Vol.12 No.9
,September 26, 2024
DOI:
10.4236/jcc.2024.129008
40
Downloads
242
Views
Citations
Impact of Information Technology on the Supply Chain Performance of the Car Segmentation Companies with Emphasis on the Integrity and Flexibility
(Articles)
Mahshid Mashreghi
,
Ebrahim Kalani
,
Alireza Elhami
,
Abas Farajpoor Alamdari
,
Iraj Bakhtiyari
,
Ehsan Kamrani
American Journal of Industrial and Business Management
Vol.8 No.2
,February 26, 2018
DOI:
10.4236/ajibm.2018.82021
1,172
Downloads
8,408
Views
Citations
Selection of Investment Basis Using Neural Networks in Stock Exchange
(Articles)
Ebrahim Kalani
,
Alireza Elhami
,
Reza Baradaran Kazem-Zadeh
,
Ehsan Kamrani
American Journal of Industrial and Business Management
Vol.8 No.3
,March 20, 2018
DOI:
10.4236/ajibm.2018.83036
797
Downloads
1,986
Views
Citations
Effects of Quality and Quantity of Information Processing on Design Coordination Performance
(Articles)
R. Zhang
,
A. M. M. Liu
,
I. Y. S. Chan
World Journal of Engineering and Technology
Vol.6 No.2B
,May 22, 2018
DOI:
10.4236/wjet.2018.62B005
735
Downloads
2,010
Views
Citations
Playing against Hedge
(Articles)
Miltiades E. Anagnostou
,
Maria A. Lambrou
Int'l J. of Communications, Network and System Sciences
Vol.7 No.12
,December 3, 2014
DOI:
10.4236/ijcns.2014.712050
2,557
Downloads
3,374
Views
Citations
Treatment and Hardware Removal after Lisfranc Injury: A Narrative Review
(Articles)
Prasenjit Saha
,
Matthew Smith
,
Khalid Hasan
Open Journal of Orthopedics
Vol.13 No.12
,December 19, 2023
DOI:
10.4236/ojo.2023.1312049
149
Downloads
2,615
Views
Citations
This article belongs to the Special Issue on
Orthopedics and Orthopedic Surgery
<
...
2
3
4
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top