Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
CPK Public Key and Its Basic Functions
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.9 No.1
,January 14, 2022
DOI:
10.4236/oalib.1108287
78
Downloads
1,018
Views
Citations
Passwords Management via Split-Key
(Articles)
Kenneth Giuliani
,
V. Kumar Murty
,
Guangwu Xu
Journal of Information Security
Vol.7 No.3
,April 22, 2016
DOI:
10.4236/jis.2016.73016
3,605
Downloads
6,309
Views
Citations
GAP Universal One-Step Authentication Protocol
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.8 No.11
,November 15, 2021
DOI:
10.4236/oalib.1108061
77
Downloads
683
Views
Citations
Online Accounts Management Method Using Risk-Based Approach
(Articles)
Yoshio Kakizaki
,
Takumi Akiyama
,
Kazuya Otani
,
Ryoichi Sasaki
Journal of Computer and Communications
Vol.4 No.14
,November 14, 2016
DOI:
10.4236/jcc.2016.414003
1,384
Downloads
2,318
Views
Citations
Comparative Study of the Reliability and Complexity of Symmetrical and Asymmetrical Cryptosystems for the Protection of Academic Data in the Democratic Republic of Congo
(Articles)
Mugaruka Buduge Gulain
,
Jeremie Ndikumagenge
,
Buhendwa Nyenyezi Justin
,
Bulonza Masumbuko Alexis
,
Katho Seba Jacques
Journal of Information Security
Vol.15 No.3
,May 17, 2024
DOI:
10.4236/jis.2024.153017
116
Downloads
413
Views
Citations
An Enhanced Dragonfly Key Exchange Protocol against Offline Dictionary Attack
(Articles)
Eman Alharbi
,
Noha Alsulami
,
Omar Batarfi
Journal of Information Security
Vol.6 No.2
,March 12, 2015
DOI:
10.4236/jis.2015.62008
4,805
Downloads
6,663
Views
Citations
Research and Implementation of Time Synchronous Dynamic Password Based on SM3 Hash Algorithm
(Articles)
Dognery Sinaly Silue
,
Wanggen Wan
,
Muhammad Rizwan
Open Journal of Applied Sciences
Vol.6 No.13
,December 28, 2016
DOI:
10.4236/ojapps.2016.613077
1,837
Downloads
3,056
Views
Citations
Discussion of New Padding Method in DES Encryption
(Articles)
Chengxia Liu
Journal of Software Engineering and Applications
Vol.5 No.12B
,January 17, 2013
DOI:
10.4236/jsea.2012.512B004
4,386
Downloads
6,478
Views
Citations
Improved High Definition Multimedia Interface Authentication Mechanism
(Articles)
R. N. Iyare
,
S. D. Walker
Journal of Computer and Communications
Vol.2 No.12
,October 22, 2014
DOI:
10.4236/jcc.2014.212003
3,494
Downloads
4,356
Views
Citations
Ambiguous Multi-Symmetric Scheme and Applications
(Articles)
Richard Bassous
,
Ahmad Mansour
,
Roger Bassous
,
Huirong Fu
,
Ye Zhu
,
George Corser
Journal of Information Security
Vol.8 No.4
,October 31, 2017
DOI:
10.4236/jis.2017.84024
1,271
Downloads
2,655
Views
Citations
Implementation of a Hybrid Triple-Data Encryption Standard and Blowfish Algorithms for Enhancing Image Security in Cloud Environment
(Articles)
Mohan Nagamunthala
,
Ramakrishnan Manjula
Journal of Computer and Communications
Vol.11 No.10
,October 31, 2023
DOI:
10.4236/jcc.2023.1110009
142
Downloads
767
Views
Citations
Dynamic Identity Based Authentication Protocol for Two-Server Architecture
(Articles)
Sandeep K. Sood
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34040
5,400
Downloads
8,754
Views
Citations
Weaknesses of a Dynamic ID Based Remote User Authentication Protocol for Multi-Server Environment
(Articles)
R. Madhusudhan
,
Adireddi Praveen
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24026
3,718
Downloads
5,527
Views
Citations
An Enhanced Remote User Authentication Scheme
(Articles)
Xiaohui Yang
,
Xinchun Cui
,
Zhenliang Cao
,
Ziqiang Hu
Engineering
Vol.6 No.6
,April 30, 2014
DOI:
10.4236/eng.2014.66030
3,864
Downloads
5,498
Views
Citations
Using Database Management System to Generate, Manage and Secure Personal Identification Numbers (PIN)
(Articles)
Dipo Theophilus Akomolafe
,
Babajide Olakunle Afeni
Journal of Software Engineering and Applications
Vol.7 No.5
,May 28, 2014
DOI:
10.4236/jsea.2014.75043
10,215
Downloads
12,165
Views
Citations
Security and Privacy-Preserving Metering Service in the Smart Grid
(Articles)
Zhongwei Sun
,
Chuqi Song
Int'l J. of Communications, Network and System Sciences
Vol.10 No.8B
,August 14, 2017
DOI:
10.4236/ijcns.2017.108B033
1,155
Downloads
2,587
Views
Citations
Authentication Key-Exchange Using SMS for Web-Based Platforms
(Articles)
Benedicto B. Balilo Jr.
,
Jayvee Christopher N. Vibar
Journal of Computer and Communications
Vol.9 No.8
,August 3, 2021
DOI:
10.4236/jcc.2021.98001
331
Downloads
2,111
Views
Citations
Image Encryption Algorithm Based on a Chaotic Iterative Process
(Articles)
Michael François
,
Thomas Grosges
,
Dominique Barchiesi
,
Robert Erra
Applied Mathematics
Vol.3 No.12
,December 17, 2012
DOI:
10.4236/am.2012.312262
6,073
Downloads
9,725
Views
Citations
Image Encryption Scheme Based on Filter Bank and Lifting
(Articles)
Saleh Saraireh
,
Yazeed Al-Sbou
,
Ja’afer Al-Saraireh
,
Othman Alsmadi
Int'l J. of Communications, Network and System Sciences
Vol.7 No.1
,January 24, 2014
DOI:
10.4236/ijcns.2014.71006
4,463
Downloads
6,925
Views
Citations
An Image Encryption Method Based on Quantum Fourier Transformation
(Articles)
Ying Liu
,
Bing Zhou
,
Zijing Li
,
Jiangnan Deng
,
Zhengying Cai
International Journal of Intelligence Science
Vol.8 No.3
,July 30, 2018
DOI:
10.4236/ijis.2018.83004
992
Downloads
2,076
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top