Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Use of Block Chain in the Informal Distributed Manufacturing Industry in Kenya
(Articles)
Wahome E. Wangui
,
Thomas Ogoro Ombati
,
Robert Oboko
Journal of Service Science and Management
Vol.15 No.4
,July 7, 2022
DOI:
10.4236/jssm.2022.154023
221
Downloads
886
Views
Citations
The Analysis and Amendment of Security System in 3G
(Articles)
Min ZHAO
,
Ling SHI
Intelligent Information Management
Vol.1 No.1
,July 31, 2009
DOI:
10.4236/iim.2009.11001
7,839
Downloads
12,049
Views
Citations
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model
(Articles)
Zhengtao JIANG
,
Yongbin WANG
,
Yong WANG
,
Yumin WANG
Intelligent Information Management
Vol.1 No.1
,July 31, 2009
DOI:
10.4236/iim.2009.11002
4,832
Downloads
8,479
Views
Citations
Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
(Articles)
Debnath BHATTACHARYYA
,
Jhuma DUTTA
,
Poulami DAS
,
Samir Kumar BANDYOPADHYAY
,
Tai-hoon KIM
Int'l J. of Communications, Network and System Sciences
Vol.2 No.5
,August 21, 2009
DOI:
10.4236/ijcns.2009.25040
5,542
Downloads
9,927
Views
Citations
Application of a Dynamic Identity Authentication Model Based on an Improved Keystroke Rhythm Algorithm
(Articles)
Wenchuan YANG
,
Fang FANG
Int'l J. of Communications, Network and System Sciences
Vol.2 No.8
,November 17, 2009
DOI:
10.4236/ijcns.2009.28082
6,238
Downloads
10,291
Views
Citations
E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks
(Articles)
Hossein Fereidooni
,
Hassan Taheri
,
Mehran Mahramian
Int'l J. of Communications, Network and System Sciences
Vol.5 No.4
,April 19, 2012
DOI:
10.4236/ijcns.2012.54030
7,007
Downloads
11,346
Views
Citations
Corporate Intranet Security: Packet-Level Protocols for Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic
(Articles)
Boris S. Verkhovsky
,
Roberto D. Rubino
Int'l J. of Communications, Network and System Sciences
Vol.5 No.5
,May 30, 2012
DOI:
10.4236/ijcns.2012.55033
5,027
Downloads
7,439
Views
Citations
Identity and Mobility in a Digital World
(Articles)
Ali M. Al-Khouri
Technology and Investment
Vol.4 No.1
,February 26, 2013
DOI:
10.4236/ti.2013.41002
5,978
Downloads
8,950
Views
Citations
On the Usage of the Faraday Effect as an Authentication Technique for Vegetable Oils
(Articles)
M. I. Abu-Taha
,
M. A. Halasa
,
M. M. Abu-Samreh
Journal of Modern Physics
Vol.4 No.2
,February 27, 2013
DOI:
10.4236/jmp.2013.42032
5,346
Downloads
7,803
Views
Citations
Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks
(Articles)
Vivaksha Jariwala
,
Vishal Singh
,
Prafulla Kumar
,
Devesh C. Jinwala
Journal of Information Security
Vol.5 No.1
,January 10, 2014
DOI:
10.4236/jis.2014.51001
3,778
Downloads
6,829
Views
Citations
RFID Anti-Counterfeiting for Retailing Systems
(Articles)
Duy-Thinh Tran
,
Sung Je Hong
Journal of Applied Mathematics and Physics
Vol.3 No.1
,January 28, 2015
DOI:
10.4236/jamp.2015.31001
4,064
Downloads
5,737
Views
Citations
Identity Verification of Individuals Based on Retinal Features Using Gabor Filters and SVM
(Articles)
Mohamed A. El-Sayed
,
M. Hassaballah
,
Mohammed A. Abdel-Latif
Journal of Signal and Information Processing
Vol.7 No.1
,February 29, 2016
DOI:
10.4236/jsip.2016.71007
3,642
Downloads
5,248
Views
Citations
Face Recognition across Time Lapse Using Convolutional Neural Networks
(Articles)
Hachim El Khiyari
,
Harry Wechsler
Journal of Information Security
Vol.7 No.3
,April 11, 2016
DOI:
10.4236/jis.2016.73010
5,898
Downloads
9,829
Views
Citations
Feasibility Study for Applying Spectral Imaging for Wheat Grain Authenticity Testing in Pasta
(Articles)
Timothy Wilkes
,
Gavin Nixon
,
Claire Bushell
,
Adrian Waltho
,
Amer Alroichdi
,
Malcolm Burns
Food and Nutrition Sciences
Vol.7 No.5
,April 28, 2016
DOI:
10.4236/fns.2016.75037
2,338
Downloads
4,345
Views
Citations
This article belongs to the Special Issue on
Food Analysis
Dual Authentication Hashing for Security Enhancement in MANET
(Articles)
L. Raja
,
Dr. P. S. Periasamy
Circuits and Systems
Vol.7 No.4
,April 28, 2016
DOI:
10.4236/cs.2016.74030
1,665
Downloads
2,595
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
2,374
Downloads
5,389
Views
Citations
Accurate Fingerprint Enhancement and Identification Using Minutiae Extraction
(Articles)
Kumar Attangudi Perichiappan Perichappan
,
Sreenivas Sasubilli
Journal of Computer and Communications
Vol.5 No.14
,December 14, 2017
DOI:
10.4236/jcc.2017.514003
1,632
Downloads
5,393
Views
Citations
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations
(Articles)
Ezer Osei Yeboah-Boateng
,
Grace Dzifa Kwabena-Adade
Journal of Information Security
Vol.11 No.3
,July 17, 2020
DOI:
10.4236/jis.2020.113011
1,556
Downloads
3,563
Views
Citations
Modified Vanstone’s Construction of lightweight MAC for Vehicular On-Board IT Systems
(Articles)
István Vajda
Journal of Computer and Communications
Vol.8 No.12
,December 30, 2020
DOI:
10.4236/jcc.2020.812019
346
Downloads
908
Views
Citations
Use of AI Voice Authentication Technology Instead of Traditional Keypads in Security Devices
(Articles)
Deepak Ramesh Chandran
Journal of Computer and Communications
Vol.10 No.6
,June 13, 2022
DOI:
10.4236/jcc.2022.106002
404
Downloads
2,716
Views
Citations
<
...
6
7
8
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top