Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
An Enhanced Dragonfly Key Exchange Protocol against Offline Dictionary Attack
(Articles)
Eman Alharbi
,
Noha Alsulami
,
Omar Batarfi
Journal of Information Security
Vol.6 No.2
,March 12, 2015
DOI:
10.4236/jis.2015.62008
4,701
Downloads
6,188
Views
Citations
A Two-Party Password-Authenticated Key Exchange Protocol with Verifier
(Articles)
Shunbo Xiang
,
Bing Xu
,
Ke Chen
Journal of Computer and Communications
Vol.9 No.4
,April 29, 2021
DOI:
10.4236/jcc.2021.94007
351
Downloads
999
Views
Citations
This article belongs to the Special Issue on
Information Technology and Applications
TUP: A New eCK-Secure AKE Protocol under the CDH Assumption
(Articles)
Qinglei Zhou
,
Zengfu Yang
Int'l J. of Communications, Network and System Sciences
Vol.5 No.6
,June 12, 2012
DOI:
10.4236/ijcns.2012.56043
3,441
Downloads
5,912
Views
Citations
E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks
(Articles)
Hossein Fereidooni
,
Hassan Taheri
,
Mehran Mahramian
Int'l J. of Communications, Network and System Sciences
Vol.5 No.4
,April 19, 2012
DOI:
10.4236/ijcns.2012.54030
6,867
Downloads
11,043
Views
Citations
GAP Universal One-Step Authentication Protocol
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.8 No.11
,November 15, 2021
DOI:
10.4236/oalib.1108061
49
Downloads
507
Views
Citations
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.2
,February 26, 2011
DOI:
10.4236/ijcns.2011.42009
4,250
Downloads
7,636
Views
Citations
Deterministic Algorithm Computing All Generators: Application in Cryptographic Systems Design
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.5 No.11
,November 26, 2012
DOI:
10.4236/ijcns.2012.511074
4,341
Downloads
6,186
Views
Citations
Faster Method for Secure Transmission of Information with Sender Identification
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.6 No.2
,February 26, 2013
DOI:
10.4236/ijcns.2013.62009
3,878
Downloads
5,708
Views
Citations
Passwords Management via Split-Key
(Articles)
Kenneth Giuliani
,
V. Kumar Murty
,
Guangwu Xu
Journal of Information Security
Vol.7 No.3
,April 22, 2016
DOI:
10.4236/jis.2016.73016
3,531
Downloads
5,979
Views
Citations
CPK Public Key and Its Basic Functions
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.9 No.1
,January 14, 2022
DOI:
10.4236/oalib.1108287
54
Downloads
746
Views
Citations
Blockchain Based Redistricting with Public Participation
(Articles)
Mahalingam Ramkumar
,
Naresh Adhikari
Journal of Information Security
Vol.13 No.3
,July 11, 2022
DOI:
10.4236/jis.2022.133009
148
Downloads
737
Views
Citations
Online Accounts Management Method Using Risk-Based Approach
(Articles)
Yoshio Kakizaki
,
Takumi Akiyama
,
Kazuya Otani
,
Ryoichi Sasaki
Journal of Computer and Communications
Vol.4 No.14
,November 14, 2016
DOI:
10.4236/jcc.2016.414003
1,327
Downloads
2,092
Views
Citations
Research and Implementation of Time Synchronous Dynamic Password Based on SM3 Hash Algorithm
(Articles)
Dognery Sinaly Silue
,
Wanggen Wan
,
Muhammad Rizwan
Open Journal of Applied Sciences
Vol.6 No.13
,December 28, 2016
DOI:
10.4236/ojapps.2016.613077
1,786
Downloads
2,815
Views
Citations
Authoritative and Unbiased Responses to Geographic Queries
(Articles)
Mahalingam Ramkumar
,
Naresh Adhikari
Journal of Information Security
Vol.13 No.3
,June 30, 2022
DOI:
10.4236/jis.2022.133007
117
Downloads
435
Views
Citations
Hierarchical Hypercube Based Pairwise Key Establishment Scheme for Sensor Networks
(Articles)
Lei WANG
Int'l J. of Communications, Network and System Sciences
Vol.2 No.2
,May 14, 2009
DOI:
10.4236/ijcns.2009.22016
6,627
Downloads
10,574
Views
Citations
Re-Finding PL.AC.E. for Walking: Assessment of Key-Elements Using Questionnaire
(Articles)
Fritz Akhmad Nuzir
,
Bart Dewancker
Current Urban Studies
Vol.3 No.4
,October 28, 2015
DOI:
10.4236/cus.2015.34023
3,580
Downloads
4,415
Views
Citations
Dynamic Identity Based Authentication Protocol for Two-Server Architecture
(Articles)
Sandeep K. Sood
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34040
5,273
Downloads
8,486
Views
Citations
Weaknesses of a Dynamic ID Based Remote User Authentication Protocol for Multi-Server Environment
(Articles)
R. Madhusudhan
,
Adireddi Praveen
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24026
3,573
Downloads
5,259
Views
Citations
An Enhanced Remote User Authentication Scheme
(Articles)
Xiaohui Yang
,
Xinchun Cui
,
Zhenliang Cao
,
Ziqiang Hu
Engineering
Vol.6 No.6
,April 30, 2014
DOI:
10.4236/eng.2014.66030
3,730
Downloads
5,254
Views
Citations
Using Database Management System to Generate, Manage and Secure Personal Identification Numbers (PIN)
(Articles)
Dipo Theophilus Akomolafe
,
Babajide Olakunle Afeni
Journal of Software Engineering and Applications
Vol.7 No.5
,May 28, 2014
DOI:
10.4236/jsea.2014.75043
9,946
Downloads
11,633
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top