Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Improvement of the Round Key Generation of AES
(Articles)
Junshe Wang
,
Han Xu
,
Mingqiu Yao
Int'l J. of Communications, Network and System Sciences
Vol.5 No.12
,December 27, 2012
DOI:
10.4236/ijcns.2012.512090
4,369
Downloads
6,617
Views
Citations
Data Migration Need, Strategy, Challenges, Methodology, Categories, Risks, Uses with Cloud Computing, and Improvements in Its Using with Cloud Using Suggested Proposed Model (DMig 1)
(Articles)
Abou_el_ela Abdou Hussein
Journal of Information Security
Vol.12 No.1
,January 19, 2021
DOI:
10.4236/jis.2021.121004
5,016
Downloads
14,847
Views
Citations
A Fast FPGA Implementation for Triple DES Encryption Scheme
(Articles)
Edni Del Rosal
,
Sanjeev Kumar
Circuits and Systems
Vol.8 No.9
,September 25, 2017
DOI:
10.4236/cs.2017.89016
2,198
Downloads
5,425
Views
Citations
AES Overhead Mitigation Using OpenMP
(Articles)
Hesham Alhumyani
Journal of Computer and Communications
Vol.7 No.7
,July 23, 2019
DOI:
10.4236/jcc.2019.77017
911
Downloads
1,807
Views
Citations
Analyzing Computational Components of Standard Block Encryption Schemes
(Articles)
Chu-Wen Cheng
,
Miranda Heather Cantu
,
Sanjeev Kumar
Journal of Computer and Communications
Vol.10 No.6
,June 30, 2022
DOI:
10.4236/jcc.2022.106007
158
Downloads
820
Views
Citations
This article belongs to the Special Issue on
Data Science and Applications
On Rijndael ByteSub Transformation
(Articles)
W. Eltayeb Ahmed
Applied Mathematics
Vol.10 No.3
,March 28, 2019
DOI:
10.4236/am.2019.103010
780
Downloads
2,082
Views
Citations
Establishment and Application of Cryptographic Library Model
(Articles)
Tie-Ming Liu
,
Lie-Hui Jiang
,
Jing Jing
,
Yuan-Yuan Zhang
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35003
3,905
Downloads
5,021
Views
Citations
Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries
(Articles)
Musaria K. Mahmood
,
Fawzi M. Al-Naima
Wireless Sensor Network
Vol.2 No.7
,July 9, 2010
DOI:
10.4236/wsn.2010.27064
5,714
Downloads
10,781
Views
Citations
Improved Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords
(Articles)
Ping Zhang
,
Jianzhong Wang
Journal of Computer and Communications
Vol.3 No.9
,September 28, 2015
DOI:
10.4236/jcc.2015.39010
3,609
Downloads
4,576
Views
Citations
Blockchain-Based Islamic Marriage Certification with the Supremacy of Web 3.0
(Articles)
Md. Al-Sajiduzzaman Akand
,
Sarwar Azmain Reza
,
Amatul Bushra Akhi
Intelligent Control and Automation
Vol.13 No.4
,November 30, 2022
DOI:
10.4236/ica.2022.134004
212
Downloads
1,399
Views
Citations
Analysis of Secured Cloud Data Storage Model for Information
(Articles)
Emmanuel Nwabueze Ekwonwune
,
Udo Chukwuebuka Chigozie
,
Duroha Austin Ekekwe
,
Georgina Chekwube Nwankwo
Journal of Software Engineering and Applications
Vol.17 No.5
,May 28, 2024
DOI:
10.4236/jsea.2024.175017
123
Downloads
548
Views
Citations
A Modern Method for Constructing the S-Box of Advanced Encryption Standard
(Articles)
W. Eltayeb Ahmed
Applied Mathematics
Vol.10 No.4
,April 29, 2019
DOI:
10.4236/am.2019.104018
1,125
Downloads
8,910
Views
Citations
A High Efficiency Hardware Implementation of S-Boxes Based on Composite Field for Advanced Encryption Standard
(Articles)
Yawen Wang
,
Sini Bin
,
Shikai Zhu
,
Xiaoting Hu
Journal of Computer and Communications
Vol.12 No.4
,April 30, 2024
DOI:
10.4236/jcc.2024.124016
157
Downloads
744
Views
Citations
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
(Articles)
P. Premkumar
,
D. Shanthi
Circuits and Systems
Vol.7 No.11
,September 13, 2016
DOI:
10.4236/cs.2016.711307
1,917
Downloads
3,356
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
4,038
Downloads
5,185
Views
Citations
Enhancing Mobile Cloud Computing Security Using Steganography
(Articles)
Hassan Reza
,
Madhuri Sonawane
Journal of Information Security
Vol.7 No.4
,July 19, 2016
DOI:
10.4236/jis.2016.74020
3,675
Downloads
6,707
Views
Citations
Data Security of Mobile Cloud Computing on Cloud Server
(Articles)
Mohammad Waseem
,
Abdullah Lakhan
,
Irfan Ali Jamali
Open Access Library Journal
Vol.3 No.4
,April 28, 2016
DOI:
10.4236/oalib.1102377
1,845
Downloads
8,482
Views
Citations
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
(Articles)
Mohammad Anwar Hossain
,
Ahsan Ullah
,
Newaz Ibrahim Khan
,
Md Feroz Alam
Journal of Information Security
Vol.10 No.4
,October 14, 2019
DOI:
10.4236/jis.2019.104012
1,352
Downloads
5,643
Views
Citations
A Novel Hybrid Encryption Method Based on Honey Encryption and Advanced DNA Encoding Scheme in Key Generation
(Articles)
Nwe Ni Khin
,
Thanda Win
Journal of Computer and Communications
Vol.10 No.9
,September 9, 2022
DOI:
10.4236/jcc.2022.109002
205
Downloads
1,051
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
The Use of Life Narrative and Living Standard Measurement Survey Data in the Study of Poverty in the Caribbean: A Resolution of Conflicting Epistemologies
(Articles)
Dennis A. V. Brown
Sociology Mind
Vol.3 No.3
,June 28, 2013
DOI:
10.4236/sm.2013.33030
5,609
Downloads
8,130
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top