Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Simple Steganography Algorithm Based on Lossless Compression Technique in WSN
(Articles)
R. Vijayarajeswari
,
A. Rajivkannan
,
J. Santhosh
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78117
2,059
Downloads
3,375
Views
Citations
The Deutsch-Jozsa Algorithm Can Be Used for Quantum Key Distribution
(Articles)
Koji Nagata
,
Tadao Nakamura
Open Access Library Journal
Vol.2 No.8
,August 14, 2015
DOI:
10.4236/oalib.1101798
1,656
Downloads
2,948
Views
Citations
Color Visual Cryptography with Stacking Order Dependence Using Interference Color
(Articles)
Toshiki Matsuzaki
,
Huangyi Qin
,
Kenji Harada
Open Journal of Applied Sciences
Vol.7 No.7
,July 3, 2017
DOI:
10.4236/ojapps.2017.77026
1,555
Downloads
3,098
Views
Citations
Dual Visual Cryptography Using the Interference Color of Birefringent Material
(Articles)
Huangyi Qin
,
Toshiki Matsusaki
,
Yusuke Momoi
,
Kenji Harada
Journal of Software Engineering and Applications
Vol.10 No.8
,July 19, 2017
DOI:
10.4236/jsea.2017.108041
1,109
Downloads
2,164
Views
Citations
This article belongs to the Special Issue on
Data Security & Data Encryption
Countermeasure against Deepfake Using Steganography and Facial Detection
(Articles)
Kyle Corcoran
,
Jacob Ressler
,
Ye Zhu
Journal of Computer and Communications
Vol.9 No.9
,September 30, 2021
DOI:
10.4236/jcc.2021.99009
377
Downloads
2,281
Views
Citations
Design of an E-Administration Platform and Its Cryptography-Based Security Model
(Articles)
Ohwobeno Omohwo
,
Iwasokun Gabriel Babatunde
,
Boyinbode Olutayo Kehinde
,
Gabriel Junior Arome
Journal of Computer and Communications
Vol.11 No.4
,April 28, 2023
DOI:
10.4236/jcc.2023.114008
219
Downloads
1,931
Views
Citations
Review of Algorithms for Securing Data Transmission in Mobile Banking
(Articles)
Daniel Okari Orucho
,
Fredrick Mzee Awuor
,
Ratemo Makiya
,
Collins Oduor
Modern Economy
Vol.14 No.9
,September 15, 2023
DOI:
10.4236/me.2023.149062
278
Downloads
1,442
Views
Citations
Survey on Public Key Cryptography Scheme for Securing Data in Cloud Computing
(Articles)
J. Athena
,
V. Sumathy
Circuits and Systems
Vol.8 No.3
,March 31, 2017
DOI:
10.4236/cs.2017.83005
2,179
Downloads
5,025
Views
Citations
HiMAC: Hierarchical Message Authentication Code for Secure Data Dissemination in Mobile Ad Hoc Networks
(Articles)
Khaleel Mershad
,
Ali Hamie
,
Mohamad Hamze
Int'l J. of Communications, Network and System Sciences
Vol.10 No.12
,December 15, 2017
DOI:
10.4236/ijcns.2017.1012018
1,098
Downloads
2,336
Views
Citations
A Nonmonotone Line Search Method for Symmetric Nonlinear Equations
(Articles)
Gonglin Yuan
,
Laisheng Yu
Intelligent Control and Automation
Vol.1 No.1
,August 27, 2010
DOI:
10.4236/ica.2010.11004
5,029
Downloads
7,561
Views
Citations
Asymptotic Analysis for U-Statistics and Its Application to Von Mises Statistics
(Articles)
Timur Zubayraev
Open Journal of Statistics
Vol.1 No.3
,October 20, 2011
DOI:
10.4236/ojs.2011.13016
5,169
Downloads
8,936
Views
Citations
A Simple Encryption Keys Creation Scheme in Wireless Ad Hoc Networks
(Articles)
Abdulrahman H. Altalhi
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41011
5,261
Downloads
9,055
Views
Citations
A Note on a Recent Paper by J. S. Respondek
(Articles)
Moawwad E. A. El-Mikkawy
Applied Mathematics
Vol.3 No.6
,June 21, 2012
DOI:
10.4236/am.2012.36076
6,301
Downloads
11,102
Views
Citations
Designing Optical Fibers: Fitting the Derivatives of a Nonlinear Pde-Eigenvalue Problem
(Articles)
Linda Kaufman
,
Seok-Min Bang
,
Brian Heacook
,
William Landon
,
Daniel Savacool
,
Nick Woronekin
American Journal of Computational Mathematics
Vol.2 No.4
,December 31, 2012
DOI:
10.4236/ajcm.2012.24044
3,515
Downloads
6,029
Views
Citations
Solvability of Inverse Eigenvalue Problem for Dense Singular Symmetric Matrices
(Articles)
Anthony Y. Aidoo
,
Kwasi Baah Gyamfi
,
Joseph Ackora-Prah
,
Francis T. Oduro
Advances in Pure Mathematics
Vol.3 No.1
,January 16, 2013
DOI:
10.4236/apm.2013.31003
3,999
Downloads
6,611
Views
Citations
Jordan Semi-Triple Multiplicative Maps on the Symmetric Matrices
(Articles)
Xiaoning Hao
,
Pengxiang Ren
,
Runling An
Advances in Linear Algebra & Matrix Theory
Vol.3 No.2
,June 14, 2013
DOI:
10.4236/alamt.2013.32003
3,237
Downloads
7,440
Views
Citations
Symmetric Identities from an Invariant in Partition Conjugation and Their Applications in
q
-Series
(Articles)
Sandy H. L. Chen
Open Journal of Discrete Mathematics
Vol.4 No.2
,April 15, 2014
DOI:
10.4236/ojdm.2014.42006
4,875
Downloads
6,494
Views
Citations
Robust Adaptive Control for a Class of Systems with Deadzone Nonlinearity
(Articles)
Nizar J. Ahmad
,
Mahmud J. Alnaser
,
Ebraheem Sultan
,
Khuloud A. Alhendi
Intelligent Control and Automation
Vol.6 No.1
,January 13, 2015
DOI:
10.4236/ica.2015.61002
9,231
Downloads
10,524
Views
Citations
Pseudoathletic Appearance: A Case Report in a Male
(Short Report)
Joana Moreira
,
Gonçalo Gomes Pereira
,
Mário Santos
,
Vaz de Macedo
Case Reports in Clinical Medicine
Vol.4 No.12
,December 4, 2015
DOI:
10.4236/crcm.2015.412073
4,579
Downloads
5,560
Views
Citations
Double Derangement Permutations
(Articles)
Pooya Daneshmand
,
Kamyar Mirzavaziri
,
Madjid Mirzavaziri
Open Journal of Discrete Mathematics
Vol.6 No.2
,April 12, 2016
DOI:
10.4236/ojdm.2016.62010
2,579
Downloads
4,946
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top