Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Flaws in the Field of Digital Security in the Workplace: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Open Journal of Applied Sciences
Vol.12 No.12
,December 29, 2022
DOI:
10.4236/ojapps.2022.1212146
90
Downloads
392
Views
Citations
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems
(Articles)
Faisal Nabi
,
Jianming Yong
,
Xiaohui Tao
,
Muhammad Saqib Malhi
,
Muhammad Farhan
,
Umar Mahmood
Journal of Information Security
Vol.12 No.3
,May 14, 2021
DOI:
10.4236/jis.2021.123010
401
Downloads
1,808
Views
Citations
Exploration of Core Technologies of Cyber Security
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.8 No.9
,September 26, 2021
DOI:
10.4236/oalib.1107795
116
Downloads
916
Views
Citations
Conventional and Improved Digital Signature Scheme: A Comparative Study
(Articles)
Alaa D. Alrehily
,
Asmaa F. Alotaibi
,
Suzan B. Almutairy
,
Mashael S. Alqhtani
,
Jayaprakash Kar
Journal of Information Security
Vol.6 No.1
,January 22, 2015
DOI:
10.4236/jis.2015.61007
6,057
Downloads
7,929
Views
Citations
Combining Public Key Encryption with Schnorr Digital Signature
(Articles)
Laura Savu
Journal of Software Engineering and Applications
Vol.5 No.2
,February 27, 2012
DOI:
10.4236/jsea.2012.52016
9,326
Downloads
14,363
Views
Citations
Enhancing Police Officers’ Cybercrime Investigation Skills Using a Checklist Tool
(Articles)
Abdelkhalek Ibrahim Alastal
,
Ashraf Hassan Shaqfa
Journal of Data Analysis and Information Processing
Vol.11 No.2
,April 4, 2023
DOI:
10.4236/jdaip.2023.112008
259
Downloads
2,300
Views
Citations
An Analysis of Digital Records and Their Juridical Ramifications: Bangladesh Perspective
(Articles)
Mohammad Khabbab Taki
Beijing Law Review
Vol.14 No.4
,December 7, 2023
DOI:
10.4236/blr.2023.144106
55
Downloads
261
Views
Citations
Sensitive Information Security Based on Elliptic Curves
(Articles)
Nadine Nibigira
,
Vincent Havyarimana
,
Zhu Xiao
World Journal of Engineering and Technology
Vol.12 No.2
,April 23, 2024
DOI:
10.4236/wjet.2024.122018
45
Downloads
156
Views
Citations
On Secure Digital Image Watermarking Techniques
(Articles)
Manjit Thapa
,
Sandeep Kumar Sood
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24017
8,300
Downloads
17,913
Views
Citations
Features of Virus Detection Mechanism in Microsoft Security Essentials (Microsoft Forefront Endpoint Protection)
(Articles)
Dmitry Silnov
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42014
5,159
Downloads
8,402
Views
Citations
Dual Authentication Hashing for Security Enhancement in MANET
(Articles)
L. Raja
,
Dr. P. S. Periasamy
Circuits and Systems
Vol.7 No.4
,April 28, 2016
DOI:
10.4236/cs.2016.74030
1,594
Downloads
2,395
Views
Citations
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
(Articles)
P. Premkumar
,
D. Shanthi
Circuits and Systems
Vol.7 No.11
,September 13, 2016
DOI:
10.4236/cs.2016.711307
1,834
Downloads
3,127
Views
Citations
Geospatial Technology Potentials in Reawakening the Consciousness of Soil Distribution in Nigeria’s North-Central Region and Mediating the Herdsmen-Farmers Conflicts
(Articles)
Ugonna C. Nkwunonwo
,
Francis I. Okeke
,
Emmanuel N. Chiemelu
,
Elijah S. Ebinne
Journal of Geoscience and Environment Protection
Vol.7 No.2
,February 27, 2019
DOI:
10.4236/gep.2019.72011
807
Downloads
1,712
Views
Citations
Decrypting the Digital Security Act of 2018 and Disclosing Its Unconstitutionality
(Articles)
Syed Menhazul Bari
Beijing Law Review
Vol.14 No.2
,June 25, 2023
DOI:
10.4236/blr.2023.142050
114
Downloads
995
Views
Citations
A Journal Article Critique of “Motivational Interviewing and Exercise Program for Community-Dwelling Older Persons with Chronic Pain”
(Articles)
Hamzah M. Alghzawi
,
Fatima K. Ghanem
Open Access Library Journal
Vol.8 No.5
,May 31, 2021
DOI:
10.4236/oalib.1107456
151
Downloads
1,354
Views
Citations
Dissent under Siege: Case Studies of Repression in the Digital Era of Bangladesh
(Articles)
Ahmed Tahsin Shams
Advances in Journalism and Communication
Vol.12 No.1
,March 29, 2024
DOI:
10.4236/ajc.2024.121011
45
Downloads
208
Views
Citations
Critical Treatise on University Ranking Systems
(Articles)
Osama H. Sayed
Open Journal of Social Sciences
Vol.7 No.12
,December 3, 2019
DOI:
10.4236/jss.2019.712004
803
Downloads
2,039
Views
Citations
Impact of Saudi Digital Library (SDL) to Saudi Research Output: A Review
(Articles)
William Taala
,
Filoteo B. Franco Jr.
,
Rino S. De Sagun
Open Access Library Journal
Vol.6 No.3
,March 21, 2019
DOI:
10.4236/oalib.1105331
932
Downloads
2,404
Views
Citations
Flaws of Modern Economic Theory: The Origins of the Contemporary Financial-Economic Crisis
(Articles)
Ezra Davar
Modern Economy
Vol.2 No.1
,February 24, 2011
DOI:
10.4236/me.2011.21004
6,590
Downloads
13,240
Views
Citations
Proactive Security Mechanism and Design for Firewall
(Articles)
Saleem-Ullah Lar
,
Xiaofeng Liao
,
Aqeel ur Rehman
,
MA Qinglu
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23012
7,038
Downloads
12,768
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top