Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Three-Party Simultaneous Quantum Secure Communication Based on Closed Transmission Loops
(Articles)
Xunru Yin
Journal of Quantum Information Science
Vol.4 No.4
,December 31, 2014
DOI:
10.4236/jqis.2014.44024
4,675
Downloads
5,478
Views
Citations
Cubic Root Extractors of Gaussian Integers and Their Application in Fast Encryption for Time-Constrained Secure Communication
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.4
,April 15, 2011
DOI:
10.4236/ijcns.2011.44024
5,606
Downloads
10,011
Views
Citations
An Efficient Trusted Computing Base for MANET Security
(Articles)
Somya D. Mohanty
,
Vinay Thotakura
,
Mahalingam Ramkumar
Journal of Information Security
Vol.5 No.4
,October 7, 2014
DOI:
10.4236/jis.2014.54018
3,613
Downloads
4,680
Views
Citations
Establishment and Application of Cryptographic Library Model
(Articles)
Tie-Ming Liu
,
Lie-Hui Jiang
,
Jing Jing
,
Yuan-Yuan Zhang
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35003
3,823
Downloads
4,804
Views
Citations
Transmission over Cognitive Radio Channel with Novel Secure LT Code
(Articles)
Elham Hosseini
,
Abolfazl Falahati
Communications and Network
Vol.5 No.3
,August 2, 2013
DOI:
10.4236/cn.2013.53023
4,795
Downloads
6,943
Views
Citations
Disclosure of Disability by University Students: Development of a Study Protocol
(Articles)
Andrea De Cesarei
Open Journal of Social Sciences
Vol.2 No.8
,August 27, 2014
DOI:
10.4236/jss.2014.28012
4,369
Downloads
6,048
Views
Citations
CXL (Compute Express Link) Technology
(Articles)
Santhosh Nagaraj Nag
Journal of Computer and Communications
Vol.11 No.6
,June 30, 2023
DOI:
10.4236/jcc.2023.116006
955
Downloads
3,422
Views
Citations
Random but System-Wide Unique Unlinkable Parameters
(Articles)
Peter Schartner
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31001
7,291
Downloads
11,183
Views
Citations
All-Optical Cryptographic Device for Secure Communication
(Articles)
Fabio Garzia
,
Roberto Cusani
Communications and Network
Vol.2 No.4
,December 2, 2010
DOI:
10.4236/cn.2010.24034
6,780
Downloads
11,169
Views
Citations
Corporate Intranet Security: Packet-Level Protocols for Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic
(Articles)
Boris S. Verkhovsky
,
Roberto D. Rubino
Int'l J. of Communications, Network and System Sciences
Vol.5 No.5
,May 30, 2012
DOI:
10.4236/ijcns.2012.55033
4,921
Downloads
7,211
Views
Citations
RFID Anti-Counterfeiting for Retailing Systems
(Articles)
Duy-Thinh Tran
,
Sung Je Hong
Journal of Applied Mathematics and Physics
Vol.3 No.1
,January 28, 2015
DOI:
10.4236/jamp.2015.31001
3,931
Downloads
5,512
Views
Citations
Implementation of an Efficient Light Weight Security Algorithm for Energy-Constrained Wireless Sensor Nodes
(Articles)
A. Saravanaselvan
,
B. Paramasivan
Circuits and Systems
Vol.7 No.9
,July 18, 2016
DOI:
10.4236/cs.2016.79194
1,500
Downloads
2,617
Views
Citations
A Review of Lightweight Cryptographic Schemes and Fundamental Cryptographic Characteristics of Boolean Functions
(Articles)
Nahla Fatahelrahman Ibrahim
,
Johnson Ihyeh Agbinya
Advances in Internet of Things
Vol.12 No.1
,January 19, 2022
DOI:
10.4236/ait.2022.121002
345
Downloads
1,723
Views
Citations
GnRH Antagonist Protocol: Is It Effective for Expected Poor Ovarian Responders with Tubal Factor Undergoing IVF?
(Articles)
Weijie Xing
,
Haiyan Lin
,
Qingxue Zhang
Advances in Reproductive Sciences
Vol.5 No.4
,October 24, 2017
DOI:
10.4236/arsci.2017.54007
1,639
Downloads
4,710
Views
Citations
Research on ZigBee Wireless Sensors Network Based on ModBus Protocol
(Articles)
Chengbo YU
,
Yanfei LIU
,
Cheng WANG
Wireless Sensor Network
Vol.1 No.1
,April 10, 2009
DOI:
10.4236/wsn.2009.11007
12,065
Downloads
23,685
Views
Citations
Implementation and Evaluation of Transport Layer Protocol Executing Error Correction (ECP)
(Articles)
Tomofumi Matsuzawa
,
Keisuke Shimazu
Communications and Network
Vol.6 No.3
,August 14, 2014
DOI:
10.4236/cn.2014.63019
3,321
Downloads
4,569
Views
Citations
Building a Secure Mobile Payment Protocol in the Cloud
(Articles)
Liping Du
,
Guifen Zhao
,
Ying Li
Open Journal of Social Sciences
Vol.4 No.7
,July 30, 2016
DOI:
10.4236/jss.2016.47009
1,425
Downloads
2,252
Views
Citations
Knowledge and Practices of the Prescription of Physical and Sports Activities (PSA) by Doctors in Ouagadougou: Inventory
(Articles)
Nana Brigitte
,
Lamien David Prosper
,
Sawadogo Amidou
,
Daboné Moussa
Advances in Physical Education
Vol.13 No.4
,November 7, 2023
DOI:
10.4236/ape.2023.134018
68
Downloads
332
Views
Citations
A Generic and Reliable Land Acquisition Protocol Implementation for Sub-Saharan Africa Countries
(Articles)
Bayomock Linwa André Claude
,
Traore Hamidou
Journal of Computer and Communications
Vol.12 No.1
,January 31, 2024
DOI:
10.4236/jcc.2024.121015
52
Downloads
142
Views
Citations
The Specification of Agent Interaction in Multi-Agent Systems
(Articles)
Dmitri CHEREMISINOV
Intelligent Information Management
Vol.1 No.2
,November 30, 2009
DOI:
10.4236/iim.2009.12011
4,292
Downloads
7,725
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top