Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Three-Party Simultaneous Quantum Secure Communication Based on Closed Transmission Loops
(Articles)
Xunru Yin
Journal of Quantum Information Science
Vol.4 No.4
,December 31, 2014
DOI:
10.4236/jqis.2014.44024
4,590
Downloads
5,263
Views
Citations
Efficient Three-Party Quantum Secure Direct Communication with EPR Pairs
(Articles)
Xunru Yin
,
Wenping Ma
,
Dongsu Shen
,
Chaoyang Hao
Journal of Quantum Information Science
Vol.3 No.1
,March 29, 2013
DOI:
10.4236/jqis.2013.31001
3,390
Downloads
6,388
Views
Citations
Cubic Root Extractors of Gaussian Integers and Their Application in Fast Encryption for Time-Constrained Secure Communication
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.4
,April 15, 2011
DOI:
10.4236/ijcns.2011.44024
5,476
Downloads
9,685
Views
Citations
An Efficient Trusted Computing Base for MANET Security
(Articles)
Somya D. Mohanty
,
Vinay Thotakura
,
Mahalingam Ramkumar
Journal of Information Security
Vol.5 No.4
,October 7, 2014
DOI:
10.4236/jis.2014.54018
3,536
Downloads
4,494
Views
Citations
Six-State Symmetric Quantum Key Distribution Protocol
(Articles)
Makhamisa Senekane
,
Mhlambululi Mafu
,
Francesco Petruccione
Journal of Quantum Information Science
Vol.5 No.2
,May 28, 2015
DOI:
10.4236/jqis.2015.52005
3,755
Downloads
4,978
Views
Citations
Establishment and Application of Cryptographic Library Model
(Articles)
Tie-Ming Liu
,
Lie-Hui Jiang
,
Jing Jing
,
Yuan-Yuan Zhang
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35003
3,766
Downloads
4,598
Views
Citations
On the Security of Quantum Key Distribution Ping-Pong Protocol
(Articles)
Masakazu Yoshida
,
Takayuki Miyadera
,
Hideki Imai
Journal of Quantum Information Science
Vol.3 No.1
,March 29, 2013
DOI:
10.4236/jqis.2013.31004
4,236
Downloads
6,919
Views
Citations
Toward Efficient Quantum Key Distribution Reconciliation
(Articles)
Nedra Benletaief
,
Houria Rezig
,
Ammar Bouallegue
Journal of Quantum Information Science
Vol.4 No.2
,June 27, 2014
DOI:
10.4236/jqis.2014.42013
3,656
Downloads
5,189
Views
Citations
Transmission over Cognitive Radio Channel with Novel Secure LT Code
(Articles)
Elham Hosseini
,
Abolfazl Falahati
Communications and Network
Vol.5 No.3
,August 2, 2013
DOI:
10.4236/cn.2013.53023
4,703
Downloads
6,719
Views
Citations
Disclosure of Disability by University Students: Development of a Study Protocol
(Articles)
Andrea De Cesarei
Open Journal of Social Sciences
Vol.2 No.8
,August 27, 2014
DOI:
10.4236/jss.2014.28012
4,256
Downloads
5,719
Views
Citations
Random but System-Wide Unique Unlinkable Parameters
(Articles)
Peter Schartner
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31001
7,174
Downloads
10,913
Views
Citations
All-Optical Cryptographic Device for Secure Communication
(Articles)
Fabio Garzia
,
Roberto Cusani
Communications and Network
Vol.2 No.4
,December 2, 2010
DOI:
10.4236/cn.2010.24034
6,653
Downloads
10,897
Views
Citations
Corporate Intranet Security: Packet-Level Protocols for Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic
(Articles)
Boris S. Verkhovsky
,
Roberto D. Rubino
Int'l J. of Communications, Network and System Sciences
Vol.5 No.5
,May 30, 2012
DOI:
10.4236/ijcns.2012.55033
4,849
Downloads
7,071
Views
Citations
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol
(Articles)
Moad Mowafi
,
Lo'ai Tawalbeh
,
Walid Aljoby
,
Mohammad Al-Rousan
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34034
3,930
Downloads
6,936
Views
Citations
RFID Anti-Counterfeiting for Retailing Systems
(Articles)
Duy-Thinh Tran
,
Sung Je Hong
Journal of Applied Mathematics and Physics
Vol.3 No.1
,January 28, 2015
DOI:
10.4236/jamp.2015.31001
3,807
Downloads
5,157
Views
Citations
Implementation of an Efficient Light Weight Security Algorithm for Energy-Constrained Wireless Sensor Nodes
(Articles)
A. Saravanaselvan
,
B. Paramasivan
Circuits and Systems
Vol.7 No.9
,July 18, 2016
DOI:
10.4236/cs.2016.79194
1,451
Downloads
2,464
Views
Citations
A Review of Lightweight Cryptographic Schemes and Fundamental Cryptographic Characteristics of Boolean Functions
(Articles)
Nahla Fatahelrahman Ibrahim
,
Johnson Ihyeh Agbinya
Advances in Internet of Things
Vol.12 No.1
,January 19, 2022
DOI:
10.4236/ait.2022.121002
240
Downloads
1,131
Views
Citations
GnRH Antagonist Protocol: Is It Effective for Expected Poor Ovarian Responders with Tubal Factor Undergoing IVF?
(Articles)
Weijie Xing
,
Haiyan Lin
,
Qingxue Zhang
Advances in Reproductive Sciences
Vol.5 No.4
,October 24, 2017
DOI:
10.4236/arsci.2017.54007
1,532
Downloads
4,323
Views
Citations
Research on ZigBee Wireless Sensors Network Based on ModBus Protocol
(Articles)
Chengbo YU
,
Yanfei LIU
,
Cheng WANG
Wireless Sensor Network
Vol.1 No.1
,April 10, 2009
DOI:
10.4236/wsn.2009.11007
11,878
Downloads
23,263
Views
Citations
Implementation and Evaluation of Transport Layer Protocol Executing Error Correction (ECP)
(Articles)
Tomofumi Matsuzawa
,
Keisuke Shimazu
Communications and Network
Vol.6 No.3
,August 14, 2014
DOI:
10.4236/cn.2014.63019
3,208
Downloads
4,251
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2023 Scientific Research Publishing Inc. All Rights Reserved.
Top