Scientific Research An Academic Publisher
OPEN ACCESS
Trusted Heartbeat Framework for Cloud Computing (Articles)
Dipen Contractor, Dhiren Patel, Shreya Patel
Journal of Information Security Vol.7 No.3,April 1, 2016
DOI: 10.4236/jis.2016.73007 3,684 Downloads 4,599 Views Citations
A Threshold Signature Scheme Based on TPM (Articles)
Zhi-Hua Zhang, Si-Rong Zhang, Wen-Jin Yu, Jian-Jun Li, Bei Gong, Wei Jiang
Int'l J. of Communications, Network and System Sciences Vol.4 No.10,October 12, 2011
DOI: 10.4236/ijcns.2011.410075 4,733 Downloads 7,879 Views Citations
Opportunistic Unicast and Multicast Routing Protocol for VANET (Articles)
Zhizhong Jie, Chuanhe Huang, Liya Xu, Bo Wang, Wenzhong Yang, Xi Chen
Journal of Software Engineering and Applications Vol.6 No.6,June 19, 2013
DOI: 10.4236/jsea.2013.66040 4,891 Downloads 7,314 Views Citations
The Influence of Leader-Member Relationship on Staff under the Feeling Trusted (Articles)
Xue Yang
Open Journal of Business and Management Vol.7 No.2,March 28, 2019
DOI: 10.4236/ojbm.2019.72039 346 Downloads 652 Views Citations
Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace (Articles)
Hui Lin, Gyungho Lee
Journal of Information Security Vol.1 No.1,July 30, 2010
DOI: 10.4236/jis.2010.11001 6,618 Downloads 10,853 Views Citations
Morphotectonic Analysis of Burkh Anticline, North of Bastak (Zagros) (Articles)
Mohammad Khalaj
Open Journal of Geology Vol.5 No.6,June 10, 2015
DOI: 10.4236/ojg.2015.56036 4,799 Downloads 5,275 Views Citations
Non-invasive foetal heartbeat rate extraction from an underdetermined single signal (Articles)
Ranjan Acharyya, Neil L Scott, Paul D Teal
Health Vol.1 No.2,September 28, 2009
DOI: 10.4236/health.2009.12018 4,902 Downloads 9,566 Views Citations
Observer-Based Nonlinear Feedback Controls for Heartbeat ECG Tracking Systems (Articles)
Witt Thanom, Robert N. K. Loh
Intelligent Control and Automation Vol.3 No.3,August 30, 2012
DOI: 10.4236/ica.2012.33029 4,823 Downloads 7,079 Views Citations
A Fair Electronic Cash System with Identity-Based Group Signature Scheme (Articles)
Khalid. O. Elaalim, Shoubao Yang
Journal of Information Security Vol.3 No.2,April 26, 2012
DOI: 10.4236/jis.2012.32021 3,973 Downloads 6,920 Views Citations
Corporate Intranet Security: Packet-Level Protocols for Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic (Articles)
Boris S. Verkhovsky, Roberto D. Rubino
Int'l J. of Communications, Network and System Sciences Vol.5 No.5,May 30, 2012
DOI: 10.4236/ijcns.2012.55033 4,670 Downloads 6,815 Views Citations
An Efficient Billing Scheme for Trusted Nodes Using Fuzzy Logic in Wireless Sensor Networks (Articles)
Mohammad M. Shurman, Zaid A. Alomari, Khaldoon M. Mhaidat
Wireless Engineering and Technology Vol.5 No.3,July 11, 2014
DOI: 10.4236/wet.2014.53008 3,852 Downloads 4,848 Views Citations
A Security Architecture for SCADA Systems (Articles)
Arun Velagapalli, Mahalingam Ramkumar
Journal of Information Security Vol.9 No.1,January 23, 2018
DOI: 10.4236/jis.2018.91009 778 Downloads 1,902 Views Citations
Can Routers Provide Sufficient Protection against Cyber Security Attacks? (Articles)
David Leal, Sanjeev Kumar
Journal of Information Security Vol.10 No.4,October 31, 2019
DOI: 10.4236/jis.2019.104017 309 Downloads 836 Views Citations