Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks
(Articles)
Hossein Fereidooni
,
Hassan Taheri
,
Mehran Mahramian
Int'l J. of Communications, Network and System Sciences
Vol.5 No.4
,April 19, 2012
DOI:
10.4236/ijcns.2012.54030
6,600
Downloads
10,772
Views
Citations
A Two-Party Password-Authenticated Key Exchange Protocol with Verifier
(Articles)
Shunbo Xiang
,
Bing Xu
,
Ke Chen
Journal of Computer and Communications
Vol.9 No.4
,April 29, 2021
DOI:
10.4236/jcc.2021.94007
249
Downloads
779
Views
Citations
This article belongs to the Special Issue on
Information Technology and Applications
TUP: A New eCK-Secure AKE Protocol under the CDH Assumption
(Articles)
Qinglei Zhou
,
Zengfu Yang
Int'l J. of Communications, Network and System Sciences
Vol.5 No.6
,June 12, 2012
DOI:
10.4236/ijcns.2012.56043
3,328
Downloads
5,747
Views
Citations
An Enhanced Dragonfly Key Exchange Protocol against Offline Dictionary Attack
(Articles)
Eman Alharbi
,
Noha Alsulami
,
Omar Batarfi
Journal of Information Security
Vol.6 No.2
,March 12, 2015
DOI:
10.4236/jis.2015.62008
4,513
Downloads
6,022
Views
Citations
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.2
,February 26, 2011
DOI:
10.4236/ijcns.2011.42009
4,133
Downloads
7,482
Views
Citations
Deterministic Algorithm Computing All Generators: Application in Cryptographic Systems Design
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.5 No.11
,November 26, 2012
DOI:
10.4236/ijcns.2012.511074
4,237
Downloads
6,052
Views
Citations
Faster Method for Secure Transmission of Information with Sender Identification
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.6 No.2
,February 26, 2013
DOI:
10.4236/ijcns.2013.62009
3,787
Downloads
5,566
Views
Citations
Hierarchical Hypercube Based Pairwise Key Establishment Scheme for Sensor Networks
(Articles)
Lei WANG
Int'l J. of Communications, Network and System Sciences
Vol.2 No.2
,May 14, 2009
DOI:
10.4236/ijcns.2009.22016
6,499
Downloads
10,311
Views
Citations
Re-Finding PL.AC.E. for Walking: Assessment of Key-Elements Using Questionnaire
(Articles)
Fritz Akhmad Nuzir
,
Bart Dewancker
Current Urban Studies
Vol.3 No.4
,October 28, 2015
DOI:
10.4236/cus.2015.34023
3,472
Downloads
4,274
Views
Citations
An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks
(Articles)
Mi Wen
,
Zhi Yin
,
Yong Wang
,
Yu Long
Wireless Sensor Network
Vol.2 No.9
,September 30, 2010
DOI:
10.4236/wsn.2010.29083
5,303
Downloads
9,992
Views
Citations
A New Kind of Dynamic Key Protocol for Wireless Sensor Network
(Articles)
Cai-Xia Zhang
,
Liang-Lun Cheng
,
Xiang-Dong Wang
Wireless Sensor Network
Vol.3 No.6
,July 1, 2011
DOI:
10.4236/wsn.2011.36021
5,592
Downloads
10,401
Views
Citations
A Novel Scheme for Deleting Group Members
(Articles)
Junping Yao
,
Xinshe Li
,
Junchun Ma
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24006
2,956
Downloads
3,794
Views
Citations
A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers
(Articles)
Muhammad Ariful Islam
,
Md. Ashraful Islam
,
Nazrul Islam
,
Boishakhi Shabnam
Journal of Computer and Communications
Vol.6 No.3
,March 23, 2018
DOI:
10.4236/jcc.2018.63006
2,520
Downloads
6,610
Views
Citations
Comparison of 4 Multi-User Passive Network Topologies for 3 Different Quantum Key Distribution
(Articles)
Fabio Garzia
,
Roberto Cusani
Communications and Network
Vol.2 No.3
,September 10, 2010
DOI:
10.4236/cn.2010.23025
7,043
Downloads
11,666
Views
Citations
Quantum Key Distribution with Qubit Pairs
(Articles)
Mohd Asad Siddiqui
,
Tabish Qureshi
Journal of Quantum Information Science
Vol.4 No.3
,August 13, 2014
DOI:
10.4236/jqis.2014.43014
3,569
Downloads
4,961
Views
Citations
Unequal Access to HIV Prevention Services by Gender in Benin
(Articles)
Mahouli Mireille-Marie Mintogbe
,
Mouftaou Amadou Sanni
,
Nelly Harmonie Bigbé Baké Ahoussinou
,
Odile Sodolouffo
,
Elihou Adje
,
Djima Barano
Open Journal of Social Sciences
Vol.7 No.6
,June 3, 2019
DOI:
10.4236/jss.2019.76004
832
Downloads
1,791
Views
Citations
A Design of Nuclear Electronics Filter Forming Circuit
(Articles)
Shaoqin Li
,
Yunrui Jiang
,
Jie Shi
Open Access Library Journal
Vol.8 No.9
,September 3, 2021
DOI:
10.4236/oalib.1107843
58
Downloads
346
Views
Citations
Differentiation of Value Creation for Suppliers and Consumers in Sharing Economy Business Models
(Articles)
Evgeny V. Popov
,
Anna Y. Veretennikova
,
Daria A. Selezneva
Open Journal of Social Sciences
Vol.10 No.12
,November 11, 2022
DOI:
10.4236/jss.2022.1012017
62
Downloads
300
Views
Citations
Exchange Market Pressure in China: A Re-Examination Based on Girton-Roper Monetary Model
(Articles)
Xiangsheng Dou
Theoretical Economics Letters
Vol.7 No.5
,August 2, 2017
DOI:
10.4236/tel.2017.75089
904
Downloads
1,997
Views
Citations
Is the Tokyo Foreign Exchange Market Efficient from Two Perspectives of Forward Bias and Anomaly?
(Articles)
Yutaka Kurihara
Modern Economy
Vol.2 No.4
,September 21, 2011
DOI:
10.4236/me.2011.24067
5,146
Downloads
8,868
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2023 Scientific Research Publishing Inc. All Rights Reserved.
Top