Scientific Research An Academic Publisher
OPEN ACCESS
Efficient Three-Party Quantum Secure Direct Communication with EPR Pairs (Articles)
Xunru Yin, Wenping Ma, Dongsu Shen, Chaoyang Hao
Journal of Quantum Information Science Vol.3 No.1,March 29, 2013
DOI: 10.4236/jqis.2013.31001 3,107 Downloads 5,757 Views Citations
Three-Party Simultaneous Quantum Secure Communication Based on Closed Transmission Loops (Articles)
Xunru Yin
Journal of Quantum Information Science Vol.4 No.4,December 31, 2014
DOI: 10.4236/jqis.2014.44024 4,427 Downloads 4,890 Views Citations
Modified Vanstone’s Construction of lightweight MAC for Vehicular On-Board IT Systems (Articles)
István Vajda
Journal of Computer and Communications Vol.8 No.12,December 30, 2020
DOI: 10.4236/jcc.2020.812019 33 Downloads 123 Views Citations
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols (Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences Vol.4 No.2,February 26, 2011
DOI: 10.4236/ijcns.2011.42009 3,874 Downloads 6,993 Views Citations
Public-Key Cryptosystems with Secret Encryptor and Digital Signature (Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences Vol.6 No.1,January 29, 2013
DOI: 10.4236/ijcns.2013.61001 3,843 Downloads 5,428 Views Citations
Cubic Root Extractors of Gaussian Integers and Their Application in Fast Encryption for Time-Constrained Secure Communication (Articles)
Int'l J. of Communications, Network and System Sciences Vol.4 No.4,April 15, 2011
DOI: 10.4236/ijcns.2011.44024 5,053 Downloads 8,879 Views Citations
Protection of Sensitive Messages Based on Quadratic Roots of Gaussians: Groups with Complex Modulus (Articles)
Int'l J. of Communications, Network and System Sciences Vol.4 No.5,May 12, 2011
DOI: 10.4236/ijcns.2011.45033 3,537 Downloads 6,656 Views Citations
Building a Secure Mobile Payment Protocol in the Cloud (Articles)
Liping Du, Guifen Zhao, Ying Li
Open Journal of Social Sciences Vol.4 No.7,July 30, 2016
DOI: 10.4236/jss.2016.47009 1,197 Downloads 1,662 Views Citations
Secure Signature Protocol (Articles)
Shundong LI, Daoshun WANG, Yiqi DAI
Intelligent Information Management Vol.1 No.3,December 29, 2009
DOI: 10.4236/iim.2009.13026 4,926 Downloads 7,437 Views Citations
Secure Messaging Implementation in OpenSC (Articles)
Maurizio Talamo, Maulahikmah Galinium, Christian H. Schunck, Franco Arcieri
Journal of Information Security Vol.3 No.4,October 31, 2012
DOI: 10.4236/jis.2012.34032 4,578 Downloads 7,514 Views Citations
Private Personal Information Verification (Articles)
Hoang Giang Do, Wee Keong Ng
Journal of Information Security Vol.8 No.3,July 18, 2017
DOI: 10.4236/jis.2017.83015 864 Downloads 1,767 Views Citations
Effective and Extensive Virtual Private Network (Articles)
Tarek S. Sobh, Yasser Aly
Journal of Information Security Vol.2 No.1,January 31, 2011
DOI: 10.4236/jis.2011.21004 6,415 Downloads 12,712 Views Citations
Hardware Performance Evaluation of SHA-3 Candidate Algorithms (Articles)
Yaser Jararweh, Lo’ai Tawalbeh, Hala Tawalbeh, Abidalrahman Moh’d
Journal of Information Security Vol.3 No.2,April 26, 2012
DOI: 10.4236/jis.2012.32008 6,517 Downloads 10,774 Views Citations
A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks (Articles)
Hyeon Myeong Choi, Su Man Nam, Tae Ho Cho
Wireless Sensor Network Vol.5 No.3,March 29, 2013
DOI: 10.4236/wsn.2013.53005 4,692 Downloads 8,987 Views Citations
Design of Secure Microsystems Using Current-to-Data Dependency Analysis (Articles)
Haleh Vahedi, Radu Muresan, Stefano Gregori
Circuits and Systems Vol.4 No.2,April 17, 2013
DOI: 10.4236/cs.2013.42019 3,233 Downloads 5,241 Views Citations
Secured Transmission of ECG Signals: Numerical and Electronic Simulations (Articles)
Gutenbert Kenfack, Alain Tiedeu
Journal of Signal and Information Processing Vol.4 No.2,May 8, 2013
DOI: 10.4236/jsip.2013.42023 4,531 Downloads 7,072 Views Citations
A Secure Approach to Educating a Mobile World-Class Military —A Mobile Secure Concept for Accessing the Classroom from Around the World (Articles)
Terry C. House
Communications and Network Vol.5 No.3B,October 4, 2013
DOI: 10.4236/cn.2013.53B2087 4,457 Downloads 5,448 Views Citations
Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation (Articles)
Sankita J. Patel, Ankit Chouhan, Devesh C. Jinwala
Journal of Information Security Vol.5 No.1,January 17, 2014
DOI: 10.4236/jis.2014.51002 4,298 Downloads 7,417 Views Citations
Design and Implementation of Secure Nodes in the Based-Internet-of-Things Intelligent Household (Articles)
Xiangdong Hu, Hongru Xu, Kaimin Han
Journal of Computer and Communications Vol.2 No.7,May 21, 2014
DOI: 10.4236/jcc.2014.27001 3,101 Downloads 3,949 Views Citations
Trusted-CDS Based Intrusion Detection System in Wireless Sensor Network (TC-IDS) (Articles)
Amin Mohajer, Mohammad Hasan Hajimobini, Abbas Mirzaei, Ehsan Noori
Open Access Library Journal Vol.1 No.7,October 22, 2014
DOI: 10.4236/oalib.1100848 1,362 Downloads 2,101 Views Citations