Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Analysis and Amendment of Security System in 3G
(Articles)
Min ZHAO
,
Ling SHI
Intelligent Information Management
Vol.1 No.1
,July 31, 2009
DOI:
10.4236/iim.2009.11001
7,634
Downloads
11,762
Views
Citations
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model
(Articles)
Zhengtao JIANG
,
Yongbin WANG
,
Yong WANG
,
Yumin WANG
Intelligent Information Management
Vol.1 No.1
,July 31, 2009
DOI:
10.4236/iim.2009.11002
4,739
Downloads
8,258
Views
Citations
The Forward Exchange Rate Unbiasedness Hypothesis: A Single Break Unit Root and Cointegration Analysis
(Articles)
Michael E. Mazur
,
Miguel D. Ramirez
Modern Economy
Vol.4 No.9
,September 11, 2013
DOI:
10.4236/me.2013.49066
4,485
Downloads
6,597
Views
Citations
Differentiation of Value Creation for Suppliers and Consumers in Sharing Economy Business Models
(Articles)
Evgeny V. Popov
,
Anna Y. Veretennikova
,
Daria A. Selezneva
Open Journal of Social Sciences
Vol.10 No.12
,November 11, 2022
DOI:
10.4236/jss.2022.1012017
142
Downloads
694
Views
Citations
A Hybrid Key Management Scheme Based on Clustered Wireless Sensor Networks
(Articles)
Pengcheng Zhao
,
Yong Xu
,
Min Nan
Wireless Sensor Network
Vol.4 No.8
,August 29, 2012
DOI:
10.4236/wsn.2012.48029
4,366
Downloads
7,333
Views
Citations
Social Ecological Model and Underage Drinking: A Theoretical Review and Evaluation
(Articles)
Hamzah M. Alghzawi
,
Fatima K. Ghanem
Psychology
Vol.12 No.5
,May 31, 2021
DOI:
10.4236/psych.2021.125050
1,107
Downloads
8,401
Views
Citations
Parallel Key Insulated ID-Based Public Key Cryptographic Primitive with Outsourced Equality Test
(Articles)
Seth Alornyo
,
Mustapha Adamu Mohammed
,
Bright Anibrika Selorm Kodzo
,
Pious Akwasi Sarpong
,
Michael Asante
Journal of Computer and Communications
Vol.8 No.12
,December 30, 2020
DOI:
10.4236/jcc.2020.812018
355
Downloads
1,091
Views
Citations
Analysis of Database Security
(Articles)
Xueying Pan
,
Anthony Obahiaghon
,
Brendan Makar
,
Samuel Wilson
,
Christian Beard
Open Access Library Journal
Vol.11 No.4
,April 15, 2024
DOI:
10.4236/oalib.1111366
9
Downloads
86
Views
Citations
Reliability and Precision Are Optimal for Non-Uniform Distributions of Presynaptic Release Probability
(Articles)
Jean-Marc Fellous
,
Nadia S. Corral-Frías
Journal of Biomedical Science and Engineering
Vol.8 No.3
,March 19, 2015
DOI:
10.4236/jbise.2015.83017
4,177
Downloads
4,886
Views
Citations
This article belongs to the Special Issue on
Synapses
A Formal Model of Conformity and Security Testing of Inheritance for Object Oriented Constraint Programming
(Articles)
Khalid Benlhachmi
,
Mohammed Benattou
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42013
4,400
Downloads
7,060
Views
Citations
Key Core Project Management of Construction Industry to Study
(Articles)
Shu-Chen Lee
,
Shou-Shu Liang
Open Journal of Social Sciences
Vol.2 No.3
,March 6, 2014
DOI:
10.4236/jss.2014.23010
5,415
Downloads
8,317
Views
Citations
Top 10 Key Risk Factors of GZA Project Implementation Are Analyzed with Interpretative Structural Model
(Articles)
Jiangping Wan
,
Guangwei Pan
Open Journal of Business and Management
Vol.2 No.4
,August 22, 2014
DOI:
10.4236/ojbm.2014.24032
2,994
Downloads
3,707
Views
Citations
Analysis of Security of Quantum Key Distribution Based on Entangled Photon Pairs by Model Checking
(Articles)
Surapol Rochanapratishtha
,
Wanchai Pijitrojana
Journal of Quantum Information Science
Vol.5 No.3
,September 16, 2015
DOI:
10.4236/jqis.2015.53012
3,816
Downloads
5,085
Views
Citations
Advanced Transition/Cluster Key Management Scheme for End-System Multicast Protocol
(Articles)
Ayman El-Sayed
Int'l J. of Communications, Network and System Sciences
Vol.5 No.5
,May 30, 2012
DOI:
10.4236/ijcns.2012.55038
6,439
Downloads
9,079
Views
Citations
A Way to Set up Security Layer over Internet
(Articles)
Xiangyi Hu
,
Guifen Zhao
,
Guanning Xu
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35022
2,516
Downloads
3,077
Views
Citations
A Simple Security Proof for Entanglement-Based Quantum Key Distribution
(Articles)
Mhlambululi Mafu
Journal of Quantum Information Science
Vol.6 No.4
,December 21, 2016
DOI:
10.4236/jqis.2016.64018
1,987
Downloads
4,591
Views
Citations
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
(Articles)
Mohammad Anwar Hossain
,
Ahsan Ullah
,
Newaz Ibrahim Khan
,
Md Feroz Alam
Journal of Information Security
Vol.10 No.4
,October 14, 2019
DOI:
10.4236/jis.2019.104012
1,221
Downloads
5,396
Views
Citations
Practical Security of the Continuous-Variable Quantum Key Distribution with Locally-Generated Local Oscillators
(Articles)
Biao Huang
,
Yongjun Zhu
,
Pu Tang
,
Yongmei Huang
,
Zhenming Peng
Journal of Applied Mathematics and Physics
Vol.7 No.11
,November 13, 2019
DOI:
10.4236/jamp.2019.711188
477
Downloads
1,180
Views
Citations
Research on Dynamic Relationship between Exchange Rate and Stock Price—Based on GARCH-in-Mean Model
(Articles)
Weihan Zhang
,
Peijuan Yang
Journal of Service Science and Management
Vol.11 No.6
,December 28, 2018
DOI:
10.4236/jssm.2018.116046
1,134
Downloads
2,941
Views
Citations
Authenticated Key Agreement Protocols: A Comparative Study
(Articles)
Areej Omar Baalghusun
,
Olfa Fahad Abusalem
,
Zahra Abbas Al Abbas
,
Jayaprakash Kar
Journal of Information Security
Vol.6 No.1
,January 13, 2015
DOI:
10.4236/jis.2015.61006
4,696
Downloads
6,393
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top