Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462
(WhatsApp)
1655362766
SCIRP WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform
(Articles)
Ashraful Tauhid
,
Maisha Tasnim
,
Saima Arifin Noor
,
Nuruzzaman Faruqui
,
Mohammad Abu Yousuf
Journal of Information Security
Vol.10 No.3
, July 2, 2019
DOI:
10.4236/jis.2019.103007
1,518
Downloads
5,280
Views
Citations
This article belongs to the Special Issue on
Security and Cryptography
A Method to Determine the Sentence Structure of Animals and Insects
(Articles)
Robert William Bonner
Open Journal of Modern Linguistics
Vol.12 No.1
, February 21, 2022
DOI:
10.4236/ojml.2022.121007
264
Downloads
1,158
Views
Citations
Chaos-Based Encryption of ECG Signals: Experimental Results
(Articles)
Gutenbert Kenfack
,
Alain Tiedeu
Journal of Biomedical Science and Engineering
Vol.7 No.6
, May 19, 2014
DOI:
10.4236/jbise.2014.76039
5,298
Downloads
7,127
Views
Citations
Novel Hybrid Encryption Algorithm Based on Aes, RSA, and Twofish for Bluetooth Encryption
(Articles)
Marwan Ali Albahar
,
Olayemi Olawumi
,
Keijo Haataja
,
Pekka Toivanen
Journal of Information Security
Vol.9 No.2
, April 9, 2018
DOI:
10.4236/jis.2018.92012
2,752
Downloads
7,797
Views
Citations
Design of an E-Administration Platform and Its Cryptography-Based Security Model
(Articles)
Ohwobeno Omohwo
,
Iwasokun Gabriel Babatunde
,
Boyinbode Olutayo Kehinde
,
Gabriel Junior Arome
Journal of Computer and Communications
Vol.11 No.4
, April 28, 2023
DOI:
10.4236/jcc.2023.114008
299
Downloads
2,706
Views
Citations
Review of Algorithms for Securing Data Transmission in Mobile Banking
(Articles)
Daniel Okari Orucho
,
Fredrick Mzee Awuor
,
Ratemo Makiya
,
Collins Oduor
Modern Economy
Vol.14 No.9
, September 15, 2023
DOI:
10.4236/me.2023.149062
385
Downloads
1,941
Views
Citations
Establishment and Application of Cryptographic Library Model
(Articles)
Tie-Ming Liu
,
Lie-Hui Jiang
,
Jing Jing
,
Yuan-Yuan Zhang
Journal of Computer and Communications
Vol.3 No.5
, May 25, 2015
DOI:
10.4236/jcc.2015.35003
4,022
Downloads
5,402
Views
Citations
Secured Transmission of ECG Signals: Numerical and Electronic Simulations
(Articles)
Gutenbert Kenfack
,
Alain Tiedeu
Journal of Signal and Information Processing
Vol.4 No.2
, May 8, 2013
DOI:
10.4236/jsip.2013.42023
5,323
Downloads
8,578
Views
Citations
Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm
(Articles)
Omer K. Jasim
,
Safia Abbas
,
El-Sayed M. Horbaty
,
Abdel-Badeeh M. Salem
Journal of Information Security
Vol.6 No.2
, March 12, 2015
DOI:
10.4236/jis.2015.62009
4,930
Downloads
6,744
Views
Citations
Cryptographic Schemes Based on Elliptic Curves over the Ring Zp[i]
(Articles)
Manoj Kumar
,
Pratik Gupta
Applied Mathematics
Vol.7 No.3
, February 29, 2016
DOI:
10.4236/am.2016.73027
3,680
Downloads
5,692
Views
Citations
A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers
(Articles)
Muhammad Ariful Islam
,
Md. Ashraful Islam
,
Nazrul Islam
,
Boishakhi Shabnam
Journal of Computer and Communications
Vol.6 No.3
, March 23, 2018
DOI:
10.4236/jcc.2018.63006
3,502
Downloads
9,377
Views
Citations
Security Framework for Distributed Database System
(Articles)
Allajabu Dafalla Khamis
,
Saad Subair
Journal of Data Analysis and Information Processing
Vol.7 No.1
, December 17, 2018
DOI:
10.4236/jdaip.2019.71001
1,497
Downloads
3,561
Views
Citations
Comparative Study of Different Cryptographic Algorithms
(Articles)
Baha Eldin Hamouda Hassan Hamouda
Journal of Information Security
Vol.11 No.3
, June 8, 2020
DOI:
10.4236/jis.2020.113009
2,452
Downloads
12,842
Views
Citations
On the LWE Cryptosystem with More General Disturbance
(Articles)
Zhiyong Zheng
,
Kun Tian
Journal of Information Security
Vol.13 No.3
, July 11, 2022
DOI:
10.4236/jis.2022.133008
205
Downloads
1,037
Views
Citations
Algorithms and Tools for Securing and Protecting Academic Data in the Democratic Republic of the Congo
(Articles)
Gulain Mugaruka Buduge
,
Jérémie Ndikumagenge
,
Justin Buhendwa Nyenyezi
Journal of Information Security
Vol.13 No.4
, September 30, 2022
DOI:
10.4236/jis.2022.134017
263
Downloads
1,080
Views
Citations
Learning with Errors Public Key Cryptosystem with Its Security
(Articles)
Zhiyong Zheng
,
Kun Tian
,
Yi Zhang
,
Yunfan Lu
Journal of Information Security
Vol.14 No.1
, January 18, 2023
DOI:
10.4236/jis.2023.141003
326
Downloads
1,699
Views
Citations
Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange
(Articles)
Pawan Kumar
,
Vipin Saxena
Journal of Computer and Communications
Vol.12 No.2
, February 29, 2024
DOI:
10.4236/jcc.2024.122012
240
Downloads
940
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
International Journal of Communications, Network and System Sciences
Vol.8 No.13
, December 30, 2015
DOI:
10.4236/ijcns.2015.813051
4,151
Downloads
5,566
Views
Citations
Efficient FPGA implementation of AES 128 bit for IEEE 802.16e mobile WiMax standards
(Articles)
P. Rajasekar
,
Dr. H. Mangalam
Circuits and Systems
Vol.7 No.4
, April 28, 2016
DOI:
10.4236/cs.2016.74032
2,504
Downloads
4,661
Views
Citations
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
(Articles)
P. Premkumar
,
D. Shanthi
Circuits and Systems
Vol.7 No.11
, September 13, 2016
DOI:
10.4236/cs.2016.711307
2,072
Downloads
3,816
Views
Citations
First
<
1
2
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
SCIRP Newsletter
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
News
About SCIRP
Ethics
Editorial Policies
For Authors
Peer-Review Issues
Publication Fees
Special Issues
Service
Manuscript Tracking System
Order Print Copies
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top