Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers
(Articles)
Muhammad Ariful Islam
,
Md. Ashraful Islam
,
Nazrul Islam
,
Boishakhi Shabnam
Journal of Computer and Communications
Vol.6 No.3
,March 23, 2018
DOI:
10.4236/jcc.2018.63006
3,386
Downloads
8,853
Views
Citations
E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks
(Articles)
Hossein Fereidooni
,
Hassan Taheri
,
Mehran Mahramian
Int'l J. of Communications, Network and System Sciences
Vol.5 No.4
,April 19, 2012
DOI:
10.4236/ijcns.2012.54030
7,075
Downloads
11,505
Views
Citations
Cryptographic Protocols Based on Nielsen Transformations
(Articles)
Benjamin Fine
,
Anja I. S. Moldenhauer
,
Gerhard Rosenberger
Journal of Computer and Communications
Vol.4 No.12
,October 31, 2016
DOI:
10.4236/jcc.2016.412004
1,630
Downloads
2,735
Views
Citations
This article belongs to the Special Issue on
Coding and Cryptography
A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes
(Articles)
Rola I. Al-Khalid
,
Randa A. Al-Dallah
,
Aseel M. Al-Anani
,
Raghad M. Barham
,
Salam I. Hajir
Journal of Software Engineering and Applications
Vol.10 No.1
,January 19, 2017
DOI:
10.4236/jsea.2017.101001
2,665
Downloads
7,068
Views
Citations
Hierarchical Hypercube Based Pairwise Key Establishment Scheme for Sensor Networks
(Articles)
Lei WANG
Int'l J. of Communications, Network and System Sciences
Vol.2 No.2
,May 14, 2009
DOI:
10.4236/ijcns.2009.22016
6,764
Downloads
10,911
Views
Citations
Re-Finding PL.AC.E. for Walking: Assessment of Key-Elements Using Questionnaire
(Articles)
Fritz Akhmad Nuzir
,
Bart Dewancker
Current Urban Studies
Vol.3 No.4
,October 28, 2015
DOI:
10.4236/cus.2015.34023
3,674
Downloads
4,705
Views
Citations
The Determinants of Private Participation in Infrastructure in Zimbabwe
(Articles)
Jameson Jabangwe
,
Gift Mugano
,
Amanda Van Den Berg
Open Access Library Journal
Vol.12 No.9
,September 30, 2025
DOI:
10.4236/oalib.1113448
19
Downloads
101
Views
Citations
An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks
(Articles)
Mi Wen
,
Zhi Yin
,
Yu Long
,
Yong Wang
Wireless Sensor Network
Vol.2 No.9
,September 30, 2010
DOI:
10.4236/wsn.2010.29083
5,611
Downloads
10,686
Views
Citations
A New Kind of Dynamic Key Protocol for Wireless Sensor Network
(Articles)
Cai-Xia Zhang
,
Liang-Lun Cheng
,
Xiang-Dong Wang
Wireless Sensor Network
Vol.3 No.6
,July 1, 2011
DOI:
10.4236/wsn.2011.36021
5,867
Downloads
10,956
Views
Citations
A Novel Scheme for Deleting Group Members
(Articles)
Junping Yao
,
Xinshe Li
,
Junchun Ma
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24006
3,172
Downloads
4,262
Views
Citations
Comparison of 4 Multi-User Passive Network Topologies for 3 Different Quantum Key Distribution
(Articles)
Fabio Garzia
,
Roberto Cusani
Communications and Network
Vol.2 No.3
,September 10, 2010
DOI:
10.4236/cn.2010.23025
7,292
Downloads
12,200
Views
Citations
Quantum Key Distribution with Qubit Pairs
(Articles)
Mohd Asad Siddiqui
,
Tabish Qureshi
Journal of Quantum Information Science
Vol.4 No.3
,August 13, 2014
DOI:
10.4236/jqis.2014.43014
3,812
Downloads
5,711
Views
Citations
A Design of Nuclear Electronics Filter Forming Circuit
(Articles)
Shaoqin Li
,
Yunrui Jiang
,
Jie Shi
Open Access Library Journal
Vol.8 No.9
,September 3, 2021
DOI:
10.4236/oalib.1107843
144
Downloads
746
Views
Citations
HIV Seroprevalence among Key Populations in Africa: A Systematic Review
(Articles)
Alliance Tagoto Tepungipame
,
Dieu-Merci Mbumba Lupaka
,
Serge Tonen Wolyec
,
Salomon Batina Agasa
,
Jean Panda Lukongo
,
Joris Losimba Likwela
Journal of Biosciences and Medicines
Vol.13 No.3
,March 28, 2025
DOI:
10.4236/jbm.2025.133028
50
Downloads
287
Views
Citations
Differentiation of Value Creation for Suppliers and Consumers in Sharing Economy Business Models
(Articles)
Evgeny V. Popov
,
Anna Y. Veretennikova
,
Daria A. Selezneva
Open Journal of Social Sciences
Vol.10 No.12
,November 11, 2022
DOI:
10.4236/jss.2022.1012017
269
Downloads
1,234
Views
Citations
The Development of the Public-Private Partnership Concept in Economic Theory
(Articles)
Alla Mostepaniuk
Advances in Applied Sociology
Vol.6 No.11
,November 24, 2016
DOI:
10.4236/aasoci.2016.611028
3,013
Downloads
7,458
Views
Citations
Exploring the Readiness of Schools for Distributed Leadership: Perspectives of Private School Teachers in Guyana
(Articles)
Dexter Phillips
,
Jimmy Bhojedat
,
Simone Phillips
,
Clement Henry
,
Taslikyah Stewart-Fox
Creative Education
Vol.15 No.2
,February 28, 2024
DOI:
10.4236/ce.2024.152015
248
Downloads
1,217
Views
Citations
This article belongs to the Special Issue on
Educational Administration, Policy and Leadership
Reference Encryption for Access Right Segregation and Domain Representation
(Articles)
Lanfranco Lopriore
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32010
3,566
Downloads
6,286
Views
Citations
An Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks
(Articles)
Benamar Kadri
,
Djilalli Moussaoui
,
Mohammed Feham
,
Abdellah Mhammed
Wireless Sensor Network
Vol.4 No.6
,June 13, 2012
DOI:
10.4236/wsn.2012.46022
5,600
Downloads
10,964
Views
Citations
New Practical Algebraic Public-Key Cryptosystem and Some Related Algebraic and Computational Aspects
(Articles)
S. K. Rososhek
Applied Mathematics
Vol.4 No.7
,July 11, 2013
DOI:
10.4236/am.2013.47142
3,745
Downloads
5,475
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top