Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Dissent under Siege: Case Studies of Repression in the Digital Era of Bangladesh
(Articles)
Ahmed Tahsin Shams
Advances in Journalism and Communication
Vol.12 No.1
,March 29, 2024
DOI:
10.4236/ajc.2024.121011
211
Downloads
1,081
Views
Citations
Decrypting the Digital Security Act of 2018 and Disclosing Its Unconstitutionality
(Articles)
Syed Menhazul Bari
Beijing Law Review
Vol.14 No.2
,June 25, 2023
DOI:
10.4236/blr.2023.142050
206
Downloads
1,487
Views
Citations
Conventional and Improved Digital Signature Scheme: A Comparative Study
(Articles)
Alaa D. Alrehily
,
Asmaa F. Alotaibi
,
Suzan B. Almutairy
,
Mashael S. Alqhtani
,
Jayaprakash Kar
Journal of Information Security
Vol.6 No.1
,January 22, 2015
DOI:
10.4236/jis.2015.61007
6,212
Downloads
8,487
Views
Citations
SCADA Framework Incorporating MANET and IDP for Cyber Security of Residential Microgrid Communication Network
(Articles)
Goutham K. Chalamasetty
,
Paras Mandal
,
Tzu-Liang (Bill) Tseng
Smart Grid and Renewable Energy
Vol.7 No.3
,March 29, 2016
DOI:
10.4236/sgre.2016.73007
2,594
Downloads
4,245
Views
Citations
Ethical and Legal Arguments about Telemedicine in Colombia
(Articles)
José Antonio García Pereáñez
Journal of Computer and Communications
Vol.5 No.3
,March 13, 2017
DOI:
10.4236/jcc.2017.53013
1,428
Downloads
2,954
Views
Citations
Exploration of Core Technologies of Cyber Security
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.8 No.9
,September 26, 2021
DOI:
10.4236/oalib.1107795
172
Downloads
1,202
Views
Citations
Flaws in the Field of Digital Security in the Workplace: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Open Journal of Applied Sciences
Vol.12 No.12
,December 29, 2022
DOI:
10.4236/ojapps.2022.1212146
143
Downloads
591
Views
Citations
The Changing Human Rights Discourse and the Helsinki Final Act
(Articles)
Saman Adiban
Open Journal of Social Sciences
Vol.12 No.9
,September 20, 2024
DOI:
10.4236/jss.2024.129016
58
Downloads
377
Views
Citations
Combining Public Key Encryption with Schnorr Digital Signature
(Articles)
Laura Savu
Journal of Software Engineering and Applications
Vol.5 No.2
,February 27, 2012
DOI:
10.4236/jsea.2012.52016
9,467
Downloads
14,900
Views
Citations
Enhancing Police Officers’ Cybercrime Investigation Skills Using a Checklist Tool
(Articles)
Abdelkhalek Ibrahim Alastal
,
Ashraf Hassan Shaqfa
Journal of Data Analysis and Information Processing
Vol.11 No.2
,April 4, 2023
DOI:
10.4236/jdaip.2023.112008
484
Downloads
4,416
Views
Citations
An Analysis of Digital Records and Their Juridical Ramifications: Bangladesh Perspective
(Articles)
Mohammad Khabbab Taki
Beijing Law Review
Vol.14 No.4
,December 7, 2023
DOI:
10.4236/blr.2023.144106
116
Downloads
575
Views
Citations
Sensitive Information Security Based on Elliptic Curves
(Articles)
Nadine Nibigira
,
Vincent Havyarimana
,
Zhu Xiao
World Journal of Engineering and Technology
Vol.12 No.2
,April 23, 2024
DOI:
10.4236/wjet.2024.122018
133
Downloads
567
Views
Citations
Cybersecurity Culture and Organizational Resilience: A Human-Centered Approach to Digital Risk Management
(Articles)
Shankar Subramanian Iyer
,
Brinitha Raji
American Journal of Industrial and Business Management
Vol.15 No.5
,May 30, 2025
DOI:
10.4236/ajibm.2025.155036
38
Downloads
320
Views
Citations
Alteration of liver N-glycome in patients with hepatocellular carcinoma
(Articles)
Ling Wang
,
Valerie Vanhooren
,
Sylviane Dewaele
,
Xue-En Liu
,
Claude Libert
,
Feng-Min Lu
,
Hui Zhuang
,
Cuiying Chitty Chen
Open Journal of Gastroenterology
Vol.2 No.1
,February 15, 2012
DOI:
10.4236/ojgas.2012.21001
4,553
Downloads
8,730
Views
Citations
Electrochemical and Photoelectrochemical Decoloration of Amaranth Dye Azo Using Composited Dimensional Stable Anodes
(Articles)
Moisés I. Salazar-Gastélum
,
Edgar A. Reynoso-Soto
,
Shui W. Lin
,
Sergio Perez-Sicairos
,
Rosa M. Félix-Navarro
Journal of Environmental Protection
Vol.4 No.1
,January 29, 2013
DOI:
10.4236/jep.2013.41016
4,911
Downloads
7,529
Views
Citations
On the Strongly Hopfian Acts over Semigroups
(Articles)
Ksenya Anatolyevna Kolesnikova
,
Igor Borisovich Kozhukhov
Applied Mathematics
Vol.16 No.2
,February 19, 2025
DOI:
10.4236/am.2025.162008
50
Downloads
179
Views
Citations
On Secure Digital Image Watermarking Techniques
(Articles)
Manjit Thapa
,
Sandeep Kumar Sood
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24017
8,481
Downloads
18,363
Views
Citations
Features of Virus Detection Mechanism in Microsoft Security Essentials (Microsoft Forefront Endpoint Protection)
(Articles)
Dmitry Silnov
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42014
5,265
Downloads
8,662
Views
Citations
Dual Authentication Hashing for Security Enhancement in MANET
(Articles)
L. Raja
,
Dr. P. S. Periasamy
Circuits and Systems
Vol.7 No.4
,April 28, 2016
DOI:
10.4236/cs.2016.74030
1,675
Downloads
2,640
Views
Citations
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
(Articles)
P. Premkumar
,
D. Shanthi
Circuits and Systems
Vol.7 No.11
,September 13, 2016
DOI:
10.4236/cs.2016.711307
1,939
Downloads
3,419
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top