Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Efficient Three-Party Quantum Secure Direct Communication with EPR Pairs
(Articles)
Xunru Yin
,
Wenping Ma
,
Dongsu Shen
,
Chaoyang Hao
Journal of Quantum Information Science
Vol.3 No.1
,March 29, 2013
DOI:
10.4236/jqis.2013.31001
3,711
Downloads
6,963
Views
Citations
Hyperchaotic Impulsive Synchronization and Digital Secure Communication
(Articles)
Mingjun Wang
,
Yujun Niu
,
Bing Gao
,
Qijie Zou
Journal of Applied Mathematics and Physics
Vol.10 No.12
,December 5, 2022
DOI:
10.4236/jamp.2022.1012230
184
Downloads
623
Views
Citations
Three-Party Simultaneous Quantum Secure Communication Based on Closed Transmission Loops
(Articles)
Xunru Yin
Journal of Quantum Information Science
Vol.4 No.4
,December 31, 2014
DOI:
10.4236/jqis.2014.44024
4,840
Downloads
5,879
Views
Citations
Modified Vanstone’s Construction of lightweight MAC for Vehicular On-Board IT Systems
(Articles)
István Vajda
Journal of Computer and Communications
Vol.8 No.12
,December 30, 2020
DOI:
10.4236/jcc.2020.812019
404
Downloads
1,088
Views
Citations
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.2
,February 26, 2011
DOI:
10.4236/ijcns.2011.42009
4,380
Downloads
8,059
Views
Citations
Public-Key Cryptosystems with Secret Encryptor and Digital Signature
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61001
4,319
Downloads
6,493
Views
Citations
Cubic Root Extractors of Gaussian Integers and Their Application in Fast Encryption for Time-Constrained Secure Communication
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.4
,April 15, 2011
DOI:
10.4236/ijcns.2011.44024
5,941
Downloads
10,428
Views
Citations
Protection of Sensitive Messages Based on Quadratic Roots of Gaussians: Groups with Complex Modulus
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.5
,May 12, 2011
DOI:
10.4236/ijcns.2011.45033
4,081
Downloads
7,666
Views
Citations
Building a Secure Mobile Payment Protocol in the Cloud
(Articles)
Liping Du
,
Guifen Zhao
,
Ying Li
Open Journal of Social Sciences
Vol.4 No.7
,July 30, 2016
DOI:
10.4236/jss.2016.47009
1,548
Downloads
2,541
Views
Citations
Secure Signature Protocol
(Articles)
Shundong LI
,
Daoshun WANG
,
Yiqi DAI
Intelligent Information Management
Vol.1 No.3
,December 29, 2009
DOI:
10.4236/iim.2009.13026
5,566
Downloads
8,540
Views
Citations
Secure Messaging Implementation in OpenSC
(Articles)
Maurizio Talamo
,
Maulahikmah Galinium
,
Christian H. Schunck
,
Franco Arcieri
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34032
5,366
Downloads
9,012
Views
Citations
Private Personal Information Verification
(Articles)
Hoang Giang Do
,
Wee Keong Ng
Journal of Information Security
Vol.8 No.3
,July 18, 2017
DOI:
10.4236/jis.2017.83015
1,299
Downloads
3,849
Views
Citations
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques
(Articles)
Maduhu Mshangi Mlyatu
,
Camilius Sanga
Journal of Information Security
Vol.14 No.1
,November 30, 2022
DOI:
10.4236/jis.2023.141001
368
Downloads
1,942
Views
Citations
Secure and Efficient Outsourced Computation in Cloud Computing Environments
(Articles)
Varun Dixit
,
Davinderjit Kaur
Journal of Software Engineering and Applications
Vol.17 No.9
,September 27, 2024
DOI:
10.4236/jsea.2024.179040
124
Downloads
783
Views
Citations
Effective and Extensive Virtual Private Network
(Articles)
Tarek S. Sobh
,
Yasser Aly
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21004
7,515
Downloads
16,313
Views
Citations
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
(Articles)
Yaser Jararweh
,
Lo’ai Tawalbeh
,
Hala Tawalbeh
,
Abidalrahman Moh’d
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32008
9,246
Downloads
14,646
Views
Citations
A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks
(Articles)
Hyeon Myeong Choi
,
Su Man Nam
,
Tae Ho Cho
Wireless Sensor Network
Vol.5 No.3
,March 29, 2013
DOI:
10.4236/wsn.2013.53005
5,385
Downloads
10,166
Views
Citations
Design of Secure Microsystems Using Current-to-Data Dependency Analysis
(Articles)
Haleh Vahedi
,
Radu Muresan
,
Stefano Gregori
Circuits and Systems
Vol.4 No.2
,April 17, 2013
DOI:
10.4236/cs.2013.42019
3,646
Downloads
6,132
Views
Citations
Secured Transmission of ECG Signals: Numerical and Electronic Simulations
(Articles)
Gutenbert Kenfack
,
Alain Tiedeu
Journal of Signal and Information Processing
Vol.4 No.2
,May 8, 2013
DOI:
10.4236/jsip.2013.42023
5,270
Downloads
8,434
Views
Citations
A Secure Approach to Educating a Mobile World-Class Military —A Mobile Secure Concept for Accessing the Classroom from Around the World
(Articles)
Terry C. House
Communications and Network
Vol.5 No.3C
,October 4, 2013
DOI:
10.4236/cn.2013.53B2087
5,163
Downloads
6,594
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top