Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Solution to Implement Dynamic Authentication
(Articles)
Bingbing Xia
,
Youping Dong
Open Journal of Applied Sciences
Vol.2 No.3
,September 28, 2012
DOI:
10.4236/ojapps.2012.23025
5,973
Downloads
9,080
Views
Citations
Authentication Key-Exchange Using SMS for Web-Based Platforms
(Articles)
Benedicto B. Balilo Jr.
,
Jayvee Christopher N. Vibar
Journal of Computer and Communications
Vol.9 No.8
,August 3, 2021
DOI:
10.4236/jcc.2021.98001
335
Downloads
2,142
Views
Citations
Development of Two-Factor Authentication to Mitigate Phishing Attack
(Articles)
Varun Dixit
,
Davinderjit Kaur
Journal of Software Engineering and Applications
Vol.17 No.11
,November 6, 2024
DOI:
10.4236/jsea.2024.1711043
121
Downloads
659
Views
Citations
Identity Authentication Based on Two-Beam Interference
(Articles)
Wenqi He
,
Xiang Peng
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24005
4,143
Downloads
5,531
Views
Citations
An Anti-Eavesdropping Method in Data Collection of Smart Meter
(Articles)
Weiwei Dong
,
Yong Wang
,
Lin Zhou
,
Kanghua Cao
,
Haiming Li
Journal of Computer and Communications
Vol.7 No.9
,September 20, 2019
DOI:
10.4236/jcc.2019.79004
628
Downloads
1,637
Views
Citations
The Legitimacy of Online Banking Transactions as a Value-Added Tool in Rwanda’s Banking System
(Articles)
Evariste Nkubito
,
Jean Baptiste Mbanzabugabo
Open Access Library Journal
Vol.11 No.12
,December 25, 2024
DOI:
10.4236/oalib.1112326
15
Downloads
159
Views
Citations
Security Considerations on Three-Factor Anonymous Authentication Scheme for WSNs
(Articles)
Hyunsung Kim
,
Beaton Ofesi Denice Kapito
Journal of Computer and Communications
Vol.9 No.3
,March 1, 2021
DOI:
10.4236/jcc.2021.93001
607
Downloads
1,462
Views
Citations
Effect of Two Liquid Phases on the Separation Efficiency of Distillation Columns
(Articles)
Gardênia Marinho Cordeiro
,
Stephanie Rolim Dantas
,
Luís Gonzaga Sales Vasconcelos
,
Romildo Pereira Brito
Advances in Chemical Engineering and Science
Vol.3 No.1
,January 11, 2013
DOI:
10.4236/aces.2013.31001
10,319
Downloads
16,380
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
2,382
Downloads
5,430
Views
Citations
Carbon Nanotubes Dispersion in Polymers by Two-Factor Mechanical Method
(Articles)
Sevda A. Abdullayeva
,
Asger B. Huseynov
,
Nahida N. Musayeva
,
Rasim B. Jabbarov
,
Chingiz A. Sultanov
,
Akif D. Guliyev
,
Rovshan F. Hasanov
Advances in Materials Physics and Chemistry
Vol.6 No.11
,November 24, 2016
DOI:
10.4236/ampc.2016.611028
2,039
Downloads
3,916
Views
Citations
Exploring the Mechanism of Teachers’ Political Theory Learning in Colleges and Universities
—Based on the Dual Analysis Framework of “SECI-Two Factor”
(Articles)
Shali Li
Open Journal of Social Sciences
Vol.12 No.7
,July 24, 2024
DOI:
10.4236/jss.2024.127028
59
Downloads
246
Views
Citations
Non-Neutral Technological Progress and Income Distribution—Piketty’s Fundamental Laws in a Neoclassical Two-Sector Model
(Articles)
Masanori Morita
Theoretical Economics Letters
Vol.6 No.6
,December 7, 2016
DOI:
10.4236/tel.2016.66119
1,825
Downloads
4,366
Views
Citations
Improved High Definition Multimedia Interface Authentication Mechanism
(Articles)
R. N. Iyare
,
S. D. Walker
Journal of Computer and Communications
Vol.2 No.12
,October 22, 2014
DOI:
10.4236/jcc.2014.212003
3,499
Downloads
4,366
Views
Citations
Leveraging 3D Benefits for Authentication
(Articles)
Jonathan Gurary
,
Ye Zhu
,
Huirong Fu
Int'l J. of Communications, Network and System Sciences
Vol.10 No.8B
,September 4, 2017
DOI:
10.4236/ijcns.2017.108B035
1,505
Downloads
3,393
Views
Citations
Improvement of an Anonymous and Lightweight Authentication Scheme for TMIS
(Articles)
Chien-Ming Chen
,
Bin Xiang
,
Eric Wang Ke
,
Tsu-Yang Wu
,
Jerry Chun-Wei Lin
Journal of Applied Mathematics and Physics
Vol.6 No.1
,January 5, 2018
DOI:
10.4236/jamp.2018.61003
842
Downloads
1,688
Views
Citations
GAP Universal One-Step Authentication Protocol
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.8 No.11
,November 15, 2021
DOI:
10.4236/oalib.1108061
78
Downloads
697
Views
Citations
Realization Technology of Digital Currency Hubee
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.9 No.10
,October 25, 2022
DOI:
10.4236/oalib.1109324
70
Downloads
481
Views
Citations
Validation of the Flourishing Scale (FS), Greek Version and Evaluation of Two Well-Being Models
(Articles)
Theodoros A. Kyriazos
,
Anastassios Stalikas
,
Konstantina Prassa
,
Vasiliki Yotsidi
,
Michael Galanakis
,
Christos Pezirkianidis
Psychology
Vol.9 No.7
,July 20, 2018
DOI:
10.4236/psych.2018.97105
2,618
Downloads
6,534
Views
Citations
Increase Throughput of CCM Security Mode Using MKP
(Articles)
Zuriati Ahmad Zukarnain
Applied Mathematics
Vol.5 No.4
,March 10, 2014
DOI:
10.4236/am.2014.54055
4,345
Downloads
5,938
Views
Citations
Biometric-PKI Authentication System Using Fingerprint Minutiae
(Articles)
Han-Ul Jang
,
Heung-Kyu Lee
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24004
4,585
Downloads
7,184
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top