Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Design of an Intelligent Security Access Control System Based on Fingerprint Sensor FPC1011C
(Articles)
Yan Wang
,
Hongli Liu
,
Jun Feng
Circuits and Systems
Vol.1 No.1
,July 28, 2010
DOI:
10.4236/cs.2010.11005
10,778
Downloads
20,728
Views
Citations
An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks
(Articles)
Mi Wen
,
Zhi Yin
,
Yu Long
,
Yong Wang
Wireless Sensor Network
Vol.2 No.9
,September 30, 2010
DOI:
10.4236/wsn.2010.29083
5,556
Downloads
10,543
Views
Citations
Sustainable Tourism Using Security Cameras with Privacy Protecting Ability
(Articles)
V. Prashyanusorn
,
Y. Fujii
,
S. Kaviya
,
S. Mitatha
,
P. P. Yupapin
Journal of Information Security
Vol.1 No.2
,October 29, 2010
DOI:
10.4236/jis.2010.12008
4,339
Downloads
9,655
Views
Citations
A Novel Attack Graph Posterior Inference Model Based on Bayesian Network
(Articles)
Shaojun Zhang
,
Shanshan Song
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21002
6,766
Downloads
12,432
Views
Citations
Effective and Extensive Virtual Private Network
(Articles)
Tarek S. Sobh
,
Yasser Aly
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21004
7,387
Downloads
15,684
Views
Citations
Ambient Intelligence: Awareness Context Application in Industrial Storage
(Articles)
Ahmed Zouinkhi
,
Eddy Bajic
,
Eric Rondeau
,
Mohamed Ben Gayed
,
Mohamed Naceur Abdelkrim
Wireless Sensor Network
Vol.3 No.4
,March 31, 2011
DOI:
10.4236/wsn.2011.34016
5,068
Downloads
9,807
Views
Citations
A Comparison of Link Layer Attacks on Wireless Sensor Networks
(Articles)
Shahriar Mohammadi
,
Reza Ebrahimi Atani
,
Hossein Jadidoleslamy
Journal of Information Security
Vol.2 No.2
,April 8, 2011
DOI:
10.4236/jis.2011.22007
7,811
Downloads
15,873
Views
Citations
Midwife’s experiences of using intuition as a motivating element in conveying assurance and care
(Articles)
Agneta Olsson
,
Annsofie Adolfsson
Health
Vol.3 No.7
,July 18, 2011
DOI:
10.4236/health.2011.37075
4,960
Downloads
9,972
Views
Citations
Effectiveness of Built-in Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Based DDoS Attacks
(Articles)
Hari Krishna Vellalacheruvu
,
Sanjeev Kumar
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23013
5,976
Downloads
11,506
Views
Citations
An Enhanced Secure Heuristic-Stochastic Routing Arithmetic in MPLS Network
(Articles)
Ying Zheng
Communications and Network
Vol.3 No.4
,November 16, 2011
DOI:
10.4236/cn.2011.34026
6,036
Downloads
9,137
Views
Citations
Design and Development of a House-Mobile Security System
(Articles)
Ashraf Elfasakhany
,
Jorge Hernández
,
Juan Carlos García
,
Mario Reyes
,
Francisco Martell
Engineering
Vol.3 No.12
,December 14, 2011
DOI:
10.4236/eng.2011.312151
10,478
Downloads
16,895
Views
Citations
Evaluation of Electrocardiogram for Biometric Authentication
(Articles)
Yogendra Narain Singh
,
S K Singh
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31005
24,693
Downloads
36,163
Views
Citations
Combining Public Key Encryption with Schnorr Digital Signature
(Articles)
Laura Savu
Journal of Software Engineering and Applications
Vol.5 No.2
,February 27, 2012
DOI:
10.4236/jsea.2012.52016
9,456
Downloads
14,832
Views
Citations
Research and Analysis on Cognitive Radio Network Security
(Articles)
Long Tang
,
Juebo Wu
Wireless Sensor Network
Vol.4 No.4
,April 24, 2012
DOI:
10.4236/wsn.2012.44017
9,058
Downloads
16,307
Views
Citations
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
(Articles)
Yaser Jararweh
,
Lo’ai Tawalbeh
,
Hala Tawalbeh
,
Abidalrahman Moh’d
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32008
9,043
Downloads
14,074
Views
Citations
Evaluation of Operating Domains in Power Systems
(Articles)
M. A. El-Kady
,
Y. A. Alturki
,
M. S. Al-Saud
Energy and Power Engineering
Vol.4 No.4
,June 25, 2012
DOI:
10.4236/epe.2012.44037
4,743
Downloads
7,108
Views
Citations
Optimization of Security Communication Wired Network by Means of Genetic Algorithms
(Articles)
Fabio Garzia
,
Natale Tirocchi
,
Michele Scarpiniti
,
Roberto Cusani
Communications and Network
Vol.4 No.3
,August 31, 2012
DOI:
10.4236/cn.2012.43024
4,208
Downloads
7,427
Views
Citations
Challenges of Energy Security to the Industrialisation and Sustainable Development in Vietnam
(Articles)
Nguyen Tan Phat
Technology and Investment
Vol.3 No.3
,August 31, 2012
DOI:
10.4236/ti.2012.33024
6,326
Downloads
9,704
Views
Citations
Managing Social Security Data in the Web 2.0 Era
(Articles)
Li Luo
,
Hongyan Yang
,
Xuhui Li
iBusiness
Vol.4 No.3
,September 27, 2012
DOI:
10.4236/ib.2012.43028
4,596
Downloads
7,215
Views
Citations
Consumption Profile of the Socially Excluded People
(Articles)
Maniklal Adhikary
,
Khokon Sarkar
Modern Economy
Vol.3 No.6
,October 31, 2012
DOI:
10.4236/me.2012.36098
4,409
Downloads
6,619
Views
Citations
<
...
13
14
15
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top