Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression
(Articles)
Shinichi Murata
,
Yasunari Yoshitomi
,
Hiroaki Ishii
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23010
6,848
Downloads
13,745
Views
Citations
Research on compound chaos image encryption method with clock- varying
(Articles)
Xing MENG
,
XiaoMan WANG
,
Ying CHU
Open Journal of Applied Sciences
Vol.2 No.4B
,January 9, 2013
DOI:
10.4236/ojapps.2012.24B003
3,480
Downloads
5,014
Views
Citations
A Novel Scheme for Deleting Group Members
(Articles)
Junping Yao
,
Xinshe Li
,
Junchun Ma
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24006
3,057
Downloads
3,981
Views
Citations
The Strife of Love in a Dream
in the Context of Christian Monasticism: An Example of
Lectio Divina
and a Secret Monastic Code
(Articles)
Liza Piña-Rubio
Advances in Literary Study
Vol.10 No.1
,November 18, 2021
DOI:
10.4236/als.2022.101001
217
Downloads
662
Views
Citations
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm
(Articles)
Youhai Shao
,
Yong Wang
,
Yun Yang
,
Xiang Wang
Journal of Computer and Communications
Vol.10 No.1
,January 17, 2022
DOI:
10.4236/jcc.2022.101003
203
Downloads
1,282
Views
Citations
Coordination of Supply Chain under the Revenue Sharing-Advertising Cost Sharing Contract
(Articles)
Meng Jia
Journal of Service Science and Management
Vol.10 No.3
,June 23, 2017
DOI:
10.4236/jssm.2017.103024
1,550
Downloads
3,569
Views
Citations
The Optimal Monthly Strategy Pricing of Free-Floating Bike Sharing Platform
(Articles)
Xi Cheng
,
Yang Gao
Modern Economy
Vol.9 No.2
,February 27, 2018
DOI:
10.4236/me.2018.92021
1,211
Downloads
3,182
Views
Citations
This article belongs to the Special Issue on
Transport Economics & Policy
Uniqueness of Meromorphic Functions Concerning Differential Monomials
(Articles)
Hui Huang
,
Bin Huang
Applied Mathematics
Vol.2 No.2
,February 25, 2011
DOI:
10.4236/am.2011.22025
5,656
Downloads
9,663
Views
Citations
Information Sharing in a Supply Chain with Horizontal Competition: The Case of Discount Based Incentive Scheme
(Articles)
Birendra K. Mishra
,
Srinivasan Raghunathan
Theoretical Economics Letters
Vol.2 No.4
,November 1, 2012
DOI:
10.4236/tel.2012.24069
4,537
Downloads
7,113
Views
Citations
International Peace-Making—Creating Post-Conflict Structures of Government
(Articles)
Peter Emerson
Open Journal of Political Science
Vol.6 No.2
,April 6, 2016
DOI:
10.4236/ojps.2016.62011
2,405
Downloads
3,228
Views
Citations
Operations Management of Mobike in China
(Articles)
Zhen Li
Open Journal of Business and Management
Vol.6 No.3
,July 13, 2018
DOI:
10.4236/ojbm.2018.63052
1,529
Downloads
3,455
Views
Citations
The Impact of Sharing Economy on China’s Labor Relations in the Internet Era
(Articles)
Siyu Chen
Journal of Human Resource and Sustainability Studies
Vol.7 No.2
,April 12, 2019
DOI:
10.4236/jhrss.2019.72011
1,154
Downloads
3,125
Views
Citations
Analysis of the Present Situation and Prospects of Development of Sharing Economy—Taking Dazhou, Sichuan Province as an Example
(Articles)
Yan Ding
Open Access Library Journal
Vol.6 No.8
,August 9, 2019
DOI:
10.4236/oalib.1105640
306
Downloads
901
Views
Citations
Challenges and Response to the Development of Sharing Economy in Dazhou
(Articles)
Yan Ding
Open Journal of Business and Management
Vol.7 No.4
,August 13, 2019
DOI:
10.4236/ojbm.2019.74111
616
Downloads
1,394
Views
Citations
The Sharing-Exchange Continuum Inside of the Sharing Economy
(Articles)
Philipp Lee
,
Michael J. Kendzia
American Journal of Industrial and Business Management
Vol.11 No.6
,June 28, 2021
DOI:
10.4236/ajibm.2021.116045
350
Downloads
1,641
Views
Citations
Explaining Reciprocal Sharing in Repeated Dictator Game: The Role of Theory of Mind
(Articles)
Weiwei Wang
,
Wen Liu
Open Journal of Social Sciences
Vol.10 No.7
,July 12, 2022
DOI:
10.4236/jss.2022.107009
129
Downloads
625
Views
Citations
Revenue and Knowledge Cooperation Mechanisms between Business Incubators and Venture Capitalists for Collaborative Start-Ups
(Articles)
Wenqing Wu
,
Qing Han
Theoretical Economics Letters
Vol.7 No.5
,August 2, 2017
DOI:
10.4236/tel.2017.75091
1,136
Downloads
2,046
Views
Citations
This article belongs to the Special Issue on
Economics and Management Strategies
A Way to Set up Security Layer over Internet
(Articles)
Xiangyi Hu
,
Guifen Zhao
,
Guanning Xu
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35022
2,533
Downloads
3,069
Views
Citations
Secret Codes of Scale Distribution of Different Matter Stratums from Planck Scale to the Sun-Scale, Proof of Anthropic Principle and Different Stratum Sciences
(Articles)
Changyu Huang
,
Yong-Chang Huang
Journal of Modern Physics
Vol.8 No.9
,August 14, 2017
DOI:
10.4236/jmp.2017.89092
761
Downloads
1,294
Views
Citations
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
(Articles)
Mohammad Anwar Hossain
,
Ahsan Ullah
,
Newaz Ibrahim Khan
,
Md Feroz Alam
Journal of Information Security
Vol.10 No.4
,October 14, 2019
DOI:
10.4236/jis.2019.104012
1,236
Downloads
5,111
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top