Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Simple Steganography Algorithm Based on Lossless Compression Technique in WSN
(Articles)
R. Vijayarajeswari
,
A. Rajivkannan
,
J. Santhosh
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78117
1,991
Downloads
3,099
Views
Citations
The Deutsch-Jozsa Algorithm Can Be Used for Quantum Key Distribution
(Articles)
Koji Nagata
,
Tadao Nakamura
Open Access Library Journal
Vol.2 No.8
,August 14, 2015
DOI:
10.4236/oalib.1101798
1,556
Downloads
2,576
Views
Citations
Color Visual Cryptography with Stacking Order Dependence Using Interference Color
(Articles)
Toshiki Matsuzaki
,
Huangyi Qin
,
Kenji Harada
Open Journal of Applied Sciences
Vol.7 No.7
,July 3, 2017
DOI:
10.4236/ojapps.2017.77026
1,492
Downloads
2,785
Views
Citations
Dual Visual Cryptography Using the Interference Color of Birefringent Material
(Articles)
Huangyi Qin
,
Toshiki Matsusaki
,
Yusuke Momoi
,
Kenji Harada
Journal of Software Engineering and Applications
Vol.10 No.8
,July 19, 2017
DOI:
10.4236/jsea.2017.108041
1,048
Downloads
1,966
Views
Citations
This article belongs to the Special Issue on
Data Security & Data Encryption
Countermeasure against Deepfake Using Steganography and Facial Detection
(Articles)
Kyle Corcoran
,
Jacob Ressler
,
Ye Zhu
Journal of Computer and Communications
Vol.9 No.9
,September 30, 2021
DOI:
10.4236/jcc.2021.99009
256
Downloads
1,562
Views
Citations
Design of an E-Administration Platform and Its Cryptography-Based Security Model
(Articles)
Ohwobeno Omohwo
,
Iwasokun Gabriel Babatunde
,
Boyinbode Olutayo Kehinde
,
Gabriel Junior Arome
Journal of Computer and Communications
Vol.11 No.4
,April 28, 2023
DOI:
10.4236/jcc.2023.114008
131
Downloads
1,244
Views
Citations
Review of Algorithms for Securing Data Transmission in Mobile Banking
(Articles)
Daniel Okari Orucho
,
Fredrick Mzee Awuor
,
Ratemo Makiya
,
Collins Oduor
Modern Economy
Vol.14 No.9
,September 15, 2023
DOI:
10.4236/me.2023.149062
124
Downloads
761
Views
Citations
No Anomaly and New Renormalization Scheme
(Articles)
Takehisa Fujita
,
Naohiro Kanda
Journal of Modern Physics
Vol.3 No.8
,August 16, 2012
DOI:
10.4236/jmp.2012.38091
4,790
Downloads
8,516
Views
Citations
Approximation Schemes for the 3-Partitioning Problems
(Articles)
Jianbo Li
,
Honglin Ding
Communications and Network
Vol.5 No.1B
,November 7, 2013
DOI:
10.4236/cn.2013.51B021
5,118
Downloads
6,479
Views
Citations
Security Implementation in WSN with Symmetric and Matrix Mapping on Asymmetric ECC Cryptographic Techniques
(Articles)
S. Hemalatha
,
V. Rajamani
,
V. Parthasarathy
Circuits and Systems
Vol.7 No.10
,August 23, 2016
DOI:
10.4236/cs.2016.710273
2,055
Downloads
3,239
Views
Citations
Survey on Public Key Cryptography Scheme for Securing Data in Cloud Computing
(Articles)
J. Athena
,
V. Sumathy
Circuits and Systems
Vol.8 No.3
,March 31, 2017
DOI:
10.4236/cs.2017.83005
2,066
Downloads
4,538
Views
Citations
HiMAC: Hierarchical Message Authentication Code for Secure Data Dissemination in Mobile Ad Hoc Networks
(Articles)
Khaleel Mershad
,
Ali Hamie
,
Mohamad Hamze
Int'l J. of Communications, Network and System Sciences
Vol.10 No.12
,December 15, 2017
DOI:
10.4236/ijcns.2017.1012018
1,021
Downloads
2,055
Views
Citations
Adaptability of Conservative Staircase Scheme for Live Videos
(Articles)
Sudeep Kanav
,
Satish Chand
Circuits and Systems
Vol.2 No.3
,July 6, 2011
DOI:
10.4236/cs.2011.23023
4,647
Downloads
7,488
Views
Citations
A Unified Interpolating Subdivision Scheme for Curves/Surfaces by Using Newton Interpolating Polynomial
(Articles)
Faheem Khan
,
Irem Mukhtar
,
Noreen Batool
Open Journal of Applied Sciences
Vol.3 No.3
,July 10, 2013
DOI:
10.4236/ojapps.2013.33033
3,368
Downloads
5,612
Views
Citations
A Multi-Secret Sharing Scheme with Many Keys Based on Hermite Interpolation
(Articles)
Tomoko Adachi
,
Chie Okazaki
Journal of Applied Mathematics and Physics
Vol.2 No.13
,December 23, 2014
DOI:
10.4236/jamp.2014.213140
4,142
Downloads
4,989
Views
Citations
An Exploratory Study on the Implementation of Student Loans in Alleviating Poverty and Its Contribution to Human Capital Development in Sierra Leone
(Articles)
Abu Kai Kamara
,
Prince Lahai Momoh
Open Access Library Journal
Vol.10 No.4
,April 19, 2023
DOI:
10.4236/oalib.1109791
50
Downloads
495
Views
Citations
Application of Risk-based Flexibility Assessment Methods to Evaluate System Expansion Plans
(Articles)
Baorong Zhou
,
Pei Zhang
,
Jianbin Chen
,
Xiaoming Jin
,
Kai Hou
,
Ming Niu
,
Zhao Xu
,
Yunkai Lei
Energy and Power Engineering
Vol.5 No.4B
,November 12, 2013
DOI:
10.4236/epe.2013.54B195
5,450
Downloads
6,477
Views
Citations
Construction and Application of Subdivision Surface Scheme Using Lagrange Interpolation Polynomial
(Articles)
Faheem Khan
,
Noreen Batool
,
Iram Mukhtar
Applied Mathematics
Vol.5 No.3
,February 11, 2014
DOI:
10.4236/am.2014.53040
3,837
Downloads
6,355
Views
Citations
Three-Temperature Model Applied to Thermochemical Non-Equilibrium Reentry Flows in 2D—Seven Species
(Articles)
Edisson Sávio de Góes Maciel
Open Journal of Fluid Dynamics
Vol.12 No.1
,January 25, 2022
DOI:
10.4236/ojfd.2022.121001
186
Downloads
773
Views
Citations
An Efficient PRBG Based on Chaotic Map and Engel Continued Fractions
(Articles)
Atef Masmoudi
,
William Puech
,
Mohamed Salim Bouhlel
Journal of Software Engineering and Applications
Vol.3 No.12
,December 31, 2010
DOI:
10.4236/jsea.2010.312133
5,444
Downloads
9,697
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top