Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Way to Set up Security Layer over Internet
(Articles)
Xiangyi Hu
,
Guifen Zhao
,
Guanning Xu
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35022
2,606
Downloads
3,243
Views
Citations
Cryptographic Protocols Based on Nielsen Transformations
(Articles)
Benjamin Fine
,
Anja I. S. Moldenhauer
,
Gerhard Rosenberger
Journal of Computer and Communications
Vol.4 No.12
,October 31, 2016
DOI:
10.4236/jcc.2016.412004
1,605
Downloads
2,627
Views
Citations
This article belongs to the Special Issue on
Coding and Cryptography
Secret Codes of Scale Distribution of Different Matter Stratums from Planck Scale to the Sun-Scale, Proof of Anthropic Principle and Different Stratum Sciences
(Articles)
Changyu Huang
,
Yong-Chang Huang
Journal of Modern Physics
Vol.8 No.9
,August 14, 2017
DOI:
10.4236/jmp.2017.89092
823
Downloads
1,484
Views
Citations
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
(Articles)
Mohammad Anwar Hossain
,
Ahsan Ullah
,
Newaz Ibrahim Khan
,
Md Feroz Alam
Journal of Information Security
Vol.10 No.4
,October 14, 2019
DOI:
10.4236/jis.2019.104012
1,353
Downloads
5,649
Views
Citations
Verifiable Secret Sharing Scheme Based on Certain Projective Transformation
(Articles)
Bin Li
American Journal of Computational Mathematics
Vol.11 No.2
,June 24, 2021
DOI:
10.4236/ajcm.2021.112012
432
Downloads
1,221
Views
Citations
Verifiable Secret Sharing Scheme Based on the Plane Parametric Curve
(Articles)
Bin Li
Applied Mathematics
Vol.12 No.11
,November 30, 2021
DOI:
10.4236/am.2021.1211066
254
Downloads
781
Views
Citations
AES RSA-SM2 Algorithm against Man-in-the-Middle Attack in IEC 60870-5-104 Protocol
(Articles)
Shan Shi
,
Yong Wang
,
Cunming Zou
,
Yingjie Tian
Journal of Computer and Communications
Vol.10 No.1
,January 13, 2022
DOI:
10.4236/jcc.2022.101002
296
Downloads
2,108
Views
Citations
Review and Analysis: United States Secret Wars in Cambodia: Long-Term Impacts and Consequences
(Articles)
Kenneth Ray Olson
,
David Richard Speidel
Open Journal of Soil Science
Vol.13 No.7
,July 13, 2023
DOI:
10.4236/ojss.2023.137013
776
Downloads
6,702
Views
Citations
Double-Moduli Gaussian Encryption/Decryption with Primary Residues and Secret Controls
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.7
,July 25, 2011
DOI:
10.4236/ijcns.2011.47058
4,678
Downloads
8,645
Views
Citations
U.S. Restitution of the Iraq Secret Police Files from Saddam Hussein’s Regime Regarding the Kurds in Iraq
(Articles)
Ferdinand Hennerbichler
,
Bruce P. Montgomery
Advances in Anthropology
Vol.5 No.1
,February 10, 2015
DOI:
10.4236/aa.2015.51004
4,485
Downloads
6,408
Views
Citations
Cyberattack Ramifications, The Hidden Cost of a Security Breach
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152007
281
Downloads
1,565
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
<
1
2
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top