Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Acceleration of Homomorphic Arithmetic Processing Based on the ElGamal Cryptosystem
(Articles)
Takuma Jogan
,
Tomofumi Matsuzawa
,
Masayuki Takeda
Communications and Network
Vol.11 No.1
,January 24, 2019
DOI:
10.4236/cn.2019.111001
1,272
Downloads
2,917
Views
Citations
Observer-Dependence in P vs NP
(Articles)
Logan Nye
Journal of Modern Physics
Vol.16 No.1
,January 21, 2025
DOI:
10.4236/jmp.2025.161002
100
Downloads
314
Views
Citations
Effective and Extensive Virtual Private Network
(Articles)
Tarek S. Sobh
,
Yasser Aly
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21004
7,386
Downloads
15,680
Views
Citations
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
(Articles)
Yaser Jararweh
,
Lo’ai Tawalbeh
,
Hala Tawalbeh
,
Abidalrahman Moh’d
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32008
9,041
Downloads
14,070
Views
Citations
Efficient Three-Party Quantum Secure Direct Communication with EPR Pairs
(Articles)
Xunru Yin
,
Wenping Ma
,
Dongsu Shen
,
Chaoyang Hao
Journal of Quantum Information Science
Vol.3 No.1
,March 29, 2013
DOI:
10.4236/jqis.2013.31001
3,575
Downloads
6,689
Views
Citations
A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks
(Articles)
Hyeon Myeong Choi
,
Su Man Nam
,
Tae Ho Cho
Wireless Sensor Network
Vol.5 No.3
,March 29, 2013
DOI:
10.4236/wsn.2013.53005
5,237
Downloads
9,874
Views
Citations
Design of Secure Microsystems Using Current-to-Data Dependency Analysis
(Articles)
Haleh Vahedi
,
Radu Muresan
,
Stefano Gregori
Circuits and Systems
Vol.4 No.2
,April 17, 2013
DOI:
10.4236/cs.2013.42019
3,579
Downloads
5,941
Views
Citations
Secured Transmission of ECG Signals: Numerical and Electronic Simulations
(Articles)
Gutenbert Kenfack
,
Alain Tiedeu
Journal of Signal and Information Processing
Vol.4 No.2
,May 8, 2013
DOI:
10.4236/jsip.2013.42023
5,189
Downloads
8,180
Views
Citations
A Secure Approach to Educating a Mobile World-Class Military —A Mobile Secure Concept for Accessing the Classroom from Around the World
(Articles)
Terry C. House
Communications and Network
Vol.5 No.3C
,October 4, 2013
DOI:
10.4236/cn.2013.53B2087
5,023
Downloads
6,296
Views
Citations
Design and Implementation of Secure Nodes in the Based-Internet-of-Things Intelligent Household
(Articles)
Xiangdong Hu
,
Hongru Xu
,
Kaimin Han
Journal of Computer and Communications
Vol.2 No.7
,May 21, 2014
DOI:
10.4236/jcc.2014.27001
3,433
Downloads
4,651
Views
Citations
Trusted-CDS Based Intrusion Detection System in Wireless Sensor Network (TC-IDS)
(Articles)
Amin Mohajer
,
Mohammad Hasan Hajimobini
,
Abbas Mirzaei
,
Ehsan Noori
Open Access Library Journal
Vol.1 No.7
,October 22, 2014
DOI:
10.4236/oalib.1100848
1,479
Downloads
2,854
Views
Citations
Analysis of Recent Secure Scan Test Techniques
(Articles)
Cheng Xing
,
Sungju Park
,
Ji Zhao
Journal of Software Engineering and Applications
Vol.9 No.3
,March 31, 2016
DOI:
10.4236/jsea.2016.93008
3,275
Downloads
4,384
Views
Citations
Secure Operation and Optimal Generation Scheduling Considering Battery Life for an Isolated Northwest Grid of Saudi Arabia
(Articles)
Hani Albalawi
,
Karthikeyan Balasubramaniam
,
Elham Makram
Journal of Power and Energy Engineering
Vol.5 No.1
,January 17, 2017
DOI:
10.4236/jpee.2017.51004
1,473
Downloads
2,497
Views
Citations
Towards the Development of Best Data Security for Big Data
(Articles)
Yuan Tian
Communications and Network
Vol.9 No.4
,November 30, 2017
DOI:
10.4236/cn.2017.94020
1,878
Downloads
5,200
Views
Citations
Highly Secure Residents Life Event Management System Based on Blockchain by Hyperledger Fabric
(Articles)
Ragouguelaba Agoda Koussema
,
Hirohide Haga
Journal of Computer and Communications
Vol.9 No.9
,September 17, 2021
DOI:
10.4236/jcc.2021.99003
364
Downloads
1,952
Views
Citations
Hyperchaotic Impulsive Synchronization and Digital Secure Communication
(Articles)
Mingjun Wang
,
Yujun Niu
,
Bing Gao
,
Qijie Zou
Journal of Applied Mathematics and Physics
Vol.10 No.12
,December 5, 2022
DOI:
10.4236/jamp.2022.1012230
139
Downloads
462
Views
Citations
Blockchain-Based Certificate Authentication System with Enabling Correction
(Articles)
Md. Mijanur Rahman
,
Md. Tanzinul Kabir Tonmoy
,
Saifur Rahman Shihab
,
Riya Farhana
Journal of Computer and Communications
Vol.11 No.3
,March 31, 2023
DOI:
10.4236/jcc.2023.113006
311
Downloads
3,132
Views
Citations
Opportunistic Relaying Technique over Rayleigh Fading Channel to Improve Multicast Security
(Articles)
Md. Shamim Hossain
,
Md. Zahurul Islam Sarkar
Journal of Computer and Communications
Vol.11 No.8
,August 29, 2023
DOI:
10.4236/jcc.2023.118010
158
Downloads
617
Views
Citations
Secure Multi-Party Proof and its Applications
(Articles)
Chunming Tang
,
Shuhong Gao
Journal of Software Engineering and Applications
Vol.3 No.7
,July 23, 2010
DOI:
10.4236/jsea.2010.37081
6,181
Downloads
9,803
Views
Citations
Profit-Maximizing Strategies for an Artificial Payment Card Market. Is Learning Possible?
(Articles)
Biliana Alexandrova-Kabadjova
,
Edward Tsang
,
Andreas Krause
Journal of Intelligent Learning Systems and Applications
Vol.3 No.2
,April 8, 2011
DOI:
10.4236/jilsa.2011.32009
4,810
Downloads
8,916
Views
Citations
This article belongs to the Special Issue on
Intelligent Learning Systems in Banking and Finance
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top