Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Assessment of Surgical Safety Checklist Compliance and Fidelity in Obstetrics and Gynecologic Surgeries: Insights from Northern Cameroon
(Articles)
Tchounzou Robert
,
Mboh Eyong Isaac
,
Inna Rakia
,
Djallo Bitamzoui
,
Nzometia Yimlefac Crysantus
,
Nana Njamen Théophile
Open Journal of Obstetrics and Gynecology
Vol.15 No.7
,July 16, 2025
DOI:
10.4236/ojog.2025.157086
12
Downloads
75
Views
Citations
LDAP Injection Techniques
(Articles)
Jose Maria ALONSO
,
Antonio GUZMAN
,
Marta BELTRAN
,
Rodolfo BORDON
Wireless Sensor Network
Vol.1 No.4
,November 20, 2009
DOI:
10.4236/wsn.2009.14030
11,335
Downloads
18,348
Views
Citations
A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility
(Articles)
Zhikui CHEN
,
Song YANG
Communications and Network
Vol.1 No.2
,December 1, 2009
DOI:
10.4236/cn.2009.12012
6,656
Downloads
10,519
Views
Citations
Research on the Security Monitoring of the Amusement Ride of Tourist Sites Based on RFID
(Articles)
Jian SHANGGUAN
,
Yingchun LV
,
Mu ZHANG
Wireless Sensor Network
Vol.2 No.1
,January 13, 2010
DOI:
10.4236/wsn.2010.21012
6,899
Downloads
11,228
Views
Citations
WEP and WPA Improvement
(Articles)
Mustafa ElGili
,
Samani A. Talab
,
Awad H. Ali
Wireless Sensor Network
Vol.2 No.3
,April 12, 2010
DOI:
10.4236/wsn.2010.23032
6,645
Downloads
13,020
Views
Citations
Self Umpiring System for Security in Wireless Mobile Ad Hoc Network
(Articles)
Ayyaswamy Kathirvel
,
Rengaramanujam Srinivasan
Wireless Sensor Network
Vol.2 No.3
,April 12, 2010
DOI:
10.4236/wsn.2010.23036
5,191
Downloads
9,608
Views
Citations
Considerations and Open Issues in Delay Tolerant Network’S (DTNs) Security
(Articles)
Harminder Singh Bindra
,
Amrit Lal Sangal
Wireless Sensor Network
Vol.2 No.8
,August 3, 2010
DOI:
10.4236/wsn.2010.28076
7,778
Downloads
15,005
Views
Citations
SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms
(Articles)
Tao Xu
,
Chunxiao Yi
Journal of Information Security
Vol.2 No.1
,February 17, 2011
DOI:
10.4236/jis.2011.21001
5,361
Downloads
10,145
Views
Citations
Secured Electronic Voting Protocol Using Biometric Authentication
(Articles)
Kalaichelvi Visvalingam
,
R. M. Chandrasekaran
Advances in Internet of Things
Vol.1 No.2
,July 26, 2011
DOI:
10.4236/ait.2011.12006
10,940
Downloads
24,896
Views
Citations
Characterization of Peaks and Valleys of Electricity Demand. Application to the Spanish Mainland System in the Period 2000-2020
(Articles)
Fermín Moreno
Energy and Power Engineering
Vol.3 No.4
,September 27, 2011
DOI:
10.4236/epe.2011.34066
5,620
Downloads
9,195
Views
Citations
A Personnel Detection Algorithm for an Intermodal Maritime Application of ITS Technology for Security at Port Facilities
(Articles)
Mouhammad K. Al Akkoumi
,
Robert C. Huck
,
James J. Sluss
Journal of Transportation Technologies
Vol.1 No.4
,October 24, 2011
DOI:
10.4236/jtts.2011.14016
5,004
Downloads
8,512
Views
Citations
A Topology-Based Conflict Detection System for Firewall Policies using Bit-Vector-Based Spatial Calculus
(Articles)
Subana Thanasegaran
,
Yi Yin
,
Yuichiro Tateiwa
,
Yoshiaki Katayama
,
Naohisa Takahashi
Int'l J. of Communications, Network and System Sciences
Vol.4 No.11
,October 31, 2011
DOI:
10.4236/ijcns.2011.411084
4,888
Downloads
8,681
Views
Citations
Cyber-Physical-Social Based Security Architecture for Future Internet of Things
(Articles)
Huansheng Ning
,
Hong Liu
Advances in Internet of Things
Vol.2 No.1
,January 14, 2012
DOI:
10.4236/ait.2012.21001
14,134
Downloads
31,633
Views
Citations
Personnel Security outside the Box
(Articles)
Semyon Ioffe
,
Sergey Yesin
Psychology
Vol.3 No.2
,February 23, 2012
DOI:
10.4236/psych.2012.32031
5,449
Downloads
9,060
Views
Citations
A Simple Encryption Keys Creation Scheme in Wireless Ad Hoc Networks
(Articles)
Abdulrahman H. Altalhi
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41011
5,262
Downloads
9,066
Views
Citations
An Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks
(Articles)
Benamar Kadri
,
Djilalli Moussaoui
,
Mohammed Feham
,
Abdellah Mhammed
Wireless Sensor Network
Vol.4 No.6
,June 13, 2012
DOI:
10.4236/wsn.2012.46022
5,569
Downloads
10,901
Views
Citations
A New Construction Scheme for Information Security Lab
(Articles)
Li Zhu
,
Huaqing Mao
,
Zhiwen Hu
Creative Education
Vol.3 No.4
,August 13, 2012
DOI:
10.4236/ce.2012.34064
5,135
Downloads
7,483
Views
Citations
High Security Nested PWLCM Chaotic Map Bit-Level Permutation Based Image Encryption
(Articles)
Qassim Nasir
,
Hadi H. Abdlrudha
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9
,September 18, 2012
DOI:
10.4236/ijcns.2012.59065
5,491
Downloads
8,885
Views
Citations
Prevalence of psychiatric morbidity among inmates in Jos maximum security prison
(Articles)
Aishatu Y. Armiya’u
,
Ayodele Obembe
,
Moses D. Audu
,
Tolulope O. Afolaranmi
Open Journal of Psychiatry
Vol.3 No.1
,January 29, 2013
DOI:
10.4236/ojpsych.2013.31003
5,587
Downloads
9,667
Views
Citations
Secure Bluetooth for Trusted m-Commerce
(Articles)
Pasquale Stirparo
,
Jan Löschner
Int'l J. of Communications, Network and System Sciences
Vol.6 No.6
,June 18, 2013
DOI:
10.4236/ijcns.2013.66030
16,132
Downloads
44,245
Views
Citations
<
...
21
22
23
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top