Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Quantum Fisher Information of Two-Level Atomic System under the Influence of Thermal Field, Intrinsic Decoherence, Stark Effect and Kerr-Like Medium
(Articles)
S. Jamal Anwar
,
M. Ramzan
,
M. Usman
,
M. Khalid Khan
Journal of Quantum Information Science
Vol.11 No.1
,March 16, 2021
DOI:
10.4236/jqis.2021.111003
428
Downloads
1,286
Views
Citations
An Efficient PRBG Based on Chaotic Map and Engel Continued Fractions
(Articles)
Atef Masmoudi
,
William Puech
,
Mohamed Salim Bouhlel
Journal of Software Engineering and Applications
Vol.3 No.12
,December 31, 2010
DOI:
10.4236/jsea.2010.312133
5,444
Downloads
9,697
Views
Citations
Introduction to Secure PRNGs
(Articles)
Majid Babaei
,
Mohsen Farhadi
Int'l J. of Communications, Network and System Sciences
Vol.4 No.10
,October 12, 2011
DOI:
10.4236/ijcns.2011.410074
6,090
Downloads
10,293
Views
Citations
Practical Stabilization of Counterfactual Quantum Cryptography
(Articles)
Musheng Jiang
,
Shihai Sun
,
Linmei Liang
Journal of Quantum Information Science
Vol.1 No.3
,December 9, 2011
DOI:
10.4236/jqis.2011.13016
3,898
Downloads
7,646
Views
Citations
Fast Converging Series for Riemann Zeta Function
(Articles)
Hannu Olkkonen
,
Juuso T. Olkkonen
Open Journal of Discrete Mathematics
Vol.2 No.4
,November 1, 2012
DOI:
10.4236/ojdm.2012.24025
4,482
Downloads
7,808
Views
Citations
All-Optical EXOR for Cryptographic Application Based on Spatial Solitons
(Articles)
Mario Marco Corbelli
,
Fabio Garzia
,
Roberto Cusani
Journal of Information Security
Vol.4 No.3
,July 16, 2013
DOI:
10.4236/jis.2013.43020
3,474
Downloads
5,452
Views
Citations
Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation
(Articles)
Sankita J. Patel
,
Ankit Chouhan
,
Devesh C. Jinwala
Journal of Information Security
Vol.5 No.1
,January 17, 2014
DOI:
10.4236/jis.2014.51002
5,380
Downloads
9,072
Views
Citations
Security and Privacy-Preserving Metering Service in the Smart Grid
(Articles)
Zhongwei Sun
,
Chuqi Song
Int'l J. of Communications, Network and System Sciences
Vol.10 No.8B
,August 14, 2017
DOI:
10.4236/ijcns.2017.108B033
1,078
Downloads
2,331
Views
Citations
An Algebraic Proof of the Associative Law of Elliptic Curves
(Articles)
Kazuyuki Fujii
,
Hiroshi Oike
Advances in Pure Mathematics
Vol.7 No.12
,December 12, 2017
DOI:
10.4236/apm.2017.712040
2,588
Downloads
5,194
Views
Citations
A Review of Existing 4-Bit Crypto S-Box Cryptanalysis Techniques and Two New Techniques with 4-Bit Boolean Functions for Cryptanalysis of 4-Bit Crypto S-Boxes*
(Articles)
Sankhanil Dey
,
Ranjan Ghosh
Advances in Pure Mathematics
Vol.8 No.3
,March 22, 2018
DOI:
10.4236/apm.2018.83015
1,089
Downloads
3,386
Views
Citations
Security Framework for Distributed Database System
(Articles)
Allajabu Dafalla Khamis
,
Saad Subair
Journal of Data Analysis and Information Processing
Vol.7 No.1
,December 17, 2018
DOI:
10.4236/jdaip.2019.71001
1,246
Downloads
2,811
Views
Citations
Comparative Study of Different Cryptographic Algorithms
(Articles)
Baha Eldin Hamouda Hassan Hamouda
Journal of Information Security
Vol.11 No.3
,June 8, 2020
DOI:
10.4236/jis.2020.113009
1,736
Downloads
8,678
Views
Citations
Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation
(Articles)
Protais Ndagijimana
,
Fulgence Nahayo
,
Marc Kokou Assogba
,
Adoté François-Xavier Ametepe
,
Juma Shabani
Journal of Information Security
Vol.11 No.3
,July 15, 2020
DOI:
10.4236/jis.2020.113010
583
Downloads
1,976
Views
Citations
Authentication Key-Exchange Using SMS for Web-Based Platforms
(Articles)
Benedicto B. Balilo Jr.
,
Jayvee Christopher N. Vibar
Journal of Computer and Communications
Vol.9 No.8
,August 3, 2021
DOI:
10.4236/jcc.2021.98001
252
Downloads
1,686
Views
Citations
A Quantum Mechanical Proof of Insecurity of the Theoretical QKD Protocols
(Articles)
Jianzhong Zhao
Journal of Quantum Information Science
Vol.12 No.3
,August 30, 2022
DOI:
10.4236/jqis.2022.123006
139
Downloads
843
Views
Citations
Blockchain-Based Islamic Marriage Certification with the Supremacy of Web 3.0
(Articles)
Md. Al-Sajiduzzaman Akand
,
Sarwar Azmain Reza
,
Amatul Bushra Akhi
Intelligent Control and Automation
Vol.13 No.4
,November 30, 2022
DOI:
10.4236/ica.2022.134004
129
Downloads
893
Views
Citations
Numeric Identifier Transmission Algorithm Using Hash Function
(Articles)
Vladyslav Kutsman
Open Journal of Applied Sciences
Vol.13 No.9
,September 26, 2023
DOI:
10.4236/ojapps.2023.139125
59
Downloads
269
Views
Citations
Development of a Post Quantum Encryption Key Generation Algorithm Using Electromagnetic Wave Propagation Theory
(Articles)
Vincent Mbonigaba
,
Fulgence Nahayo
,
Octave Moutsinga
,
Okalas-Ossami Dieudonné
Journal of Information Security
Vol.15 No.1
,January 31, 2024
DOI:
10.4236/jis.2024.151005
72
Downloads
280
Views
Citations
From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A Quantum Leap to Q-Day Security
(Articles)
Fazal Raheman
Journal of Computer and Communications
Vol.12 No.3
,March 29, 2024
DOI:
10.4236/jcc.2024.123016
79
Downloads
420
Views
Citations
Sensitive Information Security Based on Elliptic Curves
(Articles)
Nadine Nibigira
,
Vincent Havyarimana
,
Zhu Xiao
World Journal of Engineering and Technology
Vol.12 No.2
,April 23, 2024
DOI:
10.4236/wjet.2024.122018
45
Downloads
153
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top