Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols
(Articles)
Zhicai Shi
,
Shitao Ren
,
Fei Wu
,
Changzhi Wang
Journal of Computer and Communications
Vol.4 No.8
,June 17, 2016
DOI:
10.4236/jcc.2016.48001
2,131
Downloads
3,333
Views
Citations
A Review of Gaps between Usability and Security/Privacy
(Articles)
Majed Alshamari
Int'l J. of Communications, Network and System Sciences
Vol.9 No.10
,October 25, 2016
DOI:
10.4236/ijcns.2016.910034
2,517
Downloads
7,277
Views
Citations
Internet of Things Behavioral-Economic Security Design, Actors & Cyber War
(Articles)
Robert L. Shuler
,
Billy G. Smith
Advances in Internet of Things
Vol.7 No.2
,April 30, 2017
DOI:
10.4236/ait.2017.72003
2,326
Downloads
4,354
Views
Citations
End-to-End Encryption in Messaging Services and National Security—Case of WhatsApp Messenger
(Articles)
Robert E. Endeley
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91008
11,530
Downloads
20,520
Views
Citations
Phishing Techniques in Mobile Devices
(Articles)
Belal Amro
Journal of Computer and Communications
Vol.6 No.2
,February 13, 2018
DOI:
10.4236/jcc.2018.62003
2,137
Downloads
6,386
Views
Citations
Associated Risks in Mobile Applications Permissions
(Articles)
Mohammed Al Jutail
,
Mousa Al-Akhras
,
Abdulaziz Albesher
Journal of Information Security
Vol.10 No.2
,March 26, 2019
DOI:
10.4236/jis.2019.102004
1,853
Downloads
6,732
Views
Citations
Modeling Secure Home Area Network Based on IoT for Resource Constraints Environment
(Articles)
Minsu Park
,
Mwawi Kayuni
,
Tiwonge Manda
,
Hyunsung Kim
Journal of Computer and Communications
Vol.8 No.1
,January 10, 2020
DOI:
10.4236/jcc.2020.81004
784
Downloads
1,952
Views
Citations
Security and Privacy Concerns over IoT Devices Attacks in Smart Cities (2022)
(Articles)
Azizi Majid
Journal of Computer and Communications
Vol.11 No.1
,January 20, 2023
DOI:
10.4236/jcc.2023.111003
392
Downloads
3,343
Views
Citations
Ratings of Driving Factors for the Adoption and Implementation of Artificial Intelligence in the Public Sector
(Articles)
Samuel Narh Dorhetso
,
Bismark Dzahene Quarshie
Open Access Library Journal
Vol.10 No.5
,May 30, 2023
DOI:
10.4236/oalib.1109982
188
Downloads
1,464
Views
Citations
A 5G Perspective of an SDN-Based Privacy-Preserving Scheme for IoT Networks
(Articles)
Isaac Appiah
,
Xiaoming Jiang
,
Edward Kwadwo Boahen
,
Ebenezer Owusu
Int'l J. of Communications, Network and System Sciences
Vol.16 No.8
,August 17, 2023
DOI:
10.4236/ijcns.2023.168012
245
Downloads
1,041
Views
Citations
Secure Cloud Based Approach for Mobile Devices User Data
(Articles)
Oscar Mbae
,
David Mwathi
,
Edna Too
Open Access Library Journal
Vol.9 No.9
,September 27, 2022
DOI:
10.4236/oalib.1109264
95
Downloads
988
Views
Citations
Privacy Accountability Model and Policy for Security Organizations
(Articles)
Yoel Raban
iBusiness
Vol.4 No.2
,June 20, 2012
DOI:
10.4236/ib.2012.42020
3,822
Downloads
6,436
Views
Citations
Classification of Big Data Security Based on Ontology Web Language
(Articles)
Alsadig Mohammed Adam Abdallah
,
Amir Mohamed Talib
Journal of Information Security
Vol.14 No.1
,January 31, 2023
DOI:
10.4236/jis.2023.141006
249
Downloads
1,054
Views
Citations
Design and Implementation of Secure Subnet Inside of Data Sensitive Network
(Articles)
Haiwei Xue
,
Yunliang Zhang
,
Zhien Guo
,
Yiqi Dai
Journal of Software Engineering and Applications
Vol.6 No.3B
,April 11, 2013
DOI:
10.4236/jsea.2013.63B012
3,163
Downloads
4,890
Views
Citations
The Impact of Online Networks and Big Data in Life Sciences
(Articles)
Ruchita Gujarathi
,
Fabricio F. Costa
Social Networking
Vol.3 No.1
,January 23, 2014
DOI:
10.4236/sn.2014.31007
6,546
Downloads
17,550
Views
Citations
A Semantically Sensitive Privacy Protection Method for Trajectory Publishing
(Articles)
Zhijian Shao
,
Bingwen Feng
,
Xingzheng Li
Journal of Computer and Communications
Vol.9 No.4
,April 16, 2021
DOI:
10.4236/jcc.2021.94003
447
Downloads
1,382
Views
Citations
Transparency in a Digitally Intertwined World: A Hybrid Approach to Consumers’ Protection
(Articles)
Lydia Montalbano
Open Journal of Social Sciences
Vol.9 No.8
,August 31, 2021
DOI:
10.4236/jss.2021.98031
487
Downloads
2,003
Views
Citations
Ethical Challenges in Business Analytics: Balancing Data Privacy and Profit
(Articles)
Tanvir Hossan
,
B M Taslimul Haque
,
Md Shihabun Sakib
,
Niladry Chowdhury
,
Md Minhajul Amin
Open Access Library Journal
Vol.12 No.2
,February 18, 2025
DOI:
10.4236/oalib.1112957
96
Downloads
1,006
Views
Citations
An Efficient and Anonymous Multidimensional Data Aggregation Scheme Based on Fog Computing for Smart Grids
(Articles)
Yu Chen
,
Jinmei Fan
,
Yanhai Zhang
Journal of Computer and Communications
Vol.13 No.3
,March 28, 2025
DOI:
10.4236/jcc.2025.133011
57
Downloads
284
Views
Citations
A Comparative Analysis of Customer Data Privacy Protection under the European Union’s General Data Protection Regulation and the People’s Republic of China’s Personal Information Protection Law
(Articles)
Oceanus Ming-Ting Kam
Beijing Law Review
Vol.16 No.3
,September 3, 2025
DOI:
10.4236/blr.2025.163086
37
Downloads
255
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top