Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Geospatial Technology Potentials in Reawakening the Consciousness of Soil Distribution in Nigeria’s North-Central Region and Mediating the Herdsmen-Farmers Conflicts
(Articles)
Ugonna C. Nkwunonwo
,
Francis I. Okeke
,
Emmanuel N. Chiemelu
,
Elijah S. Ebinne
Journal of Geoscience and Environment Protection
Vol.7 No.2
,February 27, 2019
DOI:
10.4236/gep.2019.72011
807
Downloads
1,717
Views
Citations
Decrypting the Digital Security Act of 2018 and Disclosing Its Unconstitutionality
(Articles)
Syed Menhazul Bari
Beijing Law Review
Vol.14 No.2
,June 25, 2023
DOI:
10.4236/blr.2023.142050
114
Downloads
999
Views
Citations
Comparative Study of the Reliability and Complexity of Symmetrical and Asymmetrical Cryptosystems for the Protection of Academic Data in the Democratic Republic of Congo
(Articles)
Mugaruka Buduge Gulain
,
Jeremie Ndikumagenge
,
Buhendwa Nyenyezi Justin
,
Bulonza Masumbuko Alexis
,
Katho Seba Jacques
Journal of Information Security
Vol.15 No.3
,May 17, 2024
DOI:
10.4236/jis.2024.153017
39
Downloads
155
Views
Citations
Dissent under Siege: Case Studies of Repression in the Digital Era of Bangladesh
(Articles)
Ahmed Tahsin Shams
Advances in Journalism and Communication
Vol.12 No.1
,March 29, 2024
DOI:
10.4236/ajc.2024.121011
47
Downloads
213
Views
Citations
Pipeline structure Schnorr-Euchner Sphere Decoding Algorithm
(Articles)
Xinyu Mao
,
Jianjun Wu
,
Haige Xiang
Communications and Network
Vol.5 No.3C
,November 7, 2013
DOI:
10.4236/cn.2013.53B2021
3,415
Downloads
4,646
Views
Citations
Discussion of New Padding Method in DES Encryption
(Articles)
Chengxia Liu
Journal of Software Engineering and Applications
Vol.5 No.12B
,January 17, 2013
DOI:
10.4236/jsea.2012.512B004
4,118
Downloads
5,947
Views
Citations
Ambiguous Multi-Symmetric Scheme and Applications
(Articles)
Richard Bassous
,
Ahmad Mansour
,
Roger Bassous
,
Huirong Fu
,
Ye Zhu
,
George Corser
Journal of Information Security
Vol.8 No.4
,October 31, 2017
DOI:
10.4236/jis.2017.84024
1,200
Downloads
2,418
Views
Citations
Implementation of a Hybrid Triple-Data Encryption Standard and Blowfish Algorithms for Enhancing Image Security in Cloud Environment
(Articles)
Mohan Nagamunthala
,
Ramakrishnan Manjula
Journal of Computer and Communications
Vol.11 No.10
,October 31, 2023
DOI:
10.4236/jcc.2023.1110009
81
Downloads
493
Views
Citations
A User Identity Management Protocol for Cloud Computing Paradigm
(Articles)
Safiriyu Eludiora
,
Olatunde Abiona
,
Ayodeji Oluwatope
,
Adeniran Oluwaranti
,
Clement Onime
,
Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences
Vol.4 No.3
,March 10, 2011
DOI:
10.4236/ijcns.2011.43019
9,498
Downloads
18,845
Views
Citations
Risk Assessment Framework of mHealth System Vulnerabilities: A Multilayer Analysis of the Patient Hub
(Articles)
Mohammed Banu Ali
,
Trevor Wood-Harper
,
Abdullah Sultan Al-Qahtani
,
Abubakar Mohamed Ali Albakri
Communications and Network
Vol.12 No.2
,March 10, 2020
DOI:
10.4236/cn.2020.122003
687
Downloads
2,073
Views
Citations
The Confidentiality of Coding Video Games with Cheat Code and Bots for Cheating in a Virtual World
(Articles)
Samantha Gorton
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.16 No.6
,June 8, 2023
DOI:
10.4236/ijcns.2023.166008
96
Downloads
1,121
Views
Citations
Secure Chained Threshold Proxy Signature without and with Supervision
(Articles)
Zoe L. JIANG
,
S. M. YIU
,
Y. DONG
,
L. C. K. HUI
,
S. H. Y. WONG
Journal of Software Engineering and Applications
Vol.2 No.4
,November 27, 2009
DOI:
10.4236/jsea.2009.24034
4,681
Downloads
8,184
Views
Citations
Minimal Repair Redundancy for Coherent Systemin its Signatures Representation
(Articles)
Vanderlei da Costa Bueno
American Journal of Operations Research
Vol.1 No.1
,March 25, 2011
DOI:
10.4236/ajor.2011.11002
5,858
Downloads
10,418
Views
Citations
Techniques for the Extraction of Vibrational Signature: A New Method of Pottery Shard Identification
(Articles)
Baxton R. Chen
Archaeological Discovery
Vol.6 No.3
,June 19, 2018
DOI:
10.4236/ad.2018.63013
2,122
Downloads
2,990
Views
Citations
An Anti-Eavesdropping Method in Data Collection of Smart Meter
(Articles)
Weiwei Dong
,
Yong Wang
,
Lin Zhou
,
Kanghua Cao
,
Haiming Li
Journal of Computer and Communications
Vol.7 No.9
,September 20, 2019
DOI:
10.4236/jcc.2019.79004
550
Downloads
1,341
Views
Citations
Thermal Behavior of Clay-Based Building Materials: A Numerical Study Using Microstructural Modeling
(Articles)
Ahmed Lkouen
,
Mohamed Lamrani
,
Ahmed Meskini
,
Abdelhamid Khabbazi
Journal of Power and Energy Engineering
Vol.10 No.4
,April 28, 2022
DOI:
10.4236/jpee.2022.104005
165
Downloads
730
Views
Citations
Image Encryption Algorithm Based on a Chaotic Iterative Process
(Articles)
Michael François
,
Thomas Grosges
,
Dominique Barchiesi
,
Robert Erra
Applied Mathematics
Vol.3 No.12
,December 17, 2012
DOI:
10.4236/am.2012.312262
5,904
Downloads
9,343
Views
Citations
Image Encryption Scheme Based on Filter Bank and Lifting
(Articles)
Saleh Saraireh
,
Yazeed Al-Sbou
,
Ja’afer Al-Saraireh
,
Othman Alsmadi
Int'l J. of Communications, Network and System Sciences
Vol.7 No.1
,January 24, 2014
DOI:
10.4236/ijcns.2014.71006
4,327
Downloads
6,556
Views
Citations
An Image Encryption Method Based on Quantum Fourier Transformation
(Articles)
Ying Liu
,
Bing Zhou
,
Zijing Li
,
Jiangnan Deng
,
Zhengying Cai
International Journal of Intelligence Science
Vol.8 No.3
,July 30, 2018
DOI:
10.4236/ijis.2018.83004
917
Downloads
1,829
Views
Citations
Analyzing Computational Components of Standard Block Encryption Schemes
(Articles)
Chu-Wen Cheng
,
Miranda Heather Cantu
,
Sanjeev Kumar
Journal of Computer and Communications
Vol.10 No.6
,June 30, 2022
DOI:
10.4236/jcc.2022.106007
113
Downloads
604
Views
Citations
This article belongs to the Special Issue on
Data Science and Applications
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top