Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers
(Articles)
Muhammad Ariful Islam
,
Md. Ashraful Islam
,
Nazrul Islam
,
Boishakhi Shabnam
Journal of Computer and Communications
Vol.6 No.3
,March 23, 2018
DOI:
10.4236/jcc.2018.63006
3,318
Downloads
8,637
Views
Citations
An Entropy Measurement Method of Quantum Information System under Uncertain Environment
(Articles)
Zijing Li
,
Jiangnan Deng
,
Bing Zhou
,
Ying Liu
,
Zhengying Cai
International Journal of Intelligence Science
Vol.8 No.2
,April 30, 2018
DOI:
10.4236/ijis.2018.82002
752
Downloads
1,478
Views
Citations
Security Framework for Distributed Database System
(Articles)
Allajabu Dafalla Khamis
,
Saad Subair
Journal of Data Analysis and Information Processing
Vol.7 No.1
,December 17, 2018
DOI:
10.4236/jdaip.2019.71001
1,363
Downloads
3,210
Views
Citations
On Rijndael ByteSub Transformation
(Articles)
W. Eltayeb Ahmed
Applied Mathematics
Vol.10 No.3
,March 28, 2019
DOI:
10.4236/am.2019.103010
788
Downloads
2,120
Views
Citations
Enabling Privacy Preservation and Decentralization for Attribute-Based Task Assignment in Crowdsourcing
(Articles)
Tianqing Liang
Journal of Computer and Communications
Vol.8 No.4
,April 24, 2020
DOI:
10.4236/jcc.2020.84007
679
Downloads
1,886
Views
Citations
Comparative Study of Different Cryptographic Algorithms
(Articles)
Baha Eldin Hamouda Hassan Hamouda
Journal of Information Security
Vol.11 No.3
,June 8, 2020
DOI:
10.4236/jis.2020.113009
2,198
Downloads
11,682
Views
Citations
VANET Security through Group Broadcast Encryption
(Articles)
Eric Eduardo Bunese
,
Eduardo Todt
,
Luiz Carlos Pessoa Albini
Journal of Computer and Communications
Vol.8 No.8
,August 11, 2020
DOI:
10.4236/jcc.2020.88003
511
Downloads
1,808
Views
Citations
Parallel Key Insulated ID-Based Public Key Cryptographic Primitive with Outsourced Equality Test
(Articles)
Seth Alornyo
,
Mustapha Adamu Mohammed
,
Bright Anibrika Selorm Kodzo
,
Pious Akwasi Sarpong
,
Michael Asante
Journal of Computer and Communications
Vol.8 No.12
,December 30, 2020
DOI:
10.4236/jcc.2020.812018
451
Downloads
1,276
Views
Citations
Data Migration Need, Strategy, Challenges, Methodology, Categories, Risks, Uses with Cloud Computing, and Improvements in Its Using with Cloud Using Suggested Proposed Model (DMig 1)
(Articles)
Abou_el_ela Abdou Hussein
Journal of Information Security
Vol.12 No.1
,January 19, 2021
DOI:
10.4236/jis.2021.121004
5,370
Downloads
15,727
Views
Citations
A Robust Non-Blind Watermarking for Biomedical Images Based on Chaos
(Articles)
Noura Alexendre
,
Ntsama Eloundou Pascal
,
Simo Thierry
,
Welba Colince
Journal of Computer and Communications
Vol.9 No.2
,February 3, 2021
DOI:
10.4236/jcc.2021.92001
518
Downloads
1,531
Views
Citations
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm
(Articles)
Youhai Shao
,
Yong Wang
,
Yun Yang
,
Xiang Wang
Journal of Computer and Communications
Vol.10 No.1
,January 17, 2022
DOI:
10.4236/jcc.2022.101003
284
Downloads
1,743
Views
Citations
Algorithms and Tools for Securing and Protecting Academic Data in the Democratic Republic of the Congo
(Articles)
Gulain Mugaruka Buduge
,
Jérémie Ndikumagenge
,
Justin Buhendwa Nyenyezi
Journal of Information Security
Vol.13 No.4
,September 30, 2022
DOI:
10.4236/jis.2022.134017
201
Downloads
830
Views
Citations
Blockchain-Based Islamic Marriage Certification with the Supremacy of Web 3.0
(Articles)
Md. Al-Sajiduzzaman Akand
,
Sarwar Azmain Reza
,
Amatul Bushra Akhi
Intelligent Control and Automation
Vol.13 No.4
,November 30, 2022
DOI:
10.4236/ica.2022.134004
222
Downloads
1,476
Views
Citations
Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange
(Articles)
Pawan Kumar
,
Vipin Saxena
Journal of Computer and Communications
Vol.12 No.2
,February 29, 2024
DOI:
10.4236/jcc.2024.122012
147
Downloads
523
Views
Citations
Some Characterizations of Upper and Lower M-Asymmetric Preirresolute Multifunctions
(Articles)
Levy Kahyata Matindih
,
Elijah Bwanga Mpelele
,
Jimmy Hambulo
,
Davy Kabuswa Manyika
Advances in Pure Mathematics
Vol.13 No.5
,May 30, 2023
DOI:
10.4236/apm.2023.135019
173
Downloads
626
Views
Citations
This article belongs to the Special Issue on
Topology and its Applications
A Quantity Discount Pricing Model Based on the Standard Container under Asymmetric Information
(Articles)
Zhengping DING
,
Keyi WANG
Journal of Service Science and Management
Vol.2 No.3
,September 11, 2009
DOI:
10.4236/jssm.2009.23026
6,103
Downloads
10,600
Views
Citations
On Synchronization of Pinning-Controlled Networks with Reducible and Asymmetric Coupling Matrix
(Articles)
Xuan Zhou
,
Hui Feng
,
Jianwen Feng
,
Yi Zhao
Communications and Network
Vol.3 No.2
,May 19, 2011
DOI:
10.4236/cn.2011.32014
4,503
Downloads
8,495
Views
Citations
Investment Timing with Incentive-Disincentive Contracts under Asymmetric Information
(Articles)
Takashi Shibata
,
Michi Nishihara
Technology and Investment
Vol.3 No.2
,May 29, 2012
DOI:
10.4236/ti.2012.32011
5,362
Downloads
8,424
Views
Citations
Cardiac Mass and Hypertrophic Cardiomyopathy as Aggressive Presentation of Primary Cardiac Lymphoma: A Case Report
(Articles)
Mehandi Haran
,
Evbu Enakpene
,
Ankur Lodha
Journal of Cancer Therapy
Vol.3 No.3
,June 20, 2012
DOI:
10.4236/jct.2012.33026
3,822
Downloads
6,704
Views
Citations
Effects of Supersonic Nozzle Geometry on Characteristics of Shock Wave Structure
(Articles)
Shigeru Matsuo
,
Kousuke Kanesaki
,
Junji Nagao
,
Md. Tawhidul Islam Khan
,
Toshiaki Setoguchi
,
Heuy Dong Kim
Open Journal of Fluid Dynamics
Vol.2 No.4A
,December 26, 2012
DOI:
10.4236/ojfd.2012.24A019
6,471
Downloads
11,676
Views
Citations
This article belongs to the Special Issue on
Thermophysics and Fluid Science
<
...
4
5
6
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top