Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Blockchain for Smart Homes: Blockchain Low Latency
(Articles)
Reem Jamaan Alzahrani
,
Fatimah Saad Alzahrani
Journal of Computer and Communications
Vol.12 No.12
,December 3, 2024
DOI:
10.4236/jcc.2024.1212001
95
Downloads
580
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
Methods and Approaches to Integrating Innovative Technologies in 3PL Provider Management: From Automation to Artificial Intelligence
(Articles)
Igor Tovstolis
iBusiness
Vol.16 No.4
,December 4, 2024
DOI:
10.4236/ib.2024.164016
58
Downloads
378
Views
Citations
Strengthening the Authentication System of an IP Telephony Network through Facial Emotion Detection
(Articles)
Sekoude Jehovah-Nis Pedrie Sonon
,
Tahirou Djara
,
Matine Ousmane
Open Journal of Safety Science and Technology
Vol.15 No.1
,March 4, 2025
DOI:
10.4236/ojsst.2025.151003
39
Downloads
202
Views
Citations
Multi-Dimensional Anonymization for Participatory Sensing Systems
(Articles)
Nafeez Abrar
,
Shaolin Zaman
,
Anindya Iqbal
,
Manzur Murshed
Int'l J. of Communications, Network and System Sciences
Vol.13 No.6
,June 30, 2020
DOI:
10.4236/ijcns.2020.136006
329
Downloads
958
Views
Citations
A Systematic Survey for Differential Privacy Techniques in Federated Learning
(Articles)
Yi Zhang
,
Yunfan Lu
,
Fengxia Liu
Journal of Information Security
Vol.14 No.2
,February 28, 2023
DOI:
10.4236/jis.2023.142008
905
Downloads
4,076
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
When Corporal Acts Are Labeled Criminal: Lack of Privacy among the Homeless
(Articles)
Matthew R. Taylor
,
Eileen T. Walsh
Sociology Mind
Vol.8 No.2
,April 3, 2018
DOI:
10.4236/sm.2018.82011
1,377
Downloads
5,348
Views
Citations
Accelerating Quantum Computing Readiness: Risk Management and Strategies for Sectors
(Articles)
Abdullah Ibrahim Salman Alsalman
Journal of Quantum Information Science
Vol.13 No.2
,June 13, 2023
DOI:
10.4236/jqis.2023.132003
597
Downloads
2,098
Views
Citations
Generalized Attack Model for Networked Control Systems, Evaluation of Control Methods
(Articles)
Arman Sargolzaei
,
Kang Yen
,
Mohamed Abdelghani
,
Alireza Abbaspour
,
Saman Sargolzaei
Intelligent Control and Automation
Vol.8 No.3
,August 23, 2017
DOI:
10.4236/ica.2017.83013
1,396
Downloads
3,058
Views
Citations
Integration of Mobile Computing and Cloud Computing in Healthcare
(Articles)
Leelakumar Raja Lekkala
Voice of the Publisher
Vol.9 No.3
,August 31, 2023
DOI:
10.4236/vp.2023.93012
186
Downloads
1,196
Views
Citations
Advancing Smart Cities through Modern Technologies: A Holistic Review of Applications, Challenges, and Opportunities
(Articles)
Seun Adeoye
Advances in Internet of Things
Vol.15 No.2
,April 1, 2025
DOI:
10.4236/ait.2025.152003
127
Downloads
780
Views
Citations
Predicting Users Mobile App Privacy Preferences
(Articles)
Aziz Alshehri
,
Fayez Alotaibi
Journal of Computer and Communications
Vol.7 No.10
,October 22, 2019
DOI:
10.4236/jcc.2019.710014
553
Downloads
1,623
Views
Citations
A Metric for Calculating the Extent of Non-Knowledge (Level) of Personal Privacy
(Articles)
Yair Oppenheim
Open Access Library Journal
Vol.12 No.5
,May 31, 2025
DOI:
10.4236/oalib.1113554
27
Downloads
129
Views
Citations
Hierarchical Production of Privacy: Gating in Compact Living in Hong Kong
(Articles)
Jun Wang
,
Stephen S. Y. Lau
Current Urban Studies
Vol.1 No.2
,June 13, 2013
DOI:
10.4236/cus.2013.12002
4,833
Downloads
8,852
Views
Citations
Privacy of Wearable Electronics in the Healthcare and Childcare Sectors: A Survey of Personal Perspectives from Finland and the United Kingdom
(Articles)
Johanna Virkki
,
Rebecca Aggarwal
Journal of Information Security
Vol.5 No.2
,March 17, 2014
DOI:
10.4236/jis.2014.52005
4,737
Downloads
7,555
Views
Citations
“A Person Is a Person through Other Persons”—A Critical Analysis of Privacy and Culture in Africa
(Articles)
Alex B. Makulilo
Beijing Law Review
Vol.7 No.3
,August 22, 2016
DOI:
10.4236/blr.2016.73020
3,153
Downloads
7,798
Views
Citations
Privacy Protection in COVID Data Tracking: Textual Analysis of the Literature
(Articles)
Antonella Massari
,
Viviana D’Addosio
,
Vittoria Claudia De Nicolò
,
Samuela L’Abbate
Applied Mathematics
Vol.15 No.3
,March 29, 2024
DOI:
10.4236/am.2024.153013
142
Downloads
422
Views
Citations
Web Search Query Privacy, an End-User Perspective
(Articles)
Kato Mivule
Journal of Information Security
Vol.8 No.1
,January 17, 2017
DOI:
10.4236/jis.2017.81005
1,986
Downloads
4,859
Views
Citations
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
(Articles)
Kpinna Tiekoura Coulibaly
,
Abdou Maïga
,
Jerome Diako
,
Moustapha Diaby
Open Journal of Applied Sciences
Vol.13 No.11
,November 28, 2023
DOI:
10.4236/ojapps.2023.1311163
138
Downloads
636
Views
Citations
Proactive Security Mechanism and Design for Firewall
(Articles)
Saleem-Ullah Lar
,
Xiaofeng Liao
,
Aqeel ur Rehman
,
MA Qinglu
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23012
7,223
Downloads
13,156
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
1,197
Downloads
3,853
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
<
...
6
7
8
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top