Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
High-Throughput and Area-Efficient FPGA Implementations of Data Encryption Standard (DES)
(Articles)
Raed Bani-Hani
,
Salah Harb
,
Khaldoon Mhaidat
,
Eyad Taqieddin
Circuits and Systems
Vol.5 No.3
,March 25, 2014
DOI:
10.4236/cs.2014.53007
5,019
Downloads
7,226
Views
Citations
Have You Considered Eating Your Weeds?
(Articles)
Willem Sternberg Jansen van Rensburg
,
Michele Cloete
,
Abe Shegro Gerrano
,
Patrick Olusanmi Adebola
American Journal of Plant Sciences
Vol.5 No.8
,March 26, 2014
DOI:
10.4236/ajps.2014.58123
5,761
Downloads
8,238
Views
Citations
This article belongs to the Special Issue on
Weed Research
A Survey of SQL Injection Attack Detection and Prevention
(Articles)
Khaled Elshazly
,
Yasser Fouad
,
Mohamed Saleh
,
Adel Sewisy
Journal of Computer and Communications
Vol.2 No.8
,June 4, 2014
DOI:
10.4236/jcc.2014.28001
7,541
Downloads
13,203
Views
Citations
Encrypted CDMA Audio Network
(Articles)
Alfredo A. Ortega
,
Víctor A. Bettachini
,
Pablo I. Fierens
,
José Ignacio Alvarez-Hamelin
Journal of Information Security
Vol.5 No.3
,June 25, 2014
DOI:
10.4236/jis.2014.53008
3,185
Downloads
4,717
Views
Citations
The Rise of Emerging Markets and Its Impact on Global Energy Security
(Articles)
José María Martín-Moreno
Modern Economy
Vol.5 No.9
,August 15, 2014
DOI:
10.4236/me.2014.59089
4,389
Downloads
5,496
Views
Citations
An Overview of Mobile Malware and Solutions
(Review)
Fan Wu
,
Hira Narang
,
Dwayne Clarke
Journal of Computer and Communications
Vol.2 No.12
,October 22, 2014
DOI:
10.4236/jcc.2014.212002
5,475
Downloads
8,274
Views
Citations
Application of High Carbon:Nitrogen Material Enhanced the Formation of the Soil A Horizon and Nitrogen Fixation in a Tropical Agricultural Field
(Articles)
Masato Oda
,
Kenji Tamura
,
Hiroko Nakatsuka
,
Miki Nakata
,
Yukimi Hayashi
Agricultural Sciences
Vol.5 No.12
,October 29, 2014
DOI:
10.4236/as.2014.512127
5,553
Downloads
7,645
Views
Citations
Climate Change Adaptation and Vulnerability: A Case of Rain Dependent Small-Holder Farmers in Selected Districts in Zambia
(Articles)
Cuthbert Casey Makondo
,
Kenneth Chola
,
Blesswell Moonga
American Journal of Climate Change
Vol.3 No.4
,December 11, 2014
DOI:
10.4236/ajcc.2014.34034
7,558
Downloads
10,204
Views
Citations
Competence of Security Officers in the Management of National Examinations in Secondary Schools in Eastern Province, Kenya
(Articles)
George M. George M. Muthaa
,
Peter K. Muriungi
,
Eunice Kagendo Njue
Open Journal of Social Sciences
Vol.2 No.12
,December 22, 2014
DOI:
10.4236/jss.2014.212010
3,626
Downloads
4,447
Views
Citations
Cloud Security: Services, Risks, and a Case Study on Amazon Cloud Services
(Articles)
Patrick Mosca
,
Yanping Zhang
,
Zhifeng Xiao
,
Yun Wang
Int'l J. of Communications, Network and System Sciences
Vol.7 No.12
,December 24, 2014
DOI:
10.4236/ijcns.2014.712053
10,821
Downloads
17,254
Views
Citations
Conventional and Improved Digital Signature Scheme: A Comparative Study
(Articles)
Alaa D. Alrehily
,
Asmaa F. Alotaibi
,
Suzan B. Almutairy
,
Mashael S. Alqhtani
,
Jayaprakash Kar
Journal of Information Security
Vol.6 No.1
,January 22, 2015
DOI:
10.4236/jis.2015.61007
6,187
Downloads
8,390
Views
Citations
The Mutuality of Challenges Facing Human Rights and Human Security: A New Framework of Analysis
(Articles)
Emmanuel Ome
,
Ani Casimir
Open Journal of Political Science
Vol.5 No.2
,February 5, 2015
DOI:
10.4236/ojps.2015.52007
3,504
Downloads
5,280
Views
Citations
This article belongs to the Special Issue on
Special Issue on Emerging Africa - Need for a Paradigm Shift
Study on the Legalization of Minor Internet Security
(Articles)
Pengfei Ji
Beijing Law Review
Vol.6 No.1
,March 10, 2015
DOI:
10.4236/blr.2015.61007
4,410
Downloads
5,189
Views
Citations
Igbo Traditional Morality as a Panacea to Nigerian Security Crises
(Articles)
Anthony Chukwudi Areji
,
Michael Chugozie Anyaehie
Open Journal of Political Science
Vol.5 No.2
,March 18, 2015
DOI:
10.4236/ojps.2015.52012
3,774
Downloads
4,877
Views
Citations
This article belongs to the Special Issue on
Special Issue on Emerging Africa - Need for a Paradigm Shift
Security & Privacy Implications in the Placement of Biometric-Based ID Card for Rwanda Universities
(Articles)
Eugen Harinda
,
Etienne Ntagwirumugara
Journal of Information Security
Vol.6 No.2
,March 31, 2015
DOI:
10.4236/jis.2015.62010
6,653
Downloads
8,795
Views
Citations
An Algorithm for Optimal Firewall Placement in IEC61850 Substations
(Articles)
Hermes Eslava
,
Luis Alejandro Rojas
,
Danny Pineda
Journal of Power and Energy Engineering
Vol.3 No.4
,April 13, 2015
DOI:
10.4236/jpee.2015.34003
4,671
Downloads
5,308
Views
Citations
Security Assessment of Distribution System with Distributed Photovoltaic
(Articles)
Weiping Zhu
,
Zhicheng Wang
,
Xiaodong Yuan
,
Ruonan Fan
Journal of Power and Energy Engineering
Vol.3 No.4
,April 14, 2015
DOI:
10.4236/jpee.2015.34034
4,225
Downloads
5,211
Views
Citations
Keyboard Dependency of Personal Identification Performance by Keystroke Dynamics in Free Text Typing
(Articles)
Yoshitomo Matsubara
,
Toshiharu Samura
,
Haruhiko Nishimura
Journal of Information Security
Vol.6 No.3
,July 14, 2015
DOI:
10.4236/jis.2015.63023
5,151
Downloads
7,741
Views
Citations
Role Expansion: Implications of the Security Role Expanding into the EHS Function
(Articles)
Wanda D. Minnick
,
Jonathan D. Cunkelman
Open Journal of Safety Science and Technology
Vol.5 No.3
,August 20, 2015
DOI:
10.4236/ojsst.2015.53010
8,577
Downloads
9,469
Views
Citations
Information Security and the Theory of Unfaithful Information
(Articles)
Aizhan Pernebekovna Pernebekova
,
Beisenkulov Ayazbi Ahbergenovich
Journal of Information Security
Vol.6 No.4
,September 9, 2015
DOI:
10.4236/jis.2015.64026
5,747
Downloads
8,324
Views
Citations
<
...
7
8
9
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top