Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Corporate Intranet Security: Packet-Level Protocols for Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic
(Articles)
Boris S. Verkhovsky
,
Roberto D. Rubino
Int'l J. of Communications, Network and System Sciences
Vol.5 No.5
,May 30, 2012
DOI:
10.4236/ijcns.2012.55033
4,952
Downloads
7,306
Views
Citations
Large-Integer Multiplication Based on Homogeneous Polynomials
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.5 No.8
,August 28, 2012
DOI:
10.4236/ijcns.2012.58054
2,610
Downloads
4,728
Views
Citations
Establishment and Application of Cryptographic Library Model
(Articles)
Tie-Ming Liu
,
Lie-Hui Jiang
,
Jing Jing
,
Yuan-Yuan Zhang
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35003
3,852
Downloads
4,879
Views
Citations
A Solution to Implement Dynamic Authentication
(Articles)
Bingbing Xia
,
Youping Dong
Open Journal of Applied Sciences
Vol.2 No.3
,September 28, 2012
DOI:
10.4236/ojapps.2012.23025
5,908
Downloads
8,950
Views
Citations
A Security Architecture for SCADA Systems
(Articles)
Arun Velagapalli
,
Mahalingam Ramkumar
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91009
1,361
Downloads
3,695
Views
Citations
A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention
(Articles)
Alese Boniface Kayode
,
Alowolodu Olufunso Dayo
,
Adekunle Adewale Uthman
Communications and Network
Vol.13 No.2
,May 27, 2021
DOI:
10.4236/cn.2021.132006
335
Downloads
1,113
Views
Citations
Implementation of an Efficient Light Weight Security Algorithm for Energy-Constrained Wireless Sensor Nodes
(Articles)
A. Saravanaselvan
,
B. Paramasivan
Circuits and Systems
Vol.7 No.9
,July 18, 2016
DOI:
10.4236/cs.2016.79194
1,513
Downloads
2,642
Views
Citations
Securing User Authentication with Server-Side Voice Verification
(Articles)
Deepak R. Chandran
,
Sanath Kumar
,
S. Deepashri
Journal of Computer and Communications
Vol.11 No.5
,May 30, 2023
DOI:
10.4236/jcc.2023.115010
139
Downloads
665
Views
Citations
Research and Implementation of Time Synchronous Dynamic Password Based on SM3 Hash Algorithm
(Articles)
Dognery Sinaly Silue
,
Wanggen Wan
,
Muhammad Rizwan
Open Journal of Applied Sciences
Vol.6 No.13
,December 28, 2016
DOI:
10.4236/ojapps.2016.613077
1,801
Downloads
2,905
Views
Citations
AudiTEE: Efficient, General-Purpose and Privacy-Preserving Audit for Distributed Ledgers
(Articles)
Zhufeng Ye
,
Zhenghao Wu
,
Xianglan Tian
Journal of Computer and Communications
Vol.9 No.8
,August 31, 2021
DOI:
10.4236/jcc.2021.98007
257
Downloads
907
Views
Citations
Improved High Definition Multimedia Interface Authentication Mechanism
(Articles)
R. N. Iyare
,
S. D. Walker
Journal of Computer and Communications
Vol.2 No.12
,October 22, 2014
DOI:
10.4236/jcc.2014.212003
3,437
Downloads
4,233
Views
Citations
Use of AI Voice Authentication Technology Instead of Traditional Keypads in Security Devices
(Articles)
Deepak Ramesh Chandran
Journal of Computer and Communications
Vol.10 No.6
,June 13, 2022
DOI:
10.4236/jcc.2022.106002
305
Downloads
2,288
Views
Citations
An Efficient Trusted Computing Base for MANET Security
(Articles)
Somya D. Mohanty
,
Vinay Thotakura
,
Mahalingam Ramkumar
Journal of Information Security
Vol.5 No.4
,October 7, 2014
DOI:
10.4236/jis.2014.54018
3,647
Downloads
4,744
Views
Citations
Toward Secure Vehicular Ad Hoc Networks an Overview and Comparative Study
(Articles)
Yousef Al-Raba’nah
,
Mohammed Al-Refai
Journal of Computer and Communications
Vol.4 No.16
,December 9, 2016
DOI:
10.4236/jcc.2016.416002
2,098
Downloads
4,076
Views
Citations
Exploration of Core Technologies of Cyber Security
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.8 No.9
,September 26, 2021
DOI:
10.4236/oalib.1107795
137
Downloads
1,011
Views
Citations
Considerations for a Planned Democratizing Data Framework for Valid and Trusted Data
(Articles)
Tambe Mariam Takang
,
Austin Oguejiofor Amaechi
Journal of Data Analysis and Information Processing
Vol.11 No.3
,July 18, 2023
DOI:
10.4236/jdaip.2023.113013
180
Downloads
703
Views
Citations
Traffic Regulation at Critical Intersections: A Case Study of Odole Intersection, Akure, Ondo State, Nigeria
(Articles)
Olumuyiwa Samson Aderinola
,
David Oladotun Owolabi
Open Journal of Civil Engineering
Vol.6 No.2
,March 14, 2016
DOI:
10.4236/ojce.2016.62009
3,229
Downloads
5,421
Views
Citations
RFID Anti-Counterfeiting for Retailing Systems
(Articles)
Duy-Thinh Tran
,
Sung Je Hong
Journal of Applied Mathematics and Physics
Vol.3 No.1
,January 28, 2015
DOI:
10.4236/jamp.2015.31001
3,998
Downloads
5,544
Views
Citations
Java Computer Animation for Effective Learning of the Cholesky Algorithm with Transportation Engineering Applications
(Articles)
Ivan Makohon
,
Duc T. Nguyen
,
Mecit Cetin
Journal of Software Engineering and Applications
Vol.9 No.10
,October 11, 2016
DOI:
10.4236/jsea.2016.910032
1,896
Downloads
3,075
Views
Citations
Knowledge Discovering in Corporate Securities Fraud by Using Grammar Based Genetic Programming
(Articles)
Hai-Bing Li
,
Man-Leung Wong
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24020
3,929
Downloads
5,815
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top