Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Tracking National Household Vehicle Usage by Type, Age, and Area in Support of Market Assessments for Plug-In Hybrid Electric Vehicles
(Articles)
Yan Zhou
,
Anant Vyas
,
Danilo Santini
Journal of Transportation Technologies
Vol.3 No.2
,April 29, 2013
DOI:
10.4236/jtts.2013.32017
3,779
Downloads
6,188
Views
Citations
Effective and Extensive Virtual Private Network
(Articles)
Tarek S. Sobh
,
Yasser Aly
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21004
7,220
Downloads
15,631
Views
Citations
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
(Articles)
Yaser Jararweh
,
Lo’ai Tawalbeh
,
Hala Tawalbeh
,
Abidalrahman Moh’d
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32008
8,734
Downloads
14,940
Views
Citations
A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks
(Articles)
Hyeon Myeong Choi
,
Su Man Nam
,
Tae Ho Cho
Wireless Sensor Network
Vol.5 No.3
,March 29, 2013
DOI:
10.4236/wsn.2013.53005
5,132
Downloads
9,794
Views
Citations
Design of Secure Microsystems Using Current-to-Data Dependency Analysis
(Articles)
Haleh Vahedi
,
Radu Muresan
,
Stefano Gregori
Circuits and Systems
Vol.4 No.2
,April 17, 2013
DOI:
10.4236/cs.2013.42019
3,524
Downloads
5,845
Views
Citations
Secured Transmission of ECG Signals: Numerical and Electronic Simulations
(Articles)
Gutenbert Kenfack
,
Alain Tiedeu
Journal of Signal and Information Processing
Vol.4 No.2
,May 8, 2013
DOI:
10.4236/jsip.2013.42023
5,076
Downloads
8,248
Views
Citations
A Secure Approach to Educating a Mobile World-Class Military —A Mobile Secure Concept for Accessing the Classroom from Around the World
(Articles)
Terry C. House
Communications and Network
Vol.5 No.3C
,October 4, 2013
DOI:
10.4236/cn.2013.53B2087
4,892
Downloads
6,099
Views
Citations
Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation
(Articles)
Sankita J. Patel
,
Ankit Chouhan
,
Devesh C. Jinwala
Journal of Information Security
Vol.5 No.1
,January 17, 2014
DOI:
10.4236/jis.2014.51002
5,367
Downloads
9,751
Views
Citations
Design and Implementation of Secure Nodes in the Based-Internet-of-Things Intelligent Household
(Articles)
Xiangdong Hu
,
Hongru Xu
,
Kaimin Han
Journal of Computer and Communications
Vol.2 No.7
,May 21, 2014
DOI:
10.4236/jcc.2014.27001
3,349
Downloads
4,509
Views
Citations
Trusted-CDS Based Intrusion Detection System in Wireless Sensor Network (TC-IDS)
(Articles)
Amin Mohajer
,
Mohammad Hasan Hajimobini
,
Abbas Mirzaei
,
Ehsan Noori
Open Access Library Journal
Vol.1 No.7
,October 22, 2014
DOI:
10.4236/oalib.1100848
1,443
Downloads
2,655
Views
Citations
Analysis of Recent Secure Scan Test Techniques
(Articles)
Cheng Xing
,
Sungju Park
,
Ji Zhao
Journal of Software Engineering and Applications
Vol.9 No.3
,March 31, 2016
DOI:
10.4236/jsea.2016.93008
3,190
Downloads
4,264
Views
Citations
Secure Operation and Optimal Generation Scheduling Considering Battery Life for an Isolated Northwest Grid of Saudi Arabia
(Articles)
Hani Albalawi
,
Karthikeyan Balasubramaniam
,
Elham Makram
Journal of Power and Energy Engineering
Vol.5 No.1
,January 17, 2017
DOI:
10.4236/jpee.2017.51004
1,397
Downloads
2,396
Views
Citations
Towards the Development of Best Data Security for Big Data
(Articles)
Yuan Tian
Communications and Network
Vol.9 No.4
,November 30, 2017
DOI:
10.4236/cn.2017.94020
1,790
Downloads
5,140
Views
Citations
Highly Secure Residents Life Event Management System Based on Blockchain by Hyperledger Fabric
(Articles)
Ragouguelaba Agoda Koussema
,
Hirohide Haga
Journal of Computer and Communications
Vol.9 No.9
,September 17, 2021
DOI:
10.4236/jcc.2021.99003
270
Downloads
1,662
Views
Citations
Blockchain-Based Certificate Authentication System with Enabling Correction
(Articles)
Md. Mijanur Rahman
,
Md. Tanzinul Kabir Tonmoy
,
Saifur Rahman Shihab
,
Riya Farhana
Journal of Computer and Communications
Vol.11 No.3
,March 31, 2023
DOI:
10.4236/jcc.2023.113006
195
Downloads
2,175
Views
Citations
Opportunistic Relaying Technique over Rayleigh Fading Channel to Improve Multicast Security
(Articles)
Md. Shamim Hossain
,
Md. Zahurul Islam Sarkar
Journal of Computer and Communications
Vol.11 No.8
,August 29, 2023
DOI:
10.4236/jcc.2023.118010
62
Downloads
305
Views
Citations
Improving High-Tech Product Development through Communication Audits
(Articles)
Mirja Vaananen
,
Pekka Belt
,
Janne Harkonen
,
Matti Mottonen
Technology and Investment
Vol.3 No.1
,February 24, 2012
DOI:
10.4236/ti.2012.31004
6,972
Downloads
12,452
Views
Citations
The Importance of Communication among the Members of the Nursing Team
(Articles)
Lucas Warmling
,
Patricia Alves de Souza
Creative Education
Vol.9 No.6
,May 31, 2018
DOI:
10.4236/ce.2018.96073
1,956
Downloads
5,459
Views
Citations
The Neurobiology of Human Super-Communication: Insights for Medicine and Business
(Articles)
Michael Hoffmann
World Journal of Neuroscience
Vol.11 No.4
,November 29, 2021
DOI:
10.4236/wjns.2021.114021
240
Downloads
1,561
Views
Citations
Simulation Based Evaluation of Highway Road Scenario between DSRC/802.11p MAC Protocol and STDMA for Vehicle-to-Vehicle Communication
(Articles)
Vaishali D. Khairnar
,
Srikhant N. Pradhan
Journal of Transportation Technologies
Vol.3 No.1
,January 29, 2013
DOI:
10.4236/jtts.2013.31009
7,268
Downloads
12,855
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top