Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Survey of SQL Injection Attack Detection and Prevention
(Articles)
Khaled Elshazly
,
Yasser Fouad
,
Mohamed Saleh
,
Adel Sewisy
Journal of Computer and Communications
Vol.2 No.8
,June 4, 2014
DOI:
10.4236/jcc.2014.28001
7,174
Downloads
13,148
Views
Citations
Cloud Computing and the Essentials of Security Management
(Articles)
Zhong Hua
,
Xin Wang
Open Access Library Journal
Vol.3 No.5
,May 30, 2016
DOI:
10.4236/oalib.1102618
1,766
Downloads
4,447
Views
Citations
Online Accounts Management Method Using Risk-Based Approach
(Articles)
Yoshio Kakizaki
,
Takumi Akiyama
,
Kazuya Otani
,
Ryoichi Sasaki
Journal of Computer and Communications
Vol.4 No.14
,November 14, 2016
DOI:
10.4236/jcc.2016.414003
1,314
Downloads
2,120
Views
Citations
Secure Bluetooth for Trusted m-Commerce
(Articles)
Pasquale Stirparo
,
Jan Löschner
Int'l J. of Communications, Network and System Sciences
Vol.6 No.6
,June 18, 2013
DOI:
10.4236/ijcns.2013.66030
15,909
Downloads
44,339
Views
Citations
An Overview of Mobile Malware and Solutions
(Review)
Fan Wu
,
Hira Narang
,
Dwayne Clarke
Journal of Computer and Communications
Vol.2 No.12
,October 22, 2014
DOI:
10.4236/jcc.2014.212002
5,329
Downloads
8,634
Views
Citations
A Proposal for Mitigating Multiple Black-Hole Attack in Wireless Mesh Networks
(Articles)
Om Shree
,
Francis J. Ogwu
Wireless Sensor Network
Vol.5 No.4
,April 30, 2013
DOI:
10.4236/wsn.2013.54010
6,952
Downloads
11,702
Views
Citations
Localized Coverage Connectivity Based on Shape and Area Using Mobile Sensor Robots in Wireless Sensor Networks
(Articles)
Rajaram Pichamuthu
,
Prakasam Periasamy
Circuits and Systems
Vol.7 No.8
,June 28, 2016
DOI:
10.4236/cs.2016.78171
1,597
Downloads
2,693
Views
Citations
Track Paging an Optimal Method for Minimizing Paging and Signaling Cost in Mobile IP
(Articles)
Tania Baghaie
Journal of Computer and Communications
Vol.1 No.4
,October 11, 2013
DOI:
10.4236/jcc.2013.14002
3,947
Downloads
6,927
Views
Citations
Analysis of Malware Families on Android Mobiles: Detection Characteristics Recognizable by Ordinary Phone Users and How to Fix It
(Articles)
Hieu Le Thanh
Journal of Information Security
Vol.4 No.4
,September 11, 2013
DOI:
10.4236/jis.2013.44024
8,819
Downloads
15,903
Views
Citations
Identity Authentication Based on Sensors of Smartphone and Neural Networks
(Articles)
Jingyong Zhu
,
Hanbing Fan
,
Yichen Huang
,
Miaomiao Lin
,
Tao Xu
,
Junqiang Cai
,
Zhengjie Wang
Journal of Computer and Communications
Vol.10 No.7
,July 29, 2022
DOI:
10.4236/jcc.2022.107006
103
Downloads
501
Views
Citations
Proactive Security Mechanism and Design for Firewall
(Articles)
Saleem-Ullah Lar
,
Xiaofeng Liao
,
Aqeel ur Rehman
,
MA Qinglu
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23012
7,014
Downloads
13,024
Views
Citations
On the Security of Anonymous Authentication Protocol for Mobile Pay-TV
(Articles)
Walid I. Khedr
Journal of Information Security
Vol.4 No.4
,September 30, 2013
DOI:
10.4236/jis.2013.44025
4,278
Downloads
7,464
Views
Citations
Anonymous Authentication for Secure Mobile Agent Based Internet Business
(Articles)
Sivaraman Audithan
,
Thanjavur Swaminathan Murunya
,
Pandi Vijayakumar
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78124
1,461
Downloads
2,400
Views
Citations
The Analysis and Amendment of Security System in 3G
(Articles)
Min ZHAO
,
Ling SHI
Intelligent Information Management
Vol.1 No.1
,July 31, 2009
DOI:
10.4236/iim.2009.11001
7,641
Downloads
11,771
Views
Citations
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model
(Articles)
Zhengtao JIANG
,
Yongbin WANG
,
Yong WANG
,
Yumin WANG
Intelligent Information Management
Vol.1 No.1
,July 31, 2009
DOI:
10.4236/iim.2009.11002
4,745
Downloads
8,268
Views
Citations
Identity Authentication Based on Two-Beam Interference
(Articles)
Wenqi He
,
Xiang Peng
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24005
4,050
Downloads
5,348
Views
Citations
Profile Generation Methods for Reinforcing Robustness of Keystroke Authentication in Free Text Typing
(Articles)
Yoshitomo Matsubara
,
Toshiharu Samura
,
Haruhiko Nishimura
Journal of Information Security
Vol.6 No.2
,April 16, 2015
DOI:
10.4236/jis.2015.62014
4,919
Downloads
6,239
Views
Citations
The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols
(Articles)
Zhicai Shi
,
Shitao Ren
,
Fei Wu
,
Changzhi Wang
Journal of Computer and Communications
Vol.4 No.8
,June 17, 2016
DOI:
10.4236/jcc.2016.48001
2,020
Downloads
3,134
Views
Citations
Security Considerations on Three-Factor Anonymous Authentication Scheme for WSNs
(Articles)
Hyunsung Kim
,
Beaton Ofesi Denice Kapito
Journal of Computer and Communications
Vol.9 No.3
,March 1, 2021
DOI:
10.4236/jcc.2021.93001
547
Downloads
1,374
Views
Citations
Securing User Authentication with Server-Side Voice Verification
(Articles)
Deepak R. Chandran
,
Sanath Kumar
,
S. Deepashri
Journal of Computer and Communications
Vol.11 No.5
,May 30, 2023
DOI:
10.4236/jcc.2023.115010
107
Downloads
535
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top