Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Three-Party Simultaneous Quantum Secure Communication Based on Closed Transmission Loops
(Articles)
Xunru Yin
Journal of Quantum Information Science
Vol.4 No.4
,December 31, 2014
DOI:
10.4236/jqis.2014.44024
4,719
Downloads
5,539
Views
Citations
Efficient Three-Party Quantum Secure Direct Communication with EPR Pairs
(Articles)
Xunru Yin
,
Wenping Ma
,
Dongsu Shen
,
Chaoyang Hao
Journal of Quantum Information Science
Vol.3 No.1
,March 29, 2013
DOI:
10.4236/jqis.2013.31001
3,505
Downloads
6,560
Views
Citations
Cubic Root Extractors of Gaussian Integers and Their Application in Fast Encryption for Time-Constrained Secure Communication
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.4
,April 15, 2011
DOI:
10.4236/ijcns.2011.44024
5,658
Downloads
9,868
Views
Citations
An Efficient Trusted Computing Base for MANET Security
(Articles)
Somya D. Mohanty
,
Vinay Thotakura
,
Mahalingam Ramkumar
Journal of Information Security
Vol.5 No.4
,October 7, 2014
DOI:
10.4236/jis.2014.54018
3,642
Downloads
4,730
Views
Citations
Development of a Post Quantum Encryption Key Generation Algorithm Using Electromagnetic Wave Propagation Theory
(Articles)
Vincent Mbonigaba
,
Fulgence Nahayo
,
Octave Moutsinga
,
Okalas-Ossami Dieudonné
Journal of Information Security
Vol.15 No.1
,January 31, 2024
DOI:
10.4236/jis.2024.151005
95
Downloads
384
Views
Citations
Six-State Symmetric Quantum Key Distribution Protocol
(Articles)
Makhamisa Senekane
,
Mhlambululi Mafu
,
Francesco Petruccione
Journal of Quantum Information Science
Vol.5 No.2
,May 28, 2015
DOI:
10.4236/jqis.2015.52005
3,915
Downloads
5,307
Views
Citations
Establishment and Application of Cryptographic Library Model
(Articles)
Tie-Ming Liu
,
Lie-Hui Jiang
,
Jing Jing
,
Yuan-Yuan Zhang
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35003
3,847
Downloads
4,868
Views
Citations
On the Security of Quantum Key Distribution Ping-Pong Protocol
(Articles)
Masakazu Yoshida
,
Takayuki Miyadera
,
Hideki Imai
Journal of Quantum Information Science
Vol.3 No.1
,March 29, 2013
DOI:
10.4236/jqis.2013.31004
4,323
Downloads
7,282
Views
Citations
Toward Efficient Quantum Key Distribution Reconciliation
(Articles)
Nedra Benletaief
,
Houria Rezig
,
Ammar Bouallegue
Journal of Quantum Information Science
Vol.4 No.2
,June 27, 2014
DOI:
10.4236/jqis.2014.42013
3,807
Downloads
5,449
Views
Citations
Transmission over Cognitive Radio Channel with Novel Secure LT Code
(Articles)
Elham Hosseini
,
Abolfazl Falahati
Communications and Network
Vol.5 No.3
,August 2, 2013
DOI:
10.4236/cn.2013.53023
4,834
Downloads
6,902
Views
Citations
Disclosure of Disability by University Students: Development of a Study Protocol
(Articles)
Andrea De Cesarei
Open Journal of Social Sciences
Vol.2 No.8
,August 27, 2014
DOI:
10.4236/jss.2014.28012
4,415
Downloads
5,978
Views
Citations
CXL (Compute Express Link) Technology
(Articles)
Santhosh Nagaraj Nag
Journal of Computer and Communications
Vol.11 No.6
,June 30, 2023
DOI:
10.4236/jcc.2023.116006
1,026
Downloads
3,025
Views
Citations
Random but System-Wide Unique Unlinkable Parameters
(Articles)
Peter Schartner
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31001
7,331
Downloads
11,200
Views
Citations
All-Optical Cryptographic Device for Secure Communication
(Articles)
Fabio Garzia
,
Roberto Cusani
Communications and Network
Vol.2 No.4
,December 2, 2010
DOI:
10.4236/cn.2010.24034
6,820
Downloads
11,206
Views
Citations
Corporate Intranet Security: Packet-Level Protocols for Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic
(Articles)
Boris S. Verkhovsky
,
Roberto D. Rubino
Int'l J. of Communications, Network and System Sciences
Vol.5 No.5
,May 30, 2012
DOI:
10.4236/ijcns.2012.55033
4,950
Downloads
7,299
Views
Citations
RFID Anti-Counterfeiting for Retailing Systems
(Articles)
Duy-Thinh Tran
,
Sung Je Hong
Journal of Applied Mathematics and Physics
Vol.3 No.1
,January 28, 2015
DOI:
10.4236/jamp.2015.31001
3,991
Downloads
5,528
Views
Citations
Implementation of an Efficient Light Weight Security Algorithm for Energy-Constrained Wireless Sensor Nodes
(Articles)
A. Saravanaselvan
,
B. Paramasivan
Circuits and Systems
Vol.7 No.9
,July 18, 2016
DOI:
10.4236/cs.2016.79194
1,513
Downloads
2,637
Views
Citations
A Review of Lightweight Cryptographic Schemes and Fundamental Cryptographic Characteristics of Boolean Functions
(Articles)
Nahla Fatahelrahman Ibrahim
,
Johnson Ihyeh Agbinya
Advances in Internet of Things
Vol.12 No.1
,January 19, 2022
DOI:
10.4236/ait.2022.121002
402
Downloads
1,860
Views
Citations
GnRH Antagonist Protocol: Is It Effective for Expected Poor Ovarian Responders with Tubal Factor Undergoing IVF?
(Articles)
Weijie Xing
,
Haiyan Lin
,
Qingxue Zhang
Advances in Reproductive Sciences
Vol.5 No.4
,October 24, 2017
DOI:
10.4236/arsci.2017.54007
1,660
Downloads
4,481
Views
Citations
Research on ZigBee Wireless Sensors Network Based on ModBus Protocol
(Articles)
Chengbo YU
,
Yanfei LIU
,
Cheng WANG
Wireless Sensor Network
Vol.1 No.1
,April 10, 2009
DOI:
10.4236/wsn.2009.11007
12,125
Downloads
23,616
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top