Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
HiMAC: Hierarchical Message Authentication Code for Secure Data Dissemination in Mobile Ad Hoc Networks
(Articles)
Khaleel Mershad
,
Ali Hamie
,
Mohamad Hamze
Int'l J. of Communications, Network and System Sciences
Vol.10 No.12
,December 15, 2017
DOI:
10.4236/ijcns.2017.1012018
1,001
Downloads
2,086
Views
Citations
Reflective Teaching-Learning Process of Integrating Metaphorical Thinking and Visual Imagery
(Articles)
Cittoor Girija Navaneedhan
Journal of Behavioral and Brain Science
Vol.2 No.3
,August 31, 2012
DOI:
10.4236/jbbs.2012.23047
4,879
Downloads
9,217
Views
Citations
The Effect of Anxiety State on the Visual Search Efficiency of Athletes
(Articles)
Shangli Liu
,
Wenfang Zhou
Open Journal of Social Sciences
Vol.3 No.6
,June 11, 2015
DOI:
10.4236/jss.2015.36014
3,152
Downloads
4,149
Views
Citations
Visual Outcome and Predictors of Poor Visual Outcome among Uveitis Patients Attended at KCMC Eye Department, Moshi—Northern Tanzania
(Articles)
Abrahamo Arao Nhutene Matova
,
William Makupa
Open Journal of Ophthalmology
Vol.10 No.2
,May 11, 2020
DOI:
10.4236/ojoph.2020.102014
268
Downloads
662
Views
Citations
The Effect of Typographic Modifications on Pupil and Blink Behavior in Dyslexic and Non-Dyslexic Readers
(Articles)
Louise Tooze
Open Access Library Journal
Vol.9 No.9
,September 21, 2022
DOI:
10.4236/oalib.1109238
61
Downloads
504
Views
Citations
Effect of Cr
3
C
2
and VC on the Mechanical and Structural Properties of Sintered WC-10wt%Co Nano Powders
(Articles)
Morteza Mahmoodan
,
Hamed Aliakbarzadeh
,
Farzad Shahri
World Journal of Nano Science and Engineering
Vol.3 No.2
,June 18, 2013
DOI:
10.4236/wjnse.2013.32005
4,328
Downloads
7,067
Views
Citations
A New Method of Measuring Human Resource Output Value: An Analysis Based on New Understanding of Value Chain
(Articles)
Yuewu Wang
,
Sichao Wang
,
Lily Wang
Journal of Human Resource and Sustainability Studies
Vol.9 No.4
,November 18, 2021
DOI:
10.4236/jhrss.2021.94034
286
Downloads
2,062
Views
Citations
An Efficient PRBG Based on Chaotic Map and Engel Continued Fractions
(Articles)
Atef Masmoudi
,
William Puech
,
Mohamed Salim Bouhlel
Journal of Software Engineering and Applications
Vol.3 No.12
,December 31, 2010
DOI:
10.4236/jsea.2010.312133
5,424
Downloads
9,783
Views
Citations
A Framework for Security-Enhanced Peer-to-Peer Applications in Mobile Cellular Networks
(Articles)
Shuping Liu
,
Shushan Zhao
,
Weirong Jiang
Int'l J. of Communications, Network and System Sciences
Vol.4 No.7
,July 11, 2011
DOI:
10.4236/ijcns.2011.47055
4,189
Downloads
7,723
Views
Citations
Introduction to Secure PRNGs
(Articles)
Majid Babaei
,
Mohsen Farhadi
Int'l J. of Communications, Network and System Sciences
Vol.4 No.10
,October 12, 2011
DOI:
10.4236/ijcns.2011.410074
6,065
Downloads
10,399
Views
Citations
Practical Stabilization of Counterfactual Quantum Cryptography
(Articles)
Musheng Jiang
,
Shihai Sun
,
Linmei Liang
Journal of Quantum Information Science
Vol.1 No.3
,December 9, 2011
DOI:
10.4236/jqis.2011.13016
3,880
Downloads
7,736
Views
Citations
Fast Converging Series for Riemann Zeta Function
(Articles)
Hannu Olkkonen
,
Juuso T. Olkkonen
Open Journal of Discrete Mathematics
Vol.2 No.4
,November 1, 2012
DOI:
10.4236/ojdm.2012.24025
4,458
Downloads
8,068
Views
Citations
All-Optical EXOR for Cryptographic Application Based on Spatial Solitons
(Articles)
Mario Marco Corbelli
,
Fabio Garzia
,
Roberto Cusani
Journal of Information Security
Vol.4 No.3
,July 16, 2013
DOI:
10.4236/jis.2013.43020
3,465
Downloads
5,477
Views
Citations
Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation
(Articles)
Sankita J. Patel
,
Ankit Chouhan
,
Devesh C. Jinwala
Journal of Information Security
Vol.5 No.1
,January 17, 2014
DOI:
10.4236/jis.2014.51002
5,342
Downloads
9,693
Views
Citations
Security and Privacy-Preserving Metering Service in the Smart Grid
(Articles)
Zhongwei Sun
,
Chuqi Song
Int'l J. of Communications, Network and System Sciences
Vol.10 No.8B
,August 14, 2017
DOI:
10.4236/ijcns.2017.108B033
1,066
Downloads
2,378
Views
Citations
An Algebraic Proof of the Associative Law of Elliptic Curves
(Articles)
Kazuyuki Fujii
,
Hiroshi Oike
Advances in Pure Mathematics
Vol.7 No.12
,December 12, 2017
DOI:
10.4236/apm.2017.712040
2,562
Downloads
5,493
Views
Citations
A Review of Existing 4-Bit Crypto S-Box Cryptanalysis Techniques and Two New Techniques with 4-Bit Boolean Functions for Cryptanalysis of 4-Bit Crypto S-Boxes*
(Articles)
Sankhanil Dey
,
Ranjan Ghosh
Advances in Pure Mathematics
Vol.8 No.3
,March 22, 2018
DOI:
10.4236/apm.2018.83015
1,076
Downloads
3,571
Views
Citations
Security Framework for Distributed Database System
(Articles)
Allajabu Dafalla Khamis
,
Saad Subair
Journal of Data Analysis and Information Processing
Vol.7 No.1
,December 17, 2018
DOI:
10.4236/jdaip.2019.71001
1,224
Downloads
2,961
Views
Citations
Comparative Study of Different Cryptographic Algorithms
(Articles)
Baha Eldin Hamouda Hassan Hamouda
Journal of Information Security
Vol.11 No.3
,June 8, 2020
DOI:
10.4236/jis.2020.113009
1,632
Downloads
9,084
Views
Citations
Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation
(Articles)
Protais Ndagijimana
,
Fulgence Nahayo
,
Marc Kokou Assogba
,
Adoté François-Xavier Ametepe
,
Juma Shabani
Journal of Information Security
Vol.11 No.3
,July 15, 2020
DOI:
10.4236/jis.2020.113010
562
Downloads
2,083
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top