8 results for information security.

Parameters for your search query:
Keyword    information security

Open AccessArticle
Export: RIS | BibTeX | EndNote
Big Data and Data-Driven Healthcare Systems
Journal of Business and Management Sciences. 2018, 6(3), 104-111. DOI: 10.12691/jbms-6-3-7
Pub. Date: June 29, 2018Views: 907Downloads: 864
Figure of 7
Open AccessArticle
Export: RIS | BibTeX | EndNote
Big Data Analytics in Biometrics and Healthcare
Journal of Computer Sciences and Applications. 2018, 6(1), 48-55. DOI: 10.12691/jcsa-6-1-7
Pub. Date: June 04, 2018Views: 2177Downloads: 2021
Open AccessArticle
Export: RIS | BibTeX | EndNote
Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey
Information Security and Computer Fraud. 2015, 3(1), 1-7. DOI: 10.12691/iscf-3-1-1
Pub. Date: June 23, 2015Views: 20740Downloads: 17368
Open AccessArticle
Export: RIS | BibTeX | EndNote
Enhanced Anonymous Tag Based Credentials
Information Security and Computer Fraud. 2014, 2(1), 10-20. DOI: 10.12691/iscf-2-1-3
Pub. Date: March 24, 2014Views: 11190Downloads: 6912
Open AccessReview Article
Export: RIS | BibTeX | EndNote
Telepsychiatry: Technology Progress, Challenges, and Language and Transcultural Issues
Journal of Translational Medicine and Developmental Disorders. 2014, 1(1), 1-11. DOI: 10.12691/jtmdd-1-1-1
Pub. Date: August 04, 2014Views: 15647Downloads: 10413
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Information Security of Kazakh Airlines
Journal of Computer Networks. 2014, 2(2), 23-25. DOI: 10.12691/jcn-2-2-4
Pub. Date: June 10, 2014Views: 8457Downloads: 4448
This article belongs to the Special Issue Parallel computing and Protection Information
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Selection Criteria of the Tools of Information Security from Unauthorized Access into Computer Systems of Different Classes
Journal of Computer Networks. 2014, 2(2), 18-22. DOI: 10.12691/jcn-2-2-3
Pub. Date: June 10, 2014Views: 9984Downloads: 5521
This article belongs to the Special Issue Parallel computing and Protection Information
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Parallelization of Integer Squaring Algorithms with Delayed Carry
Journal of Computer Networks. 2014, 2(2), 10-17. DOI: 10.12691/jcn-2-2-2
Pub. Date: June 10, 2014Views: 14802Downloads: 10833
This article belongs to the Special Issue Parallel computing and Protection Information
Results: sort by Relevance

Filter by

Date

Published between:

and

Subjects



Journals





Article Types