8 results for information security.

Parameters for your search query:
Keyword    information security

Open AccessArticle
Export: RIS | BibTeX | EndNote
Big Data and Data-Driven Healthcare Systems
Journal of Business and Management Sciences. 2018, 6(3), 104-111. DOI: 10.12691/jbms-6-3-7
Pub. Date: June 29, 2018Views: 3470Downloads: 3319
Figure of 7
Open AccessArticle
Export: RIS | BibTeX | EndNote
Big Data Analytics in Biometrics and Healthcare
Journal of Computer Sciences and Applications. 2018, 6(1), 48-55. DOI: 10.12691/jcsa-6-1-7
Pub. Date: June 04, 2018Views: 5064Downloads: 4697
Open AccessArticle
Export: RIS | BibTeX | EndNote
Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey
Information Security and Computer Fraud. 2015, 3(1), 1-7. DOI: 10.12691/iscf-3-1-1
Pub. Date: June 23, 2015Views: 21466Downloads: 17886
Open AccessArticle
Export: RIS | BibTeX | EndNote
Enhanced Anonymous Tag Based Credentials
Information Security and Computer Fraud. 2014, 2(1), 10-20. DOI: 10.12691/iscf-2-1-3
Pub. Date: March 24, 2014Views: 11526Downloads: 7158
Open AccessReview Article
Export: RIS | BibTeX | EndNote
Telepsychiatry: Technology Progress, Challenges, and Language and Transcultural Issues
Journal of Translational Medicine and Developmental Disorders. 2014, 1(1), 1-11. DOI: 10.12691/jtmdd-1-1-1
Pub. Date: August 04, 2014Views: 16134Downloads: 10764
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Information Security of Kazakh Airlines
Journal of Computer Networks. 2014, 2(2), 23-25. DOI: 10.12691/jcn-2-2-4
Pub. Date: June 10, 2014Views: 8652Downloads: 4561
This article belongs to the Special Issue Parallel computing and Protection Information
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Selection Criteria of the Tools of Information Security from Unauthorized Access into Computer Systems of Different Classes
Journal of Computer Networks. 2014, 2(2), 18-22. DOI: 10.12691/jcn-2-2-3
Pub. Date: June 10, 2014Views: 10252Downloads: 5676
This article belongs to the Special Issue Parallel computing and Protection Information
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Parallelization of Integer Squaring Algorithms with Delayed Carry
Journal of Computer Networks. 2014, 2(2), 10-17. DOI: 10.12691/jcn-2-2-2
Pub. Date: June 10, 2014Views: 15159Downloads: 11107
This article belongs to the Special Issue Parallel computing and Protection Information
Results: sort by Relevance

Filter by

Date

Published between:

and

Subjects



Journals





Article Types