Journal of Discrete Mathematical Sciences and Cryptography

短名JDMSC
Journal Impact1.09
国际分区MATHEMATICS, APPLIED(Q2)
ISSN0972-0529, 2169-0065
h-index24

期刊主页
涉及主题计算机科学数学组合数学离散数学算法物理人工智能工程类理论计算机科学操作系统程序设计语言计算机安全哲学生物纯数学数学分析计算机网络
出版信息出版商: Taru Publications出版周期: 期刊类型: journal
基本数据创刊年份: 1998原创研究文献占比97.49%自引率:16.70%Gold OA占比: 0.00%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

New public-key cryptosystem algorithm based on function composition of matrix

2024-1-1

Securing digital authentication with cryptographic innovations in intrinsic verification systems

2024-1-1

Analyzing the role of spectrum sensing for security enhancement in beyond 5G waveforms using energy detection

2024-1-1

Novel approaches to biometric security using enhanced session keys and elliptic curve cryptography

2024-1-1

Cryptographic image-based data security strategies in wireless sensor networks

2024-1-1

Vigilance and surveillance reinforced using mathematical approaches in object tracking techniques

2024-1-1

A review on quantum utility for secure authentication protocol towards cryptographic standard in quantum dot cellular automata

2024-1-1

Square difference labeling and co-secure domination in middle graph of certain graphs

2024-1-1

Human skin encryption based efficient feedback mode for privacy protection method in surveillance video

2024-1-1

Review on image steganography using different LSB methods

2024-1-1

Security threats and mitigation techniques affecting trust computation in cloud computing

2024-1-1

Novel framework for enhancing security of SDN based VPLS architecture

2024-1-1

Mathematical morphology based lung segmentation using multiscale dense pyramid network architecture

2024-1-1

Securing the Sustainable Future : Cryptography and Security in AI & IoT

2024-1-1

Enhancing applications of surveillance through multimedia data mining

2024-1-1

Secure and efficient storage approach for cloud environment using hybrid machine learning techniques

2024-1-1

A characterization of some types of Cayley graphs and addition Cayley graphs and their total chromatic numbers

2024-1-1

Improved cryptanalysis of RSA

2024-1-1

Selection of best cipher system using fuzzy soft decision methodology

2024-1-1

True-False ideals of BCK/BCI-algebras

2024-1-1

Dual quaternion theory over HGC numbers

2024-1-1

Bidimensional extensions of balancing and Lucas-balancing numbers

2024-1-1

Security issues of CFS-like digital signature algorithms

2024-1-1

Secure and scalable data aggregation techniques for healthcare monitoring in WSN

2024-1-1

Efficient key revocation in WSN with lattice-based cryptography

2024-1-1

Privacy-preserving patient monitoring in healthcare IoT using attribute-based cryptography

2024-1-1

A scheme for encrypted image data compression

2024-1-1

CR-IBE based data sharing and revocation in the cloud

2024-1-1

EAKRR : An energy-efficient key management in WSN with ECC-based cryptography

2024-1-1

Minimal and maximal cyclic codes of length 2p

2024-1-1

Implementing optimization and fine-tuning emergency response strategies in cryptographically enhanced IoT-infused medical infrastructure for rapid response

2024-1-1

Enhancing IoT security using lightweight key management with PRESENT for resource-constrained devices

2024-1-1

Lightweight authenticated key management mechanism for enhanced data transmission in the Internet of Things framework

2024-1-1

Chaotic map-based selective image encryption via diffusion and confusion

2024-1-1

Enhancing data privacy in wireless sensor network using homomorphic encryption

2024-1-1

Measuring network security in the cloud : A roadmap for proactive defense

2024-1-1

Advancements in Intelligent Encryption Systems and its Applications

2024-1-1

The fusion of quantum chaos and nonlinear dynamics in securing image encryption

2024-1-1

Blockchain based solutions for privacy-preserving authentication and authorization in networks

2024-1-1

Construction of cubic magic with cryptography application

2024-1-1

Generated new classes of BCK-algebras using permutation quasi-ordered sets

2024-1-1

Security and privacy concerns in social networks mathematically modified metaheuristic-based approach

2024-1-1

Cryptographic security for IoT : Leveraging Feistel-permutation network for enhanced encryption

2024-1-1

Balancing innovation and privacy : A machine learning perspective

2024-1-1

Burning, edge burning & chromatic burning classification of some graph family

2024-1-1

Proposed approach for securing VANET by detection and avoidance of Sybil attack

2024-1-1

Cutting-Edge Cryptography and Cybersecurity : Innovations and Applications

2024-1-1

Several types of derivations on prime and semiprime gamma rings

2024-1-1

On using of weird number sequence in counting Beurling prime systems

2024-1-1

The construction of fuzzy subgroups of groups with units modulo 20 and 21

2024-1-1

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司