Journal of Discrete Mathematical Sciences and Cryptography
短名 | JDMSC |
Journal Impact | 1.09 |
国际分区 | MATHEMATICS, APPLIED(Q2) |
ISSN | 0972-0529, 2169-0065 |
h-index | 24 |
涉及主题 | 计算机科学数学组合数学离散数学算法物理人工智能工程类理论计算机科学操作系统程序设计语言计算机安全哲学生物纯数学数学分析计算机网络 |
出版信息 | 出版商: Taru Publications,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 1998,原创研究文献占比: 97.49%,自引率:16.70%, Gold OA占比: 0.00% |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
New public-key cryptosystem algorithm based on function composition of matrix
2024-1-1
Securing digital authentication with cryptographic innovations in intrinsic verification systems
2024-1-1
Analyzing the role of spectrum sensing for security enhancement in beyond 5G waveforms using energy detection
2024-1-1
Novel approaches to biometric security using enhanced session keys and elliptic curve cryptography
2024-1-1
Cryptographic image-based data security strategies in wireless sensor networks
2024-1-1
Vigilance and surveillance reinforced using mathematical approaches in object tracking techniques
2024-1-1
A review on quantum utility for secure authentication protocol towards cryptographic standard in quantum dot cellular automata
2024-1-1
Square difference labeling and co-secure domination in middle graph of certain graphs
2024-1-1
Human skin encryption based efficient feedback mode for privacy protection method in surveillance video
2024-1-1
Review on image steganography using different LSB methods
2024-1-1
Security threats and mitigation techniques affecting trust computation in cloud computing
2024-1-1
Novel framework for enhancing security of SDN based VPLS architecture
2024-1-1
Mathematical morphology based lung segmentation using multiscale dense pyramid network architecture
2024-1-1
Securing the Sustainable Future : Cryptography and Security in AI & IoT
2024-1-1
Enhancing applications of surveillance through multimedia data mining
2024-1-1
Secure and efficient storage approach for cloud environment using hybrid machine learning techniques
2024-1-1
A characterization of some types of Cayley graphs and addition Cayley graphs and their total chromatic numbers
2024-1-1
Improved cryptanalysis of RSA
2024-1-1
Selection of best cipher system using fuzzy soft decision methodology
2024-1-1
True-False ideals of BCK/BCI-algebras
2024-1-1
Dual quaternion theory over HGC numbers
2024-1-1
Bidimensional extensions of balancing and Lucas-balancing numbers
2024-1-1
Security issues of CFS-like digital signature algorithms
2024-1-1
Secure and scalable data aggregation techniques for healthcare monitoring in WSN
2024-1-1
Efficient key revocation in WSN with lattice-based cryptography
2024-1-1
Privacy-preserving patient monitoring in healthcare IoT using attribute-based cryptography
2024-1-1
A scheme for encrypted image data compression
2024-1-1
CR-IBE based data sharing and revocation in the cloud
2024-1-1
EAKRR : An energy-efficient key management in WSN with ECC-based cryptography
2024-1-1
Minimal and maximal cyclic codes of length 2p
2024-1-1
Implementing optimization and fine-tuning emergency response strategies in cryptographically enhanced IoT-infused medical infrastructure for rapid response
2024-1-1
Enhancing IoT security using lightweight key management with PRESENT for resource-constrained devices
2024-1-1
Lightweight authenticated key management mechanism for enhanced data transmission in the Internet of Things framework
2024-1-1
Chaotic map-based selective image encryption via diffusion and confusion
2024-1-1
Enhancing data privacy in wireless sensor network using homomorphic encryption
2024-1-1
Measuring network security in the cloud : A roadmap for proactive defense
2024-1-1
Advancements in Intelligent Encryption Systems and its Applications
2024-1-1
The fusion of quantum chaos and nonlinear dynamics in securing image encryption
2024-1-1
Blockchain based solutions for privacy-preserving authentication and authorization in networks
2024-1-1
Construction of cubic magic with cryptography application
2024-1-1
Generated new classes of BCK-algebras using permutation quasi-ordered sets
2024-1-1
Security and privacy concerns in social networks mathematically modified metaheuristic-based approach
2024-1-1
Cryptographic security for IoT : Leveraging Feistel-permutation network for enhanced encryption
2024-1-1
Balancing innovation and privacy : A machine learning perspective
2024-1-1
Burning, edge burning & chromatic burning classification of some graph family
2024-1-1
Proposed approach for securing VANET by detection and avoidance of Sybil attack
2024-1-1
Cutting-Edge Cryptography and Cybersecurity : Innovations and Applications
2024-1-1
Several types of derivations on prime and semiprime gamma rings
2024-1-1
On using of weird number sequence in counting Beurling prime systems
2024-1-1
The construction of fuzzy subgroups of groups with units modulo 20 and 21
2024-1-1
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远