Journal of Discrete Mathematical Sciences and Cryptography

Title Publication Date Language Citations
Dynamic handwritten signature and machine learning based identity verification for keyless cryptocurrency transactions2019/02/17English10
AES and MQTT based security system in the internet of things2019/11/17English10
WSN and IoT based smart city model using the MQTT protocol2019/11/17English10
An empirical research on the influence of Chinese rural financial reform on cultivation of new agricultural business entities2016/12/27English10
Urban traffic flow prediction model based on BP artificial neural network in Beijing area2018/05/19English10
Total edge irregularity strength of subdivision of star2015/11/02English10
A note on edge-distance-balanced property of the generalized Petersen graphsGP(4t, 2)2019/10/03English10
The eccentric based Zagreb indices of carbon graphite2020/08/17English10
The influence of green technology cognition in adoption behavior: On the consideration of green innovation policy perception’s moderating effect2017/10/03English9
Resource management based secure trust model for WSN2019/11/17English9
Green building evaluation methodology under ecological view2016/12/27English9
Manchu character segmentation and recognition method2016/12/27English9
Quantitative risk analysis method of information security-Combining fuzzy comprehensive analysis with information entropy2016/12/27English9
Distance and eccentricity based invariants of windmill graph2019/10/03English9
Post-evaluation on financial support highway traffic project based on BP neural network algorithm2018/05/19English9
A measurement of China's new energy vehicle industry using the improved general combined-oriented CCR model2018/05/19English9
A Modified Technique for Reliable Image Encryption Method using Merkle-Hellman Cryptosystem and Rsa Algorithm2015/05/04English9
A Taxonomy of Perfect Domination2015/03/04English9
Generalized cubic relations in Hv-LA-semigroups2018/04/03English9
Two novel products ofIFP-intuitionistic fuzzy soft sets and corresponding decision making methods2018/04/03English9
A novel study on the algebraic applications of special class of lattice ordered multi-fuzzy soft sets2019/07/04English9
Representation of primes as the sums of two squares in the golden section quadratic field2006/04/01English9
The lane covering problem with time windows2008/02/01English9
A modal Θ-valent approach of the notion of code2011/10/01English9
Trust framework for attack resilience in MANET using AODV2020/01/02English9
An ensemble feature reduction method for web-attack detection2020/01/02English9
Secured and multi optimized image watermarking using SVD and entropy and prearranged embedding locations in transform domain2020/01/02English9
Steganography based image sharing with reversibility2016/01/02English9
Artificial neural network-based virtual machine allocation in cloud computing2021/04/27English9
Cryptanalysis and improvement of a ECDLP based proxy blind signature scheme2018/01/02English9