<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
A Secret Image Sharing Method using Integer Multiwavelet Transform
2
A Secret Image Sharing Method Using Integer-to-Integer Wavelet Transform
3
A secret inline hook technology
4
A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property
5
A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain
6
A secret key exchange scheme for near field communication
7
A Secret Key Extraction Technique Applied in Vehicular Networks
8
A secret key generation method based on CSI in OFDM-FDD system
9
A secret key negotiation scheme for wireless communications over fading channels
10
A secret key-based security architecture for wireless sensor networks
11
A secret sharing scheme based on a systematic Reed-Solomon code and analysis of its security for a general class of sources
12
A secret sharing scheme based on Near-MDS codes
13
A Secret Sharing Scheme Based on NTRU Algorithm
14
A secret sharing scheme for anonymous DNS queries
15
A secret sharing scheme for image encryption
16
A secret sharing scheme for secure transmission of color images
17
A Secret Sharing Scheme via Skew Polynomials
18
A Secret Sharing Scheme with the Changeable Threshold Value
19
A secret sharing shuffling scheme based on polynomial
20
A Secret Sociotechnical System
21
A secret story about the Yagi antenna
22
A secretary agent system based on HTTP client-server protocol
23
A secret-key cipher based on linear complementary codes
24
A secret-sharing-based key management in Wireless Sensor Network
25
A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability
26
A section of a curved pixelated NaI(Tl) detector for SPECT/TCT
27
A Section Theorem in Topological Ordered Spaces and its Applications to the Existence of Pareto Equilibria for Multi-objective Games
28
A Sectional Encryption Algorithm of Network Information Based on Cyclic Shift Key Code
29
A sectional matrix method for IPT coil shape optimization
30
A Sectionalizing Method in Power System Restoration Based on WAMS
31
A sectionalizing method in power system restoration based on Wide Area Measurement Systems
32
A sectioned spheroid model for cylindrical permanent magnets
33
A Sector Advanced Technique to improve dynamic response of a Direct Torque Controlled induction motor
34
A sector bound approach to event-based control with state quantization
35
A sector condition for local robustness of limit cycles
36
A sector ing technique for broadband arrays
37
A Sector Magnet for a 10-50 MeV Soc
38
A sector nulling technique revisited
39
A Sectoral Planar 6-Way Hybrid Power Divider with a Resistive Slot
40
A sectoral qualifications framework for engineers and computer scientists
41
A sector-based backward direction detection technique for vehicular ad hoc networks
42
A sector-based campus-wide indoor positioning system
43
A Sector-Based Location Management Scheme for PCS Networks
44
A sector-based, frequency-domain approach to detection and localization of multiple speakers
45
A sectored cell architecture in two-hop relay-enhanced OFDMA cellular networks
46
A sectored phased array for DBF applications
47
A sectored planar periodic leaky-wave antenna fed by a printed surface-wave source
48
A sectored receiver for infrared wireless networks
49
A sectorial Fabry - Perot antenna for radar application
50
A sectorized beamspace adaptive diversity combiner for multipath environments
51
A sector-specific approach for new product idea generation
52
A Securable Autonomous Generalised Document Model (SAGENT)
53
A secure 3D-SPIHT codec
54
A Secure Access Approach of UMTS Terminal Based on Trusted Computing
55
A secure access control mechanism against Internet crackers
56
A secure access control protocol of RFID tags based on EPC C1G2
57
A secure access control scheme based on group for peer to peer network
58
A secure account-based mobile payment protocol
59
A secure active network environment architecture: realization in SwitchWare
60
A Secure Addressing Scheme for Large-Scale Managed MANETs
61
A Secure Admission Control Scheme for P2P Networks
62
A Secure Agent Based Intelligent Tutoring System Using FRS
63
A secure agent platform for active RFID
64
A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks With no Requirements for Trusted Aggregator Nodes
65
A secure algorithm for executing queries over encrypted data
66
A secure Ambient Assisted Living (AAL) environment: An implementation view
67
A Secure and Auditable Cryptographic-Based e-Voting Scheme
68
A secure and distributed control network for the communications in smart grid
69
A Secure and Distributed Framework to Identify and Share Needed Information
70
A secure and easy remote access technology
71
A secure and effective device pairing protocol
72
A Secure and Efficient Authentication Protocol (SEAP) for MANETs wIth Membership Revocation
73
A Secure and Efficient Authentication Protocol Based on Identity Based Aggregate Signature for Electric Vehicle
74
A secure and efficient authentication protocol for passive RFID tags
75
A Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems
76
A Secure and Efficient Authentication Scheme for M-Coupon Systems
77
A Secure and Efficient Communication in VANET
78
A secure and efficient conference scheme for mobile communications
79
A Secure and Efficient Data Sharing Framework with Delegated Capabilities in Hybrid Cloud
80
A Secure and Efficient Deniable Authentication Protocol
81
A Secure and Efficient Distributed Batch Rekeying Protocol for Dynamic Collaborative Groups
82
A Secure and Efficient E-Cheque Protocol from Chameleon Hash Function
83
A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol
84
A Secure and Efficient Fingerprint Images Encryption Scheme
85
A Secure and Efficient Group Key Agreement for Ad Hoc Networks
86
A secure and efficient key management scheme for wireless sensor networks
87
A Secure and Efficient Key-Policy Attribute Based Key Encryption Scheme
88
A Secure and Efficient Large Scale Distributed System for Data Sharing
89
A Secure and Efficient Link State Routing Protocol for Ad Hoc Networks
90
A secure and efficient management system for smart distribution grid based on Distribution System Security Region (DSSR)
91
A secure and efficient message authentication protocol for VANETs with privacy preservation
92
A secure and efficient message authentication protocol for vehicular Ad hoc Networks with privacy preservation(MAPWPP)
93
A secure and efficient micropayment solution for online gaming
94
A Secure and Efficient Multi-Device and Multi-Service Authentication Protocol (SEMMAP) for 3GPP-LTE Networks
95
A secure and efficient multi-use multi-secret images sharing scheme for general access structure
96
A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems
97
A Secure and Efficient Mutual Authentication Protocol Using Hash Function
98
A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications
99
A secure and efficient revocation scheme for fine-grained access control in cloud storage
100
A secure and efficient RFID protocol that could make big brother (partially) obsolete
101
A secure and efficient satellite-based multicast architecture
102
A secure and efficient scheme for machine-to-machine communications in smart grid
103
A secure and efficient scheme of remote user authentication based on bilinear pairings
104
A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments
105
A secure and efficient solution to the IPv6 address ownership problem
106
A secure and efficient user authentication protocol for two-tiered wireless sensor networks
107
A secure and efficient voter-controlled anonymous election scheme
108
A Secure and Energy-Efficient Data Aggregation Protocol Based on Directed Diffusion
109
A secure and energy-efficient stochastic routing protocol for wireless mobile ad-hoc networks
110
A secure and fair DSA-based signature exchange protocol
111
A Secure and Fair Negotiation Protocol in Highly Complex Utility Space Based on Cone-Constraints
112
A secure and fair resource allocation model under hybrid cloud environment
113
A Secure and Flexible Data Infrastructure for the VPH-Share Community
114
A Secure and Flexible Electronic-Ticket System
115
A Secure and Flexible WLAN Authentication Scheme for Organizations
116
A secure and fully private borda voting protocol with universal verifiability
117
A Secure and Hierarchical Architecture for P2PSIP Session Initiation
118
A secure and high capacity data hiding scheme for binary images
119
A secure and high efficent computerized adaptive testing scheme for computer courses based on identity
120
A secure and high payload digital audio watermarking using features from iris image
121
A secure and highly available distributed store for meeting diverse data storage needs
122
A Secure and Legal Network-Aware P2P VoD System
123
A secure and lightweight approach for critical data security in cloud
124
A secure and lightweight authentication protocol for RFID
125
A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing
126
A Secure and Lightweight Micro-Payment Scheme in P2P Networks
127
A Secure and Lightweight Service Discovery Model for Mobile Ad Hoc Networks
128
A Secure and Lightweight User Authentication Scheme with Anonymity for the Global Mobility Network
129
A Secure and Location Assurance Protocol for Location-Aware Services in VANETs
130
A secure and low-energy logic style using charge recovery approach
131
A secure and mutual-profitable DRM interoperability scheme
132
A secure and open mobile agent programming environment
133
A Secure and Practical Buyer-Seller Watermarking Protocol
134
A secure and practical key management mechanism for NFC read-write mode
135
A Secure and Privacy Aware Data Dissemination For The Notification of Traffic Incidents
136
A secure and privacy enhanced LBS security elements based on KLP
137
A secure and privacy enhanced protocol for location-based services in ubiquitous society
138
A Secure and Privacy Friendly 2D+3D Face Authentication System Robust Under Pose and Illumation Variation
139
A Secure and privacy protecting protocol for VANET
140
A secure and privacy protection digital goods trading scheme in cloud computing
141
A secure and privacy-preserving communication protocol for V2G networks
142
A secure and privacy-preserving communication scheme for Advanced Metering Infrastructure
143
A secure and privacy-preserving payment system for Electric vehicles
144
A Secure and Privacy-Protecting Aggregation Scheme for Sensor Networks
145
A secure and private RFID authentication protocol based on quadratic residue
146
A secure and reliable bootstrap architecture
147
A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid
148
A secure and reliable local payment system
149
A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure Channels
150
A secure and reliable video watermarking technique
151
A Secure and Reversible Data Hiding Method Based on Odd-Even Interleaving Embedding
152
A secure and robust approach to scalable video authentication
153
A secure and robust audio watermarking scheme using multiple scrambling and adaptive synchronization
154
A Secure and Robust Authentication Scheme for Video Transcoding
155
A secure and robust crypto system based on unique dynamic key generation scheme
156
A Secure and Robust DCT-Based Hashing Scheme for Image Authentication
157
A secure and robust digital image watermarking scheme using repetition codes for copyright protection
158
A secure and robust digital signature scheme for JPEG2000 image authentication
159
A secure and robust digital watermarking technique by the block cipher RC6 and secure hash algorithm
160
A secure and robust dynamic ID-based mutual authentication scheme with smart card using elliptic curve cryptography
161
A Secure and Robust Hashing Scheme for Image Authentication
162
A secure and robust self-encoded spread spectrum multiple-access approach for multimedia communication system
163
A secure and robust video watermarking based on chaotic maps
164
A secure and robust watermarking algorithm based on the combination of DWT, SVD, and LU decomposition with Arnold´s Cat Map approach
165
A Secure and Scalable Framework for Group Communication
166
A Secure and Scalable Grid-Based Content Management System
167
A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications
168
A secure and scalable telemonitoring system using ultra-low-energy wireless sensor interface for long-term monitoring in life science applications
169
A secure and scalable time synchronization protocol in IEEE 802.11 ad hoc networks
170
A Secure and Scalable Transaction Protocol for Ubiquitous Sensor Network using RFID Systems
171
A Secure and Scalable Update Protocol for P2P Data Grids
172
A secure and searchable data storage in Cloud computing
173
A Secure and Survivable Architecture for SCADA Systems
174
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model
175
A secure and trusted time stamping authority
176
A secure and unclonable embedded system using instruction-level PUF authentication
177
A secure anonymous authorisation architecture for e-commerce
178
A Secure Anonymous Identity-Based Access Control over Cloud Data
179
A secure anonymous key mechanism for privacy protection in VANET
180
A secure anonymous path routing protocol for wireless sensor networks
181
A secure anonymous proxy multi-signature scheme
182
A secure anonymous routing protocol in WSN
183
A secure anonymous voting by employing Diffie-Hellman PKD concept
184
A secure application invocation mechanism in mobile phones for Near Field Communication
185
A secure approach for mobile agent migration control
186
A Secure Approach for Web Based Internet Voting System Using Multiple Encryption
187
A secure approach of Eavesdropper detection in quantum key distribution
188
A Secure Approach to Distributed Internet-Enabled Metrology
189
A secure architecture design based on application isolation, code minimization and randomization
190
A Secure Architecture for Data Storage in the Cloud Environments
191
A secure architecture for fieldbus/Internet gateways
192
A secure architecture for mobility management in heterogeneous networks in IMS
193
A secure architecture for open source VoIP solutions
194
A secure architecture for the design for testability structures
195
A secure architecture for the pseudonymization of medical data
196
A secure architecture for traffic control systems with SDLC protocols
197
A secure arithmetic coding algorithm based on integer implementation
198
A secure ATM VP coordination protocol
199
A secure auction-like negotiation protocol for agent-based Internet trading
200
A secure audio steganography approach
201
A secure audio teleconference system
202
A Secure Authenticated Encryption Scheme and Its Extension
203
A secure authenticated key agreement protocol
204
A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography
205
A Secure Authenticated Key Agreement Protocol For Wireless Security
206
A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System
207
A secure authentication mechanism for resource constrained devices
208
A Secure Authentication Policy for UMTS and WLAN Interworking
209
A secure authentication protocol among mobile phone and wireless sensor networks
210
A Secure Authentication Protocol for IP-Based Wireless Sensor Communications Using the Location/ID Split Protocol (LISP)
211
A secure authentication protocol for RFID based on Trivium
212
A secure authentication protocol using HOTP on USB storage devices
213
A Secure Authentication Scheme for Bluetooth Connection
214
A secure authentication scheme for integration of cellular networks and MANETs
215
A secure authentication scheme for MobiCloud
216
A Secure Authentication Scheme for Session Initiation Protocol Based on Elliptic Curve Cryptography
217
A secure authentication scheme in adhoc network using threshold cryptography
218
A Secure Authentication Scheme of Health Care Based on the Cloud
219
A Secure Authentication Scheme with Anonymity for Wireless Communications
220
A secure authentication system based on variable-length codes
221
A Secure Authentication System for ePassport Detection and Verification
222
A secure authorization system in PHR based on CP-ABE
223
A Secure Autonomous Document Architecture for Enterprise Digital Right Management
224
A Secure Billing Protocol for Grid Computing
225
A secure biometric-based authentication scheme using smart card
226
A Secure Biometric-Based User Authentication Scheme for Heterogeneous WSN
227
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
228
A secure biometrics-based remote user authentication scheme for secure data exchange
229
A Secure Blind Watermarking Scheme Based on Embedding Function Matrix
230
A Secure Bootstrap Based on Trusted Computing
231
A Secure BPCS Steganography against Statistical Analysis
232
A Secure Broadcasting Scheme with Network Coding
233
A secure but still safe and low cost automotive communication technique
234
A Secure Capability Computer System
235
A secure card solution for remote access for mobile workforce
236
A secure card system with biometrics capability
237
A Secure Certificateless Authenticated Group Key Agreement Protocol
238
A Secure Channel Coding Scheme for Efficient Transmission of Remote Sensing Data over the LEO Satellite Channels
239
A secure channel establishment method on a hardware security module
240
A secure checkpointing system
241
A secure client on smart phone to monitor automotive sensor network
242
A Secure Client Side Deduplication Scheme in Cloud Storage Environments
243
A Secure Cloud Backup System with Assured Deletion and Version Control
244
A Secure Cloud Computing
245
A Secure Cloud Computing Architecture Design
246
A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid
247
A Secure Cloud Manager for the X1.V1 Platform
248
A secure cloud of electronic keys for NFC locks securely controlled by NFC smartphones
249
A secure cloud storage system combining Time-based One Time Password and Automatic Blocker Protocol
250
A Secure Cloud Storage System from Threshold Encryption
251
A Secure Cloud-Based Payment Model for M-Commerce
252
A Secure Clustering Algorithm for Distributed Data Streams
253
A Secure Clustering in MANET through Direct Trust Evaluation Technique
254
A secure clustering scheme for geographically routed wireless ad hoc networks
255
A Secure Clustering Scheme Protocol for MANET
256
A secure collaborative e-diagnostics framework for semiconductor factories
257
A Secure Collaborative Machine Learning Framework Based on Data Locality
258
A secure collaborative multimedia learning scheme in cultural environments
259
A secure collaborative web based environment for virtual organizations
260
A Secure Collusion-Aware and Probability-Aware Range Query Processing in Tiered Sensor Networks
261
A Secure Communication Approach for Mobile Intelligent Terminal
262
A Secure Communication Architecture for Distributed Microgrid Control
263
A secure communication architecture for GSM networks
264
A secure communication framework for large-scale unmanned aircraft systems
265
A secure communication framework for large-scale unmanned aircraft systems
266
A Secure Communication Game With a Relay Helping the Eavesdropper
267
A secure communication game with a relay helping the eavesdropper
268
A secure communication model of solving anycast scalability in IPv6
269
A Secure Communication over Wireless Environments by Using a Data Connection Core
270
A secure communication platform based on Gemstone
271
A secure communication protocol for ad-hoc wireless sensor networks
272
A Secure Communication Protocol for EPCglobal Class 1 Generation 2 RFID Systems
273
A secure communication protocol for externally controlled implantable devices
274
A Secure Communication Protocol for Low-Cost RFID System
275
A secure communication scheme based on cellular neural network
276
A secure communication scheme based on symbolic dynamics
277
A secure communication scheme using chaotic system array
278
A secure communication suite for cluster-based Underwater Surveillance Networks
279
A secure communication system for classified documents over public network
280
A secure communication system using function projective lag synchronization in coupled hyper-chaotic lorenz systems
281
A Secure Communication System Using Projective-Lag Synchronization of Multidelay Mackey-Glass Systems
282
A Secure Communication System with Multiple Encryption Algorithms
283
A secure communications and status reporting protocol for implanted devices
284
A secure communications infrastructure for high-performance distributed computing
285
A Secure Comparison Technique for Tree Structured Data
286
A secure composition framework for trustworthy personal information assistants
287
A secure composition scheme for home networked appliances in P2P networks
288
A Secure Concurrency Control for MLS/DDBSs
289
A secure conditional access system using digital signature and encryption
290
A secure conference scheme for mobile communications
291
A Secure Confidential Document Model and Its Application
292
A Secure Conjunctive Keywords Search over Encrypted Cloud Data Against Inclusion-Relation Attack
293
A Secure Content Distribution Based on Chaotic Desynchronization
294
A Secure Content-Based Publish/Subscribe Middleware
295
A secure context distribution framework for peer-based pervasive systems
296
A secure context transfer scheme for integration of UMTS and 802.11 WLANs
297
A secure control protocol for USB mass storage devices
298
A secure cookie protocol
299
A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET
300
A secure cooperative relay transmission using chaos MIMO scheme
301
A Secure Cooperative Spectrum Sensing Strategy for Distributed Cognitive Radio Networks
302
A secure coprocessor for database applications
303
A secure covert communication model based on video steganography
304
A Secure Credit-Based Incentive Scheme for Opportunistic Networks
305
A secure cross-platform mobile IM system for enterprise applications
306
A secure cryptographic scheme for audio signals
307
A Secure Cryptographic Token Interface
308
A secure data access control method using AES for P2P storage cloud
309
A secure data access model for the Mauritian healthcare service
310
A Secure Data Aggregation Algorithm Based on Behavior Trust in Wireless Sensor Networks
311
A Secure Data Aggregation and Dispatch Scheme for Home Area Networks in Smart Grid
312
A Secure Data Aggregation Approach Based on Monitoring in Wireless Sensor Networks
313
A Secure Data Aggregation Based Trust Management Approach for Dealing with Untrustworthy Motes in Sensor Network
314
A secure data aggregation protocol for outlier detection in wireless sensor networks using aggregate Message Authentication Code
315
A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks
316
A secure data deduplication framework for cloud environments
317
A secure data forwarding in cloud storage
318
A Secure Data Fusion Algorithm Based on Behavior Trust in Wireless Sensor Networks
319
A secure data hiding scheme for binary images
320
A secure data hiding scheme for two-color images
321
A secure data hiding technique with heterogeneous data-combining capability for electronic patient records
322
A Secure Data Management Model for Cultural Organizations
323
A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher
324
A secure data security infrastructure for small organization in cloud computing
325
A Secure Data Self-Destructing Scheme in Cloud Computing
326
A secure data transfer mechanism using single-handed re-encryption technique
327
A secure data transmission scheme for 1149.1 backplane test bus
328
A Secure Data Transmission Scheme for Mobile Ad Hoc Networks
329
A secure data transmission scheme for wireless sensor networks based on digital watermarking
330
A secure database encryption scheme
331
A secure database for human specimen repositories
332
A secure decentralized data-centric information infrastructure for smart grid
333
A Secure Decentralized Erasure Code for Distributed Networked Storage
334
A Secure Deployment Framework of NEMO (Network Mobility)with Firewall Traversal and AAA Server
335
A secure DES implementation for real-time embedded applications
336
A secure design-for-test infrastructure for lifetime security of SoCs
337
A Secure DHT Routing Scheme in P2P Networks
338
A secure DHT-based key distribution system for attribute-based encryption and decryption
339
A Secure Digital Command Link
340
A Secure Digital Content Delivery System Based on Partially Reconfigurable Hardware
341
A Secure Digital Watermarking Scheme for MPEG-2 Video Copyright Protection
342
A secure directed diffusion routing protocol for wireless sensor networks
343
A secure directory service based on exclusive encryption
344
A secure distributed consensus scheme for wireless sensor networks against data falsification
345
A Secure Distributed File System Based on Revised Blakley´s Secret Sharing Scheme
346
A Secure Distributed File System for Medical Image Archiving
347
A secure distributed key management scheme for ad hoc network
348
A Secure Distributed Location Service Scheme for Mobile Ad Hoc Networks
349
A secure distributed operating system
350
A secure distributed search system
351
A Secure Distributed Transport Protocol for Wireless Sensor Networks
352
A secure distribution method for digitized image scan using a two-step wavelet-based technique: A Telemedicine Case
353
A secure docking module for providing trust in crisis management incidents
354
A Secure Document Self-Destruction Scheme with Identity Based Encryption
355
A Secure Document Self-Destruction Scheme: An ABE Approach
356
A secure domain name system based on intrusion tolerance
357
A Secure DSDV Routing Protocol for Ad Hoc Mobile Networks
358
A Secure DSR Protocol Based on the Request Sequence-Number
359
A Secure DVB Set-Top Box via Trusting Computing Technologies
360
A secure dynamic cryptographic and encryption protocol for wireless networks
361
A secure dynamic data aggregation system for citizen safety in emergency response scenarios
362
A Secure E-Election System
363
A secure e-exam management system
364
A secure e-Government´s e-voting system
365
A secure electronic contract management and process system automated with predefined tasks
366
A secure electronic diary and data collection tool
367
A secure electronic examination protocol using wireless networks
368
A secure electronic market for anonymous transferable emission permits
369
A secure electronic medical record sharing mechanism in the cloud computing platform
370
A secure electronic payment protocol based on bank account
371
A secure electronic voting protocol with IC cards
372
A secure elliptic curve communication scheme for the cluster-based ad hoc networks
373
A secure Elliptic Curve Digital Signature scheme for embedded devices
374
A Secure Email Encryption Proxy Based on Identity-Based Cryptography
375
A secure Email gateway (building an RCAS external interface)
376
A Secure Email System Based on Fingerprint Authentication Scheme
377
A Secure Encryption Protocol for Ad Hoc Networks
378
A Secure End-to-End Mobile Chat Scheme
379
A secure end-to-end protocol for conference mobile call
380
A secure energy routing mechanism for sharing renewable energy in smart microgrid
381
A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
382
A secure E-tendering system
383
A secure e-transaction model for e-commerce
384
A Secure Event Agreement (SEA) protocol for peer-to-peer games
385
A Secure e-Voting Architecture
386
A Secure E-Voting System Based on List Signature for Large Scale
387
A Secure E-Voting System Based on RSA Time-Lock Puzzle Mechanism
388
A secure examination management system on Internet
389
A secure examination system with multi-mode input on the World-Wide Web
390
A secure extensible container for hybrid mobile applications
391
A Secure Face Recognition Algorithm Based on Adaptive Non-uniform Quantization
392
A secure face recognition scheme using noisy images based on kernel sparse representation
393
A secure face recognition system
394
A secure face verification system based on robust hashing and cryptography
395
A secure fast 2D — Discrete fractional fourier transform based medical image compression using hybrid encoding technique
396
A secure fast handoff scheme with attribute-based access control for secure enterprise WLAN
397
A secure fault-tolerant conference-key agreement protocol
398
A secure field programmable gate array based System-on-Chip for Telemedicine application
399
A Secure File Allocation Algorithm for Heterogeneous Distributed Systems
400
A Secure Fine-Grained Access Control Mechanism for Networked Storage Systems
401
A secure fingerprint template generation algorithm for smart card
402
A secure flash card solution for remote access for mobile workforce
403
A secure Fragile Watermarking algorithm based on fractal compression and differentials record theory
404
A Secure fragile Watermarking Algorithm for medical Image Authentication in the DCT Domain
405
A Secure Fragile Watermarking Scheme for Image Authentication
406
A Secure Framework for Business Process Execution
407
A Secure Framework for Communications in Heterogeneous Networks
408
A Secure Framework for Distributed Agents System
409
A Secure Framework for Monitoring Operating Systems Using SPEs in Cell/B.E.
410
A Secure Framework for Protecting Customer Collaboration in Intelligent Power Grids
411
A secure framework for web service interaction
412
A secure framework in brokerage of heterogeneous cloud environment for multiple cloud providers
413
A secure frequency hopping synthesizer for reconfigurable wireless radios
414
A Secure Gateway Service for Accessing Networked Appliances
415
A secure generator distance phase backup protection setting for enhancing generator overexcitation thermal capability during system disturbances
416
A secure geographical routing protocol for highly-dynamic aeronautical networks
417
A Secure Group Agreement (SGA) Protocol for Peer-to-Peer Applications
418
A Secure Group Collaboration Protocol for Nonverbal Human Social Signals Featuring Deception Detection
419
A Secure Group Communication Framework in Private Personal Area Networks (P-PANs)
420
A secure group communication using non-interactive key computation in multiparty key agreement
421
A secure group key agreement scheme for mobile ad hoc networks based on identity tree
422
A secure group key management framework: design and rekey issues
423
A Secure Group Key Management Scheme for Sensor Networks
424
A Secure Group Key Management Scheme for Wireless Cellular Networks
425
A secure group key management scheme in ad hoc networks
426
A secure group management scheme for mobile ad hoc networks
427
A secure group membership protocol
428
A secure group membership protocol
429
A secure group membership verification protocol for IP multicast
430
A secure group solution for multi-agent ec system
431
A secure GSM-based electronic Murabaha transaction
432
A secure handshake scheme for mobile-hierarchy city intelligent transportation system
433
A secure handshake scheme with pre-negotiation for mobile-hierarchy city intelligent transportation system under semi-honest model
434
A secure hardware module and system concept for local and remote industrial embedded system identification
435
A Secure Hierarchical Fragile Watermarking Method with Tamper Localization
436
A Secure Hierarchical Identify Authentication Scheme in Mobile IPv6 Networks
437
A Secure Hierarchical Routing Protocol for Wireless Sensor Networks
438
A Secure High-Speed Identification Scheme for RFID Using Bloom Filters
439
A secure high-speed retrodirective communication link
440
A Secure Hybrid Cloud Enabled architecture for Internet of Things
441
A secure hybrid Intra/Wyner-Ziv video coding for surveillance
442
A Secure Hybrid Reputation Management System for Super-Peer Networks
443
A Secure Hypercube based Team Multicast Routing Protocois (S-HTMRP)
444
A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow
445
A secure ID-based strong designated verifier signature scheme
446
A secure identification access control scheme for accessing healthcare information systems
447
A secure identity-based capability system
448
A Secure IEC-61850 Toolkit for Utility Automation
449
A secure image authentication algorithm with pixel-level tamper localization
450
A Secure Image Based Watermark for 3D Images
451
A secure image coding scheme using residue number system
452
A secure image retrieval method based on homomorphic encryption for cloud computing
453
A secure image steganography technique using Integer Wavelet Transform
454
A secure image steganography technique with moderately higher significant bit embedding
455
A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images
456
A secure image transmission scheme based on digital watermark and cryptography
457
A Secure Implementation of White-Box AES
458
A Secure Improved Multi-signature Scheme
459
A secure improvement on the user-friendly remote authentication scheme with no time concurrency mechanism
460
A secure incentive scheme for delay tolerant networks
461
A secure information flow architecture for public web service
462
A Secure Information Flow Architecture for Web Service Platforms
463
A Secure Information Flow Architecture for Web Services
464
A Secure Information Transmission Scheme With a Secret Key Based on Polar Coding
465
A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations
466
A secure integrated routing and localization scheme for broadband mission critical networks
467
A secure interaction among nodes from different MANET groups using 4G technologies
468
A secure interconnection model for IPv6 enabled wireless sensor networks
469
A Secure Inter-Domain Routing Protocol
470
A secure intersection-based routing protocol for data collection in urban vehicular networks
471
A secure intrusion detection system for MANETs
472
A Secure Intrusion Detection System with Authentication in Mobile Ad hoc Network
473
A secure isolation of software activities in tiny scale systems
474
A secure joint wavelet based steganography and secret sharing method
475
A Secure JXTA-Overlay Platform for Robot Control
476
A secure kernelized architecture for multilevel object-oriented databases
477
A secure key establishment protocol for zigbee wireless sensor networks
478
A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications
479
A Secure Key Management Model for Wireless Mesh Networks
480
A secure key management protocol for wireless sensor networks
481
A Secure Key Management Scheme for P2P Networks
482
A Secure Key Management Scheme for Wireless and Mobile Ad Hoc Networks Using Frequency-Based Approach: Proof and Correctness
483
A Secure Key Management Scheme in Wireless Mesh Networks
484
A secure key management system in group structured mobile ad hoc networks
485
A secure key pre-distribution scheme for wireless sensor networks
486
A secure key registration system based on proactive secret-sharing scheme
487
A secure kiosk centric mobile payment protocol using symmetric key techniques
488
A Secure Lightweight Approach of Node Membership Verification in Dense HDSN
489
A Secure Lightweight Architecture for Wireless Sensor Networks
490
A secure lightweight protocol for NFC communications with mutual authentication based on limited-use of session keys
491
A secure lightweight upload protocol for single-use RFID
492
A secure logging scheme for Forensic Computing
493
A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images
494
A secure LSB ±k steganography based on SFLA
495
A secure LSB steganography system defeating sample pair analysis based on chaos system and dynamic compensation
496
A secure M+1st price auction scheme based on RSAP
497
A secure MAC protocol for Cognitive Radio Networks (SMCRN)
498
A secure MANET routing protocol for first responders
499
A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes
500
A secure m-commerce model based on wireless local area network
501
A secure mechanism for network authentication combining hand shapes verification and encryption
502
A secure mechanism for networked control systems based on TrueTime
503
A Secure Mechanism for QoS Routing in Mobile Ad Hoc Networks with QoS Requirements Consideration
504
A secure mechanism for QoS routing in wireless sensor networks
505
A secure media sharing using encoded integrated dynamic steganography approach
506
A secure message authentication scheme for VANET using ECDSA
507
A secure message delivery scheme with path tracking for delay tolerant networks
508
A secure message service using the secure domain of a mobile security solution
509
A Secure Method against Frequency Attack for Pattern Query on Encrypted String Data
510
A secure method for transferring active packet using digital signature schemes
511
A secure method on a routing protocol for ad hoc networks
512
A secure miniaturized wireless sensor node for a smart home demonstrator
513
A secure minimalist RFID authentication and an ownership transfer protocol compliant to EPC C1G2
514
A Secure Mobile Agent Protocol for M-commerce Using Self-Certified Proxy Signcryption
515
A secure mobile agent protocol for vehicular communication systems
516
A secure mobile agent system model based on extended elementary object system
517
A Secure Mobile Agents Platform Based on a Peer-to-Peer Infrastructure
518
A secure mobile communication approach based on information hiding
519
A secure mobile electronic payment architecture platform for wireless mobile networks
520
A Secure Mobile Framework for m-Services
521
A Secure Mobile Healthcare System based on Surrogate Host
522
A secure mobile healthcare system using trust-based multicast scheme
523
A secure mobile IP authentication based on identification protocol
524
A secure mobile IP implementation for windows-based wireless LAN stations using special network drivers
525
A secure mobile multimedia content sharing service (SMM-CSS)
526
A secure mobile payment system using QR code
527
A secure mobile RFID architecture for the Internet of Things
528
A Secure Mobile Shopping System Based on Credit Card Transaction
529
A secure mobile system to interchange electronic medical records in HL7
530
A secure mobile track and trace system for anti-counterfeiting
531
A secure mobile-IPv6 network model
532
A Secure Model for Electronic Contract Enactment, Monitoring and Management
533
A secure model for network-attached storage on the grid
534
A secure model in agent-based marketplace
535
A secure modular exponential algorithm resists to power, timing, C safe error and M safe error attacks
536
A secure monitoring and control system for Wireless Sensor Networks
537
A Secure m-Payment Protocol for Mobile Devices
538
A Secure Multi Authority Electronic Voting Protocol Based on Blind Signature
539
A Secure Multi-Application Platform for Vehicle Telematics
540
A Secure Multicast Model for Peer-to-Peer and Access Networks Using the Host Identity Protocol
541
A secure multicast scheme for anti-collusion fingerprinted video
542
A Secure Multicast Scheme for Wireless Sensor Networks
543
A secure multicast support framework for Mobile IP
544
A Secure Multicoupon Solution for Multi-merchant Scenarios
545
A secure multi-hop routing for IoT communication
546
A secure multi-hops routing for VANETs
547
A Secure Multiparty Computation Solution to Healthcare Frauds and Abuses
548
A Secure Multi-party Computing Model Based on Trusted Computing Platform
549
A secure multiparty micropayment protocol for internet access over WLAN wireless mesh networks
550
A Secure Multi-Party Protocol for Sharing Valuable Information in Public Safety Networks
551
A Secure Multiple-Access Scheme for Rechargeable Wireless Sensors in the Presence of an Eavesdropper
552
A secure multiple-agent cryptographic key recovery system
553
A secure multi-round electronic auction scheme
554
A secure multi-tier authentication scheme in cloud computing environment
555
A Secure Mutual Authentication Protocol for Cloud Computing Using Secret Sharing and Steganography
556
A secure NCPR for reducing routing overhead in MANET
557
A secure negotiable on-demand services model for cloud environment
558
A secure network access protocol (SNAP)
559
A Secure Network Admission and Routing Model Based on Trust Theory
560
A secure network coverage protocol of WSNs
561
A secure NFC application for credit transfer among mobile phones
562
A Secure Node Localization Method Based on the Congruity of Time in Wireless Sensor Networks
563
A secure non-blind block based digital image watermarking technique using DWT and DCT
564
A Secure Northbound Interface for SDN Applications
565
A secure novel sensor fusion architecture for nuclear applications
566
A secure OFDM transmission scheme based on chaos mapping
567
A Secure Off-Line Electronic Cash Scheme Based on ECDLP
568
A Secure One-Way Hash Function Built from DES
569
A secure OTP algorithm using a smartphone application
570
A Secure P2P Video Conference System
571
A secure path determination method for statistical en-route filtering based wireless sensor network
572
A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks
573
A secure payment system for electronic commerce
574
A secure peer-to-peer web framework
575
A secure personal identification system based on human retina
576
A secure PLAN
577
A secure PLAN (extended version)
578
A secure platform for peer-to-peer computing in the Internet
579
A secure PMS based on Fingerprint Authentication and Blowfish cryptographic algorithm
580
A Secure Position-Based Protocol Framework for Multi-hop Ad-Hoc Networks
581
A Secure Printing System for Ubiquitous Network
582
A secure private instant messenger
583
A secure private network file system with minimal system administration
584
A Secure Programming Paradigm for Network Virtualization
585
A secure protocol for computing dot-products in clustered and distributed environments
586
A Secure Protocol for Determining the Meeting Points of Two Intersected Circles
587
A secure protocol for public key exchange
588
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
589
A Secure Protocol for Traffic Police Mobile Communication System
590
A Secure Protocol of Reverse Discriminatory Auction with Bid Privacy
591
A secure protocol using 6DP for quantum authentication and hash functions for key distribution (KDP-6DP)
592
A Secure Proxy Blind Signature Scheme Based on DLP
593
A Secure Proxy Blind Signature Scheme Based on ECDLP
594
A secure proxy signature protocol for agent-based M-commerce applications
595
A Secure Proxy Signature Scheme in Bilinear Group
596
A Secure Proxy Verifiably Encrypted Signature Scheme
597
A Secure Proxy-Based Cross-Domain Communication for Web Mashups
598
A secure public cloud storage system
599
A Secure Public Key Encryption from Computational Linear Diffe-Hellman Problem
600
A secure public wireless LAN access technique that supports walk-up users
601
A secure publishing scheme in e-Government
602
A secure QoS proposal for vehicular networks
603
A Secure QoS Routing Algorithm Based on ACO for Wireless Sensor Network
604
A Secure Quantization-Based Watermarking Scheme Using An Improved Statistical Model in the Wavelet Domain
605
A secure query method for EPCGlobal networks
606
A Secure Radio Environment Map Database to Share Spectrum
607
A secure RBAC mobile agent access control model for healthcare institutions
608
A Secure Recognition Based Graphical Password by Watermarking
609
A secure recommendation-based reputation system for node incentive cooperation
610
A Secure Reconfigurable Crypto IC With Countermeasures Against SPA, DPA, and EMA
611
A Secure Reed–Solomon Code Incentive Scheme for Commercial Ad Dissemination Over VANETs
612
A secure regenerating code for the fault-tolerant of distributed networked storage
613
A secure registration protocol for wireless Internet
614
A Secure Remote User Authentication Scheme
615
A secure remote user mutual authentication scheme using smart cards
616
A Secure Reputation System Based SMC
617
A Secure Resource and Job scheduling model with Job Grouping strategy in Grid computing
618
A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming
619
A secure revocable personal health record system with policy-based fine-grained access control
620
A Secure RFID Authentication Protocol with Low Communication Cost
621
A Secure RFID Authentication Scheme for Medicine Applications
622
A Secure RFID Deactivation/Activation Mechanism for Customer Service and Consumer Shopping
623
A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard
624
A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy
625
A secure RFID-based track and trace solution in supply chains
626
A Secure Ring Signcryption Scheme for Private and Anonymous Communication
627
A Secure Roaming Payment Protocol in Mobile Commerce
628
A secure role-based service discovery technique for emergency intervention operations
629
A secure routing algorithm in wireless sensor networks
630
A secure routing algorithm with additional cognitive information scalable features for the design approach of the tactical frequency hopping radios Ad-hoc networks (TAFHNET)
631
A Secure Routing and Aggregation Protocol with Low Energy Cost for Sensor Networks
632
A Secure Routing Mechanism against Wormhole Attack in IPv6-Based Wireless Sensor Networks
633
A secure routing mechanism in AODV for Ad Hoc networks
634
A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments
635
A secure routing protocol for ad hoc networks
636
A secure routing protocol for ad hoc networks based on trust
637
A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management
638
A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using ID-Based Digital Signature
639
A Secure Routing Protocol for Clustered Sensor Networks
640
A Secure Routing Protocol for Mobile Ad hoc Networks
641
A secure routing protocol for mobile ad-hoc networks
642
A secure routing protocol for Vehicular Ad Hoc Network to provide ITS services
643
A Secure Routing Protocol for Wireless Ad Hoc Networks
644
A Secure Routing Protocol for Wireless Embedded Networks
645
A secure routing protocol for wireless sensor networks with consideration of energy efficiency
646
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
647
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks
648
A secure routing protocol with limited key distribution and double message hashing
649
A Secure Routing Protocol with Malicious Nodes Detecting and Diagnosing Mechanism for Wireless Sensor Networks
650
A Secure Routing Scheme Based on Multi-Objective Optimization in Wireless Sensor Networks
651
A Secure Routing Scheme Based on Multiple Criteria Decision Making in Wireless Sensor Networks
652
A Secure Routing Scheme for DSR
653
A Secure Routing Scheme for Static Wireless Sensor Networks
654
A secure routing scheme in MANET with CRT based secret sharing
655
A secure Scan Design Methodology
656
A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks
657
A secure scheme based on three-dimension location for wireless sensor networks
658
A secure scheme for a smart house based on Cloud of Things (CoT)
659
A Secure Scheme for Data Statistics
660
A Secure Scheme for Image Transformation
661
A secure scheme for medical image transmission
662
A secure scheme for power exhausting attacks in wireless sensor networks
663
A Secure Scheme of Continuity Based on Two-Dimensional Backward Hash Key Chains for Sensor Networks
664
A Secure Seamless Handover Authentication Technique for Wireless LAN
665
A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags
666
A Secure Secondary Backup Storage with an Isolated Authentication
667
A secure self-certification mechanism of RFID
668
A Secure Self-Destructing Scheme for Electronic Data
669
A Secure Self-Organizing Sensor Network
670
A secure self-reconfiguring architecture based on open-source hardware
671
A secure semantic transmission method for digital image based on UCL
672
A Secure Semi-Fragile JPEG Image Authentication Scheme Based on Discrete Cosine Transform
673
A secure server-paid hot spot Wi-Fi Internet service method
674
A secure service discovery protocol for MANET
675
A Secure Service-Oriented Routing Algorithm for Heterogeneous Wireless Mesh Networks
676
A Secure Shared Group Model of Cloud Storage
677
A Secure Single Sign-On Mechanism for Distributed Computer Networks
678
A Secure Smart-Card-based Password Authenticated Key Agreement Scheme in Multi-server Environments
679
A Secure Smart-Metering Protocol Over Power-Line Communication
680
A secure SMS protocol for implementing digital cash system
681
A Secure Social-Aware Incentive Scheme for Delay Tolerant Networks
682
A Secure Software Architecture for Mobile Computing
683
A Secure Software Download Framework Based on Mobile Trusted Computing
684
A secure software framework for Measuring Instruments in legal metrology
685
A secure software implementation of nonlinear AES S-box with the enhancement of biometrics
686
A Secure Solution for Ubiquitous Multimedia Broadcasting
687
A Secure Solution for USB Flash Drives Using FAT File System Structure
688
A secure space-time code for asynchronous cooperative communication systems with untrusted relays
689
A secure spreader/Despreader for code division multiple access applications
690
A secure SSM architecture
691
A secure SSO protocol without clock synchronization
692
A secure standby route mechanism for Ad Hoc networks
693
A Secure Steganographic Algorithm Based on Cellular Automata Using Fibonacci Representation
694
A Secure Steganographic Technique for Blind Steganalysis Resistance
695
A secure steganography scheme based on (N,t) threshold
696
A Secure Steganography: Noisy Region Embedding
697
A Secure Storage Service for the gLite Middleware
698
A Secure Storage Service in the Hybrid Cloud
699
A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum Mechanisms
700
A secure stream multicasting architecture for 4K motion picture
701
A secure strong password authentication protocol
702
A Secure Supply-Chain RFID System that Respects Your Privacy
703
A secure symmetric image encryption based on linear geometry
704
A Secure Synchronized Reading system over time-critical online contests
705
A Secure System-Wide Process Scheduler across Virtual Machines
706
A secure tag ownership transfer scheme in a closed loop RFID system
707
A Secure Task Delegation Model for Workflows
708
A secure technique for construction and maintenance of a trusted mobile backbone network in MANET
709
A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
710
A Secure Test Wrapper Design Against Internal and Boundary Scan Attacks for Embedded Cores
711
A secure text steganography based on synonym substitution
712
A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service
713
A secure threshold of dynamic programming techniques for track-before-detect
714
A Secure Threshold Proxy Signature Scheme for Mobile Agent-Based Electronic Commerce Transactions
715
A secure threshold secret sharing framework for database outsourcing
716
A Secure Threshold Signature Scheme from Lattices
717
A Secure Time Synchronization Scheme for Heterogeneous Sensor Networks
718
A secure tracking system for GPS-enabled mobile phones
719
A Secure Traffic Control System with Emergency Handling for Ambulances
720
A secure traitor tracing scheme against key exposure
721
A secure transaction environment for workflows in distributed systems
722
A secure transmission scheme for textual data with least overhead
723
A secure triple level encryption method using cryptography and steganography
724
A Secure Triple-Key Management Scheme for Wireless Sensor Networks
725
A secure true edge based 4 least significant bits steganography
726
A secure trust and incentive management framework for public-resource based computing utilities
727
A secure trust establishment in wireless sensor networks
728
A secure trust establishment model
729
A Secure Trust Model Based on Trusted Computing
730
A Secure Trust-based Location-Aided Routing for Ad Hoc networks
731
A secure two phase locking protocol
732
A secure two-factor mutual authentication and session key agreement protocol using Elliptic curve cryptography
733
A secure two-party bartering protocol using privacy-preserving interval operations
734
A secure two-party key agreement protocol with key escrow and perfect forward secrecy
735
A secure two-party password-authenticated key exchange protocol
736
A Secure Two-Phase Data Deduplication Scheme
737
A Secure Ubiquitous Computing Approach for Serving Elderly Citizens
738
A secure user authentication method in networked intelligent manufacturing systems
739
A Secure User Interface for Web Applications Running Under an Untrusted Operating System
740
A Secure VANET MAC Protocol for DSRC Applications
741
A secure variant of the Hill Cipher
742
A secure verifiable key agreement protocol for mobile conferencing
743
A Secure Video Deduplication Scheme in Cloud Storage Environments Using H.264 Compression
744
A secure video on demand system
745
A secure video steganography with encryption based on LSB technique
746
A secure virtual data center based on data labeled cloud-agent
747
A Secure Virtual Verification Model for Wireless Sensor Network
748
A Secure Virtualized Logging Scheme for Digital Forensics in Comparison with Kernel Module Approach
749
A secure VLAN construction protocol in wireless ad hoc networks
750
A secure voice communication system based on DSP
751
A secure wake-up scheme for low power wireless sensor nodes
752
A secure watermark embedding approach based on chaotic map for image tamper detection
753
A Secure Watermarking and Tampering Detection Technique on RGB Image Using 2 Level DWT
754
A secure watermarking for JPEG-2000
755
A Secure Watermarking Protocol Designed for Online System
756
A secure way of exchanging the secret keys in advanced metering infrastructure
757
A Secure Web Service for Electricity Prepayment Vending in South Africa: A Case Study and Industry Specification
758
A Secure Web Service-Based Platform for Wireless Sensor Network Management and Interrogation
759
A Secure Web Services Model Based on the Combination of SOAP Registration Info and Token Proxy
760
A Secure Web services-based workflow management system
761
A secure web-based framework for electronic system level design
762
A secure web-based global management system for firewall/VPN devices
763
A Secure Web-Based Watermarking Scheme for Copyright Protection
764
A Secure Webmail System Based on FreeBSD UNIX
765
A secure wide area monitoring system network model using shared key cryptography
766
A secure wireless agent-based testbed
767
A secure wireless architecture to access a virtual electronic patient record
768
A secure wireless communication system by integrating RSA and Diffie-Hellman PKDS in 4G environments and an intelligent protection-key chain with a data connection core
769
A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core
770
A Secure Wireless LAN Access Technique for Home Network
771
A secure wireless LAN system retaining privacy
772
A secure wireless network for roadside surveillance using radio tomographic imaging
773
A secure wireless point of sale system
774
A secure WLAN access sharing system using SNS
775
A secure, configurable and customized multimode Bulk Encryptor
776
A secure, constraint-aware role-based access control interoperation framework
777
A secure, fault-tolerant and progressive image transmission method using embedded shadows
778
A Secure, Flexible Framework for DNS Authentication in IPv6 Autoconfiguration
779
A secure, imperceptible yet perceptually salient, spread spectrum watermark for multimedia
780
A Secure, Intelligent Electric Vehicle Ecosystem for Safe Integration With the Smart Grid
781
A secure, lossless, and compressed Base62 encoding
782
A secure, publisher-centric Web caching infrastructure
783
A secured agent-based framework for data warehouse management
784
A secured alternative path routing protocol against DoS attack
785
A secured approach to protect SIP signaling message
786
A secured authentication protocol which resist password reuse attack
787
A secured chaos encrypted mode-S aircraft identification friend or foe (IFF) system
788
A secured cloud storage technique to improve security in cloud infrastructure
789
A secured cost-effective multi-cloud storage in cloud computing
790
A secured delegation of remote services on IPv6 home networks
791
A secured distributed medical application endowed with image processing facilities
792
A secured distributed OCR system in a pervasive environment with authentication as a service in the Cloud
793
A secured distribution of server loads to clients
794
A Secured Dynamic Cluster-Based Wireless Sensor Network
795
A secured electronic transaction scheme for mobile banking in Bangladesh incorporating digital watermarking
796
A secured energy efficient route-driven ECDH scheme for heterogeneous sensor networks
797
A secured event log storage management system in cloud computing
798
A Secured Five Pixel Pair Differencing Algorithm for Compressed Image Steganography
799
A secured flow label based QoS scheme for the Evolved Packet Core in the Evolved Packet System
800
A secured key issuing protocol for peer-to-peer network
801
A secured key-based digital text passing system through color image pixels
802
A secured load balancing architecture for cloud computing based on multiple clusters
803
A secured metadata and data separation model for cloud storage
804
A secured microcellular network supported by system-VLSI
805
A secured model for Indian e-health system
806
A secured model for trusted communication in network using ZERO INTERACTION AUTHENTICATION
807
A secured scheme for geographical distance computation over encrypted cloud data
808
A secured SDN framework for IoT
809
A secured Transmission of data using 3D chaotic map encryption and data hiding technique
810
A secured trust creation in VANET environment using random password generator
811
A secured video streaming system
812
A securely fair non-repudiation protocol with TTP load lightly
813
A securing access approach to virtual worlds based on 3D mesh watermarking of avatar´s face
814
A Security Adaptation Reference Monitor (SARM) for Highly Dynamic Wireless Environments
815
A security adaptive protocol suite: Ranked Neighbor Discovery (RND) and Security Adaptive AODV (SA-AODV)
816
A security analysis and optimal power flow package with real-time implementation in Northeast China Power System
817
A security analysis for label switching routers
818
A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems
819
A security analysis method for routing protocol in MANET
820
A Security Analysis of a P2P Incentive Mechanisms for Mobile Devices
821
A security analysis of Amazon´s Elastic Compute Cloud service
822
A security analysis of smartphone data flow and feasible solutions for lawful interception
823
A security analysis of the cliques protocols suites
824
A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe
825
A Security Analysis Of The Federal Data Encryption Standard
826
A security analysis of the Internet Chess Club
827
A security analysis of the NTP protocol version 2
828
A security analysis of the OAuth protocol
829
A Security Analysis of Two Commercial Browser and Cloud Based Password Managers
830
A security analysis tool for web application reinforcement against SQL injection attacks (SQLIAs)
831
A Security and Privacy Enhanced Protection Scheme for Secure 900MHz UHF RFID Reader on Mobile Phone
832
A security and privacy model for mobile RFID systems in the internet of things
833
A Security and Privacy Review of VANETs
834
A Security and Privacy Survey for WSN in e-Health Applications
835
A security- and privacy-driven hybrid biometric template protection technique
836
A Security and Safety Framework for Cyber Physical System
837
A security and surveillance application of the innovative Monitoring Underwater Buoy Systems (MUnBuS) on the Protected Marine Area (AMP) of capo gallo (PA-IT)
838
A security and usability perspective of cloud file systems
839
A security and usability proposal for mobile electronic commerce
840
A Security API for Multimodal Multi-biometric Continuous Authentication
841
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
842
A security architecture and mechanism for data confidentiality in TCP/IP protocols
843
A security architecture and modular intrusion detection system for WSNs
844
A security architecture based on immune agents for MANET
845
A Security Architecture Based on User Authentication of Bluetooth
846
A security architecture concept for vehicular network nodes
847
A security architecture for agent-based mobile systems
848
A security architecture for application session handoff
849
A security architecture for BYOD office
850
A security architecture for communication between smart meters and HAN devices
851
A security architecture for data privacy and security
852
A Security Architecture for e-Health Services
853
A security architecture for future active IP networks
854
A Security Architecture for Grid-Based Distributed Simulation Platform
855
A Security Architecture for IEEE 802.11 Wireless Networks in Large-Scale Multinational Corporations
856
A security architecture for information assurance and availability in MANETs
857
A Security Architecture for Intranet Based on Security Area Division
858
A security architecture for mobile agents in Ajanta
859
A Security Architecture for Multihop Mobile Ad hoc Networks With Mobile Agents
860
A security architecture for object-based distributed systems
861
A Security Architecture for Personal Networks
862
A Security Architecture for Personal Networks
863
A Security Architecture for Tactical Mobile Ad Hoc Networks
864
A security architecture for the core part of CS-2
865
A security architecture for the publish/subscribe C-DAX middleware
866
A security architecture for UPT
867
A security architecture for wireless ad hoc networks
868
A Security Architecture for Wireless Mesh Network
869
A Security Architecture for Wireless Sensor Networks Based-On Public Key Cryptography
870
A Security Architecture Model of CSCW System
871
A Security Argument Pattern for Medical Device Assurance Cases
872
A security aspects in cloud computing
873
A security assessment for slow coherency based defensive islanding
874
A security assessment method for Android applications based on permission model
875
A Security Assessment Model for E-Commerce Based on Entropy Weight Coefficient Method
876
A security assistance system combining person tracking with chemical attributes and video event analysis
877
A Security Assurance Framework Combining Formal Verification and Security Functional Testing
878
A Security Authentication System Based on Trusted Platform
879
A security based approach for generating unit scheduling
880
A security based approach to composite power system reliability evaluation
881
A security BLP model used in classified protection system
882
A security blueprint for e-business applications based on the three-tier architecture
883
A Security Bootstrap and Measurements
884
A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network Protocols
885
A security capstone course: An innovative practical approach to distance education
886
A security characterisation framework for trustworthy component based software systems
887
A security concept for OLAP
888
A Security Condition for Multi-Source Linear Network Coding
889
A Security Conscious Service Discovery Framework in Pervasive Computing Environments
890
A security constrained environmental/economic power dispatch technique using F-MSG algorithm for a power system area including limited energy supply thermal units
891
A security context migration framework for Virtual Machine migration
892
A Security Context Transfer Method for Integrated Space Network
893
A Security Control Architecture for SOAP-Based Services
894
A Security Coordination Model for an Inter-Organizational Information Incidents Response Supporting Forensic Process
895
A security coprocessor embedded system-on-chip architecture for smart metering, control and communication in power grid
896
A security credential management system for V2V communications
897
A Security Decision-Reaction Architecture for Heterogeneous Distributed Network
898
A Security Design of Data Exchange Platform
899
A security detection scheme based on evidence nodes in Wireless Sensor Networks
900
A security domain isolation and data exchange system based on VMM
901
A security E-government model based on service-oriented architecture
902
A security embedded system base on TCM and FPGA
903
A Security Enforcement ID-Based Partially Blind Signature Scheme
904
A Security Engineering Capability Maturity Model
905
A Security Engineering Environment Based on ISO/IEC Standards: Providing Standard, Formal, and Consistent Supports for Design, Development, Operation, and Maintenance of Secure Information Systems
906
A Security Engineering Process based on Patterns
907
A security engineering process for systems of systems using security patterns
908
A security enhanced AODV routing protocol based on the credence mechanism
909
A security enhanced authentication and key distribution protocol for wireless networks
910
A Security Enhanced IEEE1588 Protocol for Deep-Space Environment
911
A security enhanced network architecture for future networks
912
A Security Enhanced Remote Password Authentication Scheme Using Smart Card
913
A security enhancement and energy saving clustering scheme in smart grid sensor network
914
A security enhancement approach in quantum cryptography
915
A Security Enhancement Architecture for COTS Operating System
916
A Security Enhancement on a Remote User Authentication Scheme Based on the Rabin Cryptosystem with Secure Password Updating
917
A Security Enhancement Scheme for Image Perceptual Hashing
918
A Security Evaluation Method Based on STRIDE Model for Web Service
919
A security evaluation methodology for smart cards against electromagnetic analysis
920
A security evaluation of a novel resilient web serving architecture: Lessons learned through industry/academia collaboration
921
A Security evaluation of certain stream ciphers which involve randomness and coding
922
A security evaluation of IMS deployments
923
A Security Event Management Framework Using Wavelet and Data-Mining Technique
924
A security extension for securing the feedback & rating values in TIDE framework
925
A security extension for the standard SCP-ECG based on metadata
926
A Security Flaw of a Bilinear-Pairing-Based Electronic Cash Scheme with Trustee-Based Anonymity Revocation
927
A security framework against ARP spoofing
928
A Security Framework for Agent-Based Non-fixed Services Composition
929
A Security Framework for Audit and Manage Information System Security
930
A security framework for brokerless publish subscribe system using identity based signcryption
931
A Security Framework for Cloud-Based Web Crawling System
932
A security framework for Cluster-based Wireless Sensor Networks against the selfishness problem
933
A security framework for cognitive radio IP based cooperative protocols
934
A security framework for collaborative distributed system control at the device-level
935
A security framework for e-Health service authentication and e-Health data transmission
936
A security framework for executables in a ubiquitous computing environment
937
A Security Framework for Hybrid Broadband over Power Line (BPL)/Wireless Networks
938
A Security Framework for Input Validation
939
A security framework for internet of things based on 4G communication
940
A Security Framework for Internet of Things Based on SM2 Cipher Algorithm
941
A Security Framework for JXTA-Overlay
942
A security framework for military application on infrastructure based wireless sensor network
943
A security framework for mobile cloud applications
944
A Security Framework for Mobile Network Based on Security Services and Trusted Terminals
945
A security framework for mobile-to-mobile payment network
946
A security framework for open service mobility using trust delegation
947
A security framework for personal networks
948
A security framework for population-scale genomics analysis
949
A security framework for protecting business, government and society from cyber attacks
950
A Security Framework for Secure Home Networking in Ubiquitous Computing
951
A Security Framework for SenSearch
952
A Security Framework for Service Oriented Architectures
953
A security framework for service overlay networks: Access control
954
A security framework for smart metering with multiple data consumers
955
A Security Framework for Systems of Systems
956
A security framework for the wind farm communication network
957
A security framework for wireless network based on public key infrastructure
958
A security framework for wireless sensor networks
959
A security framework for wireless sensor networks utilizing a unique session key
960
A Security Framework for Wireless Sensor Networks: Theory and Practice
961
A security framework for XML schemas and documents for healthcare
962
A Security Framework in RFID Multi-domain System
963
A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions
964
A Security Framework of Group Location-Based Mobile Applications in Cloud Computing
965
A Security Framework to Protect against Social Networks Services Threats
966
A Security Framework with Strong Non-Repudiation and Privacy in VANETs
967
A security framework with trust management for sensor networks
968
A Security Gateway System for Medical Communication Networks Inter-Hospital Use of the Secure Socket Layer
969
A Security Grid Portal Using PKI and Online Proxy Certificate Repository
970
A Security Guard Robot Which Patrols Map Information
971
A security imbedded authentication protocol
972
A security improved OpenSST prototype combining with smart card
973
A Security Information Transmission Scheme for Internet of Things
974
A security infrastructure for distributed Java applications
975
A Security Kernel for a Multiprocessor Microcomputer
976
A security laboratory for CTF scenarios and teaching IDS
977
A Security Layer for JXTA Core Protocols
978
A security layer for smart card applications authentication
979
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth
980
A Security Log Based Trust Negotiation Model
981
A Security Management Architecture for Supporting Routing Services on WANETs
982
A Security Management Architecture for the Protection of Kernel Virtual Machines
983
A Security Management Assurance Model to Holistically Assess the Information Security Posture
984
A security management for Cloud based applications and services with Diameter-AAA
985
A security management framework for sensor networks
986
A security measure for random load disturbances in nonlinear power system models
987
A Security Mechanism for Automation Control in PLC-based Networks
988
A security mechanism for component-based systems
989
A Security Mechanism for Demand Response Using RBAC and Pub/sub
990
A security mechanism of Smart Grid AMI network through smart device mutual authentication
991
A security mechanism of Web Services-based communication for wind power plants
992
A Security Mechanism of Web Services-Based Communication for Wind Power Plants
993
A security mechanism to increase confidence in m-transactions
994
A Security Meta-model for Service-Oriented Architectures
995
A security method for signal communication
996
A security metric for VANET content delivery
997
A security metrics framework for the Cloud
998
A Security Model and Architecture for Multichannel E-Government Systems
999
A Security Model and its Application to a Distributed Decision Support System for Healthcare
1000
A Security Model Based on Database System
بازگشت