<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Secure card with optically recordable hologram
2
Secure cascade channel synthesis
3
Secure cash withdrawal through mobile phone/device
4
Secure cell relay routing protocol for sensor networks
5
Secure centralised mobile and web-based control system using GPRS with J2ME
6
Secure Certificateless Signature Scheme Supporting Batch Verification
7
Secure certificateless-based authenticated key agreement protocol in the client-server setting
8
Secure Certification for ePortfolios
9
Secure channel establishment in disadvantaged networks : Optimizing TLS using intercepting proxies
10
Secure Channel Service for MANETs
11
Secure channel simulation
12
Secure channels in an integrated MPSoC architecture
13
Secure Chaos Communications Using Driven Traveling Wave Tube Amplifiers with Delayed Feedback
14
Secure chaotic spread-spectrum communication systems
15
Secure Chaotic Transmission on a Free-Space Optics Data Link
16
Secure checkpointing using public key cryptography in mobile computing
17
Secure checkpointing-recovery using trusted nodes in MANET
18
Secure choreography of cooperating Web services
19
Secure cipher index over encrypted character data in database
20
Secure Client-Side ST-DM Watermark Embedding
21
Secure Clocked QCA logic for implementation of Quantum Cryptographic Processors
22
Secure cloud authentication using eIDs
23
Secure Cloud Browser: Model and Architecture to Support Secure WEB Navigation
24
Secure cloud computing architecture on mobile internet
25
Secure cloud computing with brokered trusted sensor networks
26
Secure cloud computing: Benefits, risks and controls
27
Secure Cloud File System with Attribute Based Encryption
28
Secure cloud mining
29
Secure cloud networks for connected & automated vehicles
30
Secure Cloud Services: Matrix Multiplication Revisited
31
Secure cloud storage and search scheme for mobile devices
32
Secure cloud storage for convenient data archive of smart phones
33
Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure
34
Secure cloud storage management method based on Time Stamp Authority
35
Secure cloud storage meets with secure network coding
36
Secure cloud storage model with hidden policy attribute based access control
37
Secure cloud storage of data
38
Secure Cloud Storage Service with an Efficient DOKS Protocol
39
Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment
40
Secure cloud video streaming using tokens
41
Secure cloud WLAN using dynamic placement and migration with a cloud name resolution protocol
42
Secure Cloud-Based Volume Ray-Casting
43
Secure cluster based data aggregation in wireless sensor networks
44
Secure cluster based routing protocol incorporating the distributed PKI mechanisms
45
Secure cluster formation using two-hop conformity check and broadcast communication
46
Secure cluster-based cooperative spectrum sensing against malicious attackers
47
Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks
48
Secure cluster-based SIP service over Ad hoc networks
49
Secure Clustering and Reliable Multi-path Route Discovering in Wireless Sensor Networks
50
Secure clustering based SEP using Virtual ECC Group Key for Wireless Sensor Networks
51
Secure Clustering for Building Certificate Management Nodes in Ad-Hoc Network
52
Secure Clustering in DSN with Key Predistribution and WCDS
53
Secure Clustering in Private Networks
54
Secure Clustering Scheme Based Keys Management in VANETs
55
Secure code assignment to alphabets using modified ant colony optimization along with compression
56
Secure code design for near field communications
57
Secure Code Dissemination and Remote Image Management Using Short-Lived Signatures in WSNs
58
Secure Code Dissemination Using Energy-Efficient Minimal Virtual Backbone in Sensor Networks
59
Secure code distribution
60
Secure code distribution in dynamically programmable wireless sensor networks
61
Secure coding in C and C++ of strings and integers
62
Secure coding in software development
63
Secure coding over networks
64
Secure Coding Over Networks Against Noncooperative Eavesdropping
65
Secure cognitive mobile hotspot
66
Secure Cognitive Networks
67
Secure cognitive radio system with cooperative secondary networks
68
Secure collaboration based on RBAC in decentralized multi-domain environments
69
Secure Collaboration in a Mediator-Free Distributed Environment
70
Secure collaboration in on boarding companies
71
Secure Collaboration Platform: A Case Study in the Biosecurity Domain
72
Secure collaboration technology for healthcare enterprises
73
Secure collaboration using Slepian-Wolf codes
74
Secure Collaborative and Distributed Services in the Java Card Grid Platform
75
Secure collaborative information system for enterprise alliances: a workflow based approach
76
Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing
77
Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks
78
Secure Collaborative Social Networks
79
Secure Collaborative Supply-Chain Management
80
Secure collective defense system
81
Secure Combination of XML Signature Application with Message Aggregation in Multicast Settings
82
Secure comms software aims for the military
83
Secure Commuicating Systems: Design, Analysis, and Implementation [Book Review]
84
Secure Communication among Cell Phones and Sensor Networks
85
Secure Communication and Access Control for Web Services Container
86
Secure Communication and Cooperation via Shared Workspaces
87
Secure communication and routing architecture in wireless sensor networks
88
Secure Communication Based on Ambient Audio
89
Secure communication based on synchronization of a unified chaotic system
90
Secure Communication Based on Synchronization of Unified Chaotic Systems
91
Secure communication based on tracking control of quantum cellular neural network
92
Secure communication between lightweight computing devices over the Internet
93
Secure communication between set-top box and smart card for fair use in DTV broadcasting
94
Secure communication between set-top box and smart card in DTV broadcasting
95
Secure communication between tactical and strategic networks
96
Secure communication by hysteresis based chaotic circuit
97
Secure Communication for a Class of Broadcast Channel with Feedback
98
Secure communication for advance metering infrastructure in smart grid
99
Secure Communication for Cluster Based Wireless Sensor Network
100
Secure Communication for Computational Steering of Grid Jobs
101
Secure Communication for Internet Payment in Heterogeneous Networks
102
Secure communication for massive MIMO uplink in the presence of co-located and distributed eavesdroppers
103
Secure communication for mobile agents in an adversarial environment
104
Secure communication for multipath ad hoc network
105
Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples
106
Secure communication for underwater acoustic sensor networks
107
Secure Communication in 802.11 Networks with a Novel Protocol Using Quantum Cryptography
108
Secure communication in a distributed system using identity based encryption
109
Secure communication in a private network
110
Secure Communication in an Embedded Environment
111
Secure communication in an OFDM-PON system by using frequency hopping
112
Secure communication in an unknown network with Byzantine faults
113
Secure Communication in Asynchronous Noise Phase Shift Keying CDMA Systems
114
Secure communication in cellular networks: The benefits of millimeter wave mobile broadband
115
Secure communication in cognitive radio networks
116
Secure communication in cooperative network with wireless information and power transfer
117
Secure communication in frequency selective channels with fade-avoiding subchannel usage
118
Secure communication in internet environments: a hierarchical key management scheme for end-to-end encryption
119
Secure communication in IP-based wireless sensor networks via a trusted gateway
120
Secure communication in K-user multi-antenna broadcast channel with state feedback
121
Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information
122
Secure communication in multiple relay networks through decode-and-forward strategies
123
Secure Communication in Next Generation Internet
124
Secure communication in PCS
125
Secure Communication in Stochastic Wireless Networks—Part I: Connectivity
126
Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion
127
Secure communication in TDS-OFDM system using constellation rotation and noise insertion
128
Secure Communication in the Low-SNR Regime
129
Secure communication in the low-SNR regime: A Characterization of the energy-secrecy tradeoff
130
Secure communication in wireless multimedia sensor networks using watermarking
131
Secure communication in Wireless Sensor Networks using AES algorithm with delay efficient sleep scheduling
132
Secure communication in Wireless Sensor Networks using hybrid encryption scheme and cooperative diversity technique
133
Secure communication in WMSN
134
Secure communication mechanisms for GSM networks
135
Secure Communication Model of WSN Based on Secret Sharing
136
Secure communication networks based on the public-key cryptosystem in GF(2m)
137
Secure communication of cluster-based ad hoc networks using ID-based cryptography
138
Secure communication of correlated sources over broadcast channels
139
Secure communication of smart metering data in the smart grid secondary substation
140
Secure Communication Over Fading Channels
141
Secure communication over fading channels with statistical QoS constraints
142
Secure communication over MISO cognitive radio channels
143
Secure Communication Over Parallel Relay Channel
144
Secure communication over satellite channel
145
Secure communication over the cellular network
146
Secure communication over Trellis: Graph theoretic approach
147
Secure communication platform for distributed city-wide surveillance systems
148
Secure communication procedure for ISDN
149
Secure communication protocol for wireless sensor networks
150
Secure communication protocol using embedded devices based on FPGA
151
Secure communication scheme for wireless sensor networks to maintain anonymity
152
Secure Communication Scheme of VANET with Privacy Preserving
153
Secure Communication Scheme Using Uncertain Delayed Chaotic System Synchronization Based on Disturbance Observers
154
Secure communication scheme with hyper-chaotic Lorenz-Stenflo system
155
Secure Communication Setup for a P2P-Based JXTA-Overlay Platform
156
Secure communication system for wearable devices wireless intra body communication
157
Secure communication system using chaos via DSP implementation
158
Secure Communication Systems
159
Secure Communication Systems
160
Secure communication systems via Yamakawa´s chaotic chips and Chua´s circuits
161
Secure communication tests carried out with next generation narrow band terminal in satellite and local area networks
162
Secure Communication through Nakagami-m Fading MISO Channel
163
Secure communication through switched-current chaotic circuits
164
Secure Communication Trees in Ad Hoc Networks
165
Secure Communication Under Channel Uncertainty and Adversarial Attacks
166
Secure communication using a chaos based signal encryption scheme
167
Secure communication using a chaos system in a mobile channel
168
Secure communication using a modified chaotic masking scheme employing Sprott94 case a chaotic attractor
169
Secure communication using an untrusted relay via sources and channels
170
Secure communication using chaos
171
Secure communication using chaotic systems and Markovian jump systems
172
Secure communication using Duffing oscillators
173
Secure communication using dynamic VPN provisioning in an Inter-Cloud environment
174
Secure communication using generalized synchronization in the case of the influence of chaotic signal on periodic generators
175
Secure communication using H/sub /spl infin// chaotic synchronization and international data encryption algorithm
176
Secure Communication Using IFS: Almost Sure and Mean Square Stability Approaches
177
Secure communication using memristor based chaotic circuit
178
Secure Communication Using Reed-Muller Codes and Partially Balanced Design in Wireless Sensor Network
179
Secure communication using TPC and chaotic encryption
180
Secure communication using uncoordinated cooperative jamming and transmit beamforming
181
Secure communication via active backstepping control of chaotic systems
182
Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels
183
Secure communication via chaotic parameter modulation
184
Secure Communication via Finite-Time Synchronization between Two Different Chaotic Systems with Uncertainties
185
Secure communication via hybrid method in nonlinear chaotic systems
186
Secure communication via jamming in massive MIMO Rician channels
187
Secure communication via multi-parameter modulation using Chua systems
188
Secure communication via one-dimensional chaotic inverse systems
189
Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis
190
Secure Communication via Shared Knowledge and a Salted Hash in Ad-Hoc Environments
191
Secure communication via synchronized chaotic circuit
192
Secure communication with a Byzantine relay
193
Secure Communication with a Relay Helping the Wire-tapper
194
Secure communication with chaotic systems of difference equations
195
Secure communication with practical two way Quantum Key Distribution protocol and Weak+ Vacuum decoy state
196
Secure communication with privacy preservation in VANET- using multilingual translation
197
Secure communication with secret sharing in static computer networks with partition in mistrust parties
198
Secure communication with side information and constrained encoding
199
Secure Communication without Encryption?
200
Secure communication: A mechanism design approach
201
Secure communications and asymmetric cryptosystems
202
Secure communications and unstable periodic orbits of strange attractors
203
Secure communications based on directly modulated antenna arrays combined with multi-path
204
Secure communications by optical homodyne
205
Secure communications for multiple concurrent jammers and interceptors
206
Secure communications for PACS in a cloud environment
207
Secure communications in ad hoc networks
208
Secure communications in ATM networks
209
Secure communications in local multipoint distribution service (LMDS) networks
210
Secure Communications in the Presence of Pervasive Deceit
211
Secure communications in the smart grid
212
Secure communications interoperability in mixed analog and digital networks
213
Secure communications of cellular users in device-to-device communication underlaying cellular networks
214
Secure communications of chaotic systems with robust performance via fuzzy observer-based design
215
Secure communications on passive optical networks using quantum cryptography
216
Secure communications over a public fiber-optical network
217
Secure communications over hybrid military networks
218
Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization
219
Secure communications processing for distributed languages
220
Secure communications system applying the chaotic carrying [signal]
221
Secure Communications through Rayleigh Fading SIMO Channel with Multiple Eavesdroppers
222
Secure communications through speech dedicated channels using digital modulations
223
Secure communications using chaotic digital encoding
224
Secure communications using chaotic encryption: improved synchronisation algorithm
225
Secure communications using Interference Alignment in MIMO interference channels
226
Secure communications using OFDM with chaotic modulation in the subcarriers
227
Secure communications using the mobile communications (cellular telephony)
228
Secure communications via chaotic synchronization in Chua´s circuit and Bonhoeffer-Van der Pol equation: numerical analysis of the errors of the recovered signal
229
Secure Communications via Cooperating Base Stations
230
Secure Communications via Cooperative Jamming in Two-Hop Relay Systems
231
Secure Communications via Physical-Layer and Information-Theoretic Techniques [Scanning the Issue]
232
Secure communications via sending artificial noise by both transmitter and receiver: optimum power allocation to minimise the insecure region
233
Secure communications with D2D cooperation
234
Secure Communications With Insecure Feedback: Breaking the High-SNR Ceiling
235
Secure Communications with Untrusted Secondary Nodes in Cognitive Radio Networks
236
Secure communications with untrusted secondary users in cognitive radio networks
237
Secure communications: applications and management [Book Review]
238
Secure communications: The infrared alternative
239
Secure comparison of encrypted data in wireless sensor networks
240
Secure Comparison Protocols in the Semi-Honest Model
241
Secure compartmented data access over an untrusted network using a COTS-based architecture
242
Secure Compilation to Modern Processors
243
Secure Component Based Applications through Security Patterns
244
Secure component composition for networked appliances
245
Secure Composite Satellite IP multicast architecture for heterogeneous groups
246
Secure composition of cascaded Web services
247
Secure Composition of ECC-PAKE Protocol for Multilayer Consensus Using Signcryption
248
Secure composition of insecure components
249
Secure composition of systems
250
Secure composition of untrusted code: wrappers and causality types
251
Secure Compressed Domain Watermarking for H.264 Video
252
Secure compressed sensing over finite fields
253
Secure compression of privacy-preserving witnesses in vehicular ad hoc networks
254
Secure Computation for Biometric Data Security—Application to Speaker Verification
255
Secure computation for combinatorial auctions and market exchanges
256
Secure computation for data privacy
257
Secure computation in a bidirectional relay
258
Secure computation of hidden Markov models
259
Secure Computation of Top-K Eigenvectors for Shared Matrices in the Cloud
260
Secure computation offloading based on social trust in mobile networks
261
Secure computations in minimal model using simple ESCT decomposition
262
Secure computations on non-integer values
263
Secure Compute-and-Forward in a Bidirectional Relay
264
Secure Computer Systems: A Retrospective
265
Secure computing
266
Secure computing using cryptographic assurance of execution correctness
267
Secure concurrency control algorithm for multilevel secure databases
268
Secure Configuration of a Field Programmable Gate Array
269
Secure configuration schemes for FPGA-based systems with simple key management
270
Secure confirmation of sensitive transaction data in modern Internet banking services
271
Secure conjunctive keyword searches for unstructured text
272
Secure connected scalable combinatorial KPS in WSN: Deterministic merging, localization
273
Secure Connection Re-establishment for Session-Based IP Mobility
274
Secure connections in Bluetooth scatternets
275
Secure Connectivity for Intra-cloud and Inter-cloud Communication
276
Secure connectivity model in Wireless Sensor Networks (WSN) using first order Reed-Muller codes
277
Secure connectivity through key predistribution with directional antennas to cope with jamming in sensor networks
278
Secure Connectivity Using Randomize-and-Forward Strategy in Cooperative Wireless Networks
279
Secure consensus averaging for secure information fusion in sensor networks
280
Secure consensus averaging in sensor networks using random offsets
281
Secure consolidation of charging information over Smart Grid using ID federation
282
Secure Constructing Bluetooth Scatternet Based on BTCP
283
Secure Construction for Nonlinear Function Threshold Ramp Secret Sharing
284
Secure contactless smartcard ASIC with DPA protection
285
Secure contactless smartcard ASIC with DPA protection
286
Secure Content Based Routing in Tactical Mobile Ad Hoc Networks
287
Secure Content Centric Mobile Network
288
Secure content delivery using key composition
289
Secure Content Distribution System Based on Run-Time Partial Hardware Reconfiguration
290
Secure content distribution to mobile users
291
Secure content sharing using third party with broadcast encryption for stateless receivers
292
Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves
293
Secure Content Validation
294
Secure Context Switch for Private Computing on Public Platforms
295
Secure contexts for confidential data
296
Secure Context-Sensitive Authorization
297
Secure continuity for sensor networks
298
Secure continuous aggregation and load balancing with false temporal pattern identification for wireless sensor networks
299
Secure Continuous Aggregation in Wireless Sensor Networks
300
Secure continuous aggregation via sampling-based verification in wireless sensor networks
301
Secure control against replay attacks
302
Secure control applications in building automation using domain knowledge
303
Secure Control of Instruments via the Internet
304
Secure control protocol for universal serial bus mass storage devices
305
Secure Control Systems: A Quantitative Risk Management Approach
306
Secure Control: Towards Survivable Cyber-Physical Systems
307
Secure controllers: Requirements of S*FSM
308
Secure cookies on the Web
309
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
310
Secure Cooperation Incentive Scheme with Limited Use of Public Key Cryptography for Multi-Hop Wireless Network
311
Secure cooperative ad hoc applications within UAV fleets position paper
312
Secure cooperative channel establishment in wireless sensor networks
313
Secure Cooperative Communication with Nth Best Relay Selection
314
Secure Cooperative Data Downloading in Vehicular Ad Hoc Networks
315
Secure Cooperative Data Storage and Query Processing in Unattended Tiered Sensor Networks
316
Secure cooperative MIMO communications under active compromised nodes
317
Secure cooperative mobile ad hoc networks against injecting traffic attacks
318
Secure cooperative multi-channel spectrum sensing in cognitive radio networks
319
Secure Cooperative Regenerating Codes for Distributed Storage Systems
320
Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation
321
Secure Cooperative Sensing Techniques for Cognitive Radio Systems
322
Secure cooperative spectrum sensing and access against intelligent malicious behaviors
323
Secure cooperative spectrum sensing based on energy efficiency under SSDF attack
324
Secure cooperative spectrum sensing based on Sybil-resilient clustering
325
Secure cooperative spectrum sensing for Cognitive Radio networks
326
Secure cooperative spectrum sensing in cognitive radio networks using interference signatures
327
Secure Cooperative Spectrum Trading in Cognitive Radio Networks: A Reversed Stackelberg Approach
328
Secure coordination with a two-sided helper
329
Secure Copyright Protection of Digital Images Using Nonnegative Matrix Factorization
330
Secure cordless terminal mobility. A challenge for manufacturers and providers
331
Secure Co-resident virtualization in multicore systems by VM pinning and page coloring
332
Secure countermeasures to data aggregation attacks on sensor networks
333
Secure Coverage Control in Wireless Sensor Networks with Malicious Nodes Using Multi-agents
334
Secure crash reporting in vehicular Ad hoc networks
335
Secure cross-cloud single sign-on (SSO) using eIDs
336
Secure cross-domain positioning architecture for autonomic systems
337
Secure cross-platform hybrid mobile enterprise voice agent
338
Secure crowdsourcing-based cooperative pectrum sensing
339
Secure crypto-biometric system for cloud computing
340
Secure Cryptography Testbed Implementation for SCADA Protocols Security
341
Secure cryptosystem from palm vein biometrics in smart card
342
Secure Cyberspace: Answering the Call for Intelligent Action
343
Secure D flip-flop against side channel attacks
344
Secure D2D communication in large-scale cognitive cellular networks with wireless power transfer
345
Secure data access control for multi-authority Quantum based cloud storage
346
Secure data access in cloud computing
347
Secure data aggregation and collaboration in wireless sensor networks
348
Secure data aggregation and intrusion detection in wireless sensor networks
349
Secure data aggregation and source-channel coding with MIT code for wireless sensor networks
350
Secure Data Aggregation Based on Interval Analysis for Wireless Sensor Networks
351
Secure data aggregation for sensor networks
352
Secure data aggregation in wireless Multimedia Sensor Networks via watermarking
353
Secure data aggregation in wireless sensor networks
354
Secure Data Aggregation in Wireless Sensor Networks
355
Secure data aggregation in wireless sensor networks
356
Secure data aggregation in wireless sensor networks using randomized dispersive routes
357
Secure Data Aggregation in Wireless Sensor Networks: A Survey
358
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker´s Impact
359
Secure Data Aggregation Model (SDAM) in Wireless Sensor Networks
360
Secure data aggregation scheme based on key vector sharing in Wireless Sensor Network
361
Secure Data Aggregation Scheme for Clustered Wireless Sensor Networks
362
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
363
Secure Data Aggregation through Proactive Defense
364
Secure data aggregation using commitment schemes and quasi commutative functions
365
Secure data aggregation using irreversible watermarking in WSNs
366
Secure data aggregation with fault tolerance for Wireless Sensor Networks
367
Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks
368
Secure data aggregation without persistent cryptographic operations in wireless sensor networks
369
Secure Data and Voice Transmission over GSM Voice Channel: Applications for Secure Communications
370
Secure data collection in clustered WSNs using digital signature
371
Secure data collection in constrained tree-based Smart Grid environments
372
Secure data collection in Sensor Networks using tree based key management scheme and secret sharing
373
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
374
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
375
Secure Data Collection Scheme in Wireless Sensor Network with Mobile Sink
376
Secure data collection using mobile data collector in clustered wireless sensor networks
377
Secure data communication and cryptography based on DNA based message encoding
378
Secure data communication for line differential relays
379
Secure data communication in a cloud environment using Row Column Diagonal (RCD)
380
Secure data communication in local area networks
381
Secure data communication in mobile ad hoc networks
382
Secure data communication protocols in bidirectional star network
383
Secure data communication through GSM Adaptive Multi Rate voice channel
384
Secure data communication using blind source separation
385
Secure Data Communication Using Protocol Steganography in IPv6
386
Secure data compression with sphere packing
387
Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS
388
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks
389
Secure data dissemination in MANETs by means of mobile agents
390
Secure data dissemination in VANET - a pull based approach
391
Secure Data Downloading with Privacy Preservation in Vehicular Ad Hoc Networks
392
Secure data exchange using authenticated Ciphertext-Policy Attributed-Based Encryption
393
Secure Data Forwarding against Denial of Service Attack Using Trust Based Evolutionary Game
394
Secure data forwarding in wireless ad hoc networks
395
Secure data harvesting in the federation of repositories managed by Multi Agent Systems
396
Secure data hiding in binary document images for authentication
397
Secure data hiding using steganographic technique with Visual cryptography and watermarking scheme
398
Secure data mechanism for iATA Protocol
399
Secure Data Mining in Cloud Using Homomorphic Encryption
400
Secure Data Objects Replication in Data Grid
401
Secure data optical fibre multiple-access communication technique
402
Secure data over GSM based on algebraic codebooks
403
Secure data pixels for binary host images using edge-adaptive grid technique
404
Secure data processing framework for mobile cloud computing
405
Secure data provenance compression using arithmetic coding in wireless sensor networks
406
Secure data recollection for redundantly deployed wireless sensor networks
407
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
408
Secure Data Retrieval of Outsourced Data with Complex Query Support
409
Secure data retrieval system (SEDAR) for DTNs
410
Secure data sharing between domains in Xen
411
Secure data sharing for multiple dynamic groups in Cloud
412
Secure Data Sharing in Mobile Environments
413
Secure data storage
414
Secure data storage and retrieval in the cloud
415
Secure data storage for Java ME-based mobile data collection systems
416
Secure data storage in distributed cloud environments
417
Secure data storage operations with verifiable outsourced decryption for mobile cloud computing
418
Secure data storage using 3D scattering medium
419
Secure data transfer in MANET using hybrid cryptosystem
420
Secure data transfer in MANET using symmetric and asymmetric cryptography
421
Secure data transfer using non-conventional modulation
422
Secure Data Transmission and Modelling in Vehicular Ad Hoc Networks
423
Secure data transmission in extended Ethernet environments
424
Secure data transmission in wireless networks using SRTN scheduling algorithm
425
Secure Data Transmission of Holy Quran Using Controlled Chaotic Dynamics
426
Secure Data Transmission of Wireless Sensor Network Based on Information Hiding
427
Secure data transmission on MANET by hybrid cryptography technique
428
Secure data transmission over frame relay network
429
Secure data transmission over wireless networks: issues and challenges
430
Secure Data Transmission Protocol for Medical Wireless Sensor Networks
431
Secure data transmission routing protocol for multicasting
432
Secure data transmission scheme based on fractional-order discrete chaotic system
433
Secure Data Transmission Using Qubits
434
Secure data transmission using video
435
Secure data transmission using video Steganography
436
Secure database design panel
437
Secure database design: an implementation using a secure DBMS
438
Secure database management systems
439
Secure databases: constraints, inference channels, and monitoring disclosures
440
Secure databases: state of the art
441
Secure Dataspace with Access Policies
442
Secure decentralised ubiquitous networking for emergency communications
443
Secure decentralized data transfer against node capture attacks for wireless sensor networks
444
Secure decommissioning of confidential electronically stored information (CESI): A framework for managing CESI in the disposal phase as needed
445
Secure Decoupled Linkage (SDLink) system for building a social genome
446
Secure Deduplication Storage Systems with Keyword Search
447
Secure Deduplication with Efficient and Reliable Convergent Key Management
448
Secure Defensive Mechanisms: An Appropriate Categorisation
449
Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling
450
Secure degrees of freedom for the MIMO wiretap channel with a multiantenna cooperative jammer
451
Secure Degrees of Freedom in Cooperative MIMO Cognitive Radio Systems
452
Secure Degrees of Freedom in K-Helper MIMO Cognitive Radio Systems with No Eavesdropper CSI
453
Secure degrees of freedom in MIMO cognitive radio systems
454
Secure Degrees of Freedom of K -User Gaussian Interference Channels: A Unified View
455
Secure Degrees of Freedom of MIMO Rayleigh Block Fading Wiretap Channels With No CSI Anywhere
456
Secure degrees of freedom of MIMO X-channels with output feedback and delayed CSI
457
Secure Degrees of Freedom of MIMO X-Channels With Output Feedback and Delayed CSIT
458
Secure Degrees of Freedom of Multiuser Networks: One-Time-Pads in the Air via Alignment
459
Secure degrees of freedom of N ×N ×M wiretap channel with a K-antenna cooperative jammer
460
Secure Degrees of Freedom of One-Hop Wireless Networks
461
Secure degrees of freedom of the Gaussian MIMO interference channel
462
Secure degrees of freedom of the Gaussian multiple access wiretap channel
463
Secure degrees of freedom of the Gaussian wiretap channel with helpers
464
Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming
465
Secure degrees of freedom of the interference channel with no eavesdropper CSI
466
Secure degrees of freedom of the MIMO multiple access wiretap channel
467
Secure degrees of freedom of the multiple access wiretap channel with no eavesdropper CSI
468
Secure Degrees of Freedom of Wireless X Networks Using Artificial Noise Alignment
469
Secure degrees of freedom on widely linear instantaneous relay-assisted interference channel
470
Secure degrees of freedom region of the Gaussian interference channel with secrecy constraints
471
Secure degrees of freedom region of the Gaussian multiple access wiretap channel
472
Secure delay-tolerant communications in the presence of oppressive governments
473
Secure Delegation Model based on SAML in Ubiquitous Environments
474
Secure delegation of tasks in distributed systems
475
Secure Delegation-Based Authentication Protocol for Wireless Roaming Service
476
Secure Deletion of Confidential Data in Consumer Electronics
477
Secure Delivery of Equipment Identity from Vendor to Operator
478
Secure delivery of images over open networks
479
Secure Delta-Publishing of XML Content
480
Secure Deniable Authenticated Key Establishment for Internet Protocols
481
Secure Deniable Authentication Protocol Based on ElGamal Cryptography
482
Secure dependencies with dynamic level assignments
483
Secure deployment of application-tailored protocols in future networks
484
Secure deployment of SmartGrid equipment
485
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
486
Secure design of engineering software tools in Industrial Automation and Control Systems
487
Secure Design of RFID Tags in the New Type License Plates Automatic Identification System
488
Secure design-for-debug for Systems-on-Chip
489
Secure detection in wireless sensor networks using a simple encryption method
490
Secure detection of public watermarks with fractal decision boundaries
491
Secure detection with correlated binary sensors
492
Secure device access for automotive software
493
Secure device association for ad hoc and ubiquitous computing environments
494
Secure device pairing based on a visual channel
495
Secure Device Pairing Based on a Visual Channel: Design and Usability Study
496
Secure device pairing using audio
497
Secure Device Pairing: A Survey
498
Secure device-to-device communication in LTE-A
499
Secure DHCPv6 that uses RSA authentication integrated with Self-Certified Address
500
Secure differential protection using unique algorithms
501
Secure Diffusion for Wireless Sensor Networks
502
Secure digital archiving in post-quantum era
503
Secure Digital Chains of Evidence
504
Secure digital communication based on hybrid dynamical systems
505
Secure digital communication using chaotic modulation with feedback
506
Secure digital communication using discrete-time chaotic systems via indirect coupling synchronization
507
Secure digital communications by means of stochastic process shift keying
508
Secure Digital Data Collection in household surveys
509
Secure digital image sharing using diverse image media
510
Secure Digital Library Technology Research Based on VPN
511
Secure Directional Routing to Prevent Relay Attack
512
Secure discovery method of devices for a home network middleware
513
Secure Disk with Authenticated Encryption and IV Verification
514
Secure Display and Secure Transactions Using a Handset
515
Secure display by use of multiple decoding masks based on visual cryptography
516
Secure display system by use of encrypted digital holograms
517
Secure Dissemination and Protection of Multispectral Images Using Crypto-Watermarking
518
Secure Dissemination of Video Data in Vehicle-to-Vehicle Systems
519
Secure Dissemination of XML Content Using Structure-based Routing
520
Secure Distance Indicator Leveraging Wireless Link Signatures
521
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
522
Secure distortion computation among untrusting parties using homomorphic encryption
523
Secure Distributed AAA with Domain and User Reputation
524
Secure Distributed Agreement Protocols for Information Assurance Applications
525
Secure distributed batch rekeying algorithm for dynamic group
526
Secure Distributed Cluster Formation in Wireless Sensor Networks
527
Secure distributed computing on a Java Card™ grid
528
Secure distributed control in unreliable D-NCS
529
Secure distributed data aggregation in the automatic metering infrastructure of smart grids
530
Secure distributed data structures for peer-to-peer-based social networks
531
Secure Distributed Deduplication Systems with Improved Reliability
532
Secure distributed demand projection in micro-grids
533
Secure distributed detection in the presence of eavesdroppers
534
Secure distributed DNS
535
Secure Distributed Dossier Management in the Legal Domain
536
Secure distributed estimation in cyber-physical systems
537
Secure distributed estimation of radio environment map in hierarchical wireless Cognitive Radio networks
538
Secure Distributed Information Exchange
539
Secure Distributed k-Anonymous Pattern Mining
540
Secure distributed key generation in attribute based encryption systems
541
Secure Distributed Key Generation on Vector Space Access Structures in Bilinear Groups
542
Secure distributed keyword search in multiple clouds
543
Secure distributed location management scheme for mobile hosts
544
Secure Distributed Multiplication of Two Polynomially Shared Values: Enhancing the Efficiency of the Protocol
545
Secure distributed routing in ad hoc networks
546
Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid
547
Secure distributed source coding with side-information
548
Secure distributed spectrum sensing in cognitive radio networks using multi-armed bandits
549
Secure distributed storage for information dissemination and retrieval at the tactical edge
550
Secure distributed storage systems: Local repair with minimum bandwidth regeneration
551
Secure distributed top-k aggregation
552
Secure distribution infrastructure for hardware digital contents
553
Secure Distribution of Big Data Based on BitTorrent
554
Secure Distribution Scheme for Compressed Data Streams
555
Secure distributive storage of decentralized source data: Can interaction help?
556
Secure Diversity-Multiplexing Tradeoff of Zero-Forcing Transmit Scheme at Finite-SNR
557
Secure diversity-multiplexing tradeoffs in MIMO relay channels
558
Secure DNA data compression using algebraic curves
559
Secure DNS from amplification attack by using modified bloom filters
560
Secure document and asset tracking
561
Secure documents management in supply chain system
562
Secure DoF of MIMO Rayleigh block fading wiretap channels with No CSI anywhere
563
Secure dominating set-based routing protocol in MANET: Using reputation
564
Secure Dot-product Protocol Using Trace Functions
565
Secure double spectrum auctions
566
Secure download system based on software defined radio composed of FPGAs
567
SecURe DPR: Secure update preventing replay attacks for dynamic partial reconfiguration
568
Secure DRM mechanism for offline applications
569
Secure DRM scheme for future mobile networks based on trusted mobile platform
570
Secure DS-CDMA spreading codes using fully digital multidimensional multiscroll chaos
571
Secure Dual-Core Cryptoprocessor for Pairings Over Barreto-Naehrig Curves on FPGA Platform
572
Secure Dynamic Community Establishment in Coalitions
573
Secure dynamic distributed routing algorithm for ad hoc wireless networks
574
Secure dynamic flow policy for content delivery networks
575
Secure dynamic fragment and replica allocation in large-scale distributed file systems
576
Secure Dynamic Key Management for Sensor Networks
577
Secure Dynamic MANET On-demand (SEDYMO) Routing Protocol
578
Secure dynamic routing protocols based on Cross-Layer Network Security Evaluation
579
Secure dynamic searchable symmetric encryption with constant document update cost
580
Secure Dynamic Software Loading and Execution Using Cross Component Verification
581
Secure Dynamic Source Routing
582
Secure dynamic source routing protocol
583
Secure E-business Transactions by Securing Web Services
584
Secure e-cash model using Java based smartcard
585
Secure E-CDMA virtual private networks over passive optical networks
586
Secure E-Check Payment Model Based on ECC
587
Secure e-Cheque Clearance between Financial Institutions
588
Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature Scheme
589
Secure E-Commerce Based on Distributed Processing
590
Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card
591
Secure E-Commerce Transactions for Multicast Services
592
Secure economic dispatch determination through integrated tools and fuzzy inference systems
593
Secure efficient proxy blind signature schemes based DLP
594
Secure Efficient QoS Multicast Route Discovery for MANET
595
Secure efficient routing based on network coding in the delay tolerant networks
596
Secure e-Governance: From observation to policy formulation
597
Secure e-government services: Towards a framework for integrating it security services into e-government maturity models
598
Secure e-learning using a holistic and immune security framework
599
Secure electromagnetic buildings
600
Secure Electronic and Mobile Commerce
601
Secure electronic banking
602
Secure electronic business applications in mobile agent based networks using elliptic curve cryptosystems
603
SECURE ELECTRONIC COMMERCE- REGULATORY CHALLENGES
604
Secure Electronic Coupons
605
Secure electronic data interchange over the Internet
606
Secure Electronic Health Record Exchange: Achieving the Meaningful Use Objectives
607
Secure electronic markets for private information
608
Secure electronic passport certification using re-water marking
609
Secure Electronic Post Office
610
Secure electronic voting based on group signatures
611
Secure Electronic Voting for Mobile Communications
612
Secure electronic voting system based on image steganography
613
Secure Elliptic Curve generation and key establishment on a 802.11 WLAN embedded device
614
Secure e-mail and databases using chaotic encryption
615
Secure Email Attachment as a Service (SeaS)
616
Secure E-mail protocols providing perfect forward secrecy
617
Secure email system based on true IPv6 address access
618
Secure email-based peer to peer information retrieval
619
Secure Emails in XML Format Using Web Services
620
Secure embedded error detection arithmetic coding
621
Secure embedded processing through hardware-assisted run-time monitoring
622
Secure Embedded Systems: The Threat of Reverse Engineering
623
Secure embedded visual sensing in end-user applications with TrustEYE.M4
624
Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables
625
Secure Encapsulation of Non-Secure Middleware
626
Secure encoder designs based on turbo codes
627
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs
628
Secure Encrypted Image Search in Mobile Cloud Computing
629
Secure Encryption in Wireless Sensor Network
630
Secure encryption scheme of amazigh alphabet based ECC using finite state machine
631
Secure encryption with digital signature approach for Short Message Service
632
Secure End-to-End Browsing System with Mobile Composition
633
Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems
634
Secure end-to-end communication over GSM and PSTN networks
635
Secure end-to-end mobile payment system
636
Secure end-to-end SMS communication over GSM networks
637
Secure energy efficiency of selective decode and forward with distributed power allocation
638
Secure energy efficient hierarchical protocol for WSN
639
Secure energy efficient load balancing multipath routing protocol with power management for wireless sensor networks
640
Secure energy management system using embedded fuzzy controller
641
Secure energy-aware multipath routing protocol with transmission range adjustment for wireless sensor networks
642
Secure Engineering and Modelling of a Metering Devices System
643
Secure enhanced compressed wideband spectrum sensing
644
Secure enhanced wireless transfer protocol
645
Secure enhancement scheme for detecting selfish nodes in MANET
646
Secure enhancement scheme for routing protocol in mobile ad hoc networks
647
Secure Enterprise Data Deduplication in the Cloud
648
Secure Enterprise Interoperability Ontology for Semantic Integration of Business to Business Applications
649
Secure Enterprise Services Consumption for SaaS Technology Platforms
650
Secure Entropy Gatherer
651
Secure environment establishment for FPGA-based safety-critical systems
652
Secure Environment for Information Systems in Medicine
653
Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key Agreement Protocol
654
Secure e-payment protocol with new involved entities
655
Secure e-Payment using Multi-agent Architecture
656
Secure erasure codes with partial decodability
657
Secure error-correcting (SEC) network codes
658
Secure Error-Correcting Network Codes with Side Information from Source
659
Secure error-correcting network codes with side information leakage
660
Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
661
Secure Estimation in the Presence of Integrity Attacks
662
Secure eTickets based on QR-Codes with user-encrypted content
663
Secure e-transactions using mobile agents with agent broker
664
Secure Evaluation of Private Functions through Piecewise Linear Approximation
665
Secure Event Dissemination in Publish-Subscribe Networks
666
Secure evolutionary hardware for public-key cryptosystems
667
Secure E-Voting System with biometric and wavelet based watermarking technique in YCgCb color space
668
Secure E-voting with blind signature
669
SECURE EXACT AUTHENTICATION IN BINARY DOCUMENT IMAGE WATERMARKING
670
Secure exams despite malicious management
671
Secure Execution Context Enforcement Framework Based on Activity Detection on Data and Applications Hosted on Smart Devices
672
Secure execution of Java applets using a remote playground
673
Secure execution of Java applets using a remote playground
674
Secure execution of mobile programs
675
Secure Exp-Golomb coding using stream cipher
676
Secure Expo [advertisement]
677
Secure extensible type system for efficient embedded operating system by using metatypes
678
Secure extension to the optimised link state routing protocol
679
Secure extensions of FPGA soft core processors for symmetric key cryptography
680
Secure face biometric verification in the randomized Radon space
681
Secure face template generation via local region hashing
682
Secure Failure Detection and Consensus in TrustedPals
683
Secure Fallback Authentication and the Trusted Friend Attack
684
Secure Fast Handoff Mechanism in Wireless Active Network Environment
685
Secure Fast Handover Scheme of Proxy Mobile IPv6
686
Secure Fast Mobility Manager for Ubiquitous Wireless Home Networks
687
Secure Fault Tolerance in Wireless Sensor Networks
688
Secure fault tolerance mechanism of wireless Ad-Hoc networks with mobile agents
689
Secure faults detection for preventing fire risk in PV systems
690
Secure federated monitoring of heterogeneous networks
691
Secure file access solution for public cloud storage
692
Secure File Sharing in JXTA Using Digital Signatures
693
Secure File Sharing Scheme for Mobile Devices
694
Secure file sharing using cryptographic techniques in cloud
695
Secure file transfer over TCP/IP
696
Secure file transmission using byte rotation algorithm in network security
697
Secure Files Management System in Intranet
698
Secure fingerprint embedding based on modified GDFT based parametric transform
699
Secure Fingerprint Embedding for Multicast
700
Secure Fingerprint Matching with Generic Local Structures
701
Secure Fingerprint Recognition Based on Frobenius Norm
702
Secure Fingerprint-based authentication and non-repudiation services for mobile learning systems
703
Secure finite state integer arithmetic codes
704
Secure firmware architecture using virtual hard disks
705
Secure firmware updates for smart grid Devices
706
Secure Firmware Updates over the Air in Intelligent Vehicles
707
Secure Flow: a totally integrated transportation security system
708
Secure Flow: a totally integrated transportation security system
709
Secure Flow-Through Provisioning Model in Distributed Network Management Systems
710
Secure Force: A low-complexity cryptographic algorithm for Wireless Sensor Network (WSN)
711
Secure forensic marking in DWT-DFRNT dual domain
712
Secure FPGA circuits using controlled placement and routing
713
Secure FPGA configuration architecture preventing system downgrade
714
Secure FPGA technologies and techniques
715
Secure fragile digital watermarking technique for image authentication
716
Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities
717
Secure Fragmentation for Content Centric Networking
718
Secure Fragmentation for Content-Centric Networks
719
Secure frame format for avoiding replay attack in Distributed Network Protocol (DNP3)
720
Secure framework for data access using Location based service in Mobile Cloud Computing
721
Secure Framework for Integrated Multipath MANET with Internet
722
Secure Framework for Multipath Multimedia Streaming over Wireless Ad Hoc Network
723
Secure Framework for the Return Routability Procedure in MIPv6
724
Secure Framework for Voice Transmission over Multipath Wireless Ad-Hoc Network
725
Secure Framework of Audiovisual Content based on Bi-directional Authentication for Hard Disk Drive
726
Secure free-space optical communication between moving platforms
727
Secure Friend Discovery Based on Encounter History in Mobile Social Networks
728
Secure friend discovery in mobile social networks
729
Secure function evaluation based on secret sharing and homomorphic encryption
730
Secure fuzzy vault based fingerprint verification system
731
Secure gateway localization and communication system for vehicular ad hoc networks
732
Secure GDoF of K -User Gaussian Interference Channels: When Secrecy Incurs No Penalty
733
Secure Generation of Digital Signature on Compromised Computer
734
Secure Geocast in Ad Hoc Network Using Multicasting Key Distribution Scheme (SGAMKDS)
735
Secure geographic routing protocol in MANETs
736
Secure geo-sharing in mobile ad-hoc networks
737
Secure global document exchange
738
Secure Glue: A Cache and Zone Transfer Considering Automatic Renumbering
739
Secure governance in enterprise architecture — Access control perspective
740
Secure graphical user interface for Geant4
741
Secure green communication for amplify-and-forward relaying with eavesdroppers
742
Secure Grid Information Service System
743
Secure Grid Micro-Workflows Using Virtual Workspaces
744
Secure Group Authentication Using a Non-Perfect Secret Sharing Scheme Based on Controlled Mixing
745
Secure group communication based on distributed parallel ID-based proxy re-encryption
746
Secure Group Communication Based Scheme for Differential Access Control in Dynamic Environments
747
Secure group communication in asynchronous networks with failures: integration and experiments
748
Secure Group communication in Body Area Networks
749
Secure Group Communication in Mobile Wireless Sensor Networks
750
Secure group communication in wireless mesh networks
751
Secure group communication in wireless sensor networks
752
Secure group communication protocol for distributed systems
753
Secure group communication scheme in wireless IPv6 networks: An experimental test-bed
754
Secure group communication using binomial trees
755
Secure Group Communication Using Fractional Public Keys
756
Secure group communication using robust contributory key agreement
757
Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks
758
Secure group communication with multiplicative one-way functions
759
Secure group communications for Delay-Tolerant Networks
760
Secure group communications for wireless networks
761
Secure group communications using key graphs
762
Secure group formation protocol for a medical sensor network prototype
763
Secure group identity authentication based on non-perfect secret sharing scheme
764
Secure Group Key Distribution Using Hybrid Cryptosystem
765
Secure group key management for storage area networks
766
Secure group key management using uni-directional proxy re-encryption schemes
767
Secure group services for storage area networks
768
Secure Group-Based Information Sharing in Mobile Ad Hoc Networks
769
Secure groups communication for mobile agents based on public key infrastructure
770
Secure Groups: Enhanced Management of Encrypted Data in Databases
771
Secure H.323 Data Transmission between Private Networks
772
Secure hamming distance based biometric authentication
773
Secure handoff method for seamless service provisioning in infrastructure mode 802.11i system
774
Secure handoff protocol in 3GPP LTE networks
775
Secure handover in enterprise WLANs: capwap, hokey, and IEEE 802.11R
776
Secure handwriting using a robot arm for educational purpose
777
Secure hardware design through bit-tight information flow control
778
Secure HARQ communication protocols based on Turbo Codes
779
Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis
780
Secure hashing of the NEMO mobile router communications
781
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
782
Secure health monitoring using medical wireless sensor networks
783
Secure healthcare information exchange for local domains
784
Secure HeNB network management based VPN IPSec
785
Secure Hierarchical Communications in Distributed Sensor Networks
786
Secure Hierarchical Data Aggregation in Wireless Sensor Networks
787
Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis
788
Secure hierarchical Virtual Private LAN Services for provider provisioned networks
789
Secure Hierarchical VPLS Architecture for Provider Provisioned Networks
790
Secure High-Throughput Multicast Routing in Wireless Mesh Networks
791
Secure Hill cipher modifications and key exchange protocol
792
Secure homes: the future of anti-crime technology
793
Secure Homomorphic Aggregation Algorithm of Mixed Operations in Wireless Sensor Networks
794
Secure Homomorphic and Searchable Encryption in Ad Hoc Networks
795
Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks
796
Secure Hop-Count Based Localization in Wireless Sensor Networks
797
Secure Host Identity Delegation for Mobility
798
Secure hosts auto-configuration in mobile ad hoc networks
799
Secure Hotspot a novel approach to secure public Wi-Fi hotspot
800
Secure hotspot authentication through a Near Field Communication side-channel
801
Secure hybrid cloud computing: Approaches and use cases
802
Secure Hybrid Communications for Medical Applications
803
Secure hybrid digital-analog Wyner-Ziv coding
804
Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network
805
Secure Hybrid Spread Spectrum System for Steganography in Auditive Media
806
Secure IBE Scheme with Security Proof under Standard Model
807
Secure ICT Services for Mobile and Wireless Communications: A Federated Global Identity Management Framework
808
Secure ID Transformation for Robust Pseudonymity against Backflow of Personal Information in SAML Federation
809
Secure ID-Based Blind Signature Scheme without Random Oracle
810
Secure ID-Based Proxy Signcryption Scheme with Designated Proxy Signcrypter
811
Secure identification documents via pattern recognition and public-key cryptography
812
Secure Identifiers and Initial Credential Bootstrapping for IoT@Work
813
Secure Identities
814
Secure identity authentication and logical access control for airport information systems
815
Secure identity-to-identity communications over Content-Centric Networking
816
Secure image communication using blind source separation
817
Secure image databases through distributed source coding of SIFT descriptors
818
Secure Image Delivery Scheme Using Poisson Editing
819
Secure image encryption and authentication using the photon counting technique in the Gyrator domain
820
Secure image encryption technique based on multiple Fresnel diffraction transforms
821
Secure Image Filtering
822
Secure image hashing via minimum distortion estimation
823
Secure image processing inside cloud file sharing environment using lightweight containers
824
Secure Image processing using LWE based Homomorphic encryption
825
Secure image retrieval through feature protection
826
Secure image retrieval using pyramid histogram of oriented gradient descriptor
827
Secure Image Steganography Based on Randomized Sequence of Cipher Bits
828
Secure image steganography based on Slantlet transform
829
Secure image transcoding technique using chaotic key based algorithm with improved security
830
Secure image transferring using KBRP and TEA algorithms
831
Secure Image Transmission over Wireless Channels
832
Secure image transmission using visual cryptography scheme without changing the color of the image
833
Secure images and image authentication
834
Secure images captured by digital camera
835
Secure implementation of channel abstractions
836
Secure implementation of routing protocols for wireless Ad hoc networks
837
Secure Implementations for Typed Session Abstractions
838
Secure IMS access signaling
839
Secure in-band update of trusted certificates
840
Secure incentive mechanism for multihop wireless networks
841
Secure Incentives for Commercial Ad Dissemination in Vehicular Networks
842
Secure Index Construction for Privacy-Preserving Large-Scale Image Retrieval
843
Secure indoor positioning: Relay attacks and mitigation using presence sensing systems
844
Secure Information Aggregation for Smart Grids Using Homomorphic Encryption
845
Secure information by using digital data embedding and spread spectrum techniques
846
Secure information exchange
847
Secure Information Exchange - A Security Quantification Approach
848
Secure information extraction from clinical documents using SNOMED CT gazetteer and natural language processing
849
Secure information flow and pointer con .nement in a java-like language
850
Secure information flow and program logics
851
Secure information flow awareness for smart wireless eHealth systems
852
Secure Information Flow by Model Checking Pushdown System
853
Secure information flow by self-composition
854
Secure Information Flow for Concurrent Programs under Total Store Order
855
Secure Information Flow in Java via Reachability Analysis of Pushdown System
856
Secure information flow using security groups
857
Secure information integration with a semantic web-based framework
858
Secure Information Management Protocol Based on Linguistic Sharing Techniques
859
Secure Information Processing during System-Level: Exploration of an Optimized Trojan Secured Datapath for CDFGs during HLS Based on User Constraints
860
Secure Information Processing with Privacy Assurance - standard based design and development for biometric applications
861
Secure information retrieval and reveal for mobile apparatus based on 2D Barcode digital signature
862
Secure information sharing in digital supply chains
863
Secure Information Sharing on Support of Emergency Management
864
Secure information sharing using role-based delegation
865
Secure information transaction in hybrid cloud computing
866
Secure Information Transmission and Power Transfer in Cellular Networks
867
Secure information transmission for mobile radio
868
Secure information transmission for mobile radio
869
Secure information transmission in filter bank multi-carrier spread spectrum systems
870
Secure Information Transmission in the Presence of Energy-Harvesting Eavesdroppers in Multi-Cell Networks
871
Secure Information Transmission Over Microwave and Telephone Channels
872
Secure infrared remote control system for automotive applications
873
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
874
Secure Input for Web Applications
875
Secure Instant Messaging Protocol for Centralized Communication Group
876
Secure instant messaging protocol preserving confidentiality against administrator
877
Secure integer arithmetic coding with adjustable interval size
878
Secure integrated framework for business processes
879
Secure Integration between Mobile Ad Hoc Networks and Mobile IPv6
880
Secure Integration of Distributed Medical Data Using Mobile Agents
881
Secure integration of the Home Energy Management System to the battery management system in the customer domain of the smart grid
882
Secure intelligence gathering using smartphones
883
Secure Inter Vehicle Communications
884
Secure interactive Livermore alarm system
885
Secure Interdependent Networks for Peer-to-Peer and Online Social Network
886
Secure Interdomain Routing Registry
887
Secure Inter-Domain Routing Standards Evolution and Role in the Future GIG
888
Secure interface for risk management services
889
Secure inter-institutional image communication by using DICOM-to-DICOM gateways
890
Secure interleaving - physical layer built-in security enhancement of CDMA systems
891
Secure Internet access to gateway using secure socket layer
892
Secure Internet access to gateway using secure socket layer
893
Secure Internet banking authentication
894
Secure Internet based virtual trading communities
895
Secure Internet on Google Chrome: Client side anti-tabnabbing extension
896
Secure interoperability with commercial open standards
897
Secure interoperable architecture construction for overlay networks
898
Secure interoperation between 2G and 3G mobile radio networks
899
Secure interoperation in a multidomain environment employing RBAC policies
900
Secure interrupts on low-end microcontrollers
901
Secure interworking & roaming of WiMAX with 3G and Wi-Fi
902
Secure Interworking in Multi-Operator, Multi-Technology Wireless Communication Environment: Issues & Challenges
903
Secure interworking with P2PSIP and IMS
904
Secure intranets
905
Secure introduction of one-way functions
906
Secure intrusion detection system for mobile adhoc networks
907
Secure INtrusion-Tolerant Replication on the Internet
908
Secure in-vehicle systems against Trojan attacks
909
Secure IP multicast over satellite
910
Secure IP-block distribution for hardware devices
911
Secure IP-Ubiquitous Sensor Network for healthcare applications monitoring In-home area
912
Secure IRIS Verification
913
Secure issues - DTI report
914
Secure jam resistant key transfer: Using the DOD CAC card to secure a radio link by employing the BBC jam resistant algorithm
915
Secure Java class loading
916
Secure Joint Source-Channel Coding for Quasi-Static Fading Channels
917
Secure joint source-channel coding with interference known at the transmitter
918
Secure JPEG 2000-JPSEC
919
Secure JPEG scrambling enabling privacy in photo sharing
920
Secure JPEG steganography by LSB+ matching and multi-band embedding
921
Secure k-connectivity in wireless sensor networks under an on/off channel model
922
Secure k-Connectivity Properties of Wireless Sensor Networks
923
Secure key agreement over reciprocal fading channels in the low SNR regime
924
Secure key agreement using pure biometrics
925
Secure Key Authentication Scheme Based on Discrete Logarithms
926
Secure key based image realization steganography
927
Secure key distribution based on meteor burst communications
928
Secure Key Distribution for the Smart Grid
929
Secure key distribution for Wireless Sensor Networks
930
Secure key distribution over a 200km long link employing a novel ultra-long fiber lasers (UFL) scheme
931
Secure key distribution system based on quantum cryptography
932
Secure key establishment for Device-to-Device communications
933
Secure key establishment in the presence of a passive eavesdropper: Impact of antenna coupling
934
Secure Key Exchange and Encryption Mechanism for Ad Hoc Networks
935
Secure Key Exchange in Wireless Networks
936
Secure key exchange over 1.9 km free-space range using quantum cryptography
937
Secure key generation from OFDM subcarriers´ channel responses
938
Secure Key Generation in Sensor Networks Based on Frequency-Selective Channels
939
Secure key generation using bounded-sampling of a chaotic semiconductor laser
940
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
941
Secure Key Management for Flexible Digital Rights Management of Scalable Codestreams
942
Secure Key Management in Hierarchical Group Communication Using Agents
943
Secure key management in low power wireless sensor networks
944
Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform
945
Secure key management scheme based on ECC algorithm for patient´s medical information in healthcare system
946
Secure key management scheme for hierarchical access control based on ECC
947
Secure key rate of the BB84 protocol using finite sample bits
948
Secure key renewal and revocation for Wireless Sensor Networks
949
Secure Key Storage Using State Machines
950
Secure Key-Insulated Proxy Signature Scheme for Mobile Agent
951
Secure Keyword Auction: Preserving Privacy of Bidding Prices and CTRs
952
Secure k-nearest neighbor query over encrypted data in outsourced environments
953
Secure kNN Query Processing in Untrusted Cloud Environments
954
Secure knowledge management: confidentiality, trust, and privacy
955
Secure LAN management with SNMPv2 over IPsec
956
Secure large fiille transfer over mulltiiplle network paths
957
Secure large-scale bingo
958
Secure layer based compound image compression using XML compression
959
Secure Layered Architecture for Session Initiation Protocol Based on SIPSSO: Formally Proved by Scyther
960
Secure layered transmission in multicast systems with wireless information and power transfer
961
Secure layers based architecture for Internet of Things
962
Secure LEACH routing protocol based on low-power cluster-head selection algorithm for wireless sensor networks
963
Secure Leakage-Proof Public Verification of IP Marks in VLSI Physical Design
964
Secure Learning and Mining in Adversarial Environments [Extended Abstract]
965
Secure Lempel-Ziv-Welch (LZW) algorithm with random dictionary insertion and permutation
966
Secure Lightweight mobile payment protocol using symmetric key techniques
967
Secure lightweight protocols for medical device monitoring
968
Secure lightweight tunnel for monitoring transport containers
969
Secure link state routing for mobile ad hoc networks
970
Secure linux [Book Review]
971
Secure live migration of VM´s in Cloud Computing: A survey
972
Secure Live Virtual Machines Migration: Issues and Solutions
973
Secure localization against wormhole attacks using conflicting sets
974
Secure localization algorithms for wireless sensor networks
975
Secure localization and authentication in ultra-wideband sensor networks
976
Secure localization and location verification inwireless sensor networks
977
Secure Localization and Location Verification of Wireless Sensor Network
978
Secure localization for wireless sensor networks using decentralized dynamic key generation
979
Secure localization in sensor networks using transmission range variation
980
Secure localization in wireless sensor networks
981
Secure localization of multiple spoofing attackers
982
Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers
983
Secure localization schemes in sensor networks
984
Secure localization with defense against selective forwarding attacks in wireless sensor networks
985
Secure Localization with Hidden and Mobile Base Stations
986
Secure Localized Authentication and Billing for Wireless Mesh Networks
987
Secure Localized Node Positioning in Mobile Ad-Hoc Networks Using PSO
988
Secure locally repairable codes for distributed storage systems
989
Secure Location Estimation in Large Scale Wireless Sensor Networks
990
Secure location information management in cellular radio systems
991
Secure Location Validation with Wi-Fi Geo-fencing and NFC
992
Secure Location Verification for Vehicular Ad-Hoc Networks
993
Secure Location Verification Using Hop-Distance Relationship in Wireless Sensor Networks
994
Secure Location Verification Using Radio Broadcast
995
Secure Location Verification Using Simultaneous Multilateration
996
Secure Location Verification with Hidden and Mobile Base Stations
997
Secure Location Verification with Randomly-Selected Base Stations
998
Secure Locking for Untrusted Clouds
999
Secure Logging as a Service—Delegating Log Management to the Cloud
1000
Secure Logging for Auditable File System Using Separate Virtual Machines
بازگشت