<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Secure logging framework integrating with cloud database
2
Secure logging monitor service for cloud forensics
3
Secure Logical Isolation for Multi-tenancy in cloud storage
4
Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS
5
Secure Lossless Aggregation for Smart Grid M2M Networks
6
Secure Lossless Aggregation Over Fading and Shadowing Channels for Smart Grid M2M Networks
7
Secure lossless compression with side information
8
Secure lossy source coding with side information
9
Secure lossy source coding with side information at the decoders
10
Secure lossy source transmission over wiretap channel with channel side information
11
Secure lossy source-channel wiretapping with side information at the receiving terminals
12
Secure lossy transmission of vector Gaussian sources
13
Secure Lossy Transmission of Vector Gaussian Sources
14
Secure Machine Learning, a Brief Overview
15
Secure MAC-Layer Protocol for Captive Portals in Wireless Hotspots
16
Secure macro mobility protocol for new generation access network
17
Secure Mail using Visual Cryptography (SMVC)
18
Secure manageable mobile handset platform architectures
19
Secure management by delegation within the Internet management framework
20
Secure management layer for JXTA-based information sharing systems
21
Secure Management of Biomedical Data With Cryptographic Hardware
22
Secure management of key distribution in cloud scenarios
23
Secure management of large-scale network based on multilevel agents
24
Secure Management of Medical Data in Wireless Environments
25
Secure management of personal health records by applying attribute-based encryption
26
Secure Many-to-Some Communications
27
Secure mask for color image hidding
28
Secure Massive MIMO transmission in the presence of an active eavesdropper
29
Secure M-commerce Transactions: A Third Party Based Signature Protocol
30
Secure mechanism based on concurrent signature for mobile payment services
31
Secure Mechanism for Mobile Web Browsing
32
Secure media access control (MAC) in wireless sensor networks: intrusion detections and countermeasures
33
Secure media content distribution based on the improved set-top box in IPTV
34
Secure Media Distribution in P2P Networks
35
Secure Media Player
36
Secure media sharing in the cloud: Two-dimensional-scalable access control and comprehensive key management
37
secure media streaming & secure adaptation for non-scalable video
38
Secure mediated databases
39
Secure Mediation Gateway architecture enabling the communication among Critical Infrastructures
40
Secure Mediation of Join Queries by Processing Ciphertexts
41
Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management
42
Secure Medical Image Retrieval Over the Internet
43
Secure medical information exchange with reversible data hiding
44
Secure medical tele-consultation based on voice authentication and realtime audio/video encryption
45
Secure medical-image transmission using independent component analysis
46
Secure Memory Accesses on Networks-on-Chip
47
Secure memristor-based main memory
48
Secure message delivery in publish/subscribe networks
49
Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks
50
Secure message exchange protocol for Smart Grids
51
Secure Message Relay over Networks with QKD-Links
52
Secure Message Transmission With Small Public Discussion
53
Secure messaging and real time media streaming using enterprise PKI and ECC based certificates
54
Secure metering for electrical vehicles
55
Secure methods for fuzzy key binding in biometric authentication applications
56
Secure micro mobility protocol for new generation wireless network
57
Secure Microcontroller with On-Chip Hierarchical Code Validator for Firmware Authentication
58
Secure middleware for situation-aware naval C
2
and combat systems
59
Secure middleware in ubiquitous healthcare
60
Secure migration of IPTV services from a STB to mobile devices for pay per view video
61
Secure Military Communications Can Benefit from Accurate Time
62
Secure MIMO AF Relaying Design: An Intercept Probability Constrained Approach
63
Secure MIMO cognitive networks based on spatial LDPC codes
64
Secure MIMO communication system based on time varying linear transformation
65
Secure MIMO Communications in a System with Equal Numbers of Transmit and Receive Antennas
66
Secure MIMO Communications Under Quantized Channel Feedback in the Presence of Jamming
67
Secure MIMO SATCOM Transmission
68
Secure MIMO transmission via compressive sensing
69
Secure Mining of Association Rules in Horizontally Distributed Databases
70
Secure MISO cognitive radio system with perfect and imperfect CSI
71
Secure MISO wiretap channels with multi-antenna passive eavesdropper via artificial fast fading
72
Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading
73
Secure MMU: Architectural support for memory isolation among virtual machines
74
Secure mobil communications
75
Secure Mobile Ad hoc Routing
76
Secure mobile agent protocol by using signcryption schemes
77
Secure Mobile Agent System for E-Business Applications
78
Secure Mobile Agent System in Peer-to-Peer Networks: A Review of Security Mechanisms Based on Several Security Issues
79
Secure Mobile Agent-based E-Negotiation for On-Line Trading
80
Secure Mobile Agents with Designated Hosts
81
Secure Mobile and Wireless Communication Services for Collaborative Virtual Gaming
82
Secure Mobile Application Development
83
Secure mobile authentication and device association with enhanced cryptographic engines
84
Secure Mobile Business Information Processing
85
Secure mobile code computing in distributed remote environment
86
Secure mobile commerce
87
Secure mobile communication in m-payment system using NFC technology
88
Secure Mobile Communication Using Low Bit-Rate Coding Method
89
Secure Mobile Communications for Battlefields
90
Secure Mobile Content Delivery Architecture in Hybrid Network Environment
91
Secure mobile crowdsensing game
92
Secure Mobile Data Collection Systems for Low-Budget Settings
93
Secure mobile grid environment defeating wormhole attacks and scam users
94
Secure mobile IP communication
95
Secure Mobile IP Communication in Residential Networks
96
Secure Mobile IP Registration Scheme with AAA from Parings to Reduce Registration Delay
97
Secure mobile IP using IP security primitives
98
Secure Mobile IPv6 for B3G Networks
99
Secure Mobile Multicast Handoff Mechanisms Using a Time-Limited Key
100
Secure mobile network handover with neural cryptography
101
Secure Mobile Network Routing Protocol Using PSR
102
Secure mobile payment based on Super SET protocol
103
Secure Mobile Payment Model Based on WAP
104
Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR
105
Secure Mobile Payment System in Wireless Environment
106
Secure Mobile Payment Systems
107
Secure Mobile Payment via Trusted Computing
108
Secure mobile RFID ownership transfer protocol to cover all transfer scenarios
109
Secure Mobile RFID system against privacy and security problems
110
Secure mobile services by face and speech based personal authentication
111
Secure mobile services for on-going archaeological excavations management and dissemination
112
Secure mobile services using secure region
113
Secure mobile social networks using USIM in a closed environment
114
Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks
115
Secure Mobility and the Autonomous Driver
116
Secure Mobility Management Scheme for 6LoWPAN ID/Locator Split Architecture
117
Secure Modular Hashing
118
Secure Monitoring for Identity Federations and Distributed Systems
119
Secure Monitoring of Service Level Agreements
120
Secure Monitoring Scheme Based on Identity-Based Threshold Signcryption for Wireless Sensor Networks
121
Secure monitoring scheme for wireless sensor networks based on identity signcryption
122
Secure MQTT for Internet of Things (IoT)
123
Secure Multi-Antenna Transmission in Three-Tier Wireless Sensor Networks
124
Secure multicast communication using evolutionary heuristic algorithm: a case study
125
Secure multicast communication: end user identification and accounting
126
Secure multicast conferencing
127
Secure multicast extensions for mobile networks
128
Secure multicast in various scenarios of WirelessMAN
129
Secure Multicast Key Protocol for E-Mail System Using Factorial Number Structure
130
Secure multicast model for ad-hoc military networks
131
Secure multicast routing protocol against internal attacks in mobile ad hoc networks
132
Secure multicast software delivery
133
Secure multicast transmission
134
Secure multicloud storage with policy based access control and cooperative provable data possession
135
Secure Multi-execution: Fine-Grained, Declassification-Aware, and Transparent
136
Secure multifactor authentication payment system using NFC
137
Secure Multihop Network Programming with Multiple One-Way Key Chains
138
Secure multi-hop routing protocols in Wireless Sensor Networks: Requirements, challenges and solutions
139
Secure multi-key file-sharing for cloud storage with erasure coding
140
Secure multilevel management of large-scale network
141
Secure multimedia activity with redundant schemes
142
Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain
143
Secure multimedia communication in wireless mesh networks
144
Secure Multimedia Communications
145
Secure multimedia objects management in medical information system
146
Secure multimedia streaming with trusted digital rights management
147
Secure multimedia systems - session 2
148
Secure multimedia transmission in IPv6 wireless networks
149
Secure Multimedia Transmission over RTP
150
Secure multimodal mobile authentication using one time password
151
Secure multi-objective distributed generation planning in distribution network
152
Secure multiowner data sharing in the cloud
153
Secure Multi-Party Comparing Protocol Based on Multi-Threshold Secret Sharing Scheme
154
Secure multiparty computation based privacy preserving smart metering system
155
Secure Multi-Party Computation for statistical computations using virtual parties on a Token Ring Network
156
Secure multi-party computation in differential private data with Data Integrity Protection
157
Secure Multi-Party Computation Problem for Distributed Electronic Contract Management
158
Secure multi-party computation protocol using asymmetric encryption
159
Secure Multiparty Computations on Bitcoin
160
Secure Multi-party Confidential Protocol of Matrix Factorization
161
Secure multi-party consensus gossip algorithms
162
Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
163
Secure Multiparty Electronic Payments Using ECC Algorithm: A Comparative Study
164
Secure multiparty privacy preserving data aggregation by modular arithmetic
165
Secure multiparty quantum communication over telecom fiber networks
166
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
167
Secure multipath communication in mobile ad hoc networks
168
Secure multi-path construction in wireless sensor networks using network coding
169
Secure multi-path data deliver in sensor networks
170
Secure Multipath Routing Algorithm for Device-to-Device Communications for Public Safety over LTE Heterogeneous Networks
171
Secure multipath routing based on secret sharing in mobile ad hoc networks
172
Secure multipath routing for AMI network in Smart Grid
173
Secure Multipath Routing for Mobile Ad Hoc Networks
174
Secure multipath routing in wireless multihop networks based on erasure channel modeling
175
Secure Multipath Routing Protocol for Wireless Sensor Networks
176
Secure Multipath Routing Protocols in Wireless Sensor Networks: A Security Survey Analysis
177
Secure Multipath Routing Scheme for Mobile Ad Hoc Network
178
Secure multipath routing using link compromise metric in mobile ad hoc networks
179
Secure multipath transport for legacy Internet applications
180
Secure Multi-period Routing in the Delay Tolerant Networks
181
Secure Multiple Deployment in Wireless Sensor Networks
182
Secure Multiple XML Documents Publishing without Information Leakage
183
Secure multiple-input single-output communication - Part I: secrecy rates and switched power allocation
184
Secure multiple-input single-output communication - Part II: δ-secrecy symbol error probability and secrecy diversity
185
Secure Multiplex Coding Attaining Channel Capacity in Wiretap Channels
186
Secure multiplex coding with a common message
187
Secure multiplex coding with dependent and non-uniform multiple messages
188
Secure Multiplex Network Coding
189
Secure Multipliers Resilient to Strong Fault-Injection Attacks Using Multilinear Arithmetic Codes
190
Secure multi-spectral hand recognition system
191
Secure Multiterminal Source Coding With Side Information at the Eavesdropper
192
Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks
193
Secure multiuser communications in multiple decode-and-forward relay networks with direct links
194
Secure multiuser multiple amplify-and-forward relay networks in presence of multiple eavesdroppers
195
Secure Multi-User Transmission Using CoMP Directional Modulation
196
Secure music sharing with improved potato system using cryptographic techniques
197
Secure Mutual Authentication and Fair Billing for Roaming Service in Wireless Mobile Networks
198
Secure mutual authentication for IPTV broadcasting
199
Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations
200
Secure Name Resolution for Identifier-to-Locator Mappings in the Global Internet
201
Secure Naming for a Network of Information
202
Secure narrowband digital conferencing
203
Secure nearest neighbor revisited
204
Secure Negotiation in Virtual Organizations
205
Secure Neighbor Discovery in Mobile Ad Hoc Networks
206
Secure Neighbor Discovery through Overhearing in Static Multihop Wireless Networks
207
Secure Neighbor Discovery: Review, Challenges, Perspectives, and Recommendations
208
Secure neighbor position discovery in vehicular networks
209
Secure Neighbor Relation in Wireless Sensor Network
210
Secure neighborhood discovery: a fundamental element for mobile ad hoc networking
211
Secure Neighborhood Routing Protocol
212
Secure neighbour authentication in wireless sensor networks
213
Secure neighbour discovery in wireless mesh networks using connectivity information
214
Secure Nested Codes for Type II Wiretap Channels
215
Secure Network Attribution and Prioritization: A Coordinated Architecture for Critical Infrastructure
216
Secure Network Authentication with PassText
217
Secure Network Bandwidth Provisioning for Quality of Services (QoS) Guarantees
218
Secure network coding
219
Secure network coding against intra/inter-generation pollution attacks
220
Secure network coding and non-malleable codes: Protection against linear tampering
221
Secure network coding based on homomorpuic signature against pollution attacks
222
Secure network coding based on lattice signature
223
Secure network coding for distributed secret sharing with low communication cost
224
Secure network coding for multi-resolution wireless video streaming
225
Secure network coding for wireless routing
226
Secure Network Coding for Wiretap Networks of Type II
227
Secure Network Coding in DTNs
228
Secure Network Coding on a Wiretap Network
229
Secure Network Coding with a Cost Criterion
230
Secure network coding with erasures and feedback
231
Secure Network Coding With Erasures and Feedback
232
Secure network coding with minimum overhead based on hash functions
233
Secure network coding: Dependency of efficiency on network topology
234
Secure network communication using biometrics
235
Secure Network Component Architecture Model
236
Secure Network Configuration and Route Discovery for Hybrid Mobile Ad Hoc Networks
237
Secure network design: A layered approach
238
Secure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-distribution
239
Secure Network Management Integration of Security Mechanisms into Network Management Protocols
240
Secure Network Mobility (SeNEMO) for Real-Time Applications
241
Secure network objects
242
Secure network-coded wireless multicast for delay-sensitive data
243
Secure networked control systems against replay attacks without injecting authentication noise
244
Secure networked control systems under data integrity attacks
245
Secure Networking for Virtual Machines in the Cloud
246
Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms
247
Secure network-wide clock synchronization in wireless sensor networks
248
Secure node misbehaviors in mobile ad hoc networks
249
Secure node packing of large-scale wireless networks
250
Secure noisy network coding
251
Secure non real time image encryption algorithm development using cryptography & steganography
252
Secure Obfuscation for Tightly Structure-Preserving Encrypted Proxy Signatures
253
Secure Obfuscation of Conditional Re-encryption with Keyword Search
254
Secure obfuscation of EIGamal cryption system based on polynomials over finite fields
255
Secure object referencing for an object-oriented computing system
256
Secure object tracking protocol for Networked RFID Systems
257
Secure OCDM Transmission Using a Planar Multiport Encoder/Decoder
258
Secure OCDMA transmission using data pattern scrambling
259
Secure OCDM-based PON
260
Secure OFDM transmission based on multiple relay selection and cooperation
261
Secure OFDM-PON Based on Chaos Scrambling
262
Secure OFDM-PON System Based on Chaos and Fractional Fourier Transform Techniques
263
Secure official document mail systems for office automation
264
Secure OLSR
265
Secure OM2M Service Platform
266
Secure on premise - On demand services communication
267
Secure on-demand distance vector routing in ad hoc networks
268
Secure On-Demand Source Routing for Ad Hoc Networks
269
Secure one-round tripartite authenticated key agreement protocol from Weil pairing
270
Secure online examination architecture based on distributed firewall
271
Secure online exams on thin client
272
Secure online exams using students´ devices
273
Secure online image trading scheme using DCT coefficients and moment invariants feature
274
Secure Online Scientific Visualization of Atmospheric Nucleation Processes
275
Secure online sealed bid Auction
276
Secure On-Off Transmission Design With Channel Estimation Errors
277
Secure operation of power system with high wind penetration
278
Secure Operation, Control, and Maintenance of Future E-Enabled Airplanes
279
Secure Opportunistic Data Retrievals in Challenged Environments
280
Secure opportunistic scheduling with transmit antenna selection
281
Secure optical bit- and block-cipher transmission using a single multiport encoder/decoder
282
Secure Optical Burst Switching: Framework and Research Directions
283
Secure optical communication using random mode mixing and time-reversal symmetry in multimode fibers
284
Secure optical communication using single phase modulator for bit-by-bit code scrambling and DPSK data modulation
285
Secure optical communications
286
Secure optical communications
287
Secure optical communications using antisqueezed light with enhanced fluctuations
288
Secure optical communications using wavelength tunable optical filters
289
Secure optical communications utilizing PSK modulation, polarization multiplexing and coherent digital homodyne detection with wavelength and polarization agility
290
Secure Optical Internet: Attack detection and prevention mechanism
291
Secure optical network architectures utilizing wavelength hopping/time spreading codes
292
Secure optical networks based on quantum key distribution and weakly trusted repeaters
293
Secure optical OFDM signal transmission using electro-optic chaos
294
Secure Optical Transmission in a Point-to-Point Link With Encrypted CDMA Codes
295
Secure optical transmission in single-user channel using encrypted wireless CDMA codes
296
Secure optimal routing protocol in MANETs
297
Secure Orchestration Based Federation in Hybrid Cloud Environments
298
Secure Ordered Bucketization
299
Secure OS extensibility needn´t cost an arm and a leg
300
Secure OTP and Biometric Verification Scheme for Mobile Banking
301
Secure outage performance analysis for multicasting with linear equalization
302
Secure outage performance analysis of wireless multicasting through Weibull fading channel
303
Secure Out-of-Band Remote Management Using Encrypted Virtual Serial Consoles in IaaS Clouds
304
Secure Outsourced Attribute-Based Signatures
305
Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones
306
Secure Outsourcing of Matrix Operations as a Service
307
Secure Outsourcing of Modular Exponentiation with Single Untrusted Server
308
Secure Outsourcing of Multiple Modular Exponentiations
309
Secure Outsourcing of Network Flow Data Analysis
310
Secure Overlay Cloud Storage with Access Control and Assured Deletion
311
Secure Overlay for Multicast IPTV Streaming Using Trust Rendezvous Point
312
Secure overlay multicast infrastructure for P2P-based IPTV service
313
Secure Overlay Services (SOS): A critical analysis
314
Secure ownership transfer in multi-tag/multi-owner passive RFID systems
315
Secure P2P File Sharing System Based on Full-Text Retrieval
316
Secure P2P Programming on Top of Tuple Spaces
317
Secure Pairing Architecture for Wireless Mobile Devices
318
Secure pairwise broadcast time synchronization in wireless sensor networks
319
Secure Pairwise Key Establishment for Key Predistribution in Wireless Sensor Networks
320
Secure pairwise key establishment in vehicular networks
321
Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network
322
Secure partial dynamic reconfiguration with unsecured external memory
323
Secure partial reconfiguration of FPGAs
324
Secure partial repair in wireless caching networks with broadcast channels
325
Secure partial secret key issuing in Certificateless Public Key Infrastructure
326
Secure Password Authentication for Distributed Computing
327
Secure Password Authentication Protocol in Wireless Networks
328
Secure password detection with artificial neural networks
329
Secure Path Loss Prediction in Fringe Areas Using Fuzzy Logic Approach
330
Secure path loss prediction using fuzzy logic approach
331
Secure pattern based aggregation using query processing algorithm in wireless sensor networks
332
Secure pattern-based authentication against shoulder surfing attack in smart devices
333
Secure payment with NFC mobile phone in the SmartTouch project
334
Secure pay-per-view testbed
335
Secure PC Platform Based on Dual-Bus Architecture
336
Secure Peer Joining Process in Structured P2P System
337
Secure Peer Sampling Service: The Mosquito Attack
338
Secure peer-to-peer networking: the JXTA example
339
Secure peer-to-peer networks for trusted collaboration
340
Secure peer-to-peer trading for multiplayer games
341
Secure perceptual data hiding technique using information theory
342
Secure performance analysis of buffer-aided cognitive relay networks
343
Secure performance analysis of cognitive two-way relay system with an eavesdropper
344
Secure performance of time reversal precoding technique in miso OFDM systems
345
Secure personal authentication system for home network
346
Secure Personal Authentication through Remote System for E-Transactions (SPARSE)
347
Secure personal cloud storage
348
Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing
349
Secure personal network
350
Secure pervasive computing without a trusted third party
351
Secure Pervasive Computing without a Trusted Third Party
352
Secure pervasive social networking based on multi-dimensional trust levels
353
Secure Phase Comparison Schemes for Transmission-Line Protection Using Synchrophasors
354
Secure PHR Access Control Scheme for Healthcare Application Clouds
355
Secure physical access control with strong cryptographic protection
356
Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits
357
Secure Physical Layer Network Coding: Challenges and Directions
358
Secure Physical Layer using Dynamic Permutations in Cognitive OFDMA Systems
359
Secure physical-layer communication based on directly modulated antenna arrays
360
Secure physical-layer key generation protocol and key encoding in wireless communications
361
Secure Picture Data Partitioning for Cloud Computing Services
362
Secure Planning and Operations of Systems With Stochastic Sources, Energy Storage, and Active Demand
363
Secure Planning of Order Picking Systems with the Aid of Simulation
364
Secure Plug and Play Architecture for Field Devices
365
Secure policy agreement for privacy routing in wireless communication system
366
Secure policy-based management solutions in heterogeneous embedded systems networks
367
Secure Position Routing Using Ad hoc Network
368
Secure Position-Based Routing for VANETs
369
Secure positioning for shipping containers in ports and terminals using WSN
370
Secure positioning in wireless networks
371
Secure positioning of wireless devices with application to sensor networks
372
Secure positioning with non-ideal distance bounding protocols
373
Secure power and subcarrier auction in uplink full-duplex cellular networks
374
Secure Power Grid Infrastructure Simulation-Test System Creation and Telecommunication Network Implementation
375
Secure Power Grid Simulation on Cloud
376
Secure power supplies for British Telecom´s major computer centres
377
Secure Priority Based Inter-Vehicle Communication MAC Protocol for Highway Safety Messaging
378
Secure privacy and distributed group authentication for VANET
379
SecUre Privacy-presERving Medical Image CompRessiOn (SUPERMICRO)
380
Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data
381
Secure Private Cloud Architecture for Mobile Infrastructure as a Service
382
Secure private fragile watermarking scheme with improved tampering localisation accuracy
383
Secure Probability Map: Transmission Policy Design for Passive Eavesdroppers in Correlated Channels
384
Secure Problem Solving Scheme by Structured Natural Language
385
Secure problems solving scheme
386
Secure Problems Solving Scheme
387
Secure procedures to reconnect intelligent devices and recover content usage control information
388
Secure process control system of industrial networks
389
Secure processing of large scale databases in a cloud computing environment
390
Secure Profile Management in Smart Home Networks
391
Secure Profile Provisioning Architecture for Embedded UICC
392
Secure program update using broadcast encryption for clustered wireless sensor networks
393
Secure programs via game-based synthesis
394
Secure progressive transmission of compressed images
395
Secure Prophet Address Allocation for Mobile Ad Hoc Networks
396
Secure protection against synchronous and asynchronous power swings
397
Secure protocol for ad hoc transportation system
398
Secure Protocol for Fast EAP Authentication in Wireless Networks
399
Secure protocol for financial transactions using smartphones — SPFT formally proved by A VISPA
400
Secure Protocol for Incoming Sensor Node in the Dynamic Sensor Networks
401
Secure protocol for wireless communication within internet of military things
402
Secure protocol for wireless sensor network
403
Secure Protocol Implementation for Remote Bitstream Update Preventing Replay Attacks on FPGA
404
Secure protocol in mobile agent environment
405
Secure protocol lifecycle and its application in power industry
406
Secure protocol with variable security level using secret sharing scheme
407
Secure Protocols Enhancement Based on Radio-propagation Related Looser Assumptions in Mobile Ad hoc Networks
408
Secure Provable Data Possession for Object Storage System
409
Secure Provenance Transmission for Streaming Data
410
Secure provision of UMTS services over diverse access networks
411
Secure Proxy Service Using p-Fibonacci Transformation of Cosine Coefficients on Cloud File Sharing Environment
412
Secure pseudonym-based near field communication protocol for the consumer internet of things
413
Secure pseudo-random bit sequence generation using coupled linear congruential generators
414
Secure Public Digital Watermarking Detection Scheme
415
Secure Public Key Regime (SPKR) in vehicular networks
416
Secure Public Verification of IP Marks in FPGA Design Through a Zero-Knowledge Protocol
417
Secure publish-subscribe mediated virtual organizations
418
Secure Publish-Subscribe-Based In-Network Data Storage Service in Wireless Sensor Networks
419
Secure PVR — A novel recording scheme for content protection
420
Secure QR code system
421
Secure quality of service handling: SQoSH
422
Secure Quantization Based Data Embedding
423
Secure quantized target tracking in wireless sensor networks
424
Secure quantum imaging
425
Secure quantum key distribution (QKD) over 76 km of optical fiber
426
Secure quantum key distribution over 40 km of fiber with a pulsed heralded single photon source
427
Secure quantum packet transmission mechanism for wireless networks
428
Secure Query Processing in Delay Tolerant Network Using Java Cryptography Architecture
429
Secure query processing in distributed database management systems-design and performance studies
430
Secure query processing in intelligent database management systems
431
Secure query processing using AI techniques
432
Secure query-processing strategies
433
Secure quick response-payment(QR-Pay) system using mobile device
434
Secure Radio Resource Management in Cloud Computing Based Cognitive Radio Networks
435
Secure random number agreement for peer-to-peer applications
436
Secure random number generation using chaotic circuits
437
Secure random number generation using chaotic circuits
438
Secure Range Queries in Tiered Sensor Networks
439
Secure range query based on spatial index
440
Secure range-free localization scheme in Wireless sensor networks
441
Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data
442
Secure Ranked Keyword Search over Encrypted Cloud Data
443
Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud Computing
444
Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data
445
Secure rate-adaptive reconciliation
446
Secure reachability query on private shared graphs
447
Secure real time remote video monitoring using selective encryption
448
Secure Real-Time Integration of Services in a OSGi Distributed Environment
449
Secure Real-Time Traffic in Hybrid Mobile Ad Hoc Networks
450
Secure Real-time User Preference Collection for Broadcast Scheduling
451
Secure Re-authentication Scheme for 3G-WLAN Integrating Network Based on Protocol Composition Logic
452
Secure Referee Selection for Fair and Responsive Peer-to-Peer Gaming
453
Secure regenerating code
454
Secure regenerating codes using linear MBR/MSR codes and the all-or-nothing transform
455
Secure registration protocol for media appliances in wireless home networks
456
Secure Reincarnation of Compromised Servers Using Xen Based Time-Forking Virtual Machines
457
Secure Relativistic Bit Commitment with Fixed Channel Capacity
458
Secure Relay and Jammer Selection for Physical Layer Security
459
Secure Relay Beamforming for Simultaneous Wireless Information and Power Transfer in Nonregenerative Relay Networks
460
Secure relay beamforming over cognitive radio channels
461
Secure Relay Beamforming With Imperfect Channel Side Information
462
Secure relaying: Can publicly transferred keys increase degrees of freedom?
463
Secure Reliable Group Communication for Tactical Networks
464
Secure reliable multicast protocols in a WAN
465
Secure remote access from office to home
466
Secure remote access to an industrial generator with mobile devices
467
Secure remote access to an Internet Web server
468
Secure remote access to home automation networks
469
Secure remote access to Smart Energy Home area Networks
470
Secure remote access to substation information
471
Secure Remote Backup Protection of Transmission Lines Using Synchrophasors
472
Secure remote control model for information appliances
473
Secure remote control of field-programmable network devices
474
Secure Remote Electronic Voting
475
Secure remote matching with privacy: Scrambled support vector vaulted verification (S
2
V
3
)
476
Secure remote mobile payment architecture and application
477
Secure remote patient monitoring system
478
Secure remote reconfiguration of an FPGA-based embedded system
479
Secure Remote Storage through Authenticated Encryption
480
Secure remote updating of bitstream in partial reconfigurable embedded systems based on FPGA
481
Secure remote USIM (universal subscriber identity module) card application management protocol for W-CDMA networks
482
Secure rendering process in cloud computing
483
Secure replica allocation in cloud storage systems with heterogeneous vulnerabilities
484
Secure reporting of traffic forwarding activity in mobile ad hoc networks
485
Secure representation of multimedia content licenses
486
Secure Reputation Framework for BitTorrent
487
Secure Residential Gateways: OSGi services with Java Cards
488
Secure resilient high performance file system for distributed systems
489
Secure Resolution of End-Host Identifiers for Mobile Clients
490
Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks
491
Secure resource allocation for OFDMA two-way relay networks
492
Secure resource allocation in OFDMA-based cognitive radio networks with two-way relays
493
Secure Resource Control in Service Oriented Applications
494
Secure resource provisioning across multiple domains
495
Secure rewarding schemes
496
Secure RFID Authentication Protocol with Key Updating Technique
497
Secure RFID Authentication with Efficient Key-Lookup
498
Secure RFID Cross Certification Protocol Based on One-Time Random Number
499
Secure RFID Identification and Authentication with Triggered Hash Chain Variants
500
Secure RFID system based on lightweight block cipher algorithm of optimized S-box
501
Secure RFID Tag Ownership Transfer Based on Quadratic Residues
502
Secure Roaming Optimization for VoIP in 802.11 MAC Layer
503
Secure Robust Ergodic Uplink Resource Allocation in Relay-Assisted Cognitive Radio Networks
504
Secure Robust Resource Allocation in the Presence of Active Eavesdroppers Using Full-Duplex Receivers
505
Secure robust resource allocation using full-duplex receivers
506
Secure role based access control systems using aspect-orientation designing
507
Secure route discovery against wormhole attacks in sensor networks using mobile agents
508
Secure Route Discovery for Preventing Black Hole Attacks on AODV-Based MANETs
509
Secure Route Discovery for preventing black hole attacks on AODV-based MANETs
510
Secure route discovery for QoS-aware routing in ad hoc networks
511
Secure Route Optimization for MIPv6 Using Enhanced CGA and DNSSEC
512
Secure route optimization for Mobile Network Node using secure address proxying
513
Secure Route Selection Based on Trust Territories for Ad Hoc Networks
514
Secure Route Selection Based on Trust Value for Distributed Networks
515
Secure Routing Algorithm Based on Power-Efficient for Wireless Sensor Networks
516
Secure Routing and Broadcast Authentication in Heterogeneous Sensor Networks
517
Secure Routing and Intrusion Detection in Ad Hoc Networks
518
Secure Routing Approach for Unstructured P2P Systems
519
Secure Routing Based on Network Coding in Wireless Sensor Networks
520
Secure routing based on the neighbor table in wireless sensor networks
521
Secure routing for large-scale wireless sensor networks
522
Secure Routing for Mobile Ad Hoc Networks
523
Secure routing for mobile ad hoc networks
524
Secure routing for supporting ad-hoc extreme emergency infrastructures
525
Secure routing in a vehicular ad hoc network
526
Secure routing in ad hoc networks and a related intrusion detection problem
527
Secure routing in DSR to mitigate black hole attack
528
Secure Routing in Integrated Mobile Ad hoc Network (MANET)-Internet
529
Secure Routing in Sensor Networks
530
Secure Routing in Structured Peer to Peer File-Sharing Networks
531
Secure routing in wireless sensor networks: attacks and countermeasures
532
Secure Routing Protocol Base on Secure Path in Ad Hoc Wireless Networks
533
Secure Routing Protocol based Trust for Ad Hoc Networks
534
Secure Routing Protocol Cluster-Gene-Based for Wireless Sensor Networks
535
Secure Routing Protocol Considering Load Distribution in Mobile Ad Hoc Networks
536
Secure routing protocol design for UAV Ad hoc NETworks
537
Secure routing protocol design for UAV ad hoc networks
538
Secure routing protocol for Hybrid Wireless Mesh Network (HWMN)
539
Secure Routing Protocol for Mobile Wireless Sensor Network
540
Secure routing protocol in MANET using TAC
541
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
542
Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes for Multiple Signers
543
Secure Routing Using Ant Colony Method and RPS Algorithm
544
Secure Routing with an Integrated Localized Key Management Protocol in MANETs
545
Secure Routing with the AODV Protocol
546
Secure routing with time-space cryptography for mobile ad-hoc networks
547
Secure Safety Messages Broadcasting in Vehicular Network
548
Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs
549
Secure satellite communication & beacon tracking device
550
Secure Satellite Communication Systems Design With Individual Secrecy Rate Constraints
551
Secure SCADA network supporting NERC CIP
552
Secure scalable disaster electronic medical record and tracking system
553
Secure Scalable Microgrid Test Bed at Sandia National Laboratories
554
Secure scalable streaming and secure transcoding with JPEG-2000
555
Secure scalable streaming enabling transcoding without decryption
556
Secure Scalable Streaming for Integrity Verification of Media Data
557
Secure Scalable Video Transcoding Over Wireless Network
558
Secure Scalar Product for Big-Data in MapReduce
559
Secure scan design using improved random order and its evaluations
560
Secure scan design using shift register equivalents against differential behavior attack
561
Secure Scan Design with Dynamically Configurable Connection
562
Secure scan design with Isomorphic registers
563
Secure scan techniques: a comparison
564
Secure scan: a design-for-test architecture for crypto chips
565
Secure Scan: A Design-for-Test Architecture for Crypto Chips
566
Secure scheme during vertical handoff in integrated heterogeneous wireless systems
567
Secure Scheme of Digital Fingerprint Based Piracy Tracking
568
Secure scripting based composite application development: Framework, architecture, and implementation
569
Secure seafloor container CO
2
storage
570
Secure Search of Private Documents in an Enterprise Content Management System
571
Secure Search Over Encrypted Data in Cloud Computing
572
Secure second price auctions with a rational auctioneer
573
Secure Secret Key Distribution and Storage in Wireless Sensor Networks
574
Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs
575
Secure selective encryption of compressed audio
576
Secure self organization of wireless sensor network: A new approach
577
Secure self-adaptive framework for distributed smart home sensor network
578
Secure self-adaptive mission-critical communication for distributed smart home sensor network
579
Secure self-certified COTS
580
Secure self-distributed certificate scheme for mobile ad hoc networks
581
Secure Self-Recovery Image Authentication Using Randomly-Sized Blocks
582
Secure Semantic Sensor Web and Pervasive Computing
583
Secure semi-fragilewatermarking for image authentication
584
Secure Sensing over Named Data Networking
585
Secure sensor data management model in a sensor - cloud integration environment
586
Secure sensor data transmission channel overlay on passive optical networks
587
Secure sensor data transmission over wireless cellular networks
588
Secure sensor information management and mining
589
Secure sensor network SUM aggregation with detection of malicious nodes
590
Secure Sensor Networks for Critical Infrastructure Protection
591
Secure sensor networks for public safety command and control system
592
Secure sensor node with Raspberry Pi
593
Secure sensor platform (SSP) for materials´ sealing and monitoring applications
594
Secure Server Switching System
595
Secure Service and Management for Security-Critical Wireless Sensor Network
596
Secure service composition in sensor Web
597
Secure Service Composition with Symbolic Effects
598
Secure service discovery in home networks
599
Secure Service Discovery with Distributed Registries
600
Secure service distribution for VErsatile Service-Oriented Wireless Mesh Networks
601
Secure service interaction for collaborative business processes in the inter-cloud
602
Secure service mechanism of video surveillance system based on H.264/SVC
603
Secure service provision in smart grid communications
604
Secure Service Sharing over Networks for Mobile Users Using Service Network Graphs
605
Secure service to prevent data breaches in cloud
606
Secure service-oriented architecture for mobile transactions
607
Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes
608
Secure session key exchange scheme for Smart Grid Home Area Networks
609
Secure session management with cookies
610
Secure session on mobile: An exploration on combining biometric, trustzone, and user behavior
611
Secure setup of inter-provider Ethernet services based on a novel naming schema
612
Secure sharing and searching for real-time video data in mobile cloud
613
Secure sharing of electronic health records in clouds
614
Secure sharing of financial records with third party application integration in cloud computing
615
Secure sharing of health data over cloud
616
Secure Sharing of Item-Level Data in the Cloud
617
SeCure Sharing Of Mobile Device Data Using Public Cloud
618
Secure sharing of personal health records on cloud using key-aggregate cryptosystem
619
Secure sharing with cryptography in cloud computing
620
Secure Short Hierarchical Identity-Based Signature in the Standard Model
621
Secure SIFT-based sparse representation for image copy detection and recognition
622
Secure signal processing in the cloud: enabling technologies for privacy-preserving multimedia cloud processing
623
Secure signal transfer by optical near-field interactions
624
Secure signaling and access control for ATM networks
625
Secure Signaling in Next Generation Networks with NSIS
626
Secure signals transmission based on quaternion encryption scheme
627
Secure Signcryption Scheme Based on a Hybrid Encryption
628
Secure similarity based document retrieval system in cloud
629
Secure Similarity Coefficients Computation with Malicious Adversaries
630
Secure Similarity Search
631
Secure single packet IP Traceback mechanism to identify the source
632
Secure Single Sign-On Schemes Constructed from Nominative Signatures
633
Secure single-sensor digital camera
634
Secure single-side-band signal generation using two fractional Hilbert transformers
635
Secure SIP signalling service in IMS network
636
Secure Site Authentication and Message Transmission Based on Grid Environment
637
Secure Sketch Search for Document Similarity
638
Secure smart card reader design
639
Secure smart homes using Jini and UIUC SESAME
640
Secure smart meter infrastructure in Multi-dwelling environment
641
Secure smart phones fitted to mobile Ad hoc networks and devices for security control
642
Secure Smartphone-Based Multimedia Guiding Services in Cultural Environments
643
Secure SMS Communication Using Encryption Gateway and Digital Signature
644
Secure Snaps: A New Forward Secrecy Cryptosystem for Self-Destructing Messages in Mobile Services
645
Secure Sockets Layer
646
Secure Software Architecture, Design, Implementation and Assurance
647
Secure software architectures
648
Secure software architectures design by aspect orientation
649
Secure software attestation for military telesurgical robot systems
650
Secure Software Design in Practice
651
Secure Software Development by Example
652
Secure Software Development through Coding Conventions and Frameworks
653
Secure Software Distribution
654
Secure software download for programmable mobile user equipment
655
Secure Software Engineering: A New Paradigm
656
Secure Software Installation on Smartphones
657
Secure software upload in an intelligent vehicle via wireless communication links
658
Secure software: management control is a key issue
659
Secure solution for mobile access to patient´s health care record
660
Secure Solution to Data Transfer from Sensor Node to Sink against Aggregator Compromises
661
Secure Sound Classification: Gaussian Mixture Models
662
Secure Source Coding With a Helper
663
Secure source coding with a helper
664
Secure source coding with a public helper
665
Secure Source Coding With Action-Dependent Side Information
666
Secure source coding with action-dependent side information
667
Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks
668
Secure space-time block coding via artificial noise alignment
669
Secure Space-Time Block Coding without Transmitter CSI
670
Secure space-time communication
671
Secure sparse network coding for reliable routing in large scale DTMN
672
Secure Spatial Authentication for Mobile Stations In Hybrid 3G-WLAN Serving Networks
673
Secure Spatial Authentication using Cell Phones
674
Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers
675
Secure spectrum sharing via rate adaptation
676
Secure speech and data communication over the public switching telephone network
677
Secure speech biometric templates for user authentication
678
Secure speech communication over public switched telephone network
679
Secure Speech Encryption System Using Segments for Speech Synthesis
680
Secure Splice Closures for Optical Fiber Systems
681
Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System
682
Secure Split-Test for preventing IC piracy by untrusted foundry and assembly
683
Secure Spread Image Watermarking Scheme in 3D-DCT Domain
684
Secure Spread Spectrum Communication Using Ultrawideband Random Noise Signals
685
Secure spread spectrum watermarking for images, audio and video
686
Secure spread spectrum watermarking for multimedia
687
Secure spread: an integrated architecture for secure group communication
688
Secure Spread-Spectrum Watermark Detection Based on Extended TPM
689
Secure state estimation and control using multiple (insecure) observers
690
Secure state estimation: Optimal guarantees against sensor attacks in the presence of noise
691
Secure State Processing
692
Secure state reconstruction in differentially flat systems under sensor attacks using satisfiability modulo theory solving
693
Secure state-estimation for dynamical systems under active adversaries
694
Secure Stateless Trust Negotiation
695
Secure stealth transmission over an existing public fiber-optical network
696
Secure steganographic method
697
Secure steganography in audio using inactive frames of VoIP streams
698
Secure Steganography in Compressed Video Bitstreams
699
Secure Steganography Technique Based on Bitplane Indexes
700
Secure Steganography using Colour Palette Decomposition
701
Secure steganography using hybrid domain technique
702
Secure Steganography: Statistical Restoration of the Second Order Dependencies for Improved Security
703
Secure Stochastic ECG Signals Based on Gaussian Mixture Model for
-Healthcare Systems
704
Secure storage and access of data in cloud computing
705
Secure Storage for Physically Exposed Web- and Application Servers
706
Secure storage of cryptographic keys within random volumetric materials
707
Secure Storage of Data in Cloud Computing
708
Secure Storage Service for IaaS Cloud Users
709
Secure storage system and key technologies
710
Secure strategy for networked manufacturing system
711
Secure subscription management on agent based platforms
712
Secure successive refinement with degraded side information
713
Secure super grids™: A new solution for secure power in critical urban centers
714
Secure supply-chain protocols
715
Secure Symmetrical Multilevel Diversity Coding
716
Secure synchronization of a class of chaotic systems from a nonlinear observer approach
717
Secure Synchronization of Periodic Updates in Ad Hoc Networks
718
Secure system architectures and integration
719
Secure system composition: five practical initiatives
720
Secure System Development for Integrated Cloud Applications
721
Secure system development in industry: a perspective from Digital Equipment
722
Secure systems design
723
Secure systems-defence in depth
724
Secure systolic architecture for montgomery modular multiplication algorithm
725
Secure Systolic Montgomery Modular Multiplier Over Prime Fields Resilient to Fault-Injection Attacks
726
Secure systolic Montgomery modular multiplier resilient to Hardware Trojan and Fault-Injection attacks
727
Secure Tag Search in RFID Systems Using Mobile Readers
728
Secure target detection and tracking in mission critical wireless sensor networks
729
Secure TCP/IP communications over DVB-S/DVB-RCS using chaotic sequences
730
Secure Team-Based EPR Access Acquisition in Wireless Networks
731
Secure Technique for Collision Avoidance in Inter-Vehicular Adhoc Network
732
Secure techniques and methods for authenticating visually impaired mobile phone users
733
Secure Template Protection in Touch-less Based Fingeprint Verification System
734
Secure the control system against DoS attacks: A JDL data fusion method
735
Secure the image-based simulated telesurgery system
736
Secure the Internet, One Home at a Time
737
Secure the signaling messages of mobile IPv6
738
Secure Third Party Auditor for Ensuring Data Integrity in Cloud Storage
739
Secure third party distribution of XML data
740
Secure Threshold Order-Specified Multi-signature Scheme in MANET
741
Secure Time Synchronization against Malicious Attacks for Wireless Sensor Networks
742
Secure time synchronization and efficiency enhancement using improved IH-MAC
743
Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-Based Approach
744
Secure time synchronization protocols for wireless sensor networks
745
Secure token passing at application level
746
Secure Top-
Query Processing in Unattended Tiered Sensor Networks
747
Secure top-k query processing via untrusted location-based service providers
748
Secure top-k query scheme in wireless sensor networks
749
Secure topology discovery through network-wide clock synchronization
750
Secure Track Verification
751
Secure Tracking in Sensor Networks
752
Secure transactions using mobile agents with TTP
753
Secure transcoding for compressive multimedia sensing
754
Secure transcoding with JPSEC confidentiality and authentication
755
Secure transfer of medical images using hybrid encryption: Authentication, confidentiality, integrity
756
Secure transmission based on ergodic fading channel uncertainty
757
Secure Transmission Design and Performance Analysis for Cooperation Exploring Outdated CSI
758
Secure Transmission for Multiuser Relay Networks
759
Secure Transmission for Relay Wiretap Channels in the Presence of Spatially Random Eavesdroppers
760
Secure transmission for relay-eavesdropper channels using polar coding
761
Secure Transmission in Cooperative Networks with Weak Eavesdroppers
762
Secure Transmission in Downlink Cellular Network with a Cooperative Jammer
763
Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection With Outdated CSI
764
Secure transmission in multi-antenna hybrid satellite-terrestrial relay networks in the presence of eavesdropper
765
Secure Transmission in Multicell Massive MIMO Systems
766
Secure transmission in multi-cell massive MIMO systems
767
Secure Transmission in OFDM Systems by Using Time Domain Scrambling
768
Secure transmission mechanism for networked control systems under deception attacks
769
Secure transmission medical data for pervasive healthcare system using android
770
Secure Transmission Model for Structured Data
771
Secure transmission network using chaotic lasers
772
Secure transmission of a Gaussian source over Gaussian channels with side information
773
SECURE TRANSMISSION OF COMPRESSED IMAGES
774
Secure transmission of data by splitting image
775
Secure transmission of data using audio watermarking with protection on synchronization attack
776
Secure transmission of gate level description
777
Secure transmission of medical images by watermarking technique
778
Secure transmission of medical information using IRIS recognition and steganography
779
Secure transmission of medical records using high capacity steganography
780
Secure transmission of sensitive data using multiple channels
781
Secure transmission of sensitive data using multiple channels
782
Secure Transmission of Sources Over Noisy Channels With Side Information at the Receivers
783
Secure transmission of the prescription order communication system based on the internet and the public-key infrastructure using master smart cards in the 2-way type terminal
784
Secure transmission over an existing public WDM lightwave network
785
Secure transmission over fast fading multiple-antenna Gaussian broadcast channel with confidential messages
786
Secure transmission power of cognitive radios for dynamic spectrum access applications
787
Secure Transmission Scheme for SWIPT in MISO Broadcast Channel with Confidential Messages and External Eavesdroppers
788
Secure transmission scheme in MIMO communication systems with simultaneous wireless information and power transfer
789
Secure transmission test method of ZigBee protocol based on randomness detection
790
Secure transmission through multihop relaying in wireless body area networks
791
Secure transmission using an untrusted relay with scaled compute-and-forward
792
Secure transmission using decode-and-forward protocol for underlay cognitive radio networks
793
Secure Transmission Using MIMO Precoding
794
Secure transmission via transmit antenna selection in MIMO wiretap channels
795
Secure Transmission With Antenna Selection in MIMO Nakagami-
Fading Channels
796
Secure transmission with artificial noise in the multiuser downlink: Secrecy sum-rate and optimal power allocation
797
Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation
798
Secure transmission with chaotic lasers synchronized by electrical injection
799
Secure Transmission with Hybrid Relay Scheme: Relaying and Jamming
800
Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel
801
Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel
802
Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks
803
Secure Transmission with Parallel Relays
804
Secure transparent mobile IP for intelligent transportation systems
805
Secure Transport Protocols for DDoS Attack Resistant Communication
806
Secure traversal of information over wireless mesh networks
807
Secure Trust Delegation for Sharing Patient Medical Records in a Mobile Environment
808
Secure trust management for mobile platforms
809
Secure Trust Management in Distributed Computing Systems
810
Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation
811
Secure tunneling of high-precision clock synchronization protocols and other time-stamped data
812
Secure Turbo Codes in Impulsive Noise Channel
813
Secure two and multi-party association rule mining
814
Secure two party comparison over encrypted data
815
Secure Two-Party Computation in Social Cloud Based on Reputation
816
Secure two-party computation of the quadratic function´s extreme minimal value
817
Secure two-party computation with AES-128: Generic approach and exploiting specific properties of functions approach
818
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
819
Secure Two-Party Multi-Dimensional Vector Comparison Protocol
820
Secure Two-Party Rank Correlation Computations for Recommender Systems
821
Secure Two-Way Transfer of Measurement Data
822
Secure TWRC system based on channel quantized PNC
823
Secure Type-Based Multiple Access
824
Secure type-based multiple access: Transmission strategy and analysis for perfect secrecy
825
Secure Ubiquitous House and Facility Control Solution
826
Secure underwater acoustic communication based on a robust key generation scheme
827
Secure unicast address resolution protocol (S-UARP) by extending DHCP
828
Secure Unified Cellular Ad Hoc Network Routing
829
Secure Universal Plug and Play network
830
Secure UNIX* - UTX/32S
831
Secure update Mechanism for Remote Update of FPGA-Based System
832
Secure UPnP services based on group signature algorithm
833
Secure upstream transmission technique using two polarization beam splitters for CSMA/CD-based Ethernet passive optical networks
834
Secure use of the World Wide Web: keeping browsers and servers from getting snared
835
Secure user authentication in cloud computing
836
Secure user authentication in cloud computing management interfaces
837
Secure User Authentication in Multimedia Systems
838
Secure user identification for consumer electronics devices
839
Secure user-friendly Wi-Fi access point joining
840
Secure User-Plane Location (SUPL) Architecture For Assisted GPS (A-GPS)
841
Secure V2V Communication With Certificate Revocations
842
Secure V2V communications: Performance impact of computational overheads
843
Secure VANET applications with a refined group signature
844
Secure Variable Data Rate Transmission
845
Secure Vault: A privacy preserving reliable architecture for Secure Social Networking
846
Secure Vault: An Intrusion Prevention Model for Ender-Users
847
Secure Vehicular Communication for Safety Applications - A Measurement Study
848
Secure vehicular communication systems: design and architecture
849
Secure vehicular communication systems: implementation, performance, and research challenges
850
Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme
851
Secure Verification of Location Claims on a Vehicular Safety Application
852
Secure vertical integration for building automation networks
853
Secure video player for mobile devices integrating a watermarking-based tracing mechanism
854
Secure video processing: Problems and challenges
855
Secure video transcoders based on correlation preserving sorting algorithm
856
Secure Video Watermarking using Random Statistics and Combinatorial Optimization
857
Secure Virtual Application Distribution
858
Secure Virtual Backbone-Based Power Management for Ad Hoc Networks
859
Secure Virtual Disk Images for Grid Computing
860
Secure Virtual Enclaves: supporting coalition use of distributed application technologies
861
Secure virtual LANS: Remote Passage
862
Secure Virtual Layer Management in Clouds
863
Secure Virtual Machine Execution under an Untrusted Management OS
864
Secure virtual machine migration (SV2M) in cloud federation
865
Secure virtual personal cloud service based on CCN/VPC
866
Secure Virtual Private LAN Services: An overview with performance evaluation
867
Secure virtual private networking over inmarsat packet-based services
868
Secure virtualised environment
869
Secure virtualization in cloud computing
870
Secure Visualization of Authentication Information: A Case Study
871
Secure Visualization of GIS Data
872
Secure VM backup and vulnerability removal in infrastructure clouds
873
Secure voice communication via GSM network
874
Secure voice over GSM and other low bit rate systems
875
Secure voice over Internet Protocol (voIP) using virtual private networks (VPN) and Internet Protocol Security (IPSec)
876
Secure voice service MW 3026 and MW 3026 S-MR C500 amadeus station
877
Secure VoIP architecture based on honeypot technology
878
Secure VoIP Using a Bare PC
879
Secure Voting in the Cloud Using Homomorphic Encryption and Mobile Agents
880
Secure water distribution using an embedded based system
881
Secure watermark detection schemes
882
Secure watermark detection with nonparametric decision boundaries
883
Secure watermark verification scheme
884
Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues
885
Secure WBAN using rule-based IDS with biometrics and MAC authentication
886
Secure wearable and implantable body sensor networks in hazardous environments
887
Secure Web 2.0 Content Sharing Beyond Walled Gardens
888
Secure Web Application Development and Global Regulation
889
Secure web based home automation: Application layer based security using embedded programmable logic controller
890
Secure Web Based Single Sign-On (SSO) Framework Using Identity Based Encryption System
891
Secure Web Browsing with the OP Web Browser
892
Secure web framework for mobile devices
893
Secure web referral service
894
Secure Web Referral Services for Mobile Cloud Computing
895
Secure Web scripting
896
Secure Web Service Composition with Untrusted Broker
897
Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing
898
Secure Web services for low-cost devices
899
Secure Web-based applications with XML and RBAC
900
Secure Web-based monitoring and control system
901
Secure Web-Based Sharing of Health Information Services Using Ad-Hoc Dynamic Coalitions
902
Secure Wi-Fi sharing at global scales
903
Secure wireless collection and distribution of commercial airplane health data
904
Secure wireless collection and distribution of commercial airplane health data
905
Secure Wireless Communication and Optimal Power Control Under Statistical Queueing Constraints
906
Secure wireless communication system for smart grid with rechargeable electric vehicles
907
Secure Wireless Communication with Dynamic Secrets
908
Secure wireless communication with random phases in transmitter under MISO-OFDM system
909
Secure wireless communications using secret sharing and vector coding
910
Secure wireless communications via cooperation
911
Secure wireless communications via cooperative relaying and jamming
912
Secure wireless communications via exhaustive cooperative jamming against a single eavesdropper
913
Secure wireless communications: Secret keys through multipath
914
Secure wireless data communications for distribution automation in the Smart Grid
915
Secure wireless data link for low-cost telemetry and telecommand applications
916
Secure Wireless Embedded Systems Via Component-based Design
917
Secure wireless energy harvesting-enabled AF-relaying SWIPT networks
918
Secure wireless information and power transfer in large-scale MIMO relaying systems with imperfect CSI
919
Secure Wireless Infrastructures and Mobile Learning for Deaf and Hard-of-Hearing Students
920
Secure wireless Internet access in public places
921
Secure wireless LAN service at a COOP cafeteria
922
Secure wireless local area network (SWLAN)
923
Secure wireless location services
924
Secure wireless monitoring and control systems for smart grid and smart home
925
Secure Wireless Multicast for Delay-Sensitive Data via Network Coding
926
Secure Wireless Multicast for Delay-Sensitive Prioritized Data Using Network Coding
927
Secure wireless multicasting in presence of multiple eavesdroppers
928
Secure wireless multicasting through co-existing MIMO radio systems
929
Secure wireless multicasting through Nakagami-m fading MISO channel
930
Secure wireless multicasting through Rayleigh fading channels — A secrecy tradeoff
931
Secure Wireless Multimedia Sensor Networks: A Survey
932
Secure Wireless Network Connectivity with Multi-Antenna Transmission
933
Secure Wireless Network in Quadrilateral Region
934
Secure wireless networking
935
Secure wireless powering and interrogation of an implantable microvalve
936
Secure wireless remote access platform in power utilities based on SSL VPN
937
Secure Wireless Sensor Networks
938
Secure wireless sensor networks with dynamic window for elliptic curve cryptography
939
Secure Wireless Transmission Based on Precoding-Aided Spatial Modulation
940
Secure wireless vehicle monitoring and control
941
Secure Workflow Development from Early Requirements Analysis
942
Secure workflow environment
943
Secure Workflow Execution in Grid Environments
944
Secure XML labeling for efficient XML content dissemination
945
Secure yoking proof protocol for RFID systems
946
Secure your Northbound SDN API
947
Secure zone based routing protocol for mobile adhoc networks
948
Secure Zones: An Attribute-Based Encryption advisory system for safe firearms
949
Secure, Autonomous, Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations
950
Secure, Autonomous, Intelligent Controller for Integrating Distributed Sensor Webs
951
Secure, blind image watermarking technique for copyright protection
952
Secure, Dependable, and High Performance Cloud Storage
953
Secure, Disjoint, Multipath Source Routing Protocol(SDMSR) for Mobile Ad-Hoc Networks
954
Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud
955
Secure, Efficient Data Transport and Replica Management for High-Performance Data-Intensive Computing
956
Secure, fast handhoff techniques for 802.1X based wireless network
957
Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems
958
Secure, intuitive and low-cost device authentication for Smart Grid networks
959
Secure, Mobile Visual Sensor Networks Architecture
960
Secure, Offline Feedback to Convey Instructor Intent
961
Secure, Performance-Oriented Data Management for nanoCMOS Electronics
962
Secure, privacy-preserving, distributed motor vehicle event data recorder
963
Secure, Real-Time and Multi-Threaded General-Purpose Embedded Java Microarchitecture
964
Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES)
965
Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption
966
Secure/Multipurpose Internet Mail Extensions
967
Secure-broadcast codes over linear-deterministic channels
968
SecureC: control-flow protection against general buffer overflow attack
969
SecureCast: A Secure Media Streaming Scheme over Peer-to-Peer Networks
970
SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments
971
SecureComm 2007 AD HOC NETWORKS - Session 3
972
SecureComm 2007 Anonymity and data sanitization - Session 2
973
SecureComm 2007 Collaborative security and trust management - Session 1
974
SecureComm 2007 Intrusion detection and malware ropagation - Session 1
975
SecureComm 2007 Network and telecommunications security - Session 5
976
SecureComm 2007 Paper - invited talk
977
SecureComm 2007 Paper track - Session 0
978
SecureComm 2007 Paper track - Session 1
979
SecureComm 2007 Paper track - Session 1
980
SecureComm 2007 Paper track - Session 2
981
SecureComm 2007 Paper track - Session 2
982
SecureComm 2007 Paper track - Session 3
983
SecureComm 2007 Paper track - Session 3
984
SecureComm 2007 Peer-to-peer applications - Session 2
985
SecureComm 2007 Privacy - Session 3
986
SecureComm 2007 SENSOR NETWORKS I - Session 4
987
SecureComm 2007 Sensor networks II - session 8
988
SecureComm 2007 Web and application security - Session 7
989
SecureComm 2007 Worms, viruses and vehicular networks - Session 6
990
SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems
991
Secured Advanced Federated Environment (SAFE): a NASA solution for secure cross-organization collaboration
992
Secured and effective approach for remote monitoring of large network of heterogeneous ATMs
993
Secured and Lossless Watermarking Technique for Patent Infringement
994
Secured and reliable VM migration in personal cloud
995
Secured and Seamless Handoff in Wireless Fourth Generation Systems
996
Secured and Trusted Service Provision in Pervasive Environment
997
Secured Approach for Hiding Data in MS Word Document Using MCDFF
998
Secured architecture for inter-VM traffic in a Cloud environment
999
Secured architecture for remote virtual desktops
1000
Secured authentication using challenge-response and quick-response code for Android mobiles