<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Secured Backup Routing Protocol for Ad Hoc Networks
2
Secured Bilateral Rendezvous using self interference cancellation in wireless networks
3
Secured biometric template
4
Secured by design - learning from the past to secure the future!
5
Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors
6
Secured cellular banking protocols using virtual internet with digital watermarking
7
Secured chaotic cognitive radio system using advanced encryption standard
8
Secured charging of electric vehicles at unattended stations using Verilog HDL
9
Secured cloud storage for strategic applications - A case study
10
Secured Communication between Mobile Devices and Smart Home Appliances
11
Secured communication for GSM networks
12
Secured communication for MANETS in military
13
Secured communication in cognitive MIMO schemes under hardware impairments
14
Secured Communication in Real Time VANET
15
Secured communication using Steganography Framework with sample RTF implementation
16
Secured communications-zone multiple input multiple output visible light communications
17
Secured cooperative cognitive radio networks with relay selection
18
Secured cooperative multi-agent system in limited resources for intelligent sensor network
19
Secured crypto-biometric system based on session key navigation
20
Secured data communication system using RSA with mersenne primes and Steganography
21
Secured data destruction in cloud based multi-tenant database architecture
22
Secured data handling system using ethernet
23
Secured data hiding of invariant sized secrete image based on Discrete and Hybrid Wavelet transform
24
Secured data integrity routing for Wireless Sensor Networks
25
Secured Data Management Paradigm for Mobile Grid Environment Using Surrogate Objects
26
Secured data partitioning in multi cloud environment
27
Secured data storage and error tolerant design in cloud computing
28
Secured data storage on cloud systems via wavefront multiplexing
29
Secured Data Transmission in Adhoc Networks Supporting Heterogeneous Interfaces
30
Secured data transmission in energy efficient mobile adhoc network
31
Secured data transmission through audio signal (SDTAS)
32
Secured distributed discovery services in the EPCglobal network
33
Secured distributed document clustering & keyphrase extraction algorithm in structured Peer to Peer networks
34
Secured document management through a third party auditor scheme in Cloud Computing
35
Secured Dual Mode Logic (DML) as a countermeasure against Differential Power Analysis
36
Secured e-health data retrieval in DaaS and Big Data
37
Secured electronic voting machine using biometric
38
Secured elliptic curve cryptosystems for scan based VLSI architecture
39
Secured energy-aware sleep scheduling algorithm in duty-cycled sensor networks
40
Secured enterprise access with strong SIM authentication
41
Secured fast prediction of cloud data stream with balanced load factor using Ensemble Tree Classification
42
Secured Flipped Scan-Chain Model for Crypto-Architecture
43
Secured Flooding Time Synchronization Protocol
44
Secured Fuzzy Based Routing Framework for dynamic wireless sensor networks
45
Secured GPS based traffic monitoring system in pervasive environment
46
Secured Group Communication Protocol
47
Secured Handover Key Management among LTE Entities Using Device Certification
48
Secured Hardware Design - An Overview
49
Secured Health Care Information exchange on cloud using attribute based encryption
50
Secured histories for presence systems
51
Secured Identity Based Routing and privacy preservation in Wireless Mesh Networks
52
Secured Image Transmission Using Wavelets for Spread Spectrum Communication in a Remote Surveillance System
53
Secured image transmission with GA based Audio Steganography
54
Secured indoor powerline communication using CDMA technique
55
Secured information service platforms effective in case of disasters — Using multilayered communications network
56
Secured Key Distribution Scheme for Cryptographic Key Management System
57
Secured key exchange protocol in wireless mobile ad hoc networks
58
Secured link quality, delay and energy aware routing protocol (SLQDEARP) for mobile Ad Hoc networks
59
Secured Link TT & C Antennas
60
Secured media latching in VoIP networks
61
Secured Mobile Device Software Update over IP Networks
62
Secured mobile messaging
63
Secured mobile multimedia communication for wireless Internet
64
Secured MPEG-21 Digital Item Adaptation for H.264 Video
65
Secured multi-identity mobile infrastructure and offline mobile-assisted micro-payment application
66
Secured multimedia authentication system for wireless sensor network data related to Internet of Things
67
Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots
68
Secured mutual authentication between two entities
69
Secured mVoIP Service over Cloud and Container-Based Improvement
70
Secured MyVirtualPDA using advanced encryption standard
71
Secured net-banking by &thetas;-Vigenere in Syverson´s protocol
72
Secured network authentication using biometrics application
73
Secured Network Model for Management Information System Based On IP Security (IPSec) Encryption Using Multilayered Approach of Network Security
74
Secured networking by sandboxing LINUX 2.6
75
Secured node-to-node key agreement for wireless sensor networks
76
Secured on demand Position Based Private Routing Protocol for mobile Adlloc network-SO2P
77
Secured open source-based set of tools for collaborative networks
78
Secured Operation Planning on Service Networks
79
Secured Ownership Transfer Scheme for Low-Cost RFID Tags
80
Secured packet inspection with hierarchical pattern matching implemented using incremental clustering algorithm
81
Secured PARTY Protocol For Self-Organized Networks
82
Secured radio communication based on fusion of cryptography algorithms
83
Secured relay-assisted atmospheric optical code-division multiple-access systems over turbulence channels
84
Secured remote tracking of critical autonomic computing applications
85
Secured Roaming Over WLAN and WIMAX Networks
86
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
87
Secured routing over manet using Enhanced Secured Routing (ESR)
88
Secured scrambling codes for vehicular control and navigation
89
Secured secret color image sharing with steganography
90
Secured selective encryption algorithm for MPEG-2 video
91
Secured short time automated toll fee collection for private group transportation
92
Secured Smart Card Using Palm Vein Biometric On-Card-Process
93
Secured steganography algorithm based random function
94
Secured transmission in cooperative groups using Group Key Management Protocol
95
Secured Two Phase Geographic Forwarding Protocol in Wireless Multimedia Sensor Networks
96
Secured user´s authentication and private data storage- access scheme in cloud computing using Elliptic curve cryptography
97
Secured vertical handoff decision scheme for the Fourth Generation (4G) wireless networks
98
Secured video conferencing desktop client for telemedicine
99
Secured video streaming development on smartphones with Android platform
100
Secured Virtual Diffused File System for the cloud
101
Secured vocal access to telephone servers
102
Secured VPN Models for LTE Backhaul Networks
103
Secured Web access
104
Secured web application using combination of Query Tokenization and Adaptive Method in preventing SQL Injection Attacks
105
Secured web oriented videoconferencing system for educational purposes using WebRTC technology
106
Secured web services for home automation in smart grid environment
107
Secured wireless ad-hoc network administration scheme
108
Secured wireless communication for industrial automation and control
109
Secured wireless communications [Message from the Editor-in-Chief]
110
Secured wireless digital video surveillance for distributed enterprises
111
Secured WSN-integrated cloud computing for u-Life Care
112
Secured zone 3 protection during stressed condition
113
Secured Zone 3 Protection During Stressed Condition
114
SecureDAV: a secure data aggregation and verification protocol for sensor networks
115
Secured-by-design FPGA: look-up tables and switch-boxes
116
SecureDirect: proactive security through content based traffic control
117
SecureDIS: A framework for secure Data Integration Systems
118
SecureDroid: An Android security framework extension for context-aware policy enforcement
119
SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems
120
Secure-EEDR: Dynamic Key Exchange Protocol Based on Diffie-Hellman Algorithm with NOVSF Code-Hopping Technique for Wireless Sensor Networks
121
SecureGo: A Hardware-Software Co-Protection against Identity Theft in Online Transaction
122
Securely Coordinating Services Using Contracts
123
Securely detecting an intruders in MANETs system
124
Securely handling application-to-application connection credentials
125
Securely Hiding the Real Servers from DDoS Floods
126
Securely Making "Things" Right
127
Securely mining transactional databases for association rules using FDM
128
Securely Outsourcing Attribute-Based Encryption with Checkability
129
Securely outsourcing large scale Eigen value problem to public cloud
130
Securely Querying Sensor Enabled RFID Virtual Databases (SERVDs)
131
Securely Replicated Web Documents
132
Securely replicating authentication services
133
Securely Sharing Data in Encrypted Databases
134
Securely utilizing external computing power
135
SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications
136
SecureMR: A Service Integrity Assurance Framework for MapReduce
137
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
138
SecureRTU: security on RTU configuration management by Digital Signatures
139
SecureSMSPay: Secure SMS Mobile Payment model
140
SecureSOA Modelling Security Requirements for Service-Oriented Architectures
141
Secure-SPIN with Cluster for Data Centric Wireless Sensor Networks
142
Secure-SPIN: Secure Sensor Protocol for Information via Negotiation for Wireless Sensor Networks
143
SecureSysComm 2015 Reviewers
144
SecureSysComm 2015 Workshop Organization
145
Secure-system design methods: evolution and future directions
146
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
147
Securewaveforms for SISO channels
148
Secure-Way, an affordable home security system
149
SecureWorld Expo 2005
150
Securi CAD by Foreseeti: A CAD Tool for Enterprise Cyber Security Management
151
SecurID Authenticator: On the Hardware Implementation Efficiency
152
Securing a Community Cloud
153
Securing a Critical Infrastructure
154
Securing a Deployment Pipeline
155
Securing a femtocell-based location service
156
Securing a global village and its resources
157
Securing a global village and its resources: Baseline security for interconnected Signaling System #7 telecommunications networks
158
Securing a Health Information System with a government issued digital identification card
159
Securing a Low Level Reader Protocol Connection and a Study of its Performance
160
Securing a medical wireless LAN system
161
Securing a new era of financial services
162
Securing a quantum key distribution relay network using secret sharing
163
Securing a railway control system
164
Securing a remote terminal application with a mobile trusted device
165
Securing a restricted site - biometric authentication at entry point
166
Securing a tiered re-taskable sensing system
167
Securing a transmission channel between two remote computers with secure shell and implementing cryptography on smart card
168
Securing a Wireless Networked Control System Using Information Fusion
169
Securing a Wireless World
170
Securing Abstention in an Electronic Legislature
171
Securing Access to Reconfigurable Scan Networks
172
Securing ad hoc networks
173
Securing Ad Hoc Networks with "Asymmetric" Probabilistic Key Predistribution Schemes
174
Securing ad hoc routing protocols
175
Securing ad hoc services, a Jini view
176
Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls
177
Securing Ada systems
178
Securing ad-hoc networks using IPsec
179
Securing AES Implementation against Fault Attacks
180
Securing Agent-Oriented Systems: An Argumentation and Reputation-based Approach
181
Securing air-ground communications
182
Securing airwave´s future
183
Securing AJAX-enriched mobile environment for exchanging SVG-based learning materials
184
Securing all-optical networks
185
Securing an alerting subsystem for a keystroke-based user identification system
186
Securing an EHR in a health sector digital ecosystem
187
Securing an Interoperability Architecture for Home and Urban Networking: Implementation of the Security Aspects in the INREDIS Interoperability Architecture
188
Securing an object relational database
189
Securing and preserving the scene of an electrical accident
190
Securing and utilizing social dynamics
191
Securing Android-Powered Mobile Devices Using SELinux
192
Securing anycast communications in IPv6 networks by means of IPSec
193
Securing AODV routing protocol in MANET using NMAC with HBKS technique
194
Securing AODV: the A-SAODV secure routing prototype
195
Securing applications with Dyninst
196
Securing asynchronous transfer mode based networks through the use of encryption
197
Securing authentication and privacy in ad hoc partitioned networks
198
Securing Authentication and Trusted Migration of Weblets in the Cloud with Reduced Traffic
199
Securing BGP — A Literature Survey
200
Securing BGP through Keychain-based Signatures
201
Securing Big Data Applications in the Cloud [Guest editors´ introduction]
202
Securing big data in our future intelligent cities
203
Securing BioEncoded IrisCodes against Correlation Attacks
204
Securing biometric authentication using DNA sequence and Naccache Stern Knapsack cryptosystem
205
Securing biometric data by combining watermarking and cryptography
206
Securing Bluetooth-based payment system using honeypot
207
Securing body sensor networks: Sensor association and key management
208
Securing Boot of an Embedded Linux on FPGA
209
Securing broadcast against dishonest receivers
210
Securing Broadcast Based Ad Hoc Routing Protocols
211
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
212
Securing building management systems using named data networking
213
Securing BYOD
214
Securing Cellular Infrastructure: Challenges and Opportunities
215
Securing Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks
216
Securing Citizen Inclusion, Take-Up & Trust for Online Services
217
Securing Class Initialization in Java-like Languages
218
Securing cloud computing environment against DDoS attacks
219
Securing Cloud Computing Environment using a New Trend of Cryptography
220
Securing cloud data using visual cryptography
221
Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine
222
Securing cloud infrastructure through PKI
223
Securing Cloud Servers Against Flooding Based DDOS Attacks
224
Securing Cloud Users at Runtime via a Market Mechanism: A Case for Federated Identity
225
Securing cloud workflows using Aggressive Chinese Wall Security Policy
226
Securing Cloud-Based Applications, Part 1
227
Securing Cluster-Based Ad Hoc Networks with Distributed Authorities
228
Securing coding based distributed storage in wireless sensor networks
229
Securing cognitive radio enabled smart grid systems against cyber attacks
230
Securing cognitive radio networks against belief manipulation attacks via trust management
231
Securing cognitive radio networks against primary user emulation attacks
232
Securing cognitive radio networks during cooperative spectrum access using game theory
233
Securing Cognitive Radio Networks with Distributed Trust Management against Belief Manipulation Attacks
234
Securing Cognitive Radio Networks with Dynamic Trust against Spectrum Sensing Data Falsification
235
Securing collaborative filtering recommender system using Kohonen Net clustering technique
236
Securing Collaborative Intrusion Detection Systems
237
Securing collaborative Web applications
238
Securing communication in 6LoWPAN with compressed IPsec
239
Securing Communication in a Peer-to-Peer Messaging Middleware
240
Securing communication in automation networks
241
Securing communication in cyber-physical systems using steganography and cryptography
242
Securing Communication of Dynamic Groups in Dynamic Network-Centric Environments
243
Securing Communication Trees in Ad Hoc Sensor Networks with Polynomial-Based Key Pre-Distribution
244
Securing Communications between Multiple Entities Using a Single TLS Session
245
Securing communications networks
246
Securing compressed video streams using RC4 encryption scheme
247
Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares
248
Securing computer networks communication by modifying computer network communication protocols
249
Securing Computerized Personal Data during Transit and at Rest Using Programmable System on Chip (PSoC) Technology
250
Securing continuous auditing in wireless network
251
Securing control signaling in Mobile IPV6 Route Optimization with Identity-Based Encryption
252
Securing Control Systems from the Inside: A Case for Mediating Physical Behaviors
253
Securing Cookies with a MAC Address Encrypted Key Ring
254
Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis
255
Securing Cooperative Transmission in Wireless Communications
256
Securing Crisis Maps in Conflict Zones
257
Securing critical information and communication infrastructures through electric power grid independence
258
Securing critical infrastructure
259
Securing critical infrastructure: A semantically enhanced sensor based approach
260
Securing cryptographic key with fuzzy vault based on a new chaff generation method
261
Securing Customer Email Communication in E-Commerce
262
Securing Cyberspace in the 21st Century
263
Securing cyberspace: Identifying key actors in hacker communities
264
Securing data against limited-knowledge adversaries in distributed storage systems
265
Securing data aggregation against false data injection in wireless sensor networks
266
Securing data and financial transactions
267
Securing Data in Composite Web Services
268
Securing data networks using optical signal processing
269
Securing data on fiber optic transmission lines
270
Securing data transfer in asynchronous transfer mode networks
271
Securing Data Transfer in Delay-sensitive and Energy-aware WSNs Using the Scalable Encryption Algorithm
272
Securing data transmission over wireless LAN (802.11) by redesigning RC4 Algorithm
273
Securing Database as a Service: Issues and Compromises
274
Securing Database by Using Collaborative Inference Detection
275
Securing DC and hybrid microgrids
276
Securing Decentralized Workflows in Ambient Environments
277
Securing Derived Credentials on a Mobile Device
278
Securing Designs against Scan-Based Side-Channel Attacks
279
Securing Digital Reputation in Online Social Media [Applications Corner]
280
Securing Disk-Resident Data through Application Level Encryption
281
Securing distance-vector routing protocols
282
Securing distributed adaptation
283
Securing Distributed Data Storage and Retrieval in Sensor Networks
284
Securing distributed SDN with IBC
285
Securing Distributed Wireless Sensor Networks: Issues and Guidelines
286
Securing DMA through virtualization
287
Securing DNP3 and Modbus with AGA12-2J
288
Securing DNS services through system self cleansing and hardware enhancements
289
Securing DNS using ECC
290
Securing DNS: Extending DNS Servers with a DNSSEC Validator
291
Securing Domain Name System Combined with MIPv6 for Mobile Hosts
292
Securing Dynamic Distributed Storage Systems Against Eavesdropping and Adversarial Attacks
293
Securing dynamic distributed storage systems from malicious nodes
294
Securing dynamic group membership information over multicast: attacks and immunization
295
Securing Dynamic Home Agent Address Discovery with Cryptographically Generated Addresses and RSA Signatures
296
Securing dynamic membership information in multicast communications
297
Securing dynamic spectrum use
298
Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support
299
Securing E-Government Services
300
Securing E-Healthcare Applications with PPS and PDS
301
Securing e-learning platforms
302
Securing electrical substation´s wireless messaging with a Lightweight Crypto-Algorithm IP core
303
Securing electronic commerce: reducing the SSL overhead
304
Securing electronic mail systems
305
Securing Elliptic Curve based El-Gamal against Pollard Rho attack using Elliptic Curve based Diffie-Hellman Key Exchange
306
Securing email archives through user modeling
307
Securing e-mail with identity-based encryption
308
Securing Embedded Processors against Power Analysis Based Side Channel Attacks Using Reconfigurable Architecture
309
Securing embedded programmable gate arrays in secure circuits
310
Securing embedded systems
311
Securing Emergency Response Operations Using Distributed Trust Decisions
312
Securing emerging short range wireless communications: the state of the art
313
Securing Encryption Key Distribution in WLAN via QKD
314
Securing Encryption Systems With a Switched Capacitor Current Equalizer
315
Securing energy metering software with automatic source code correction
316
Securing energy supply by harnessing negajoules
317
Securing Enterprise Applications: Service-Oriented Security (SOS)
318
Securing Enterprise Data on Smartphones Using Run Time Information Flow Control
319
Securing Enterprise Mobile Information
320
Securing Enterprise Multicast Access Control Requirements with Group Domain of Interpretation (GDOI)
321
Securing ePassport system: A proposed Anti-Cloning and Anti-Skimming Protocol
322
Securing E-passports with Elliptic Curves
323
Securing EPCglobal Object Name Service - Privacy Enhancements for Anti-counterfeiting
324
Securing E-Seal real time tracking system for Internet of Things
325
Securing Exposition with Parallelism in Spider-Web Networks
326
Securing fast handover in WLANs: a ticket based proactive authentication scheme
327
Securing financial network system through multilevel security using Cyber-Physical System and data mining concepts
328
Securing fingerprint template by watermarking
329
Securing Fingerprint Template: Fuzzy Vault with Helper Data
330
Securing fingerprint template: Fuzzy vault with minutiae descriptors
331
Securing First Response Coordination with Dynamic Attribute-Based Encryption
332
Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints
333
Securing Flash Technology
334
Securing GPRS Tunnel Protocol in 3G Core Network
335
Securing Grid Data Transfer Services with Active Network Portals
336
Securing Grid Workflows with Trusted Computing (Extended Abstract)
337
Securing group communication in wireless sensor networks
338
Securing group management in IPv6 with cryptographically generated addresses
339
Securing GSM voice through scrambling
340
Securing handheld devices
341
Securing handheld devices and fingerprint readers with ECG biometrics
342
Securing Health Care: Assessing Factors That Affect HIPAA Security Compliance in Academic Medical Centers
343
Securing Health Information
344
Securing home networks using Physically Unclonable Functions
345
securing hybrid wired/mobile IP networks from TCP-flooding based denial-of-service attacks
346
Securing IEC 61850
347
Securing IEEE 1588 by IPsec tunnels - An analysis
348
Securing IEEE 1588 messages with message authentication codes based on the KECCAK cryptographic algorithm implemented in FPGAs
349
Securing IEEE 1687-2014 Standard Instrumentation Access by LFSR Key
350
Securing IEEE 802.11 based hybrid wireless mesh networks
351
Securing IEEE 802.11 Wireless LANs - A Mobile Agent Based Architecture
352
Securing images online: a protection mechanism that does not involve watermarking
353
Securing In-Car Communications Through Advanced Software Systems
354
Securing inductively-coupled communication
355
Securing industrial automation and control systems using application whitelisting
356
Securing information and operations in a smart card through biometrics
357
Securing information by performing forensic and network analysis on hosted virtualization
358
Securing information content using new encryption method and Steganography
359
Securing information flows: A metadata framework
360
Securing information flows: A quantitative risk analysis approach
361
Securing information in X.25 networks
362
Securing information systems in airports: A practical approach
363
Securing Information Technology in Healthcare
364
Securing information technology infrastructures
365
Securing Information Transfer in Distributed Computing Environments
366
Securing Information Using Sterganoraphy
367
Securing infrastructure from high explosive threats
368
Securing instance-level interactions in Web services
369
Securing instrumented environments over content-centric networking: the case of lighting control and NDN
370
Securing Integrated Modular Avionics computers
371
SEcuring Integrated Modular Avionics Computers
372
Securing Intellectual Assets in a Global Environment
373
Securing intelligent substations: Real-time situational awareness
374
Securing interaction between threads and the scheduler
375
Securing interactions of Android applications
376
Securing Interactive Programs
377
Securing inter-cluster communication in Personal Networks
378
Securing internal Wi-Fi networks with position verification
379
Securing Internet Information Services (IIS) configuration files
380
Securing Internet Protocol (IP) Storage: A Case Study
381
Securing Internet sessions with Sorbet
382
Securing intra-communication in 6LoWPAN: A PKI integrated scheme
383
Securing IoT for smart home system
384
Securing IP backbones in building automation networks
385
Securing IP multicast over GEO satellites
386
Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms
387
Securing IPv6 network infrastructure: A new security model
388
Securing iris and fingerprint templates using fuzzy vault and symmetric algorithm
389
Securing IS assets through hacker deterrence: A case study
390
Securing Java RMI-based distributed applications
391
Securing Java-Based Mobile Agents through Byte Code Obfuscation Techniques
392
Securing JPEG architecture based on enhanced chaotic hill cipher algorithm
393
Securing Knowledge Assets and Processes: Lessons from the Defense and Intelligence Sectors
394
Securing KVM-Based Cloud Systems via Virtualization Introspection
395
Securing Large Applications Against Command Injections
396
Securing large applications against command injections
397
Securing large-scale military networks: homogenous protection for disparate environments
398
Securing location aware services over VANET using geographical secure path routing
399
Securing location privacy in Augmented Reality
400
Securing M2M With Post-Quantum Public-Key Cryptography
401
Securing MANET against Co-operative Black Hole Attack and Its Performance Analysis - A Case Study
402
Securing MANET databases using metadata and context information
403
Securing MAODV: attacks and countermeasures
404
Securing market value by timely IP management
405
Securing massive MIMO at the physical layer
406
Securing MDSplus for the NSTX-U Digital Coil Protection System
407
Securing Media Hotspots
408
Securing medical data in smart homes
409
Securing Medical Sensor Environments: The CodeBlue Framework Case
410
Securing Membership Control in Mobile Ad Hoc Networks
411
Securing MEMS Based Sensor Nodes in the Internet of Things
412
Securing Mesh Networks: A Novel Solution for Home Scenario
413
Securing m-healthcare social networks: challenges, countermeasures and future directions
414
Securing micropayment transactions over Session Initiation Protocol
415
Securing mobile ad hoc domain by immune-inspired mechanism
416
Securing Mobile Ad Hoc Networks through AntTree Clustering and Threshold Cryptography
417
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
418
Securing mobile agent and its platform from passive attack of malicious mobile agents
419
Securing mobile agent based Wireless Sensor Network applications on middleware
420
Securing mobile agent´s information in ad-hoc network
421
Securing mobile agents by integrity-based encryption
422
Securing mobile appliances: new challenges for the system designer
423
Securing mobile appliances: new challenges for the system designer
424
Securing mobile applications in hostile rural environments
425
Securing Mobile Auctions in the Presence of Malicious Adversaries
426
Securing Mobile Cloud Computing Using Biometric Authentication (SMCBA)
427
Securing Mobile Cloud Data with Personalized Attribute-Based Meta Information
428
Securing Mobile Devices from DoS Attacks
429
Securing Mobile Devices with Biotelemetry
430
Securing mobile IP communications using MOBIKE protocol
431
Securing mobile IP enabled laptop
432
Securing Mobile Location-based Services through position verification leveraging key distribution
433
Securing Mobile Mashups with SCCM
434
Securing mobile networks in an operational setting
435
Securing mobile product ecology for mobile commerce (mC)
436
Securing Mobile Unattended WSNs against a Mobile Adversary
437
Securing mobile users (Paper unavailable)
438
Securing mobile Wireless Sensor Networks (WSNs) against Clone Node Attack
439
Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol
440
Securing More Registers with Reduced Instruction Encoding Architectures
441
Securing MPLS Networks with Multi-path Routing
442
Securing multiagent systems against a sequence of intruder attacks
443
Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers
444
Securing multicast in DVB-RCS satellite systems
445
Securing Multimedia Content Using Joint Compression and Encryption
446
Securing multimodal biometric data through watermarking and steganography
447
Securing Multiparty Online Services Via Certification of Symbolic Transactions
448
Securing Multipath Routing Protocol Using Authentication Approach for Wireless Sensor Network
449
Securing multi-tiered web applications
450
Securing Neighbourhood Discovery for Mobile Ad-Hoc Networks
451
Securing network coding against pollution attacks based on space and time properties
452
Securing network location awareness with authenticated DHCP
453
Securing Network Processors with High-Performance Hardware Monitors
454
Securing network using mobile agents
455
Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity
456
Securing networks using Quantum Cryptography
457
Securing Networks: End-to-End Encrpytion vs. Link Encryption and Trusted Systems
458
Securing next generation mobile networks
459
Securing next generation networks by fuzzing protocol implementations
460
Securing next-generation grids
461
Securing Nodes in MANETs Using Node Based Key Management Scheme
462
Securing number plates based on digital signatures and RFID
463
Securing of Integrated Protection of Technical Information by Application of Special Engineering Decisions
464
Securing Official Account Twitter Using Social Media Management System: Accuracy of the Data and Information Publish with Twitter
465
Securing offloading process within small cell cloud-based mobile networks
466
Securing OLAP data cubes against privacy breaches
467
Securing On-Demand Source Routing in MANETs
468
Securing online reputation systems through temporal, trust and user correlation analysis
469
Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
470
Securing Online Shopping using Biometric Personal Authentication and Steganography
471
Securing open access networks using intelligent policy management system
472
Securing Opensource Code via Static Analysis
473
Securing optical monitoring ports of transmission network elements
474
Securing Optical Network Access with Post-switching Coding Scheme of Signatures Reconfiguration
475
Securing organizational internal e-learning development
476
Securing our future [From the Editor]
477
Securing our nation and protecting privacy
478
Securing Overlay Activities of Peers in Unstructured P2P Networks
479
Securing P2P networks using peer reputations: is there a silver bullet?
480
Securing P2P systems from Sybil attacks through adaptive identity management
481
Securing Passive Replication through Verification
482
Securing password recovery through dispersion
483
Securing patient-centric personal health records sharing system in cloud computing
484
Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks
485
Securing peer-to-peer overlay networks from Sybil Attack
486
Securing personal area networks
487
Securing Personal Network clusters
488
Securing physical-layer communications for cognitive radio networks
489
Securing Pocket Hard Drives
490
Securing powerline communications
491
Securing private wireless sensors in a shared environment in the Internet of Things context
492
Securing Processors Against Insider Attacks: A Circuit-Microarchitecture Co-Design Approach
493
Securing product know-how by embedding IP-protection into the organisation
494
Securing professional careers through structured interactions between higher education and the work-place
495
Securing Programs via Modeling and Efficient Enforcement of Access Control Policies
496
Securing pseudo identities in an anonymous peer-to-peer file-sharing network
497
Securing public places using intelligent motion detection
498
Securing QoS signaling in IP-based military Ad Hoc networks
499
Securing QoS threats to RSVP messages and their countermeasures
500
Securing Queries to Outsourced XML Databases
501
Securing random key predistribution against semi-honest adversaries
502
Securing Rating Aggregation Systems Using Statistical Detectors and Trust
503
Securing Real-Time Opportunistic Spectrum Access in Cognitive Networks against Malicious Secondary Users
504
Securing Recommendations in Grouped P2P E-Commerce Trust Model
505
Securing reconfigurable terminals - mechanisms and protocols
506
Securing reliable server pooling in MANET against byzantine adversaries
507
Securing removable media
508
Securing renewable energy supplies through carbon dioxide storage in methanol
509
Securing resource-constrained wireless ad hoc networks
510
Securing resource-constrained wireless ad hoc networks
511
Securing RESTful WCF Services with XAuth and Service Authorization Manager - A Practical Way for User Authorization and Server Protection
512
Securing return routability protocol against active attack
513
Securing RFID Systems in the Environment Reference Set Paradigm
514
Securing RFID Tags: Authentication Protocols with Completeness, Soundness, and Non-Traceability
515
Securing Roaming and Vertical Handover between Mobile WiMAX and UMTS
516
Securing Roaming and Vertical Handover in Fourth Generation Networks
517
Securing Robust Header Compression (ROHC)
518
Securing role-based distributed collaboration system
519
Securing route optimisation in NEMO
520
Securing routing table update in AODV routing protocol
521
Securing RSVP and RSVP-TE signaling protocols and their performance study
522
Securing RTP Packets Using Per-Packet Selective Encryption Scheme for Real-Time Multimedia Applications
523
Securing SCADA in the cloud: Managing the risks to avoid the perfect storm
524
Securing SCADA systems with open source software
525
Securing Scan Design Using Lock and Key Technique
526
Securing Scientific Workflows
527
Securing Sensor Networks Using A Novel Multi-Channel Architecture
528
Securing sensor networks with location-based keys
529
Securing Sensor Nodes Against Side Channel Attacks
530
Securing Service-Oriented and Event-Driven Architectures Results of an Evaluation of Enterprise Security Frameworks
531
Securing Session Initiation Protocol in Voice over IP Domain
532
Securing Shareable Life-logs
533
Securing smart grid: cyber attacks, countermeasures, and challenges
534
Securing smart home: Technologies, security challenges, and security requirements
535
Securing smart maintenance services: Hardware-security and TLS for MQTT
536
Securing smart metering
537
Securing smarter grids from the enemy
538
Securing smartphone based ITS
539
Securing Smartphones: A µTCB Approach
540
Securing SMS4 cipher against differential power analysis and its VLSI implementation
541
Securing SNMP across backbone networks
542
Securing Software Application Chains in a Cloud
543
Securing software cryptographic primitives for embedded systems against side channel attacks
544
Securing software defined networks: taxonomy, requirements, and open issues
545
Securing software-based hard real-time Ethernet
546
Securing space communication systems against reactive cognitive jammer
547
Securing spontaneous communications in wireless pervasive computing environments
548
Securing static nodes in mobile-enabled systems using a network-layer moving target defense
549
Securing Structured Overlays against Identity Attacks
550
Securing Structured P2P Overlay Networks
551
Securing swarm intellect robots with a police office model
552
Securing systems against external programs
553
Securing systems on the Internet of Things via physical properties of devices and communications
554
Securing tags to control information flows within the Internet of Things
555
Securing Telehealth Applications in a Web-Based e-Health Portal
556
Securing Teredo Client from Nat Holes Vulnerability
557
Securing TFTP packet: A preliminary study
558
Securing the "Bring Your Own Device" Paradigm
559
Securing the 802.11 MAC in MANETs: A specification-based intrusion detection engine
560
Securing the Ad Hoc Dynamic Source Routing Protocol
561
Securing the architecture of the JPEG compression by an dynamic encryption
562
Securing the authentication and message integrity for Smart Home using smart phone
563
Securing the backhaul for mobile and multi-homed femtocells
564
Securing the banking ecosystem: A quantum leap? Italian open panel
565
Securing the biometric model
566
Securing the border gateway routing protocol
567
Securing the Borealis Data Stream Engine
568
Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
569
Securing the Cloud, Dispelling Fears: Ways to Combat Climate Change
570
Securing the cloud: Cloud computer security techniques and tactics (Winkler, V.; 2011) [Book reviews]
571
Securing the Cloud´s Core Virtual Infrastructure
572
Securing the Communication Links between U-Healthcare System Components for Protecting Patient Bio-information
573
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks
574
Securing the contents of document images using knight moves and genetic approach
575
Securing the control channel of software-defined mobile networks
576
Securing the Data in Clouds with Hyperelliptic Curve Cryptography
577
Securing the delivery of digital content over the Internet
578
Securing the Deluge network programming system
579
Securing the digital marketplace
580
Securing the Digital Script of the Holy Quran on the Internet
581
Securing the Elliptic Curve Montgomery Ladder against Fault Attacks
582
Securing the Exocortex: A Twenty-First Century Cybernetics Challenge
583
Securing the exocortex: A twenty-first century cybernetics challenge
584
Securing the forwarding plane in information centric networks
585
Securing the global airspace system via identity-based security
586
Securing the global Airspace System via identity-based security
587
Securing the Global Information Grid Routing Control Plane
588
Securing the human to protect the system: Human factors in cyber security
589
Securing the infrastructure and the workloads of linux containers
590
Securing the interface: Safety-critical interaction between humans and mobile robots
591
Securing the internet against attack
592
Securing the Internet metering and billing
593
Securing the Internet of Things
594
Securing the Internet of Things a military perspective
595
Securing the Internet of Things: A Standardization Perspective
596
Securing the Internet routing infrastructure
597
Securing the internet through the detection of anonymous proxy usage
598
Securing the Internet´s Routing Infrastructure
599
Securing the itinerary of mobile agents through a non-repudiation protocol
600
Securing the Link - Fitting Authentication into an Existing Space Link Implementation
601
Securing the LISP map registration process
602
Securing the Madeira network management system
603
Securing the manufacturing environment using biometrics
604
Securing the mobile enterprise with network-based security and cloud computing
605
Securing the Nimrod routing architecture
606
Securing the Pharmaceutical Supply Chain using RFID
607
Securing the reliability of tomorrow´s systems with Self-Optimization
608
Securing the sale
609
Securing the skies
610
Securing the Skies: In Requirements We Trust
611
Securing the smart grid
612
Securing the supply chain for commodity IT devices by automated scenario generation
613
Securing the Web
614
Securing the Web Using Human Perception and Visual Object Interpretation
615
Securing the whole enterprise: business and legal issues
616
Securing the wireless internet
617
Securing the Wireless LANs that is based on Distributed Resource Management against internal attacks
618
Securing the ZigBee Protocol in the Smart Grid
619
Securing Timeout Instructions in Web Applications
620
Securing Time-Synchronization Protocols in Sensor Networks: Attack Detection and Self-Healing
621
Securing Topology Maintenance Protocols for Sensor Networks
622
Securing Topology Maintenance Protocols for Sensor Networks:
623
Securing TORA against Sybil attack in MANETs
624
Securing trade lanes using an autonomous tracking device
625
Securing traffic at QoS-aware residential gateway using biometric signatures
626
Securing transient stability assessment using single machine equivalent SIME method
627
Securing Transient Stability Using Time-Domain Simulations Within an Optimal Power Flow
628
Securing transmissions between nodes of WSN using TPM
629
Securing transport systems and infrastructure against terrorism using ITS
630
Securing Trusted Execution Environments with PUF Generated Secret Keys
631
Securing Trustworthy Three-Tier Grid Architecture with Spam Filtering
632
Securing tunnel endpoints for IPv6 transition in enterprise networks
633
Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach
634
Securing ubiquitous and low-cost RFID using tiny encryption algorithm
635
Securing UDT protocol: Experiences in integrating Transport Layer Security Solutions with UDT
636
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
637
Securing underwater acoustic communications through analog network coding
638
Securing underwater wireless communication networks
639
Securing user authentication using single sign-on in Cloud Computing
640
Securing User-Controlled Routing Infrastructures
641
Securing UWB Communications under NLOS Indoor Propagation Conditions
642
Securing vehicle-to-grid communications in the smart grid
643
Securing Vehicular Ad Hoc Networks
644
Securing Vehicular Ad-hoc Networks Against Malicious Drivers: A Probabilistic Approach
645
Securing vehicular ad-hoc networks connectivity with roadside units support
646
SECURING VEHICULAR COMMUNICATIONS
647
Securing Vehicular Networks Based on Data-Trust Computation
648
Securing Vehicular Networks Using Deterministic Schemes for Computing Trust
649
Securing vehicular networks: A reputation and plausibility checks-based approach
650
Securing venture capital: effective approaches and appropriate sources
651
Securing venture capital: effective approaches and appropriate sources
652
Securing Very Dynamic Groups and Data Aggregation in Wireless Sensor Networks
653
Securing Virtual Coordinates by Enforcing Physical Laws
654
Securing virtual execution environments through machine learning-based intrusion detection
655
Securing Virtual Networks for Multi-owner Wireless Sensor Networks
656
Securing Virtual Private Networks with SIM Authentication
657
Securing visible light communications via friendly jamming
658
Securing Visual Cryptographic shares using Public Key Encryption
659
Securing voice over IP
660
Securing VoIP and PSTN from integrated signaling network vulnerabilities
661
Securing VoIP network: An overview of applied approaches and analysis
662
Securing VoIP networks via signaling protocol layer
663
Securing VoIP Services in Multi-Hop Wireless Mesh Networks
664
Securing Warning Message Dissemination in VANETs Using Cooperative Neighbor Position Verification
665
Securing weakly-dominating virtual backbones in mobile ad hoc networks
666
Securing Web access with DCE
667
Securing Web Applications with Better "Patches": An Architectural Approach for Systematic Input Validation with Security Patterns
668
Securing Web OLAP Based on RBAC Model
669
Securing Web servers against insider attack
670
Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT)
671
Securing webpages — An overview
672
Securing Wi-Fi networks
673
Securing wireless body sensor networks using bijective function-based hardware primitive
674
Securing wireless communication in heterogeneous environments
675
Securing wireless communication with implanted medical devices using reciprocal carrier-phase quantization
676
Securing Wireless Data Networks against Eavesdropping using Smart Antennas
677
Securing wireless data: system architecture challenges
678
Securing wireless implantable devices for healthcare: Ideas and challenges
679
Securing wireless in the cyber domain
680
Securing Wireless Infrared Communications Through Optical Chaos
681
Securing wireless LANs
682
Securing wireless links at the physical layer through reconfigurable antennas
683
Securing Wireless Local Area Networks using Smart-Card-based Digital Certificates from the DoD Public Key Infrastructure
684
Securing wireless medical devices
685
Securing wireless medical implants using an ECG-based secret data sharing scheme
686
Securing wireless medicine confidentiality, integrity, nonrepudiation, & malware prevention
687
Securing wireless medium access control against insider denial-of-service attackers
688
Securing Wireless Mesh Network with Mobile Firewall
689
Securing Wireless Mesh Network with MSA-Based Proactive Defense Mechanism
690
Securing Wireless Mesh Networks
691
Securing wireless mesh networks
692
Securing wireless mesh networks with ticket-based authentication
693
Securing wireless network coding against pollution attack at the physical layer
694
Securing wireless networks in a university environment
695
Securing Wireless Sensor Network based solutions
696
Securing wireless sensor network using deployment knowledge based key predistribution
697
Securing wireless sensor networks against aggregator compromises
698
Securing wireless sensor networks against broadcast attacks
699
Securing Wireless Sensor Networks Against Spurious Injections
700
Securing Wireless Sensor Networks by Using Location Information
701
Securing wireless sensor networks from denial-of-service attacks using artificial intelligence and the CLIPS expert system tool
702
Securing Wireless Sensor Networks Using Cluster Reformations
703
Securing wireless sensor networks: a survey
704
Securing Wireless Transmission against Reactive Jamming: A Stackelberg Game Framework
705
Securing WLAN offload of cellular networks using subscriber residential access gateways
706
Securing XML document sources and their distribution
707
Securing XML documents with Author-X
708
Securing XML Web Services with Elliptic Curve Cryptography
709
Securing your data in agent-based P2P systems
710
Securing your e-mail
711
Securing your Internet connection: a sequel
712
Securing Zone Routing Protocol in MANET Using Authentication Technique
713
Securisation des reseaux de distribution vis-a-vis des phenomenes climatiques exceptionnels
714
Securisation of SIP Presence notifications thanks to the Belgian electronic identity card
715
SecurIST: co-ordinating the development of a strategic research agenda for security and dependability R&D
716
Securities Analyst´s Forecasting Ability and ITS Influential Factors: Based on Decision-Making Theory
717
Securities Analysts´ Behavior and IPO Initial Return Rate in China Based on Quantile Regression
718
Securities investment funds based on utility maximization model of research and application
719
Securitization of Longevity Risk in Pension Annuities
720
Securitized Optical Fiber Communication and Sensor Systems Using Mode-Selective Couplers
721
Securitv assurance and standards - design for evaluation
722
Security
723
Security - Lifetime tradeoffs for wireless sensor networks
724
Security & Privacy
725
Security & reliability are provided by a Web-based classroom electronic document management process
726
Security & Privacy masthead
727
Security & scalability architecture for next generation internet services
728
Security & trust enforcement in pervasive computing environment (STEP)
729
Security — A big question for big data
730
Security & Privacy Architecture as a service for Small and Medium Enterprises
731
Security + Applications and Context
732
Security access control research trends
733
Security Access Protocols in IoT Networks with Heterogenous Non-IP Terminals
734
Security across the curriculum and beyond
735
Security Advancement of Wireless Communications via Chaotic Techniques and Interference Mitigation
736
Security advances and challenges in 4G wireless networks
737
Security after login: Identity change detection on smartphones using sensor fusion
738
Security against Black Hole Attack in Wireless Sensor Network - A Review
739
Security against compelled disclosure
740
Security against hardware Trojan through a novel application of design obfuscation
741
Security Against Malicious Code in Web Based Applications
742
Security against memory-bounded adversaries
743
Security agents for detecting and avoiding cooperative blackhole attacks in MANET
744
Security agility for dynamic execution environments
745
Security agility in response to intrusion detection
746
Security Alchemy
747
Security Alert Management System for Internet Data Center Based on ISO/IEC 27001 Ontology
748
Security algorithm of face recognition based on local binary pattern and random projection
749
Security algorithms in wireless LAN: proprietary or nonproprietary
750
Security Analysis and Amendment of 3G Core Network Based on MTPsec
751
Security Analysis and Auditing of IEC61850-Based Automated Substations
752
Security Analysis and Authentication Improvement for IEEE 802.11i Specification
753
Security analysis and concept for the multicast-based handover support architecture MOMBASA
754
Security analysis and configuration of SSL protocol
755
Security analysis and countermeasures assessment against spit attacks on VoIP systems
756
Security Analysis and Defense Strategy on Access Domain in 3G
757
Security Analysis and Defense Tactics of Electricity Market Business Management System
758
Security analysis and design of a uniform identity authentication system
759
Security analysis and design of an online score system
760
Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards
761
Security analysis and enhancements of 3GPP authentication and key agreement protocol
762
Security Analysis and Implementation of 3-Level Security System Using Image Based Authentication
763
Security Analysis and Implementation of JUIT—Image Based Authentication System Using Kerberos Protocol
764
Security analysis and implementation of web-based telemedicine services with a four-tier architecture
765
Security Analysis and Improvement for Kerberos Based on Dynamic Password and Diffie-Hellman Algorithm
766
Security Analysis and Improvement for Mesh Mode in IEEE802.16
767
Security Analysis and Improvement of a (t, n) Threshold Proxy Signature Scheme
768
Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol
769
Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks
770
Security analysis and improvement of an anonymous DoS-resistant access control protocol
771
Security Analysis and Improvement of Dual Signature in Electronic Payment System
772
Security analysis and improvement of NU-EV tracking and monitoring system
773
Security Analysis and Improvement of Pairing-Based Threshold Proxy Signature Scheme
774
Security analysis and improvement of Smart Card-Based Authenticated Key Exchange protocol with CAPTCHAs for wireless mobile network
775
Security analysis and improvement of the efficient password-based authentication protocol
776
Security analysis and improvement of TNC IF-T Protocol Binding to TLS
777
Security Analysis and Improvement of WAPI Protocol
778
Security analysis and improvement of Yahalom protocol
779
Security analysis and improvement to digital library RFID protocol
780
Security analysis and optimization
781
Security Analysis and Optimization of AES S-Boxes Against CPA Attack in Wireless Sensor Network
782
Security analysis and proposal of new access control model in the Internet of Thing
783
Security analysis and recommendations for Wireless LAN 802.11b network
784
Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion
785
Security Analysis and Security Optimizations for the Context Transfer Protocol
786
Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System
787
Security analysis and solutions for deploying IP telephony in the critical infrastructure
788
Security analysis and the DSM model
789
Security analysis and the improvement of the sequential multi-signature scheme based on discrete logarithm
790
Security Analysis and their Improvement of Two Signature Schemes
791
Security analysis based on Trusted Environment (TRE) of M2M/IoT
792
Security Analysis Concerning the Random Numbers of Threshold Ring Signatures
793
Security analysis for Cyber-Physical Systems against stealthy deception attacks
794
Security analysis for Delay/Disruption Tolerant satellite and sensor networks
795
Security Analysis for Hilbert Curve Based Spatial Data Privacy-Preserving Method
796
Security Analysis for IEEE802.11
797
Security analysis for inter-domain routing system based on IPv6 protocol
798
Security Analysis for Internet Banking Models
799
Security analysis for IP-based Government Emergency Telephony Service
800
Security analysis for IPv6 neighbor discovery protocol
801
Security analysis for key generation systems using face images
802
Security Analysis for Online Banking System Using Hierarchical Stochastic Game Nets Model
803
Security analysis for order preserving encryption schemes
804
Security Analysis for P2P Routing Protocols
805
Security analysis for privacy preserving search of multimedia
806
Security analysis for Rayleigh fading channel by artificial noise
807
Security Analysis for SOA-SCA Based SDO and Solutions for 3 Capability Problems
808
Security analysis for system operation using Bayes classifier
809
Security Analysis for UHF RFID Tags
810
Security analysis for voltage problems using a reduced model
811
Security Analysis for Web Service Behaviors Based on Hierarchical Stochastic Game Model
812
Security Analysis for Wireless Networks Based on ZigBee
813
Security analysis of ‘A novel copyright protection scheme using Visual Cryptography’
814
Security Analysis of `An Improved Low Computation Cost User Authentication Scheme for Mobile Communication´
815
Security analysis of 3GPP (LTE) — WLAN interworking and a new local authentication method based on EAP-AKA
816
Security analysis of a cancelable iris recognition system based on block remapping
817
Security analysis of a chaos-based random number generator for applications in cryptography
818
Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS
819
Security Analysis of a Dynamic Program Update Protocol for Wireless Sensor Networks
820
Security analysis of a flexible forward-secure signature scheme
821
Security analysis of a future Internet architecture
822
Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme
823
Security Analysis of a Mutual Authentication Protocol for RFID Systems
824
Security analysis of a new multi-party payment protocol with intermediary service.
825
Security Analysis of a Paillier-Based Threshold Proxy Signature Scheme
826
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme
827
Security Analysis of a Protocol Based on Multiagents Systems for Clinical Data Exchange
828
Security analysis of a protocol for pollution attack detection
829
Security analysis of a provably secure identity-based signature scheme using bilinear parings
830
Security Analysis of a Proxy Blind Signature and Its Improved Scheme
831
Security Analysis of a Proxy Blind Signature Scheme Based on ECDLP
832
Security analysis of a remote user authentication scheme using smart card
833
Security Analysis of a Shared Modular Inversion Protocol for RSA Cryptosystem
834
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
835
Security analysis of a three-dimensional rotation-based image encryption
836
Security Analysis of a Time-Bound Hierarchical Key Assignment Scheme
837
Security analysis of a token ring using Ulysses
838
Security Analysis Of an AsymmetricWatermarking Scheme
839
Security Analysis of an eSeal Used in Taiwan Customs Officials
840
Security analysis of an identity-based mix net
841
Security analysis of an image encryption algorithm based on chaos and DNA encoding
842
Security analysis of an unlinkable secret handshakes scheme
843
Security analysis of and proposal for image-based authentication
844
Security analysis of audio secret sharing scheme encrypting audio secrets
845
Security Analysis of Authenticated Key Agreement Protocol Using Extended SVO Logic
846
Security analysis of authentication protocols for next-generation mobile and CE cloud services
847
Security Analysis of Authentication Scheme with Anonymity for Wireless Environments
848
Security analysis of automotive architectures using probabilistic model checking
849
Security Analysis of Binding Update Protocols in Route Optimization of MIPv6
850
Security Analysis of BLAKE-32 Based on Differential Properties
851
Security analysis of Bloom filter-based iris biometric template protection
852
Security analysis of blowfish algorithm
853
Security analysis of certificate authentication in Chinese WLAN standard
854
Security Analysis of CIKS-128 and CIKS-128H Using Key Schedule Weaknesses
855
Security analysis of CLEFIA-128
856
Security Analysis of Cloud Storage with Access Control and File Assured Deletion (FADE)
857
Security Analysis of Compromised-Neighbor-Tolerant Networks Using Stochastics
858
Security Analysis of Content-Based Watermarking Authentication Framework
859
Security Analysis of Control Plane in ASON
860
Security analysis of Croatia´s receipt registration and verification system
861
Security Analysis of Crypto-based Java Programs using Automated Theorem Provers
862
Security analysis of cryptographic constructions used within communications in modern transportation systems on the base of modelling
863
Security analysis of cryptosystem based on quasigroups
864
Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage
865
Security Analysis of DTLS Structure and Its Application to Secure Multicast Communication
866
Security analysis of DTN architecture and Bundle Protocol Specification for space-based networks
867
Security Analysis of DVB Common Scrambling Algorithm
868
Security analysis of electric power supply in SADC region
869
Security analysis of emerging remote obstetrics monitoring systems
870
Security Analysis of Enterprise Network Based on Stochastic Game Nets Model
871
Security analysis of EPC-enabled RFID network
872
Security Analysis of Firewall Rule Sets in Computer Networks
873
Security analysis of flow-based fast handover method for mobile IPv6 networks
874
Security Analysis of Future Enterprise Business Intelligence
875
Security analysis of FWAI with BAN-like logic
876
Security Analysis of Gagne et al.´s Threshold Attribute-Based Signcryption Scheme
877
Security Analysis of Handover Key Management in 4G LTE/SAE Networks
878
Security Analysis of Hardened Retina Based Fuzzy Vault
879
Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking)
880
Security Analysis of Hsieh-Sun´s Deniable Authentication Protocol
881
Security analysis of IDComby identity-based encryption scheme
882
Security Analysis of Identity Based Cryptography and Certificate Based in Wimax Network Using Omnet++ Simulator
883
Security analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)
884
Security Analysis of IEEE 802.16
885
Security Analysis of Impostor Attempts with Respect to Gender in Gait Biometrics
886
Security analysis of index-based syndrome coding for PUF-based key generation
887
Security Analysis of Industrial Test Compression Schemes
888
Security Analysis of Information Systems Taking into Account Social Engineering Attacks
889
Security analysis of interconnected AC/DC systems
890
Security Analysis of Interleave-Division Multiple Access: Next Generation Competitor
891
Security analysis of J-PAKE
892
Security analysis of Kulseng et al.´s mutual authentication protocol for RFID systems
893
Security analysis of large power grid based on complex network theory and Bayesian network model
894
Security analysis of LMAP
++
, an RFID authentication protocol
895
Security analysis of logic encryption against the most effective side-channel attack: DPA
896
Security analysis of logic obfuscation
897
Security analysis of low cost RFID systems
898
Security Analysis of MAC Protocol for Mobile Device Identification Based on PARADIS
899
Security analysis of mandatory access control model
900
Security Analysis of Micali´s Fair Contract Signing Protocol by Using Coloured Petri Nets
901
Security analysis of Micali´s fair contract signing protocol by using Coloured Petri Nets : Multi-session case
902
Security analysis of mobile applications: A case study of a collaboration tool in healthcare
903
Security Analysis of Mobile Java
904
Security analysis of mobile QQ
905
Security analysis of m-to-n mapping against eavesdropping in identifier-based universal network
906
Security Analysis of Multimedia Encryption Schemes Based on Multiple Huffman Table
907
Security analysis of neural cryptography implementation
908
Security analysis of NFC relay attacks using probabilistic model checking
909
Security Analysis of NSSK Protocol and its Improvement
910
Security Analysis of OIAP Implementation Based on BAN Logic
911
Security Analysis of One Quantum Digital Signature Scheme
912
Security Analysis of Openstack Keystone
913
Security analysis of optimal multi-carrier spread-spectrum embedding
914
Security analysis of participants CSCW service systems functional features for Shanghai Expo 2010
915
Security Analysis of Poker-Resembled Protocol Based on Hidden Number Problem
916
Security analysis of proactive participation of smart buildings in smart grid
917
Security Analysis of Projected C*- Scheme
918
Security Analysis of Public-key Encryption Scheme Based on Neural Networks and Its Implementing
919
Security analysis of radial-based 3D watermarking systems
920
Security Analysis of Random Phase Encoding Based Image Encryption in Gyrator Transform Domains
921
Security analysis of reliable transport layer protocols for wireless sensor networks
922
Security analysis of revocable and bipartite biotokens
923
Security Analysis of RFID Authentication for Pervasive Systems using Model Checking
924
Security Analysis of RFID Based on Multiple Readers
925
Security analysis of RGB image encryption based on modified baker map for nanosatellite application
926
Security analysis of Robust User Authentication Protocol
927
Security Analysis of Role-Based Access Control through Program Verification
928
Security Analysis of Role-based Separation of Duty with Workflows
929
Security Analysis of Routing Protocol for MANET
930
Security analysis of routing protocol for MANET based on extended Rubin logic
931
Security Analysis of salt||password Hashes
932
Security analysis of secure data aggregation protocols in wireless sensor networks
933
Security Analysis of Selected AMI Failure Scenarios Using Agent Based Game Theoretic Simulation
934
Security analysis of selective image encryption algorithm based on chaos and CBC-like mode
935
Security Analysis of Server-Aided Public Key Generation Protocols on Low-Power Devices for Ad-Hoc Networks
936
Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network
937
Security Analysis of Several Chosen Ciphertext Secure Group-oriented Encryption Schemes
938
Security analysis of shifted odd knapsack public key encryption scheme
939
Security Analysis of SIP Signalling during NASS-IMS bundled Authentication
940
Security analysis of SKI protocol
941
Security analysis of smart card based password authentication schemes
942
Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation
943
Security analysis of smart grids-A complex network perspective
944
Security Analysis of Some Recent Authentication Protocols for RFID
945
Security Analysis of Some RFID Authentication Protocols
946
Security Analysis of Stealth Transmission over a public Fiber-Optical Network
947
Security Analysis of TAU Procedure in LTE Network
948
Security analysis of TCP/IP networks: An approach to automatic analysis of network security properties
949
Security Analysis of Temporal-RBAC Using Timed Automata
950
Security analysis of the Bootstrap protocol for deny-by-default Mobile Ad-hoc Networks
951
Security analysis of the constrained application protocol in the Internet of Things
952
Security Analysis of the Cryptographic Namespace Design in Next Generation Internet Architectures
953
Security analysis of the Dependability, Security Reconfigurability framework
954
Security analysis of the generalized key agreement and password authentication protocol
955
Security analysis of the improved group signature
956
Security analysis of the INTELSAT VI and VII command network
957
Security analysis of the joint encryption and compressed sensing
958
Security Analysis of the Kerberos Protocol Using BAN Logic
959
Security analysis of the Louis protocol for location privacy
960
Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver
961
Security analysis of the MPOA protocol
962
Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model
963
Security analysis of the SAML single sign-on browser/artifact profile
964
Security analysis of the santi-magda elliptic curve-based RFID protocol
965
Security Analysis of the SASI Protocol
966
Security Analysis of the Simple Lightweight Authentication Protocol
967
Security analysis of the song-mitchell authentication protocol for low-cost RFID tags
968
Security analysis of the TMN protocol by using Coloured Petri Nets: On-the-fly trace generation method and homomorphic property
969
Security Analysis of the Utilization of Corba Object References as Authorization Tokens
970
Security Analysis of Timestamp-based Remote User Authentication Scheme Using Smart Cards
971
Security analysis of TLS authentication
972
Security analysis of top visited Arabic Web sites
973
Security analysis of Tramel
974
Security analysis of transformed-key asymmetric watermarking system
975
Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model
976
Security Analysis of Tu and Piramuthu´s Protocol
977
Security analysis of two anonymous authentication protocols for distributed wireless networks
978
Security Analysis of Two Authenticated Encryption Schemes
979
Security analysis of two certificateless short signature schemes
980
Security Analysis of Two Password Authentication Schemes
981
Security Analysis of Two Remote User Authentication Schemes Using Bilinear Pairings
982
Security Analysis of Two RSA-Based Fair Document Exchange Protocols
983
Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol
984
Security analysis of user mobility in triple-play systems
985
Security Analysis of Vehicular Ad Hoc Nerworks (VANET)
986
Security analysis of VLAN-based Virtual Desktop Infrastructure
987
Security Analysis of Voice-over-IP Protocols
988
Security analysis of VoIP architecture for identifying SIP vulnerabilities
989
Security analysis of vulnerable Wi-Fi Direct
990
Security Analysis of WAPI Key Negotiation Protocol
991
Security analysis of WiMAX network: With Misbehavior Node attack
992
Security analysis of wireless network access following 802.11 standard in educational institutions of the Republic of Croatia
993
Security Analysis of wrNAF and SPA Resistant Scalar Multiplication
994
Security Analysis of Yang et al.´s Practical Password-Based Two-Server Authentication and Key Exchange System
995
Security Analysis of YKHL Distance Bounding Protocol with Adjustable False Acceptance Rate
996
Security Analysis on "A Chaotic Fragile Watermarking Technique with Precise Localization"
997
Security Analysis on "Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model"
998
Security Analysis on a Blind Signature Scheme Based on Elgamal Signature Equation
999
Security analysis on a conference scheme for mobile communications
1000
Security analysis on a verifiably encrypted signature scheme