<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Security analysis on Chinese wireless LAN standard and its solution
2
Security Analysis on Cyber-physical System Using Attack Tree
3
Security analysis on mobile e-commerce
4
Security Analysis on Mutual Authentication against Man-in-the-Middle Attack
5
Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search
6
Security Analysis on Privacy-Secure Image Trading Framework Using Blind Watermarking
7
Security Analysis on Spatial
1 Steganography for JPEG Decompressed Images
8
Security Analysis on Tripartite Authenticated Key Agreement Protocols
9
Security analysis on underwater acoustic networks
10
Security analysis survey and framework design for IP connected LoWPANs
11
Security Analytics and Measurements
12
Security Analytics: Big Data Analytics for cybersecurity: A review of trends, techniques and tools
13
Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students
14
Security analyzing and designing GUI with the resources model
15
Security and AAA Architecture for WiFi-WiMAX Mesh Network
16
Security and Access Control for a Human-centric Collaborative Commerce System
17
Security and Access Control for Vehicular Communications
18
Security and Accuracy Trade-off in Anonymous Fingerprint Recognition
19
Security and Adoption of Internet Payment
20
Security and Architectural Issues for National Security Cloud Computing
21
Security and auditing of VPN
22
Security and authentication concepts for UMTS/WLAN convergence
23
Security and Authentication Issues in Emerging Network Architectures with Special Reference to SONATE
24
Security and Cloud Computing: InterCloud Identity Management Infrastructure
25
Security and coding aspects of longrange RFID
26
Security and Cognitive Bias: Exploring the Role of the Mind
27
Security and Collaborative Groupware Tools in Education: A Case Study at the University of Bahrain
28
Security and Communication Architecture for Networked Medical Devices in Mobility-Aware eHealth Environments
29
Security and complexity of a DNA-based cipher
30
Security and complexity of the McEliece cryptosystem based on quasi-cyclic low-density parity-check codes
31
Security and compliance
32
Security and confidentiality in healthcare informatics
33
Security and Congestion Management Tool for the Use in Extended Transmission Systems
34
Security and Cooperation in clustered mobile ad hoc networks with centralized supervision
35
Security and crisis management for air transport
36
Security and cryptographic hardware implementations
37
Security and Data Accountability in Distributed Systems: A Provenance Survey
38
Security and dependability [breaker page]
39
Security and Dependability Enhancement of Wireless Sensor Networks with Multipath Routing Utilizing the Connectedness of Joint Nodes
40
Security and Dependability of Cloud-Assisted Internet of Things House Advertisement
41
Security and Dependability of Embedded Systems: A Computer Architects´ Perspective
42
Security and dependability: then and now
43
Security and Design Challenges in Cyber-Physical Systems
44
Security and design issues of regroup-and-go mix
45
Security and design of a cryptoprocessor for pairings over BN curves on FPGA platform
46
Security and Disaster Management
47
Security and Discoverability of Spread Dynamics in Cyber-Physical Networks
48
Security and DRM in indoor/outdoor heterogeneous networking applications for user - centric frameworks
49
Security and dynamic class loading in Java: a formalisation
50
Security and economic dispatch of power system with environmental consideration
51
Security and efficiency analysis of a certificateless encryption scheme based on Chebyshev polynomial
52
Security and efficiency analysis of progressive audio scrambling in compressed domain
53
Security and efficiency in authentication protocols resistant to password guessing attacks
54
Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects
55
Security and efficiency of quantum cryptographic protocols
56
Security and efficiency trade-offs for cloud computing and storage
57
Security and efficient data dissemination over wireless sensor network with raptor codes
58
Security and Elections
59
Security and Energy Considerations for Routing in Hierarchical Optical Sensor Networks
60
Security and Enforcement in Spectrum Sharing
61
Security and fault-tolerance in distributed systems: an actor-based approach
62
Security and Function Creep
63
Security and IN
64
Security and Information Systems for Air Company
65
Security and Information Systems for Air Company
66
Security and Integrity Analysis Using Indicators
67
Security and integrity in outsourcing of data mining
68
Security and Integrity of a Distributed File Storage in a Virtual Environment
69
Security and Interoperable-Medical-Device Systems, Part 1
70
Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification
71
Security and intrusion detection on critical SCADA systems for water management
72
Security and IP-based 3G wireless networks
73
Security and lifespan improve the performances of HV/LV transformer substations
74
Security and lifespan improve the performances of HV/LV transformer substations
75
Security and management policy specification
76
Security and middleware
77
Security and mobility architecture for isolated wireless networks using WIMAX as an infrastructure
78
Security and Network Performance Evaluation of KK´ Cryptographic Technique in Mobile Adhoc Networks
79
Security and non destructive evaluation application of high speed time domain terahertz imaging
80
Security and Packets Delivery Trade-Off for WSN
81
Security and PCTE+
82
Security and performance analysis of a passenger screening checkpoint for mass-transit systems
83
Security and performance analysis of a secure clustering protocol for sensor networks
84
Security and performance analysis of identity based schemes in sensor networks
85
Security and performance analysis of the Kirchhoff-Law-Johnson-Noise secure key exchange protocol
86
Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism
87
Security and performance aspects of Bytewalla: A Delay Tolerant Network on smartphones
88
Security and performance challenges for user-centric wireless networking
89
Security and performance evaluation platform of biometric match on card
90
Security and performance joint analysis method for authentication protocol based on CPN models
91
Security and Performance of Mobile XML Web Services
92
Security and performance optimization of a new DES data encryption chip
93
Security and Performance Optimization of a new DES data encryption chip
94
Security and performance tradeoffs in optical CDMA network systems
95
Security and power consumption comparisons of wireless sensor networks
96
Security and precaution on computer network
97
Security and Privacy
98
Security and privacy
99
Security and Privacy [advertisement]
100
Security and privacy analysis in social network services
101
Security and Privacy Analysis of RFID Authentication Protocol for Ubiquitous Computing
102
Security and privacy architectures for biomedical cloud computing
103
Security and privacy aspects of SmartFlow Internet payment system
104
Security and Privacy by Declarative Design
105
Security and Privacy Challenges in Cloud Computing Environments
106
Security and privacy challenges in industrial Internet of Things
107
Security and privacy challenges in open and dynamic environments
108
Security and Privacy Challenges in the Smart Grid
109
Security and privacy considerations for Wireless Sensor Networks in smart home environments
110
Security and privacy enablers for future Identity Management systems
111
Security and privacy enhancement in VANETs using mobility pattern
112
Security and privacy for body cameras used in law enforcement
113
Security and Privacy for Distributed Multimedia Sensor Networks
114
Security and Privacy for Implantable Medical Devices
115
Security and privacy for in-vehicle networks
116
Security and privacy for mobile electronic health monitoring and recording systems
117
Security and privacy for mobile healthcare networks: from a quality of protection perspective
118
Security and privacy for WLAN roaming with per-connection tariff negotiation
119
Security and Privacy Framework for Academic Monitoring System
120
Security and privacy framework for ubiquitous healthcare IoT devices
121
Security and privacy grand challenges for the Internet of Things
122
Security and Privacy Implications of Pervasive Memory Augmentation
123
Security and privacy in a middleware for large scale mobile and pervasive augmented reality
124
Security and privacy in a wireless remote medical system for home healthcare purpose
125
Security and Privacy in an Online World
126
Security and privacy in cloud computing
127
Security and Privacy in Cloud Computing
128
Security and Privacy in Cloud Computing
129
Security and Privacy in Cloud Computing via Obfuscation and Diversification: A Survey
130
Security and Privacy in Cloud Computing: A Survey
131
Security and Privacy in Cloud Computing: Vision, Trends, and Challenges
132
Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions
133
Security and privacy in collaborative distributed systems
134
Security and Privacy in Companies: State-of-the-art and Qualitative Analysis
135
Security and Privacy in Distributed Information Management
136
Security and Privacy in Distributed Smart Cameras
137
Security and Privacy in eHealth: Is it possible?
138
Security and privacy in emerging networks: Part 1 [Guest Editorial]
139
Security and privacy in emerging networks: Part II [Guest Editorial]
140
Security and privacy in emerging wireless networks [Guest Editorial]
141
Security and privacy in emerging wireless networks [Invited Paper]
142
Security and Privacy in Health IT [Guest editors´ introduction]
143
Security and privacy in localization for underwater sensor networks
144
Security and privacy in mobile cloud computing
145
Security and privacy in mobile crowdsourcing networks: challenges and opportunities
146
Security and privacy in mobile social network [Editor´s Note]
147
Security and privacy in mobile social networks: challenges and solutions
148
Security and Privacy in Molecular Communication and Networking: Opportunities and Challenges
149
Security and privacy in online social networks: A survey
150
Security and Privacy in Pervasive Computing
151
Security and privacy in RFID and applications in telemedicine
152
Security and privacy in sensor networks
153
Security and Privacy in Smart Grid Infrastructures
154
Security and Privacy in Social Networks
155
Security and privacy in the cloud a long-term view
156
Security and Privacy in the Computer Forensics Context
157
Security and privacy in the Internet of Things: Current status and open issues
158
Security and Privacy in the Internet of Vehicles
159
Security and Privacy in the Internet-of-Things Under Time-and-Budget-Limited Adversary Model
160
Security and privacy in the smart grid services
161
Security and Privacy in Web 2.0 [Guest editor´s introduction]
162
Security and Privacy Issues for Inter-vehicle Communications in VANETs
163
Security and privacy issues in E-Commerce: A proposed guidelines to mitigate the risk
164
Security and Privacy Issues in E-passports
165
Security and Privacy Issues in Medical Devices - The Provider/Manufacturer Partnership
166
Security and privacy issues in middleware for emergency and rescue applications
167
Security and privacy issues in Social Networking sites from user´s viewpoint
168
Security and privacy issues in wireless and mobile computing
169
Security and privacy issues towards ENUM protocol
170
Security and Privacy Issues with Health Care Information Technology
171
Security and Privacy Issues within the Cloud Computing
172
Security and Privacy Landscape in Emerging Technologies
173
Security and privacy legislation guidelines for developing personal health records
174
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned
175
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks
176
Security and privacy of collaborative spectrum sensing in cognitive radio networks
177
Security and Privacy of Distributed Online Social Networks
178
Security and privacy of future aircraft wireless communications with offboard systems
179
Security and privacy of location-based services for in-vehicle device systems
180
Security and Privacy on Authentication Protocol for Low-cost RFID
181
Security and Privacy on the Web [Guest editors´ introduction]
182
Security and privacy produced by DHCP unique identifiers
183
Security and privacy protection for automated video surveillance
184
Security and privacy protocol for emerging smart RFID applications
185
Security and privacy requirements analysis within a social setting
186
Security and Privacy Risks of Using E-mail Address as an Identity
187
Security and privacy solutions for low-cost RFID systems
188
Security and Privacy subscription information [advertisement]
189
Security and Privacy Subscription Information [advertisement]
190
Security and privacy technologies for distance education applications
191
Security and Privacy Trust in E-Government: Understanding System and Relationship Trust Antecedents
192
Security and privacy using one-round zero-knowledge proofs
193
Security and privacy: EAIT 2012
194
Security and Privacy: Enemies or Allies?
195
Security and Privacy: Facing Ethical Choices
196
Security and privacy: promising advances
197
Security and Privacy-Enhancing Multicloud Architectures
198
Security and protection ¿ the state of the art
199
Security and provenance in M3GS for cross-domain information sharing
200
Security and Pseudo-Anonymity with a Cluster-Based Approach for MANET
201
Security and QoS analysis for Next Generation Networks
202
Security and QoS Optimization for Distributed Real Time Environment
203
Security and QoS Self-Optimization in Mobile Ad Hoc Networks
204
Security and QoS Tradeoffs: Towards a FI Perspective
205
Security and quality of service in communication networks
206
Security and reliability considerations for distributed healthcare systems
207
Security and reliability in Concordia
TM
208
Security and reliability of critical utility infrastructures
209
Security and reliability of distributed file systems
210
Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors
211
Security and revenue reconciliation in optimal transmission pricing
212
Security and RFID
213
Security and rights management in digital cinema
214
Security and rights management in digital cinema
215
Security and Risk Challenges of Voice over IP Telephony
216
Security and risk management for air transport
217
Security and Robustness by Protocol Testing
218
Security and robustness constraints for spread-spectrum Tardos fingerprinting
219
Security and Robustness Enhancement for Image Data Hiding
220
Security and Robustness Enhancement of Existing Hash Algorithm
221
Security and Routing Scoped IP Multicast Addresses
222
Security and sanity
223
Security and Seamless Mobility Based Architecture for Hybrid Network of Enterprise
224
Security And Security Management Overview Of Concepts, Standards Status And Some Current Issues
225
Security and Software Quality: An Interview with Frank Perry
226
Security and source code access: issues and realities
227
Security and Spatial Resolution Optimization for Cluster-Based Wireless Sensor Networks
228
Security and speed assessment of a new distance protection algorithm based on the wavelet transform
229
Security and stability study of planning UHVAC/DC hybrid transmission system
230
Security and survivability of distributed systems: an overview
231
Security and survivability of networked systems
232
Security and Survivability of Networked Systems
233
Security and synchronization in watermark sequence
234
Security and telecommunications
235
Security and the architectural expression of territory
236
Security and the built environment: an interview with John Habraken
237
Security and the common safety method
238
Security and the Directory
239
Security And The National Telecommunications Infrastructure
240
Security and the World Wide Web
241
Security and Traffic Management Issues
242
Security and trust assurances for smart environments
243
Security and trust enhanced mobile agent based system design
244
Security and trust in Cloud scenarios
245
Security and trust in mobile ad hoc networks
246
Security and trust issues in ubiquitous environments - the business-to-employee dimension
247
Security and Trust Management in Mobile Agents: A New Perspective
248
Security and trust- new challenges to computing today in cyberspace
249
Security and Trust of Public Key Cryptography Options for HIP
250
Security and Trust Preserving VM Migrations in Public Clouds
251
Security and trust research in M2M system
252
Security and Trust through Electronic Social Network-Based Interactions
253
Security and Usability [Guest Editor´s Introduction]
254
Security and usability of authenticating process of online banking: User experience study
255
Security and Usability: Analysis and Evaluation
256
Security and User Guidelines for the Design of the Future Networked Systems
257
Security and vulnerability in the stabilization of networks of controlled dynamical systems via robustness framework
258
Security APIs for My Private Cloud - Granting access to anyone, from anywhere at any time
259
Security applications
260
Security applications and architecture for an open market
261
Security applications challenges of RFID technology and possible countermeasures
262
Security Applications Conference [front matter]
263
Security applications of computer vision
264
Security applications of distributed arithmetic coding
265
Security Applications of Formal Language Theory
266
Security approach for rapid prototyping in multilevel secure systems
267
Security approach used for instrument control over the Internet
268
Security approaches based on elliptic curve cryptography in wireless sensor networks
269
Security Architecture and Formal Analysis for Cognitive Radio Networks
270
Security architecture and key technologies for power cloud computing
271
Security architecture and mechanism of third generation mobile communication
272
Security architecture based on multilayer distributed intrusion detection system
273
Security architecture based on secret key and privilege attribute certificates
274
Security architecture development and results for a distributed modeling and simulation system
275
Security architecture elements for IoT enabled automation networks
276
Security architecture for a virtual heterogeneous machine
277
Security architecture for Ad hoc NOMOHi networks: Development of a project based on emergency rural telecommunications
278
Security architecture for aeronautical networks
279
Security architecture for at-home medical care using Wireless Sensor Network
280
Security Architecture for Broadband Multicast Wireless Networks
281
Security architecture for cloud networking
282
Security architecture for control networks using IPsec and KINK
283
Security architecture for federated cooperative information systems
284
Security architecture for heterogeneous distributed computing systems
285
Security Architecture for IEEE 802.15.4-based Wireless Sensor Network
286
Security Architecture for MANET and Its Application in M-Governance
287
Security architecture for mobile e-health applications in medication control
288
Security architecture for power-line metering system
289
Security architecture for resource-limited environments
290
Security architecture for RFID application in home environment
291
Security architecture for satellite services over cryptographically heterogeneous networks
292
Security architecture for service-based mobile environments
293
Security architecture for smart devices
294
Security architecture for system wide information management
295
Security architecture for tactical/strategic interoperability
296
Security Architecture for Third Generation (3G) using GMHS Cellular Network
297
Security Architecture for Web-based Health Insurance Systems
298
Security architecture for wireless LANs: corporate and public environment
299
Security architecture for wireless residential networks
300
Security architecture for wireless sensor networks using frequency hopping and public key management
301
Security architecture in the third generation networks
302
Security architecture in the UMTS network - A comparison with the FPLMTS network
303
Security Architecture Model for Smart Grid Communication Systems
304
Security Architecture of Digital Library Research
305
Security architecture of large scale information systems
306
Security architecture of the Austrian citizen card concept
307
Security architecture parameters in VANETs
308
Security architectures for controlled digital information dissemination
309
Security architectures in Mobile Integrated Pay-TV Conditional Access System
310
Security architectures in mobile integrated pay-TV conditional access system
311
Security architectures using formal methods
312
Security Arguments for a Class of ID-Based Signatures
313
Security as a CoAP resource: An optimized DTLS implementation for the IoT
314
Security as a dimension of quality of service in active service environments
315
Security as a flow machine
316
Security as a new dimension in embedded system design
317
Security as a Service (SasS): Securing user data by coprocessor and distributing the data
318
Security as a Service in Smart Clouds -- Opportunities and Concerns
319
Security as a Service Model for Cloud Environment
320
Security as a Service Using an SLA-Based Approach via SPECS
321
Security as a Systems Property
322
Security as if People Mattered
323
Security as services in active networks
324
Security Aspect of the Complexity of Modern Surveillance Systems An Experience Report
325
Security aspects for IEEE 1588 based clock synchronization protocols
326
Security aspects in 6lowPan networks
327
Security aspects in future mobile networks
328
Security Aspects in Networks-on-Chips: Overview and Proposals for Secure Implementations
329
Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead
330
Security aspects in standard certificate revocation mechanisms: a case study for OCSP
331
Security aspects of 3G-WLAN interworking
332
Security aspects of e-Health systems migration to the cloud
333
Security aspects of higher order software
334
Security aspects of hybrid broadband broadcast communication
335
Security aspects of inter-access system mobility between 3GPP and non-3GPP networks
336
Security aspects of Internet voting
337
Security Aspects of Military Sensor-Based Defence Systems
338
Security Aspects of Piecewise Hashing in Computer Forensics
339
Security Aspects of Policy Controlled Cognitive Radio
340
Security aspects of practical quantum cryptography
341
Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE
342
Security aspects of PRNGs with large state spaces
343
Security aspects of safety networks
344
Security Aspects of SCADA and Corporate Network Interconnection: An Overview
345
Security aspects of SIP based VoIP networks: A survey
346
Security Aspects of Soft Verified Messages Protected by Message Authentication Codes
347
Security Aspects of the Authentication Used in Quantum Cryptography
348
Security Aspects of the Extended Playfair Cipher
349
Security aspects of the in-vehicle network in the connected car
350
Security Aspects of the Linear Network Coding
351
Security aspects of third generation mobile telecommunications systems
352
Security aspects of wireless heterogeneous databases - protocol, performance, and energy analysis
353
Security Aspects: A Framework for Enforcement of Security Policies Using AOP
354
Security Assessment and Control System : Corrective Strategies
355
Security Assessment and Control System: Corrective Strategies
356
Security assessment and enhancement in real-time operations of ERCOT nodal electricity market
357
Security assessment and enhancement using RBFNN with feature selection
358
Security assessment and green issues of FPGA-based information & control systems
359
Security assessment by multiple transmission system operators exchanging sensitivity and tie-line power flow information
360
Security assessment for a cumulative sum-based fault detector in transmission lines
361
Security assessment for bus voltages using probabilistic load flow
362
Security Assessment for Communication Networks of Power Control Systems Using Attack Graph and MCDM
363
Security assessment framework for cyber physical systems: A case-study of DNP3 protocol
364
Security assessment in active distribution networks with change in weather patterns
365
Security assessment in distribution systems
366
Security assessment in operation: a comparative study of probabilistic approaches
367
Security assessment in the electricity market environment
368
Security Assessment in the Operation of Longitudinal Power Systems
369
Security Assessment in the Operation of Longitudinal Power Systems
370
Security assessment method for power grid planning under high penetration of variable generation
371
Security assessment methodology for industrial control system products
372
Security assessment modeling for water supply network based on leakage analysis
373
Security assessment of a turbine generator using H
∞
control based on artificial neural networks and expert systems
374
Security assessment of an autonomous system with increased wind penetration and pumped storage hybrid plants
375
Security assessment of computer networks -an ethical hacker´s perspective
376
Security assessment of DC zonal naval-ship power system
377
Security assessment of Eucalyptus´ web management interface
378
Security assessment of FPGA-based safety-critical systems: US NRC requirements context
379
Security assessment of mobile- banking
380
Security assessment of power systems based on entropy weight-based gray relational method
381
Security Assessment of Power Systems Using Artificial Neural Networks - A Comparison between Euclidean Distance Based Learning and Supervised Learning Algorithms
382
Security assessment of scalar costa scheme against known message attack in DCT-domain image watermarking
383
Security assessment of several distance protection algorithms based on the wavelet transform
384
Security assessment of the year 2020 planned Western Interconnection
385
Security assessment of virtual machines in open source clouds
386
Security Assessment on User Authentication by an HttpSendRequest Hooking in an HTTP Client
387
Security assessment using neural computing
388
Security assistant system combining millimetre wave radar sensors and chemical sensors
389
Security associations: building blocks for secure communications
390
Security Assurance Aggregation for IT Infrastructures
391
Security Assurance Cases for Medical Cyber–Physical Systems
392
Security assurance efforts in engineering Java 2 SE (JDK 1.2)
393
Security assurance for an RBAC/MAC security model
394
Security Assurance for Dynamic Role Mapping in a Multi-Domain Environment
395
Security Assurance Metrics and Aggregation Techniques for IT Systems
396
Security assurance of local data stored by HTML5 web application
397
Security Assurance of Services through Digital Security Certificates
398
Security Assurance Requirements Engineering (STARE) for trustworthy service level agreements
399
Security Assurance Using Face Recognition & Detection System Based On Neural Networks
400
Security Assurance with Metamorphic Testing and Genetic Algorithm
401
Security assurance with program path analysis and metamorphic testing
402
Security at Physical Layer in Wireless Communication
403
Security at software architecture level: A systematic mapping study
404
Security at the Internet layer
405
Security at the network edge: a distributed firewall architecture
406
Security attack analysis of safety systems
407
Security Attack Detection using Genetic Algorithm (GA) in Policy Based Network
408
Security attack mitigation framework for the cloud
409
Security Attack Ontology for Web Services
410
Security attacks against the availability of LTE mobility networks: Overview and research directions
411
Security attacks and countermeasures in Surveillance Wireless Sensor Networks
412
Security attacks and detection schemes in MANET
413
Security attacks and solutions for vehicular ad hoc networks
414
Security attacks and their countermeasures along with node replication attack for time synchronization in wireless sensor network
415
Security attacks in optical access networks - simultaneous detection and localization
416
Security attacks in wireless sensor networks: A survey
417
Security attacks on the wavelet transform and singular value decomposition image watermarking
418
Security attacks to ZigBee technology and their practical realization
419
Security Attribute Aggregation Models for E-research Collaborations
420
Security attribute evaluation method: a cost-benefit approach
421
Security audit for embedded avionics systems
422
Security audit logs for IDS
423
Security audit of data flows across enterprise systems and networks
424
Security audit system using Adaptive Genetic Algorithm and Support Vector Machine
425
Security audit trail analysis using inductively generated predictive rules
426
Security audit: a case study [information systems]
427
Security Authentication and an Undeniable Billing Protocol for WMNs
428
Security authentication of 3G-WLAN interworking
429
Security Authentication Scheme Based on Certificateless Signature and Fingerprint Recognition
430
Security Authentication through AES and fine-grained distributed Data Access Control using clustering in Wireless Sensor Networks
431
Security Authorization Scheme for Web Applications
432
Security automata integrated XACML and security validation
433
Security Automation and Threat Information-Sharing Options
434
Security aware content-based publish/subscribe system
435
Security aware minimized dominating set based routing in MANET
436
Security aware network controllers for next generation automotive embedded systems
437
Security Aware Partitioning for efficient file system search
438
Security awareness and adoption of security controls by smartphone users
439
Security awareness and social responsability
440
Security backlog in Scrum security practices
441
Security band-aids: more cost-effective than "secure" coding
442
Security Based Cyber-Physical Architecture for Environment Protection
443
Security based energy efficient routing protocol for Adhoc network
444
Security based on network topology against the wiretapping attack
445
Security basics
446
Security Benchmarks for Web Serving Systems
447
Security between base stations in cellular communication system
448
Security Blind Spots in the ATM Safety Culture
449
Security Bootstrap Based on Trusted Computing
450
Security Boundaries
451
Security boundary visualization for systems operation
452
Security Bounds for Efficient Decoy-State Quantum Key Distribution
453
Security Breaches in an Organization and Their Countermeasures
454
Security breaks a sweat
455
Security Broadcast Based on Linear Network Coding in WSN
456
Security broker for multimedia wireless LANs: design, implementation and testbed
457
Security by Checklist
458
Security by design factors for developing and evaluating secure software
459
Security by Design for the Smart Grid: Combining the SGAM and NISTIR 7628
460
Security camera based on a single chip solution using a sharply outlined display algorithm and variable-clock video encoder
461
Security camera system using sharply outlined display algorithm and variable-clock CVBS encoder
462
Security camera video authentication
463
Security Capabilities, Privacy & Integrity
464
Security Certification and Accreditation analysis for UAS Control and Communications
465
Security Certification of Composite Services: A Test-Based Approach
466
Security certification-aware service discovery and selection
467
Security certified simple identity-based non-interactive key sharing
468
Security Challenge and Defense in VoIP Infrastructures
469
Security challenges and countermeasures for trusted virtualized computing environments
470
Security challenges and data implications by using smartwatch devices in the enterprise
471
Security challenges and opportunities in adaptive and reconfigurable hardware
472
Security challenges and solutions in cloud computing
473
Security challenges during VLSI test
474
Security challenges for customer domain in the Smart Grid
475
Security Challenges for Hardware Designers of Mobile Systems
476
Security challenges for peer-to-peer SIP
477
Security challenges for the electricity infrastructure
478
Security challenges for the next generation of highly available systems
479
Security Challenges for the Public Cloud
480
Security challenges in automotive hardware/software architecture design
481
Security challenges in building automation and SCADA
482
Security challenges in cloud
483
Security Challenges in Cloud Storages
484
Security challenges in designing an integrated web application for multiple online banking
485
Security challenges in intrusion detection
486
Security challenges in Next generation HBB TV
487
Security challenges in opportunistic communication
488
Security challenges in pervasive wireless medical systems and devices
489
Security challenges in reactive Mobile Ad Hoc Network
490
Security challenges in swarm intelligence
491
Security challenges in the personal distributed environment
492
Security challenges in UAV development
493
Security challenges in vehicular cloud computing
494
Security challenges of E-government adoption based on end users´ perspective
495
Security challenges of integration of hash functions into cloud systems
496
Security Challenges of Location-Aware Mobile Business
497
Security challenges of wireless sensors devices (MOTES)
498
Security Challenges on the Clone, Snapshot, Migration and Rollback of Xen Based Computing Environments
499
Security challenges to telecommunication networks: An overview of threats and preventive strategies
500
Security challenges with cross-domain information exchange: Integrity and guessing attacks
501
Security Challenges with LTE-Advanced Systems and Military Spectrum
502
Security challenges, technology and international cooperation; the holocide intercept and the future of humanity
503
Security characterisation and integrity assurance for component-based software
504
Security characterisation of software components and their composition
505
Security characterization for evaluation of software architectures using ATAM
506
Security Checkers: Detecting processor malicious inclusions at runtime
507
Security Checking of Long-term Contract Transaction in Northeast Regional Power Market
508
Security Checkpoint Optimizer (SCO): An Application for Simulating the Operations of Airport Security Checkpoints
509
Security Checkpoint Optimizer Simulation Tool For Passenger Screening Prototyping
510
Security communication in headrace tunnel using beam transmission of laser lights
511
Security communication in tunnels underground
512
Security communication in winding tunnels and deep underground streets
513
Security communications interoperability protocol implementation
514
Security Comparison of Wired and Wireless Network with Firewall and Virtual Private Network (VPN)
515
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack
516
Security Components in a One-Stop-Shop Border Control System
517
Security Concept and Implementation for a Cloud Based E-science Infrastructure
518
Security concept for a wide-area low-bandwidth power-line communication system
519
Security Concept for Distributed Service Execution Environments
520
Security concept of individual identification in academic environment of CTU in Prague
521
Security concepts and implementation in the Ara mobile agent system
522
Security Concepts as Add-On for Process Models
523
Security concepts for flexible wireless automation in real-time environments
524
Security Concepts for Underwater Production Control Systems
525
Security Concerns and Countermeasures in Cloud Computing Paradigm
526
Security concerns and mitigation approaches for MOOC-based applications
527
Security concerns and risk at different levels in Cloud Computing
528
Security concerns for cloud computing in aircraft data networks
529
Security concerns for distributed systems
530
Security concerns for mobile information systems in health care
531
Security concerns for web-based research survey
532
Security Concerns in Cloud Computing
533
Security Concerns in Cloud Computing
534
Security Concerns in Popular Cloud Storage Services
535
Security concerns in smart grids: Threats, vulnerabilities and countermeasures
536
Security concerns in WiMAX
537
Security concerns of a plug-in vehicle
538
Security concerns of cloud-based healthcare systems: A perspective of moving from single-cloud to a multi-cloud infrastructure
539
Security Concerns of Identity Authentication and Context Privacy Preservation in uHealthcare System
540
Security concerns of legally sensitive Web portals
541
Security concerns of system users: a proposed study of user preceptions of the adequacy of security measures
542
Security configuration analytics using video games
543
Security Conscious Web Service Composition
544
Security Conscious Web Service Composition with Semantic Web Support
545
Security consideratiolis for the e-enabled aircraft
546
Security consideration for IP based aeronautical networks
547
Security consideration of migration to IPv6 with NAT (Network Address Translation) methods
548
Security considerations and reference architecture of a cyber computing infrastructure for online education
549
Security Considerations and Requirements for a Native Mode LAN Interconnection Service
550
Security considerations and two-factor authentication opportunities in e-learning environments
551
Security Considerations for Autonomous Robots
552
Security considerations for distributed Web-based e-commerce applications in Java
553
Security considerations for FAN-Internet connections
554
Security Considerations for Handover Schemes in Mobile WiMAX Networks
555
Security considerations for RFID technology adoption
556
Security considerations for secure and trustworthy smart home system in the IoT environment
557
Security Considerations for SOA-Based Multimedia Applications
558
Security considerations for the centralized ad-hoc network architecture (CANA)
559
Security considerations for the WirelessHART protocol
560
Security considerations for workflow systems
561
Security considerations in a network management environment
562
Security considerations in agent-based systems
563
Security considerations in communications systems and networks
564
Security considerations in composite power system reliability evaluation
565
Security considerations in data center configuration management
566
Security considerations in frequency hopping radio systems
567
Security Considerations in Integrating the Fragmented, Outsourced, ITSM Processes
568
Security considerations in ITRI cloud OS
569
Security Considerations in Minutiae-Based Fuzzy Vaults
570
Security considerations in OpenTag network
571
Security considerations in PMR networks
572
Security considerations in space and delay tolerant networks
573
Security considerations in the acquisition of computer systems
574
Security considerations in the design and peering of RFID Discovery Services
575
Security considerations in the design of tamper resistant GNSS receivers
576
Security considerations on extending PACE to a biometric-based connection establishment
577
Security Considerations on Node Mobility in Wireless Sensor Networks
578
Security considerations on pervasive real-time collaboration
579
Security Considerations on Processing of Geospatial Information in the Cloud
580
Security considerations when designing a distributed file system using object storage devices
581
Security considered harmful a case study of tradeoff between security and usability
582
Security Consistency in UML Designs
583
Security constrained augmentation for transmission system considering preferences of market players on expansion options
584
Security constrained coordinated dynamic voltage stabilization based on model predictive control
585
Security constrained day-ahead microgrid island scheduling with battery storage control
586
Security Constrained Dispatch
587
Security Constrained Dispatch at the New York Power Pool
588
Security Constrained Dispatch at the New York Power Pool
589
Security constrained dispatch solutions using the gradient projection method of optimization
590
Security constrained dynamic dispatch of real power for thermal groups
591
Security constrained economic dispatch considering wind energy conversion systems
592
Security Constrained Economic Dispatch using a hybrid Fuzzy Genetic Algorithm approach
593
Security Constrained Economic Dispatch Using Interior Point Method
594
Security constrained economic dispatch using nonlinear Dantzig-Wolfe decomposition
595
Security constrained economic dispatch with flexible thermostatically controlled loads
596
Security constrained economic dispatch with participation factors based on worst case bus load variations
597
Security Constrained Economic Dispatch with Secure Bilateral Transactions in Hybrid Electricity Markets
598
Security constrained emergency voltage stabilization: A Model Predictive Control based approach
599
Security Constrained Integrated Unit Commitment Using Quadratic Programming
600
Security constrained matching of supply and demand in a hydro thermal power supply system
601
Security constrained multi-objective congestion management in transactional based restructured electrical network using bacterial foraging algorithm
602
Security constrained OPF by hybrid algorithms in interconnected power systems
603
Security constrained OPF incorporating corrective control of HVDC
604
Security constrained optimal power flow employing particle swarm optimization
605
Security Constrained Optimal Power Flow for an Economical Operation of FACTS Devices in Liberalized Energy Markets
606
Security constrained optimal power flow for an economical operation of FACTS-devices in liberalized energy markets
607
Security constrained optimal power flow for HVAC and HVDC grids
608
Security constrained Optimal Power Flow for mixed AC and multi-terminal HVDC grids
609
Security constrained optimal power flow for the evaluation of transmission capability on Korea electric power system
610
Security constrained optimal power flow incorporating preventive and corrective control
611
Security Constrained Optimal Power Flow via proximal message passing
612
Security constrained optimal power flow with FACTS devices using bender decomposition
613
Security constrained optimal reactive dispatch using GB transmission network models
614
Security constrained optimal unit commitment in balancing market
615
Security constrained optimization for power systems
616
Security constrained optimization: an added dimension in utility systems optimal power flow
617
Security constrained optimization-a case study (power system control)
618
Security Constrained Power Management System for the NG IPS ships
619
Security constrained transmission expansion planning for smart transmission grids based on the AC network model
620
Security Constrained Unit Commitment
621
Security constrained unit commitment and economic dispatch through benders decomposition: A comparative study
622
Security constrained unit commitment for East China Electric Power Market
623
Security Constrained Unit Commitment for open markets
624
Security constrained unit commitment incorporating volatile wind power
625
Security constrained unit commitment strategy for wind/thermal units using Lagrangian relaxation based Particle Swarm Optimization
626
Security constrained unit commitment with multiple wind farms integrated
627
Security constrained unit commitment with phase shifter and wind generation
628
Security Constrained Unit Commitment: Network Modeling and Solution Issues
629
Security constrained unit commitment-based power system dispatching with plug-in hybrid electric vehicles
630
Security constrained well-being evaluation of a sub-transmission system
631
Security Constrains Unit Commitment by Lagrangian Decomposition and Tabu Search
632
Security constraint processing during multilevel secure database design
633
Security constraint processing during the update operation in a multilevel secure database management system
634
Security constraint processing in a multilevel secure distributed database management system
635
Security constraints for wind power operation
636
Security Constraints in Access Control of Information System Using UML Language
637
Security constraints in integrated circuits
638
Security Constraints Unit Commitment for a Multi-Regional Electricity Market
639
Security context transfer in vertical handover
640
Security Contexts in Autonomic Systems
641
Security control for COTS components
642
Security control system research on a high-altitude hot washing device
643
Security controls for Android
644
Security Coordinated Economic Dispatch for Joint Energy and Reserve Markets
645
Security Coordinated Maintenance Scheduling in Deregulation Based on Genco Contribution to Unserved Energy
646
Security coordinated maintenance scheduling in deregulation based on genco contribution to unserved energy
647
Security Credential Mapping in Grids
648
Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia
649
Security Data Mining in an Ontology for Vulnerability Management
650
Security decision analysis based on A. Shamir´s (t, n) threshold secret sharing scheme
651
Security Decision Making Based on Domain Partitional Markov Decision Process
652
Security Decision Support Challenges in Data Collection and Use
653
Security Decision-Making among Interdependent Organizations
654
Security defence system for smart grid
655
Security Defenses for Vulnerable Medical Sensor Network
656
Security design and evaluation in a VoIP secure infrastracture: a policy based approach
657
Security Design Based on Social Modeling
658
Security design for a new wireless local area network TUTWLAN
659
Security Design for Configuration Management of Android Devices
660
Security Design for E-business Applications
661
Security Design for Electronic Medical Record Sharing System
662
Security design for Instant Messaging system based on RSA and triple DES
663
Security Design for Multi-service Smart Card Systems
664
Security design in online games
665
Security Design Issues For Microprocessor-Based Systems
666
Security design of electronic military affair system based on J2EE and RSA platform
667
Security design of mobile agent system
668
Security design of remote maintenance system for nuclear power plants based on ISO/IEC 15408
669
Security Design on Construction Machinery Running Attention System
670
Security Design Patterns: Survey and Evaluation
671
Security Difference between DSA and Schnorr´s Signature
672
Security difficulties with a recently proposed chaotic based communication technique
673
Security Digital Evidence
674
Security Dilemma: Healthcare Clinicians at Work
675
Security dispatch using the Hopfield neural network
676
Security Domains: Key Management in Large-Scale Systems
677
Security Door System Using Human Tracking Method with Laser Range Finders
678
Security Driven Requirements Refinement and Exploration of Architecture with Multiple NFR Points of View
679
Security Education against Phishing: A Modest Proposal for a Major Rethink
680
Security Education Using Second Life
681
Security Effectiveness and a Hardware Firewall for MPSoCs
682
Security Electronic Commerce Protocol by the Third Kind Entities
683
Security Embedding Codes
684
Security embedding codes
685
Security embedding on UWB-IR physical layer
686
Security enabled DSR for establishing symmetric key and security in MANETS
687
Security Enforcement Model for Distributed Usage Control
688
Security enforcement on RFX storage - a selective encryption approach
689
Security enforcement using PKI in Semantic Web
690
Security Engineering and Modelling of Set-Top Boxes
691
Security Engineering Approach to Support Software Security
692
Security Engineering Based on Structured Formal Reasoning
693
Security engineering in a system of systems environment
694
Security Engineering in IT Governance for University Information System
695
Security engineering of lattice-based policies
696
Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing
697
Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network
698
Security enhanced data delivery in sensor networks
699
Security enhanced design of the Bluetooth simple pairing protocol
700
Security enhanced IEEE 802.1x authentication method for WLAN mobile router
701
Security Enhanced Indoor Location Tracking System for Ubiquitous Home Healthcare
702
Security Enhanced Java: Mandatory Access Control for the Java Virtual Machine
703
Security Enhanced Linux on embedded systems: A hardware-accelerated implementation
704
Security enhanced MPEG player
705
Security enhanced multi-hop over the air reprogramming with Fountain Codes
706
Security Enhanced OCDMA System Based on Incoherent Broadband Light Source and Bipolar Coding
707
Security enhanced SPECTS O-CDMA with four-state encoded data modulation
708
Security enhancement by adopting the chaotic system for wavelet tree based digital image watermarking
709
Security enhancement by detection and penalization of malicious nodes in wireless networks
710
Security enhancement for a dynamic ID-based remote user authentication scheme
711
Security Enhancement for a Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
712
Security Enhancement for Commercial Communication Satellite Systems
713
Security Enhancement for Data Transmission in 3G/4G Networks
714
Security enhancement for data transmission in 4G networks
715
Security enhancement for dual-hop RF protocols with Nth-best partial relay and EH-based jammer
716
Security Enhancement for Lightweight JPEG 2000 Transparent Encryption
717
Security enhancement for MIMO based wireless network using codebook and diversity multiplexing
718
Security enhancement for real-time routing protocol in wireless sensor networks
719
Security enhancement for space telecommand link
720
Security enhancement for spectral amplitude coding OCDMA based on hybrid EDW/M seq. code systems
721
Security enhancement for the “simple authentication key agreement algorithm”
722
Security enhancement for TPVD steganographic method
723
Security enhancement for two remote user authentication schemes
724
Security Enhancement for Watermarking Technique Using Content based Image Segmentation
725
Security enhancement in ad hoc network with ID-based cryptosystem
726
Security enhancement in cooperative jamming using compromised secrecy region minimization
727
Security enhancement in free-space optics using acousto-optic deflectors
728
Security Enhancement in InfiniBand Architecture
729
Security Enhancement in Wireless Sensor Networks Using Machine Learning
730
Security Enhancement Methods for Mobile POS System
731
Security enhancement of a novel proxy key generation protocol
732
Security Enhancement of a Remote User Authentication Scheme Using Bilinear Pairings and ECC
733
Security enhancement of AODV against internal attacks
734
Security enhancement of AODVjr routing protocol for ZigBee network
735
Security enhancement of biometrics, cryptography and data hiding by their combinations
736
Security Enhancement of Cooperative Single Carrier Systems
737
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
738
Security enhancement of electric power systems by approximate reasoning
739
Security enhancement of handover key management based on media access control address in 4G LTE networks
740
Security enhancement of HTML5 Local Data Storage
741
Security enhancement of initial ranging based attacks on IEEE 802.16-2009
742
Security enhancement of internet banking applications by using multimodal biometrics
743
Security Enhancement of Java Remote Method Invocation
744
Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol
745
Security enhancement of MD5 hashed passwords by using the unused bits of TCP header
746
Security Enhancement of Multimedia Copyright Protection
747
Security Enhancement of Multiple Distributed Generation by the Harmonized Grouping
748
Security enhancement of secure USB debugging in Android system
749
Security Enhancement of SPECTS O-CDMA Through Concealment Against Upstream DPSK Eavesdropping
750
Security Enhancement of the Authentication Protocol for RFID Systems
751
Security enhancement of voice over Internet protocol using speaker recognition technique
752
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments
753
Security enhancement on an authentication scheme for privacy preservation in Ubiquitous Healthcare System
754
Security enhancement on BGP protocol: A literature survey
755
Security enhancement on the efficient and complete remote user authentication scheme using smart cards
756
Security Enhancement on VoIP using Chaotic Cryptography
757
Security Enhancement Protocol in SMS-Banking using Digital Watermarking Technique
758
Security enhancement through multiple path transmission in ad hoc networks
759
Security Enhancement through Product Evaluation
760
Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks
761
Security enhancement using an optimal switching power flow
762
Security enhancement using an optimal switching power flow
763
Security enhancement using motion detection
764
Security enhancement with nodal criticality based integration of PHEV micro grids
765
Security Enhancement With Nodal Criticality-Based Integration of Strategic Micro Grids
766
Security enhancement with optimal QoS using ECDH for converged 3G-WLAN system
767
Security enhancements for a user-controlled lightpath provisioning system
768
Security enhancements for A5/1 without loosing hardware efficiency in future mobile systems
769
Security enhancements for FPGA-based MPSoCs: A boot-to-runtime protection flow for an embedded Linux-based system
770
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning
771
Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005
772
Security enhancements in AODV protocol for wireless ad hoc networks
773
Security enhancements in GSM cellular standard
774
Security Enhancements in Novel Passive Optical Networks
775
Security enhancements in WiMAX mesh networks
776
Security enhancements of networked control systems using RSA public-key cryptosystem
777
Security enhancements of smart card-based remote user password authentication scheme with session key agreement
778
Security Enhancements to Routing Protocols for Backbone Networks
779
Security enhancing algorithm in network computing environment based on periodic condition monitoring
780
Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks
781
Security equipment in ad hoc networks
782
Security estimates for 512-bit RSA
783
Security Estimation Framework: Design Phase Perspective
784
Security estimation in Streaming Protocols
785
Security estimation model with directional antennas
786
Security EvaBio: An analysis tool for the security evaluation of biometric authentication systems
787
Security evaluation against electromagnetic analysis at design time
788
Security evaluation algorithm for enterprise-class CMS website system
789
Security evaluation and optimization of the delay-based dual-rail pre-charge logic in presence of early evaluation of data
790
Security evaluation at design time against optical fault injection attacks
791
Security evaluation for communication-friendly encryption of multimedia
792
Security Evaluation for Cyber Situational Awareness
793
Security evaluation for distribution power system using improved MIQCP based restoration strategy
794
Security Evaluation for Information Assurance
795
Security Evaluation for Software System with Vulnerability Life Cycle and User Profiles
796
Security Evaluation for Wireless Network Based on Fuzzy-AHP with Variable Weight
797
Security evaluation in cloud
798
Security Evaluation in Power Systems Using Pattern Recognition
799
Security Evaluation Method Based on Host Resource Availability
800
Security evaluation model for threshold cryptography applications in MANET
801
Security evaluation model of the information system based on the security characteristic measure for the key
802
Security evaluation of a control system using Named Data Networking
803
Security Evaluation of a Linux System: Common Criteria EAL4+ Certification Experience
804
Security evaluation of a new analog speech privacy/scrambling device using hopping filters
805
Security evaluation of a new analog speech scrambling device using a nonlinear DES-based keystream generator
806
Security evaluation of a perceptual image hashing scheme based on virtual watermark detection
807
Security Evaluation of an Intrusion Tolerant System with MRSPNs
808
Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks
809
Security Evaluation of Balanced 1-of-
Circuits
810
Security evaluation of biometric authentication systems under real spoofing attacks
811
Security Evaluation of Biometrics Authentications for Cellular Phones
812
Security evaluation of bistable ring PUFs on FPGAs using differential and linear analysis
813
Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off
814
Security evaluation of composite power systems
815
Security evaluation of data exchange path in infrastructure networks
816
Security evaluation of different AES implementations against practical setup time violation attacks in FPGAs
817
Security evaluation of dual rail logic against DPA attacks
818
Security evaluation of embedded hardware implementation
819
Security Evaluation of Hosts Based on Network Traffic
820
Security evaluation of informed watermarking schemes
821
Security evaluation of IT systems underlying critical networked infrastructures
822
Security evaluation of open source clouds
823
Security evaluation of optical CDMA system with statistical approach
824
Security Evaluation of Pattern Classifiers under Attack
825
Security evaluation of proactive secret sharing cryptosystem
826
Security evaluation of Saudi Arabia´s websites using open source tools
827
Security Evaluation of Service-oriented Systems with an Extensible Knowledge Base
828
Security Evaluation of Urban Rail Transit Operation
829
Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks
830
Security evaluation over lightweight cryptographic protocols
831
Security Event Correlation Supported by Multi-Core Architecture
832
Security Event Management System based on Mobile Agent Technology
833
Security Event Monitoring in a Distributed Systems Environment
834
Security Evolution of the Webkit browser engine
835
Security Expert Slams Bush´s Surveillance Program
836
Security extension to grasshopper for network management based policy
837
Security Extensions for Improving Data Security of Event Repositories in EPCglobal Networks
838
Security Extensions for Space-Link Communication
839
Security extensions of Windows environment based on FIPS 201 (PIV) smart card
840
Security Fatigue? Shift Your Paradigm
841
Security feature comparison for fibre channel storage area networks switches
842
Security features for DECT
843
Security features in Ethernet switches for access networks
844
Security First Network Bank: a case study of an Internet pioneer
845
Security flaw of authentication scheme with anonymity for wireless communications
846
Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing Platforms
847
Security flaws and workarounds for IEEE 1588 (transparent) clocks
848
Security Flaws in Kuribayashi-Tanaka Fingerprinting Protocol
849
Security flow control by dynamic stack allocation
850
Security for Ambient Assisted Living: Multi-factor Authentication in the Internet of Things
851
Security for Ambient Wireless Services
852
Security for ATM networks
853
Security for Authenticated Key Exchange Based on Non-Malleability
854
Security for Bluetooth enabled devices using BlipTrack Bluetooth detector
855
Security for Computer Networks
856
Security for control systems under sensor and actuator attacks
857
Security for distributed applications
858
Security for distributed object-oriented systems
859
Security for distributed SOA at the tactical edge
860
Security for distributed systems
861
Security for emerging ubiquitous networks
862
Security for energy constrained RFID system
863
Security for extensible systems
864
Security for FLUTE over Satellite Networks
865
Security for FTTx Optical Access Networks
866
Security for Future Software Defined Mobile Networks
867
Security for Grid services
868
Security for Grids
869
Security for Industrial Communication Systems
870
Security for infinite networks
871
Security for information data broadcasting system with conditional-access control
872
Security for integrated IP-ATM/tactical-strategic networks
873
Security for IoT: An effective DTLS with public certificates
874
Security for Key Management Interfaces
875
Security for medical sensor networks in mobile health systems
876
Security for mission-oriented systems
877
Security for mobile ATE applications
878
Security for mobile users of telecommunication services
879
Security for mobility
880
Security for mobility
881
Security for multimedia adaptation: architectures and solutions
882
Security for Networks Virtual Access of Cloud Computing
883
Security for next generation intelligent network based on Parlay API
884
Security for node isolation attack on OLSR by modifying MPR selection process
885
Security for object-oriented database systems
886
Security for personal communications services: public-key vs. private key approaches
887
Security for Pervasive Health Monitoring Sensor Applications
888
Security for pervasive healthcare
889
Security for pervasive medical sensor networks
890
Security for Process Control Systems: An Overview
891
Security for real-time MPEG compressed video in distributed multimedia applications
892
Security for Resource Allocation Based on Trust and Reputation in Computational Economy Model for Grid
893
Security for smart mobile networks: The NEMESYS approach
894
Security for smart mobile networks: The NEMESYS approach
895
Security for space power systems
896
Security for space power systems
897
Security for telecommunications network management [Book Review]
898
Security for the Common Object Request Broker Architecture (CORBA)
899
Security for the digital library-protecting documents rather than channels
900
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
901
Security for the Mythical Air-Dropped Sensor Network
902
Security for the Rest of Us: An Industry Perspective on the Secure-Software Challenge
903
Security for the scientific data services framework
904
Security for the Storage Network Merging NAS and SAN
905
Security for Ubiquitous Computing: Problems and Proposed Solutionl
906
Security for universal personal communications
907
Security for Video Surveillance with Privacy
908
Security for virtual private intranets
909
Security for Web Service Based on Regulatory Compliance
910
Security for wireless sensor networks
911
Security for wireless sensor networks in military operations
912
Security for wireless sensor networks: A review
913
Security for wiretap networks via rank-metric codes
914
Security for WISP through Mikrotik equipment
915
Security for WSN based on elliptic curve cryptography
916
Security foundation for a distributed cabin core architecture
917
Security Frame and Evaluation in Mobile Agent System
918
Security framework for addressing the issues of trust on mobile financial services
919
Security framework for designing SIP scanner
920
Security Framework for DPWS Compliant Devices
921
Security framework for integrated networks
922
Security framework for low latency vanet applications
923
Security Framework for P2P Based Grid Systems
924
Security Framework for Remote Access to Home Network
925
Security framework for smart devices
926
Security framework for VANET for privacy preservation
927
Security Framework for Virtualised Infrastructure Services Provisioned On-demand
928
Security Framework for Wireless Communications in Smart Distribution Grid
929
Security Framework in a Virtual Large-Scale Disk System
930
Security framework of AeroMACS
931
Security framework of cloud data storage based on Multi Agent system architecture - A pilot study
932
Security frameworks in the converged web and mobile applications: A review
933
Security from space
934
Security from the transparent computing aspect
935
Security function and mechanism of social networks on vulnerable groups: A theoretic framework
936
Security function interactions
937
Security function virtualization in software defined infrastructure
938
Security Fundamentals
939
Security fusion based on state machine compositions
940
Security fusion implementation and optimization in SCADA systems
941
Security game between source and friendly relay
942
Security Games for Node Localization through Verifiable Multilateration
943
Security Games for Risk Minimization in Automatic Generation Control
944
Security games for vehicular networks
945
Security Games for Vehicular Networks
946
Security games for voltage control in smart grid
947
Security games with decision and observation errors
948
Security Games with Incomplete Information
949
Security gap assessment for the fast fading wiretap channel
950
Security gap performance of some LDPC code constructions
951
Security Gateway for Accessing IPv6 WLAN
952
Security Goal Indicator Trees: A Model of Software Features that Supports Efficient Security Inspection
953
Security Goals Assurance Based on Software Active Monitoring
954
Security goggles based on superposed liquid crystal windows
955
Security Governance for Enterprise VoIP Communication
956
Security Guarantee in Backend RFID System
957
Security guards: issues and approaches
958
Security has been lifted on radar mapping systems
959
Security impact assessment of industrial automation systems using genetic algorithm and simulation
960
Security impacts of changes in governor response
961
Security Impacts of Virtualization on a Network Testbed
962
Security Implementation for a VoIP Server
963
Security implementation in heterogeneous networks with long delay channel
964
Security implementation within GEN2 protocol
965
Security implication and detection of threats due to manipulating IPv6 extension headers
966
Security implications for EDI
967
Security implications of adaptive multimedia distribution
968
Security Implications of Cooperative Communications in Wireless Networks
969
Security implications of cyberphysical digital microfluidic biochips
970
Security Implications of Direct-to-Consumer Genetic Sevices
971
Security implications of high-power microwave technology
972
Security implications of memory deduplication in a virtualized environment
973
Security Implications of Network Address Translation on Intrusion Detection and Prevention Systems
974
Security Implications of Open- and Closed-Loop Receivers in All-Optical Chaos-Based Communications
975
Security implications of radio frequency certificates of authenticity
976
Security implications of typical Grid Computing usage scenarios
977
Security Implications of Virtualization: A Literature Study
978
Security improvement for audio watermarking in image using BCH coding
979
Security improvement for CSK via breaking time correlation among state variables
980
Security improvement in fingerprint authentication system using virtual biometric
981
Security Improvement in RFID Supply Chain
982
Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6
983
Security improvement of the ID system using a cell phone
984
Security improvement on a timestamp-based password authentication scheme
985
Security improvement on an efficient key distribution mechanism for large-scale Wireless Sensor Network
986
Security Improvement On Chien Et Al.´s Remote User Authentication Scheme Using Smart Cards
987
Security Improvement on Smart Card-Based Remote User Authentication Scheme Using Hash Function
988
Security Improvement on the Timestamp-based Password Authentication Scheme Using Smart Cards
989
Security improvement on Yang-Shieh´s authentication scheme
990
Security Improvement Using
-Phase-Shifted SSFBG En/Decoder in Time-Spreading OCDMA
991
Security Improvement with Multiplexing for Optical Encryption Based on Cross-Correlation of Random Phase Masks
992
Security improvements for IEEE 1588 Annex K: Implementation and comparison of authentication codes
993
Security improvements of dynamic ID-based remote user authentication scheme with session key agreement
994
Security improvements of IEEE 802.11i 4-way handshake scheme
995
Security improvements on an efficient group key agreement protocol
996
Security Improvements to Anonymous ID-Based Group Key Agreement for Wireless Networks
997
Security improvisation in image steganography using DES
998
Security in a distributed message handling system
999
Security in a mobile agent system
1000
Security in a PKI-based networking environment: a multi-agent architecture for distributed security management system & control