Limit search to available items
Nearby Titles are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Year Entries
Secur. conduit   1998- 1
Secur. deal     1
Secur. dir. handb   1991- 1
Sécur. glob   2007- 1
Secur. Imperii   1994- 1
Secur. ind. news     1
Secur. inform   2012 1
Secur. law handb   1978- 1
Secur. law rev   1969- 1
Secur. mark. news   1994- 1
Secur. priv   2018- 1
Secur. reg. (St. Paul Minn.)   1990- 1
Sécur. stratég. (En ligne)     1
Secur. syst. news (Online)     1
Secur. technol. des   2008 1
Secur. technol. news     1
Secur. watch   1999- 1
Secur. week     1
Securables, Permissions, and Auditing / / Jason Brimhall --  2012 1
Securance of the Social Minimum: Social Insurance Principles -- / pt. TWO  2017 1
Secure Access Control and Authentication in Wireless Mesh Networks / / Ranga Reddy --22.1.  2011 1
Secure accommodation in child care : between hospital and prison or thereabouts?   1993 1
Secure Accumulators from Euclidean Rings without Trusted Setup / / Helger Lipmaa --  2012 1
The new leader's 100-day action plan : how to take charge, build your team, and get immediate results /   2009 1
Secure administration techniques -- / pt. II.  2005 1
Secure agent programs -- / 11.  2000 1
Secure Agent Roaming under M-Commerce / / Steven Sheng-Ue Guan --  2008 1
Secure Aggregation of Data -- / 10.11.  2011 1
Secure and Anonymous Hybrid Encryption from Coding Theory / / Edoardo Persichetti --  2013 1
Secure and Compliant Implementation of Business Process-Driven Systems / / Achim D. Brucker, Isabelle Hang --  2013 1
SECURE AND DIGITALIZED FUTURE MOBILITY shaping the ground and air vehicles   2022 1
Secure and Efficient Electricity Supply : During the Transition to Low Carbon Power Systems   2014 1
A Secure and Efficient Mix Network Especially Suitable for E-Voting / / Kun Peng --  2012 1
Secure and Efficient Outsourcing of Sequence Comparisons / / Marina Blanton, Mikhail J. Atallah, Keith B. Frikken and Qutaibah Malluhi --  2012 1
Secure and Efficient Protocols for Iris and Fingerprint Identification / / Paolo Gasti --  2011 1
A Secure and Efficient Scheme for Cloud Storage against Eavesdropper / / Jian Liu [and others] --  2013 1
Secure and Fast Implementations of Two Involution Ciphers / / Billy Bob Brumley --  2012 1
A Secure and Flexible Data Aggregation Framework for Smart Grid / / Lun-Pin Yuan, Bing-Zhe He [and 2 others] --  2014 1
Secure and Imperceptible Intelligence Message Sharing Scheme / / Vineeta Khemchandani and G.N. Purohit --  2012 1
A secure and light weight user authentication system based on online signature verification for resource constrained mobile networks / / Chandra Sekhar Vorugunti, D.S. Guru, and Viswanath Pulabaigari  2019 1
Secure and Lightweight Distance-Bounding / / Ioana Boureanu, Aikaterini Mitrokotsa and Serge Vaudenay --  2013 1
A Secure and Practical Fingerprinting Protocol for Industry Design Map / / Feng Chen, Chengyue Wang and Zhen Wang  2012 1
Secure and Practical Key Distribution for RFID-Enabled Supply Chains / / Tieyan Li, Yingjiu Li and Guilin Wang --  2012 1
Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines / / Michael Velten, Frederic Stumpf --  2013 1
Secure and Privacy-Aware Searching in Peer-to-Peer Networks / / Jaydip Sen --  2012 1
Secure and Privacy-Preserving Cross-Layer Advertising of Location-Based Social Network Services / / Michael Dürr, Florian Gschwandtner, Corina Kim Schindhelm and Markus Duchon --  2012 1
Secure and privacy-preserving data communication in Internet of Things   2017 1
Secure and Privacy-Preserving Execution Model for Data Services / / Mahmoud Barhamgi [and others] --  2013 1
Secure and Private Execution Environment Design (SEED), International Symposium on     1
Secure and Private Outsourcing of Shape-Based Feature Extraction / / Shumiao Wang [and others]  2013 1
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next