|
|
A Secure and Private RFID Authentication Protocol under SLPN Problem / / Mohammad S.I. Mamun, Atsuko Miyaji and Mohammad S. Rahman --
|
2012
|
1
|
|
A Secure and Reliable Cyberspace? The NSA, Encryption, and Exploits.
|
2015
|
1
|
|
Secure and Reliable Microservices and Containers (SRMC), International Workshop on
|
|
1
|
|
Secure and Reliable Systems --
|
2012
|
1
|
|
Secure and resilient digital transformation of healthcare : first workshop, SUNRISE 2023, Stavanger, Norway, November 30, 2023, Proceedings
|
2024
|
1
|
|
Secure and Resilient Software
|
2011
|
1
|
|
Secure and resilient software development
|
2010
|
1
|
|
Secure and Resilient Software : Requirements, Test Cases, and Testing Methods
|
2011
|
1
|
|
Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection / / Martim Carbone, Matthew Conover, Bruce Montague and Wenke Lee --
|
2012
|
1
|
|
Secure and Robust Watermarking Scheme in Frequency Domain Using Chaotic Logistic Map Encoding -- / Part IV
|
2020
|
1
|
|
Secure and Semantic Repository for Weapon Models in the Cloud / / Hyunhwi Kim, Chanjong Park and Kangsun Lee --Part 4.
|
2012
|
1
|
|
Secure and smart Internet of Things (IoT) : using blockchain and AI
|
2018
|
1
|
|
Secure and sustainable pensions
|
2009
|
1
|
|
The Secure and the Dispossessed : How the Military and Corporations Are Shaping a Climate-Changed World
|
2015
|
1
|
|
Secure and traceable attribute-based sequential aggregate signature / / Ruili Yang, Jiageng Chen, Shangle Li --
|
2021
|
1
|
|
Secure and trust computing, data management and applications : 8th FTRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011, proceedings
|
2011
|
1
|
|
Secure and trust computing, data management, and applications : STA 2011 Workshops: IWCS 2011 and STAVE 2011, Loutraki, Greece, June 28-30, 2011, proceedings
|
2011
|
1
|
|
Secure and trusted cyber physical systems : recent approaches and future directions
|
2022
|
1
|
|
Secure and trustworthy cyberphysical microfluidic biochips : a practical guide to cutting-edge design techniques for implementing secure and trustworthy cyberphysical microfluidic biochips
|
2020
|
1
|
|
Secure and Trustworthy Machine Learning (SaTML), IEEE Conference on
|
|
1
|
|
Secure and trustworthy service composition : the Aniketos approach
|
2014
|
1
|
|
Secure and trustworthy transportation cyber-physical systems
|
2017
|
1
|
|
Secure and Unfailing Services / / Davide Basile, Pierpaolo Degano and Gian-Luigi Ferrari --
|
2013
|
1
|
|
Secure and Usable PIN-Entry Method with Shoulder-Surfing Resistance --
|
2013
|
1
|
|
Secure and Verifiable Outsourcing of Sequence Comparisons / / Yansheng Feng [and others] --
|
2013
|
1
|
|
Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks / / Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao, Jinguo Li --
|
2013
|
1
|
|
Secure Android Application in SOA-Based Mobile Government and Mobile Banking Systems / / Milan Markoviá and Goran Đjorđjević --
|
2013?
|
1
|
|
Secure Anonymous Calling Service Using GHOST CALL --
|
2017
|
1
|
|
Secure Anonymous Conditional Purchase Order Payment Mechanism --
|
2012
|
1
|
|
Secure Anonymous File Sharing --
|
2017
|
1
|
|
Secure AODV Routing Protocol Based on Trust Mechanism / / Harris Simaremare, Abdelhafid Abouaissa, Riri Fitri Sari --
|
2013
|
1
|
|
Secure Application Role Procedure for Multiple Applications --
|
2011
|
1
|
|
A Secure Architecture for Smart Meter Systems / / Daniel Angermeier, Konstantin Böttinger, Andreas Ibing, Dieter Schuster --
|
2012
|
1
|
|
Secure Architectures with Active Networks / / Srinivas Sampalli, Yaser Haggag, and Christian Labonte
|
2007
|
1
|
|
Secure Architecure for the Integration of RFID and Sensors in Personal Networks / / Pablo Najera, Rodrigo Roman and Javier Lopez --
|
2012
|
1
|
|
Secure ASP.NET AJAX development
|
2006
|
1
|
|
Secure Authentication Assumptions -- / 22.3.3.
|
2011
|
1
|
|
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions / / Aravind Ashok, Prabaharan Poornachandran and Krishnasree Achuthan
|
2012
|
1
|
|
A secure authentication infrastructure for mobile users / / Gregor V. Bochmann, Eric Zhen Zhang --
|
2005
|
1
|
|
A Secure Authentication Scheme of Wireless Mesh Network --
|
2012
|
1
|
|
Secure Authorized Proxy Signature Scheme for Value-Added Service in Vehicular Ad Hoc Networks --
|
2014
|
1
|
|
Secure Automated Clearing House Transactions / / Mark B. Schmidt, Jan Skalicky Hanson --
|
2008
|
1
|
|
Secure automatic dependent surveillance-broadcast systems
|
2023
|
1
|
|
Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates / / Atif Alvi /Rashid Mehmood /Zubair Nabi
|
2011
|
1
|
|
A secure base : clinical applications of attachment theory
|
|
2
|
|
Secure Base Model : Promoting Attachment And Resilience In Foster Care And Adoption
|
2013
|
1
|
|
A secure base : Parent-child attachment and healthy human development
|
1988
|
1
|
|
Secure because math? : challenges on applying machine learning to security
|
2015
|
1
|
|
Secure beginner's guides.
|
|
2
|
|
Secure Biometric-Based Authentication for Cloud Computing / / Kok-Seng Wong, Myung Ho Kim --
|
2013
|
1
|
Add Marked to Bag
Add All On Page
Add Marked to My Lists
|