Limit search to available items
Nearby Titles are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Year Entries
A Secure and Private RFID Authentication Protocol under SLPN Problem / / Mohammad S.I. Mamun, Atsuko Miyaji and Mohammad S. Rahman --  2012 1
A Secure and Reliable Cyberspace? The NSA, Encryption, and Exploits.   2015 1
Secure and Reliable Microservices and Containers (SRMC), International Workshop on     1
Secure and Reliable Systems --   2012 1
Secure and resilient digital transformation of healthcare : first workshop, SUNRISE 2023, Stavanger, Norway, November 30, 2023, Proceedings   2024 1
Secure and Resilient Software   2011 1
Secure and resilient software development   2010 1
Secure and Resilient Software : Requirements, Test Cases, and Testing Methods   2011 1
Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection / / Martim Carbone, Matthew Conover, Bruce Montague and Wenke Lee --  2012 1
Secure and Robust Watermarking Scheme in Frequency Domain Using Chaotic Logistic Map Encoding -- / Part IV  2020 1
Secure and Semantic Repository for Weapon Models in the Cloud / / Hyunhwi Kim, Chanjong Park and Kangsun Lee --Part 4.  2012 1
Secure and smart Internet of Things (IoT) : using blockchain and AI   2018 1
Secure and sustainable pensions   2009 1
The Secure and the Dispossessed : How the Military and Corporations Are Shaping a Climate-Changed World   2015 1
Secure and traceable attribute-based sequential aggregate signature / / Ruili Yang, Jiageng Chen, Shangle Li --  2021 1
Secure and trust computing, data management and applications : 8th FTRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011, proceedings   2011 1
Secure and trust computing, data management, and applications : STA 2011 Workshops: IWCS 2011 and STAVE 2011, Loutraki, Greece, June 28-30, 2011, proceedings   2011 1
Secure and trusted cyber physical systems : recent approaches and future directions   2022 1
Secure and trustworthy cyberphysical microfluidic biochips : a practical guide to cutting-edge design techniques for implementing secure and trustworthy cyberphysical microfluidic biochips   2020 1
Secure and Trustworthy Machine Learning (SaTML), IEEE Conference on     1
Secure and trustworthy service composition : the Aniketos approach   2014 1
Secure and trustworthy transportation cyber-physical systems   2017 1
Secure and Unfailing Services / / Davide Basile, Pierpaolo Degano and Gian-Luigi Ferrari --  2013 1
Secure and Usable PIN-Entry Method with Shoulder-Surfing Resistance --   2013 1
Secure and Verifiable Outsourcing of Sequence Comparisons / / Yansheng Feng [and others] --  2013 1
Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks / / Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao, Jinguo Li --  2013 1
Secure Android Application in SOA-Based Mobile Government and Mobile Banking Systems / / Milan Markoviá and Goran Đjorđjević --  2013? 1
Secure Anonymous Calling Service Using GHOST CALL --   2017 1
Secure Anonymous Conditional Purchase Order Payment Mechanism --   2012 1
Secure Anonymous File Sharing --   2017 1
Secure AODV Routing Protocol Based on Trust Mechanism / / Harris Simaremare, Abdelhafid Abouaissa, Riri Fitri Sari --  2013 1
Secure Application Role Procedure for Multiple Applications --   2011 1
A Secure Architecture for Smart Meter Systems / / Daniel Angermeier, Konstantin Böttinger, Andreas Ibing, Dieter Schuster --  2012 1
Secure Architectures with Active Networks / / Srinivas Sampalli, Yaser Haggag, and Christian Labonte  2007 1
Secure Architecure for the Integration of RFID and Sensors in Personal Networks / / Pablo Najera, Rodrigo Roman and Javier Lopez --  2012 1
Secure ASP.NET AJAX development   2006 1
Secure Authentication Assumptions -- / 22.3.3.  2011 1
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions / / Aravind Ashok, Prabaharan Poornachandran and Krishnasree Achuthan  2012 1
A secure authentication infrastructure for mobile users / / Gregor V. Bochmann, Eric Zhen Zhang --  2005 1
A Secure Authentication Scheme of Wireless Mesh Network --   2012 1
Secure Authorized Proxy Signature Scheme for Value-Added Service in Vehicular Ad Hoc Networks --   2014 1
Secure Automated Clearing House Transactions / / Mark B. Schmidt, Jan Skalicky Hanson --  2008 1
Secure automatic dependent surveillance-broadcast systems   2023 1
Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates / / Atif Alvi /Rashid Mehmood /Zubair Nabi  2011 1
A secure base : clinical applications of attachment theory   2
Secure Base Model : Promoting Attachment And Resilience In Foster Care And Adoption   2013 1
A secure base : Parent-child attachment and healthy human development   1988 1
Secure because math? : challenges on applying machine learning to security   2015 1
Secure beginner's guides.   2
Secure Biometric-Based Authentication for Cloud Computing / / Kok-Seng Wong, Myung Ho Kim --  2013 1
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next