A Robust and Fault-Tolerant Distributed Intrusion Detection System
A Robust and Secure Aggregation Protocol for Wireless Sensor Networks
A Robust Control Framework for Malware Filtering
A Robust Mechanism for Defending Distributed Denial OF Service Attacks on Web Servers
A Secret Key Generation System Based on Multipath Channel Randomness: RSSI vs CSSI
A secret sharing scheme using groups
A Secure Aggregation Protocol for Wireless Sensor Networks
A Secure and Efficient Protocol for Group Key agreement in Heterogeneous Environment
A secure archive for Voice-over-IP conversations
A secure email login system using virtual password
A Secure Hash Function MD-192 With Modified Message Expansion
A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining
A Secure RFID Deactivation/Activation Mechanism for Supporting Customer Service and Consumer Shopping
A secure solution on hierarchical access control
A Secure Traitor Tracing Scheme against Key Exposure
A Secure Variant of the Hill Cipher
A Secure Web-Based File Exchange Server: Software Requirements Specification Document
A Secure Wireless Routing Protocol Using Enhanced Chain Signatures
A secured Cryptographic Hashing Algorithm
A Security Protocol for Multi-User Authentication