Secure Routing in Wireless Mesh Networks
Secure Transmission of Sensitive data using multiple channels
Secure Two-party Protocols for Point Inclusion Problem
Secure Vehicular Communication Systems: Design and Architecture
Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges
Secured Cryptographic Key Generation From Multimodal Biometrics Feature Level Fusion Of Fingerprint And Iris
Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris
Secured histories: computing group statistics on encrypted data while preserving individual privacy
SecureSMART: A Security Architecture for BFT Replication Libraries
Securing IEEE 802.11G WLAN Using OpenVPN and Its Impact Analysis
Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Securing Iris Templates using Combined User and Soft Biometric based Password Hardened Fuzzy Vault
Securing Our Bluetooth Mobiles From Intruder Attack Using Enhanced Authentication Scheme And Plausible Exchange Algorithm
Securing Remote Procedure Calls over HTTPS
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Securing Tor Tunnels under the Selective-DoS Attack
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Sécurité des systèmes critiques et cybercriminalité : vers une sécurité globale ?
Security amplification by composition: The case of doubly-iterated, ideal ciphers
Security Analyses of One-time System