Secure Component Deployment in the OSGi(tm) Release 4 Platform
Secure Counting: counting members of a subset without revealing their identities
Secure Deletion on Log-structured File Systems
Secure Diversity-Multiplexing Tradeoff of Zero-Forcing Transmit Scheme at Finite-SNR
Secure Execution of Java Applets using a Remote Playground
Secure Hop-by-Hop Aggregation of End-to-End Concealed Data in Wireless Sensor Networks
Secure Information Flow by Model Checking Pushdown System
Secure Iris Authentication Using Visual Cryptography
Secure Linear Programming Using Privacy-Preserving Simplex
Secure Localization in Wireless Sensor Networks: A Survey
Secure Multicast in a WAN
Secure Multicast Key Distribution for Mobile Ad Hoc Networks
Secure Multiparty Computation with Partial Fairness
Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility
Secure Neighbor Position Discovery in VANETs
Secure Network Coding Against the Contamination and Eavesdropping Adversaries
Secure Operations on Tree-Formed Verification Data
Secure Positioning of Mobile Terminals with Simplex Radio Communication
Secure Querying of Recursive XML Views: A Standard XPath-based Technique
Secure Remote Voting Using Paper Ballots