Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility
Secure Neighbor Position Discovery in VANETs
Secure Network Coding Against the Contamination and Eavesdropping Adversaries
Secure Operations on Tree-Formed Verification Data
Secure Positioning of Mobile Terminals with Simplex Radio Communication
Secure Querying of Recursive XML Views: A Standard XPath-based Technique
Secure Remote Voting Using Paper Ballots
Secure Routing in Wireless Mesh Networks
Secure Transmission of Sensitive data using multiple channels
Secure Two-party Protocols for Point Inclusion Problem
Secure Vehicular Communication Systems: Design and Architecture
Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges
Secured Cryptographic Key Generation From Multimodal Biometrics Feature Level Fusion Of Fingerprint And Iris
Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris
Secured histories: computing group statistics on encrypted data while preserving individual privacy
SecureSMART: A Security Architecture for BFT Replication Libraries
Securing IEEE 802.11G WLAN Using OpenVPN and Its Impact Analysis
Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Securing Iris Templates using Combined User and Soft Biometric based Password Hardened Fuzzy Vault
Securing Our Bluetooth Mobiles From Intruder Attack Using Enhanced Authentication Scheme And Plausible Exchange Algorithm