Securing Remote Procedure Calls over HTTPS
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Securing Tor Tunnels under the Selective-DoS Attack
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Sécurité des systèmes critiques et cybercriminalité : vers une sécurité globale ?
Security amplification by composition: The case of doubly-iterated, ideal ciphers
Security Analyses of One-time System
Security analysis of a binary image permutation scheme based on Logistic map
Security Analysis of two Distance-Bounding Protocols
Security and complexity of the McEliece cryptosystem based on QC-LDPC codes
Security and Non-Repudiation for Voice-Over-IP Conversations
Security Assessment of E-Tax Filing Websites
Security Considerations for Remote Electronic Voting over the Internet
Security Estimates for Quadratic Field Based Cryptosystems
Security Features of an Asymmetric Cryptosystem based on the Diophantine Equation Hard Problem
Security Flaws in a Recent Ultralightweight RFID Protocol
Security for Distributed Web-Applications via Aspect-Oriented Programming
Security for Grid Services
Security impact ratings considered harmful
Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits