Search in Power-Law Networks
Secure and reliable routing in mobile adhoc networks
Secure and Robust IPV6 Autoconfiguration Protocol For Mobile Adhoc Networks Under Strong Adversarial Model
Secure Clustering in DSN with Key Predistribution and WCDS
Secure Geographic Routing Protocols: Issues and Approaches
Secure Key Exchange and Encryption Mechanism for Group Communication in Wireless Ad Hoc Networks
Secure Multidimensional Queries in Tiered Sensor Networks
Secure Tracking in Sensor Networks using Adaptive Extended Kalman Filter
Secured Distributed Cognitive MAC and Complexity Reduction in Channel Estimation for the Cross Layer based Cognitive Radio Networks
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Secured Message Transmission in Mobile AD HOC Networks through Identification and Removal of Byzantine Failures
Secured Position Location and Tracking (SPL&T) for Detection of Multiple Malicious Nodes Maintaining Two Friendly References in Mobile Ad hoc Networks
Securing a mobile adhoc network from routing attacks through the application of genetic algorithm
Securing AODV for MANETs using Message Digest with Secret Key
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characterization
Securing Internet Protocol (IP) Storage: A Case Study
Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network
Security Implications of Converged Networks and Protecting Them, without Compromising Efficiency
Security in Carrier Class Server Applications for All-IP Networks
Security in Wireless Sensor Networks: Issues and Challenges