| Issue | Title | |
| Vol 23, No 4 (2022) | Secure Data Deduplication System with Efficient and Reliable Multi-Key Management in Cloud Storage | Abstract PDF |
| R. Vignesh, J. Preethi | ||
| Vol 21, No 7 (2020) | Secure Federated Learning with Efficient Communication in Vehicle Network | Abstract PDF |
| Yinglong Li, Zhenjiang Zhang, Zhiyuan Zhang, Yi-Chih Kao | ||
| Vol 21, No 4 (2020) | Secure Fine-grained Attribute-based Access Control with Hidden Policy for Electronic Health Record System | Abstract PDF |
| Sai Ji, Xin Jin, Jin-Feng Lai, Jian Shen | ||
| Vol 17, No 4 (2016) | Secure HDFS Design Using Group Key Management System | Abstract |
| Jungho Kang, Jaesoo Kim | ||
| Vol 20, No 4 (2019) | Secure Human Authentication with Graphical Passwords | Abstract PDF |
| Zayabaatar Dagvatur, Aziz Mohaisen, Kyunghee Lee, DaeHun Nyang | ||
| Vol 23, No 5 (2022) | Secure Judgment of Point and Line Relationship Against Malicious Adversaries and Its Applications | Abstract |
| Xin Liu, Yang Xu, Gang Xu, Xiu-Bo Chen, Yu-Ling Chen | ||
| Vol 11, No 6 (2010) | Secure Many-to-Many Multicast in Heterogeneous Networks | Abstract |
| Junbeom Hur, Dongyoung Koo, Hyunsoo Yoon | ||
| Vol 15, No 5 (2014) | Secure Nano Communication | Abstract |
| Aneel Rahim, Paul Malone, Abdullah Sharaf Alghamdi | ||
| Vol 11, No 5 (2010) | Secure Peer-to-Peer Multimedia Service in E-Commerce Environments | Abstract |
| Xi Chen, Shi-Guo Lian | ||
| Vol 20, No 4 (2019) | Secure Routing for WSN-Based Tactical-Level Intelligent Transportation Systems | Abstract PDF |
| Der-Chen Huang, Ying-Yi Chu, Yuan-Kwei Tzeng, Yu-Yi Chen, Wei-Ming Chen | ||
| Vol 5, No 2 (2004) | Secure VPNs over IPv6 Networks: An Evaluation and its Integration in a Policy Management Framework | Abstract |
| F'elix J. Garcia Clemente, Antonio F. Gómez Skarmeta, Gabriel López Millán, Gregorio Martinez Pérez | ||
| Vol 22, No 4 (2021) | Secured Communication Method using Visual Secret Sharing Scheme for Color Images | Abstract PDF |
| John Blesswin A., Selva Mary G., Manoj Kumar S. | ||
| Vol 25, No 3 (2024) | Securing AI Models Against Backdoor Attacks: A Novel Approach Using Image Steganography | Abstract |
| Candra Ahmadi, Jiann-Liang Chen, Yu-Ting Lin | ||
| Vol 11, No 3 (2010) | Securing Digital Images over the Internet Using a Robust Watermarking Scheme | Abstract |
| Yun-Ho Lee, Sang-Soo Yeo, Jin Kwak | ||
| Vol 20, No 1 (2019) | Security Analysis and Improvement on an Image Encryption Algorithm Using Chebyshev Generator | Abstract PDF |
| Tsu-Yang Wu, Xiaoning Fan, King-Hang Wang, Jeng-Shyang Pan, Chien-Ming Chen | ||
| Vol 14, No 2 (2013) | Security Analysis of Block Cipher LED | Abstract |
| Ki-Tae Jeong, Sang-Soo Yeo | ||
| Vol 17, No 2 (2016) | Security Analysis of RFID Relay Attacks | Abstract |
| Sghaier Guizani | ||
| Vol 24, No 3 (2023) | Security Attack on Remote Sensing Equipment: PoIs Recognition Based on HW with Bi-LSTM Attention | Abstract PDF |
| Wei Jiang, Xianhua Zhang, Yanpeng Li, Chuansheng Chen, Jianfeng Zhu | ||
| Vol 11, No 3 (2010) | Security Challenges for User-Oriented RFID Applications within the "Internet of Things" | Abstract |
| G. P. Hancke, K. Markantonakis, K. E. Mayes | ||
| Vol 17, No 5 (2016) | Security Challenges in Recent Internet Threats and Enhanced Security Service Model for Future IT Environments | Abstract |
| Man-Sik Kim, Jeong-Kyu Lee, Jong Hyuk Park, Jung-Ho Kang | ||
| Vol 18, No 3 (2017) | Security Collaborative Optimization Strategy for Perception Layer in Cognitive IoT | Abstract |
| Ruijuan Zheng, Mingchuan Zhang, Qinghua Zheng, Qingtao Wu, Wangyang Wei | ||
| Vol 14, No 3 (2013) | Security Evaluation of Double-Block-Length Hash Modes with Preimage Attacks on PGV Schemes | Abstract |
| Duk-Jae Moon, Deuk-Jo Hong, Bon-Wook Koo, Seok-Hie Hong | ||
| Vol 7, No 3 (2006) | Security Frame and Evaluation in Mobile Agent System | Abstract |
| Su-Zhen Wang, Jia-Zhen Wang | ||
| Vol 8, No 1 (2007) | Security Protocols for Wireless Local Area Networks (WLANs) and Cellular Networks | Abstract |
| Sherali Zeadally, Farhan Siddiqui | ||
| Vol 10, No 1 (2009) | Security Simulation Modeling Using Contract Net Protocol | Abstract |
| Jong-Hyuk Park, Hee-Suk Seo | ||
| 2251 - 2275 of 2743 Items | << < 86 87 88 89 90 91 92 93 94 95 > >> | |
