24982 publications
- Sector-Based Action Against Corruption
- Sectoral Analysis of Trade, Investment and Business in Vietnam
- Sectoral Plans and Pilot Projects for Sustainable Development
- Sectors Matter!
- Secular Bioethics in Theological Perspective
- Secular Evolution of Self-Gravitating Systems Over Cosmic Age
- Secular Institutions, Islam and Education Policy
- Secular Martyrdom in Britain and Ireland
- Secular Messiahs and the Return of Paul’s “Real”
- Secular Nationalism and Citizenship in Muslim Countries
- Secular Solar and Geomagnetic Variations in the Last 10,000 Years
- Secular Spirituality
- Secular Stagnation Theories
- Secular State and Religious Society
- Secularisations and Their Debates
- Secularism and Its Opponents from Augustine to Solzhenitsyn
- Secularism and Religion in Multi-faith Societies
- Secularism in Comparative Perspective
- Secularism on the Edge
- Secularism(s) in Contemporary France
- Secularisms in a Postsecular Age?
- Secularists, Religion and Government in Nineteenth-Century America
- Secularization
- Secularization Revisited - Teaching of Religion and the State of Denmark
- Secularization, Desecularization, and Toleration
- Secure Automatic Dependent Surveillance-Broadcast Systems
- Secure Broadcast Communication
- Secure Cloud Computing
- Secure Communication for 5G and IoT Networks
- Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT
- Secure Control of Networked Control Systems and Its Applications
- Secure Coordination Control of Networked Robotic Systems
- Secure Data Deletion
- Secure Data Management
- Secure Data Management
- Secure Data Management
- Secure Data Management
- Secure Data Management
- Secure Data Management
- Secure Data Management
- Secure Data Management
- Secure Data Management
- Secure Data Management
- Secure Data Management in Decentralized Systems
- Secure Digital Communications
- Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities
- Secure Electronic Voting
- Secure Group Communications over Data Networks
- Secure ICT Service Provisioning for Cloud, Mobile and Beyond
- Secure ICT Service Provisioning for Cloud, Mobile and Beyond
- Secure IP Mobility Management for VANET
- Secure IT Systems
- Secure IT Systems
- Secure IT Systems
- Secure IT Systems
- Secure IT Systems
- Secure IT Systems
- Secure IT Systems
- Secure IT Systems
- Secure IT Systems
- Secure IT Systems
- Secure IT Systems
- Secure IT Systems
- Secure Image Transmission in Wireless Sensor Network (WSN) Applications
- Secure Information Management Using Linguistic Threshold Approach
- Secure Information Networks
- Secure Integrated Circuits and Systems
- Secure Internet Programming
- Secure Key Establishment
- Secure Knowledge Management In Artificial Intelligence Era
- Secure Knowledge Management In The Artificial Intelligence Era
- Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
- Secure Mobile Ad-hoc Networks and Sensors
- Secure Multi-Party Computation Against Passive Adversaries
- Secure Multi-Party E-Commerce Protocols
- Secure Multi-Party Non-Repudiation Protocols and Applications
- Secure Networked Inference with Unreliable Data Sources
- Secure Networking — CQRE [Secure] ’ 99
- Secure Quantum Network Coding Theory
- Secure Sensor Cloud
- Secure Smart Embedded Devices, Platforms and Applications
- Secure System Design and Trustable Computing
- Secure Systems Development with UML
- Secure Transaction Protocol Analysis
- Secure Voice Processing Systems against Malicious Voice Attacks
- Secure Web Application Development
- Secure Wireless Sensor Networks
- Secure and Privacy-Preserving Data Communication in Internet of Things
- Secure and Resilient Digital Transformation of Healthcare
- Secure and Trust Computing, Data Management and Applications
- Secure and Trust Computing, Data Management, and Applications
- Secure and Trusted Cyber Physical Systems
- Secure and Trustworthy Cyberphysical Microfluidic Biochips
- Secure and Trustworthy Service Composition
- Secure and Trustworthy Transportation Cyber-Physical Systems
- Secure, Low-Power IoT Communication Using Edge-Coded Signaling
- Securing Biometrics Applications
- Securing Digital Video
- Securing Electricity Supply in the Cyber Age
- Securing Electronic Business Processes
- Securing Emerging Wireless Systems
- Securing Europe
- Securing Mega-Events
- Securing Office 365
- Securing Our Natural Wealth
- Securing PHP Apps
- Securing Peace in Europe, 1945–62
- Securing Pension Provision: The Challenge of Reforming the Age of Entitlement
- Securing Public Transportation Systems
- Securing SQL Server
- Securing SQL Server
- Securing Social Identity in Mobile Platforms
- Securing South Africa’s Democracy
- Securing Unmanned Aerial Vehicle Networks
- Securing Urbanism
- Securing Water and Wastewater Systems
- Securing Wireless Communications at the Physical Layer
- Securing the Belt and Road Initiative
- Securing the Future
- Securing the Perimeter
- Securing the ‘Rice Bowl’
- Securitainment
- Securities Lending and Repos
- Securitisation as Hegemonic Discourse Formation
- Securitization Economics
- Securitization and Authoritarianism
- Securitization and Democracy in Eurasia
- Securitization and Desecuritization Processes in Protracted Conflicts
- Securitization and the Global Economy
- Securitization: Past, Present and Future
- Securitizing Immigration
- Security Access in Wireless Local Area Networks
- Security Analysis and Portfolio Management
- Security Aspects in Information Technology
- Security Assessment in Vehicular Networks
- Security Awareness
- Security Basics for Computer Architects
- Security Challenges and Approaches in Internet of Things
- Security Co-operation between Russia and Ukraine in the Post-Soviet Era
- Security Communities and their Neighbours
- Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants
- Security Dynamics in the Black Sea Region
- Security Education and Critical Infrastructures
- Security Einfach Machen
- Security Engineering and Intelligence Informatics
- Security Engineering for Service-Oriented Architectures
- Security Engineering for Vehicular IT Systems
- Security Engineering with Patterns
- Security Incidents & Response Against Cyber Attacks
- Security Informatics
- Security Infrastructure Technology for Integrated Utilization of Big Data
- Security Intelligence Services in New Democracies
- Security Interests in Intellectual Property
- Security Issues and Privacy Threats in Smart Ubiquitous Computing
- Security Issues in Fog Computing from 5G to 6G
- Security Issues in Mobile NFC Devices
- Security Management, Integrity, and Internal Control in Information Systems
- Security Meets Gender Equality in the EU
- Security Planning
- Security Policy in System-on-Chip Designs
- Security Politics in the Commonwealth of Independent States
- Security Privatization
- Security Problems and Policies in the Post-Cold War Caribbean
- Security Protocols
- Security Protocols
- Security Protocols
- Security Protocols
- Security Protocols
- Security Protocols
- Security Protocols
- Security Protocols
- Security Protocols
- Security Protocols
- Security Protocols
- Security Protocols
- Security Protocols XIX
- Security Protocols XVI
- Security Protocols XVII
- Security Protocols XVIII
- Security Protocols XX
- Security Protocols XXI
- Security Protocols XXII
- Security Protocols XXIII
- Security Protocols XXIV
- Security Protocols XXV
- Security Protocols XXVI
- Security Protocols XXVII
- Security Protocols XXVIII
- Security Rights in Intellectual Property
- Security Sector Reform in Southeast Asia
- Security Standardisation Research
- Security Standardisation Research
- Security Standardisation Research
- Security Standardisation Research
- Security Standardisation Research
- Security Standardisation Research
- Security Strategies in the Asia-Pacific
- Security Technology
- Security Technology
- Security Technology, Disaster Recovery and Business Continuity