24982 publications

  1. Security Threats and Public Perception
  2. Security Trends for FPGAS
  3. Security and Artificial Intelligence
  4. Security and Bilateral Issues between Iran and its Arab Neighbours
  5. Security and Cryptography for Networks
  6. Security and Cryptography for Networks
  7. Security and Cryptography for Networks
  8. Security and Cryptography for Networks
  9. Security and Cryptography for Networks
  10. Security and Cryptography for Networks
  11. Security and Cryptography for Networks
  12. Security and Cryptography for Networks
  13. Security and Cryptography for Networks
  14. Security and Data Storage Aspect in Cloud Computing
  15. Security and Defence in Europe
  16. Security and Defence: Ethical and Legal Challenges in the Face of Current Conflicts
  17. Security and Dependability for Ambient Intelligence
  18. Security and Environment in the Mediterranean
  19. Security and Environmental Sustainability of Multimodal Transport
  20. Security and Fault Tolerance in Internet of Things
  21. Security and Human Right to Water in Central Asia
  22. Security and Intelligent Information Systems
  23. Security and International Relations in Central Africa
  24. Security and Interorganizational Networks in Peace Operations
  25. Security and Liberty
  26. Security and Persistence
  27. Security and Privacy
  28. Security and Privacy
  29. Security and Privacy
  30. Security and Privacy Applications for Smart City Development
  31. Security and Privacy Preserving for IoT and 5G Networks
  32. Security and Privacy Preserving in Social Networks
  33. Security and Privacy Protection in Information Processing Systems
  34. Security and Privacy Trends in the Industrial Internet of Things
  35. Security and Privacy for Implantable Medical Devices
  36. Security and Privacy for Mobile Healthcare Networks
  37. Security and Privacy for Next-Generation Wireless Networks
  38. Security and Privacy in Ad-Hoc and Sensor Networks
  39. Security and Privacy in Ad-hoc and Sensor Networks
  40. Security and Privacy in Ad-hoc and Sensor Networks
  41. Security and Privacy in Biometrics
  42. Security and Privacy in Communication Networks
  43. Security and Privacy in Communication Networks
  44. Security and Privacy in Communication Networks
  45. Security and Privacy in Communication Networks
  46. Security and Privacy in Communication Networks
  47. Security and Privacy in Communication Networks
  48. Security and Privacy in Communication Networks
  49. Security and Privacy in Communication Networks
  50. Security and Privacy in Communication Networks
  51. Security and Privacy in Communication Networks
  52. Security and Privacy in Communication Networks
  53. Security and Privacy in Communication Networks
  54. Security and Privacy in Communication Networks
  55. Security and Privacy in Communication Networks
  56. Security and Privacy in Communication Networks
  57. Security and Privacy in Communication Networks
  58. Security and Privacy in Communication Networks
  59. Security and Privacy in Communication Networks
  60. Security and Privacy in Cyber-Physical Systems and Smart Vehicles
  61. Security and Privacy in Cyberspace
  62. Security and Privacy in Digital Economy
  63. Security and Privacy in Digital Rights Management
  64. Security and Privacy in Dynamic Environments
  65. Security and Privacy in Federated Learning
  66. Security and Privacy in Mobile Information and Communication Systems
  67. Security and Privacy in Mobile Information and Communication Systems
  68. Security and Privacy in Mobile Information and Communication Systems
  69. Security and Privacy in Mobile Information and Communication Systems
  70. Security and Privacy in Mobile Social Networks
  71. Security and Privacy in New Computing Environments
  72. Security and Privacy in New Computing Environments
  73. Security and Privacy in New Computing Environments
  74. Security and Privacy in New Computing Environments
  75. Security and Privacy in Smart Grid
  76. Security and Privacy in Social Networks
  77. Security and Privacy in Social Networks and Big Data
  78. Security and Privacy in Social Networks and Big Data
  79. Security and Privacy in Social Networks and Big Data
  80. Security and Privacy in Social Networks and Big Data
  81. Security and Privacy in Social Networks and Big Data
  82. Security and Privacy in User Modeling
  83. Security and Privacy in the Age of Ubiquitous Computing
  84. Security and Privacy in the Age of Uncertainty
  85. Security and Privacy – Silver Linings in the Cloud
  86. Security and Protection in Information Processing Systems
  87. Security and Quality in Cyber-Physical Systems Engineering
  88. Security and Reliability of Damaged Structures and Defective Materials
  89. Security and Resilience in Cyber-Physical Systems
  90. Security and Resilience of Control Systems
  91. Security and Resiliency Analytics for Smart Grids
  92. Security and Risk Analysis for Intelligent Edge Computing
  93. Security and Safety Interplay of Intelligent Software Systems
  94. Security and Sovereignty in the North Atlantic
  95. Security and Special Operations
  96. Security and Trust Management
  97. Security and Trust Management
  98. Security and Trust Management
  99. Security and Trust Management
  100. Security and Trust Management
  101. Security and Trust Management
  102. Security and Trust Management
  103. Security and Trust Management
  104. Security and Trust Management
  105. Security and Trust Management
  106. Security and Trust Management
  107. Security and Trust Management
  108. Security and Trust Management
  109. Security and Trust Management
  110. Security and Trust in Online Social Networks
  111. Security and the CSCE Process
  112. Security and the Networked Society
  113. Security and the Turkey-EU Accession Process
  114. Security by Design
  115. Security by Design
  116. Security for Cloud Storage Systems
  117. Security for Multi-hop Wireless Networks
  118. Security for Object-Oriented Systems
  119. Security for Telecommunications Networks
  120. Security for Web Services and Service-Oriented Architectures
  121. Security for Wireless Implantable Medical Devices
  122. Security for Wireless Sensor Networks
  123. Security in Ad-hoc and Sensor Networks
  124. Security in British Politics, 1945–99
  125. Security in Communication Networks
  126. Security in Communication Networks
  127. Security in Computer and Information Sciences
  128. Security in Computer and Information Sciences
  129. Security in Computing Systems
  130. Security in Computing and Communications
  131. Security in Computing and Communications
  132. Security in Computing and Communications
  133. Security in Computing and Communications
  134. Security in Computing and Communications
  135. Security in Computing and Communications
  136. Security in Computing and Communications
  137. Security in Computing and Communications
  138. Security in Cyber-Physical Systems
  139. Security in E-Learning
  140. Security in Embedded Devices
  141. Security in Emerging Wireless Communication and Networking Systems
  142. Security in Network Coding
  143. Security in Pervasive Computing
  144. Security in Pervasive Computing
  145. Security in Pervasive Computing
  146. Security in Shared Neighbourhoods
  147. Security in Smart Cities: Models, Applications, and Challenges
  148. Security in Smart Home Networks
  149. Security in Translation
  150. Security in Wireless Sensor Networks
  151. Security in a Post-Cold War World
  152. Security in an Interconnected World
  153. Security in the Global Commons and Beyond
  154. Security in the Information Society
  155. Security in the Persian Gulf
  156. Security in the Persian Gulf Region
  157. Security of Biochip Cyberphysical Systems
  158. Security of Computer Based Information Systems
  159. Security of Cyber-Physical Systems
  160. Security of Cyber-Physical Systems: State Estimation and Control
  161. Security of Data and Transaction Processing
  162. Security of FPGA-Accelerated Cloud Computing Environments
  163. Security of Industrial Control Systems and Cyber Physical Systems
  164. Security of Industrial Control Systems and Cyber-Physical Systems
  165. Security of Industrial Water Supply and Management
  166. Security of Natural Gas Supply through Transit Countries
  167. Security of Networks and Services in an All-Connected World
  168. Security of Public Water Supplies
  169. Security of Ubiquitous Computing Systems
  170. Security of Water Supply Systems: from Source to Tap
  171. Security with Intelligent Computing and Big-Data Services 2019
  172. Security with Intelligent Computing and Big-data Services
  173. Security with Intelligent Computing and Big-data Services
  174. Security with Noisy Data
  175. Security, Citizenship and Human Rights
  176. Security, Clans and Tribes: Unstable Governance in Somaliland, Yemen and the Gulf of Aden
  177. Security, Democracy and War Crimes
  178. Security, Democracy, and Society in Bali
  179. Security, Disinformation and Harmful Narratives: RT and Sputnik News Coverage about Sweden
  180. Security, Economics and Nuclear Non-Proliferation Morality
  181. Security, Identity, and British Counterterrorism Policy
  182. Security, Privacy and Anonymity in Computation, Communication and Storage
  183. Security, Privacy and Data Analytics
  184. Security, Privacy and Data Analytics
  185. Security, Privacy and Trust in Cloud Systems
  186. Security, Privacy and Trust in the IoT Environment
  187. Security, Privacy and User Interaction
  188. Security, Privacy, and Anonymity in Computation, Communication, and Storage
  189. Security, Privacy, and Anonymity in Computation, Communication, and Storage
  190. Security, Privacy, and Anonymity in Computation, Communication, and Storage
  191. Security, Privacy, and Anonymity in Computation, Communication, and Storage
  192. Security, Privacy, and Anonymity in Computation, Communication, and Storage
  193. Security, Privacy, and Anonymity in Computation, Communication, and Storage
  194. Security, Privacy, and Anonymity in Computation, Communication, and Storage
  195. Security, Privacy, and Anonymity in Computation, Communication, and Storage
  196. Security, Privacy, and Applied Cryptography Engineering
  197. Security, Privacy, and Applied Cryptography Engineering
  198. Security, Privacy, and Applied Cryptography Engineering
  199. Security, Privacy, and Applied Cryptography Engineering
  200. Security, Privacy, and Applied Cryptography Engineering