Article RDF
pages:- 428
- 429
- 430
- 431
- 432
- 433
- 434
- 435
- 436
- 437
- 438
- 439
- 440
- 441
- 442
- 443
- 444
- 445
- 446
- 447
- 448
- 449
- 450
- 451
- 452
- 453
- 454
- 455
- 456
- 457
- 458
- 459
- 460
- 461
- 462
- 463
- 464
- 465
- 466
- 467
- 468
- more...
- Secure access to IP multimedia services using generic bootstrapping architecture (GBA) for 3G & beyond mobile networks Conference Paper
- Secure and resilient peer-to-peer e-mail design and implementation Conference Paper
- Secure Cloud Computing: Reference Architecture for Measuring Instrument under Legal Control Academic Article
- Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology Conference Paper
- Secure cross-domain data sharing architecture for crisis management Conference Paper
- Secure Digital Chains of Evidence Conference Paper
- Secure End-to-End Sensing in Supply Chains Conference Paper
- Secure Mediation of Join Queries by Processing Ciphertexts Conference Paper
- Secure metering for electrical vehicles Conference Paper
- Secure offline superdistribution for mobile platforms Academic Article
- Secure Scuttlebutt Conference Paper
- Secure Services for Standard RISC-V Architectures Conference Paper
- Secure standards-based reference architecture for flexibility activation and democratisation Academic Article
- Secure transfer of measurement data in open systems Academic Article
- Secure Wireless Architecture for Communications in a Parcel Delivery System Conference Paper
- Secure, Mobile Visual Sensor Networks Architecture Conference Paper
- SecureCloud: Secure big data processing in untrusted clouds Conference Paper
- Secured SOA for the Safe Interconnection of Medical Devices (Position Paper) Academic Article
- Securing disaster supply chains with cryptography enhanced RFID Academic Article
- Securing Remote Policy Enforcement by a Multi-Enclave based Attestation Architecture Conference Paper
- Securing the Data Flow for Blockchain Technology in a Production Environment Academic Article
- Securing the IP-based internet of things with HIP and DTLS Conference Paper
- Security and Communication Architecture for Networked Medical Devices in Mobility-Aware eHealth Environments Conference Paper
- Security and privacy for mobile electronic health monitoring and recording systems Conference Paper
- Security and privacy services in pathology for enabling trustworthy personal health. Academic Article
- Security architecture elements for IoT enabled automation networks Conference Paper
- Security architecture for cloud networking Conference Paper
- Security Architecture for Service-Based Mobile Environments Conference Paper
- Security Architecture of the OGEMA 2.0 Home Energy Management System Academic Article
- Security by Design for the Smart Grid: Combining the SGAM and NISTIR 7628 Conference Paper