24931 publications

  1. Secular Institutions, Islam and Education Policy
  2. Secular Martyrdom in Britain and Ireland
  3. Secular Messiahs and the Return of Paul’s “Real”
  4. Secular Nationalism and Citizenship in Muslim Countries
  5. Secular Solar and Geomagnetic Variations in the Last 10,000 Years
  6. Secular Spirituality
  7. Secular Stagnation Theories
  8. Secular State and Religious Society
  9. Secularisations and Their Debates
  10. Secularism and Its Opponents from Augustine to Solzhenitsyn
  11. Secularism and Religion in Multi-faith Societies
  12. Secularism in Comparative Perspective
  13. Secularism on the Edge
  14. Secularism(s) in Contemporary France
  15. Secularisms in a Postsecular Age?
  16. Secularists, Religion and Government in Nineteenth-Century America
  17. Secularization
  18. Secularization Revisited - Teaching of Religion and the State of Denmark
  19. Secularization, Desecularization, and Toleration
  20. Secure Automatic Dependent Surveillance-Broadcast Systems
  21. Secure Broadcast Communication
  22. Secure Cloud Computing
  23. Secure Communication for 5G and IoT Networks
  24. Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT
  25. Secure Control of Networked Control Systems and Its Applications
  26. Secure Coordination Control of Networked Robotic Systems
  27. Secure Data Deletion
  28. Secure Data Management
  29. Secure Data Management
  30. Secure Data Management
  31. Secure Data Management
  32. Secure Data Management
  33. Secure Data Management
  34. Secure Data Management
  35. Secure Data Management
  36. Secure Data Management
  37. Secure Data Management
  38. Secure Data Management in Decentralized Systems
  39. Secure Digital Communications
  40. Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities
  41. Secure Electronic Voting
  42. Secure Group Communications over Data Networks
  43. Secure ICT Service Provisioning for Cloud, Mobile and Beyond
  44. Secure ICT Service Provisioning for Cloud, Mobile and Beyond
  45. Secure IP Mobility Management for VANET
  46. Secure IT Systems
  47. Secure IT Systems
  48. Secure IT Systems
  49. Secure IT Systems
  50. Secure IT Systems
  51. Secure IT Systems
  52. Secure IT Systems
  53. Secure IT Systems
  54. Secure IT Systems
  55. Secure IT Systems
  56. Secure IT Systems
  57. Secure IT Systems
  58. Secure Image Transmission in Wireless Sensor Network (WSN) Applications
  59. Secure Information Management Using Linguistic Threshold Approach
  60. Secure Information Networks
  61. Secure Integrated Circuits and Systems
  62. Secure Internet Programming
  63. Secure Key Establishment
  64. Secure Knowledge Management In Artificial Intelligence Era
  65. Secure Knowledge Management In The Artificial Intelligence Era
  66. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
  67. Secure Mobile Ad-hoc Networks and Sensors
  68. Secure Multi-Party Computation Against Passive Adversaries
  69. Secure Multi-Party E-Commerce Protocols
  70. Secure Multi-Party Non-Repudiation Protocols and Applications
  71. Secure Networked Inference with Unreliable Data Sources
  72. Secure Networking — CQRE [Secure] ’ 99
  73. Secure Quantum Network Coding Theory
  74. Secure Sensor Cloud
  75. Secure Smart Embedded Devices, Platforms and Applications
  76. Secure System Design and Trustable Computing
  77. Secure Systems Development with UML
  78. Secure Transaction Protocol Analysis
  79. Secure Voice Processing Systems against Malicious Voice Attacks
  80. Secure Web Application Development
  81. Secure Wireless Sensor Networks
  82. Secure and Privacy-Preserving Data Communication in Internet of Things
  83. Secure and Resilient Digital Transformation of Healthcare
  84. Secure and Trust Computing, Data Management and Applications
  85. Secure and Trust Computing, Data Management, and Applications
  86. Secure and Trusted Cyber Physical Systems
  87. Secure and Trustworthy Cyberphysical Microfluidic Biochips
  88. Secure and Trustworthy Service Composition
  89. Secure and Trustworthy Transportation Cyber-Physical Systems
  90. Secure, Low-Power IoT Communication Using Edge-Coded Signaling
  91. Securing Biometrics Applications
  92. Securing Digital Video
  93. Securing Electricity Supply in the Cyber Age
  94. Securing Electronic Business Processes
  95. Securing Emerging Wireless Systems
  96. Securing Europe
  97. Securing Mega-Events
  98. Securing Office 365
  99. Securing Our Natural Wealth
  100. Securing PHP Apps
  101. Securing Peace in Europe, 1945–62
  102. Securing Pension Provision: The Challenge of Reforming the Age of Entitlement
  103. Securing Public Transportation Systems
  104. Securing SQL Server
  105. Securing SQL Server
  106. Securing Social Identity in Mobile Platforms
  107. Securing South Africa’s Democracy
  108. Securing Unmanned Aerial Vehicle Networks
  109. Securing Urbanism
  110. Securing Water and Wastewater Systems
  111. Securing Wireless Communications at the Physical Layer
  112. Securing the Belt and Road Initiative
  113. Securing the Perimeter
  114. Securing the ‘Rice Bowl’
  115. Securitainment
  116. Securities Lending and Repos
  117. Securitisation as Hegemonic Discourse Formation
  118. Securitization Economics
  119. Securitization and Authoritarianism
  120. Securitization and Democracy in Eurasia
  121. Securitization and Desecuritization Processes in Protracted Conflicts
  122. Securitization and the Global Economy
  123. Securitization: Past, Present and Future
  124. Securitizing Immigration
  125. Security Access in Wireless Local Area Networks
  126. Security Analysis and Portfolio Management
  127. Security Aspects in Information Technology
  128. Security Assessment in Vehicular Networks
  129. Security Awareness
  130. Security Basics for Computer Architects
  131. Security Challenges and Approaches in Internet of Things
  132. Security Co-operation between Russia and Ukraine in the Post-Soviet Era
  133. Security Communities and their Neighbours
  134. Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants
  135. Security Education and Critical Infrastructures
  136. Security Einfach Machen
  137. Security Engineering and Intelligence Informatics
  138. Security Engineering for Service-Oriented Architectures
  139. Security Engineering for Vehicular IT Systems
  140. Security Engineering with Patterns
  141. Security Incidents & Response Against Cyber Attacks
  142. Security Informatics
  143. Security Infrastructure Technology for Integrated Utilization of Big Data
  144. Security Intelligence Services in New Democracies
  145. Security Interests in Intellectual Property
  146. Security Issues and Privacy Threats in Smart Ubiquitous Computing
  147. Security Issues in Fog Computing from 5G to 6G
  148. Security Issues in Mobile NFC Devices
  149. Security Management, Integrity, and Internal Control in Information Systems
  150. Security Meets Gender Equality in the EU
  151. Security Planning
  152. Security Policy in System-on-Chip Designs
  153. Security Politics in the Commonwealth of Independent States
  154. Security Privatization
  155. Security Problems and Policies in the Post-Cold War Caribbean
  156. Security Protocols
  157. Security Protocols
  158. Security Protocols
  159. Security Protocols
  160. Security Protocols
  161. Security Protocols
  162. Security Protocols
  163. Security Protocols
  164. Security Protocols
  165. Security Protocols
  166. Security Protocols
  167. Security Protocols
  168. Security Protocols XIX
  169. Security Protocols XVI
  170. Security Protocols XVII
  171. Security Protocols XVIII
  172. Security Protocols XX
  173. Security Protocols XXI
  174. Security Protocols XXII
  175. Security Protocols XXIII
  176. Security Protocols XXIV
  177. Security Protocols XXV
  178. Security Protocols XXVI
  179. Security Protocols XXVII
  180. Security Protocols XXVIII
  181. Security Rights in Intellectual Property
  182. Security Sector Reform in Southeast Asia
  183. Security Standardisation Research
  184. Security Standardisation Research
  185. Security Standardisation Research
  186. Security Standardisation Research
  187. Security Standardisation Research
  188. Security Standardisation Research
  189. Security Strategies in the Asia-Pacific
  190. Security Technology
  191. Security Technology
  192. Security Technology, Disaster Recovery and Business Continuity
  193. Security Threats and Public Perception
  194. Security Trends for FPGAS
  195. Security and Artificial Intelligence
  196. Security and Bilateral Issues between Iran and its Arab Neighbours
  197. Security and Cryptography for Networks
  198. Security and Cryptography for Networks
  199. Security and Cryptography for Networks
  200. Security and Cryptography for Networks