24932 publications

  1. Security and Cryptography for Networks
  2. Security and Cryptography for Networks
  3. Security and Cryptography for Networks
  4. Security and Cryptography for Networks
  5. Security and Cryptography for Networks
  6. Security and Data Storage Aspect in Cloud Computing
  7. Security and Defence in Europe
  8. Security and Defence: Ethical and Legal Challenges in the Face of Current Conflicts
  9. Security and Dependability for Ambient Intelligence
  10. Security and Environment in the Mediterranean
  11. Security and Environmental Sustainability of Multimodal Transport
  12. Security and Fault Tolerance in Internet of Things
  13. Security and Human Right to Water in Central Asia
  14. Security and Intelligent Information Systems
  15. Security and International Relations in Central Africa
  16. Security and Interorganizational Networks in Peace Operations
  17. Security and Liberty
  18. Security and Persistence
  19. Security and Privacy
  20. Security and Privacy
  21. Security and Privacy
  22. Security and Privacy Applications for Smart City Development
  23. Security and Privacy Preserving for IoT and 5G Networks
  24. Security and Privacy Preserving in Social Networks
  25. Security and Privacy Protection in Information Processing Systems
  26. Security and Privacy Trends in the Industrial Internet of Things
  27. Security and Privacy for Implantable Medical Devices
  28. Security and Privacy for Mobile Healthcare Networks
  29. Security and Privacy for Next-Generation Wireless Networks
  30. Security and Privacy in Ad-Hoc and Sensor Networks
  31. Security and Privacy in Ad-hoc and Sensor Networks
  32. Security and Privacy in Ad-hoc and Sensor Networks
  33. Security and Privacy in Biometrics
  34. Security and Privacy in Communication Networks
  35. Security and Privacy in Communication Networks
  36. Security and Privacy in Communication Networks
  37. Security and Privacy in Communication Networks
  38. Security and Privacy in Communication Networks
  39. Security and Privacy in Communication Networks
  40. Security and Privacy in Communication Networks
  41. Security and Privacy in Communication Networks
  42. Security and Privacy in Communication Networks
  43. Security and Privacy in Communication Networks
  44. Security and Privacy in Communication Networks
  45. Security and Privacy in Communication Networks
  46. Security and Privacy in Communication Networks
  47. Security and Privacy in Communication Networks
  48. Security and Privacy in Communication Networks
  49. Security and Privacy in Communication Networks
  50. Security and Privacy in Communication Networks
  51. Security and Privacy in Communication Networks
  52. Security and Privacy in Cyber-Physical Systems and Smart Vehicles
  53. Security and Privacy in Cyberspace
  54. Security and Privacy in Digital Economy
  55. Security and Privacy in Digital Rights Management
  56. Security and Privacy in Dynamic Environments
  57. Security and Privacy in Federated Learning
  58. Security and Privacy in Mobile Information and Communication Systems
  59. Security and Privacy in Mobile Information and Communication Systems
  60. Security and Privacy in Mobile Information and Communication Systems
  61. Security and Privacy in Mobile Information and Communication Systems
  62. Security and Privacy in Mobile Social Networks
  63. Security and Privacy in New Computing Environments
  64. Security and Privacy in New Computing Environments
  65. Security and Privacy in New Computing Environments
  66. Security and Privacy in New Computing Environments
  67. Security and Privacy in Smart Grid
  68. Security and Privacy in Social Networks
  69. Security and Privacy in Social Networks and Big Data
  70. Security and Privacy in Social Networks and Big Data
  71. Security and Privacy in Social Networks and Big Data
  72. Security and Privacy in Social Networks and Big Data
  73. Security and Privacy in Social Networks and Big Data
  74. Security and Privacy in User Modeling
  75. Security and Privacy in the Age of Ubiquitous Computing
  76. Security and Privacy in the Age of Uncertainty
  77. Security and Privacy – Silver Linings in the Cloud
  78. Security and Protection in Information Processing Systems
  79. Security and Quality in Cyber-Physical Systems Engineering
  80. Security and Reliability of Damaged Structures and Defective Materials
  81. Security and Resilience in Cyber-Physical Systems
  82. Security and Resilience of Control Systems
  83. Security and Resiliency Analytics for Smart Grids
  84. Security and Risk Analysis for Intelligent Edge Computing
  85. Security and Safety Interplay of Intelligent Software Systems
  86. Security and Sovereignty in the North Atlantic
  87. Security and Special Operations
  88. Security and Trust Management
  89. Security and Trust Management
  90. Security and Trust Management
  91. Security and Trust Management
  92. Security and Trust Management
  93. Security and Trust Management
  94. Security and Trust Management
  95. Security and Trust Management
  96. Security and Trust Management
  97. Security and Trust Management
  98. Security and Trust Management
  99. Security and Trust Management
  100. Security and Trust Management
  101. Security and Trust Management
  102. Security and Trust in Online Social Networks
  103. Security and the CSCE Process
  104. Security and the Networked Society
  105. Security and the Turkey-EU Accession Process
  106. Security by Design
  107. Security by Design
  108. Security for Cloud Storage Systems
  109. Security for Multi-hop Wireless Networks
  110. Security for Object-Oriented Systems
  111. Security for Telecommunications Networks
  112. Security for Web Services and Service-Oriented Architectures
  113. Security for Wireless Implantable Medical Devices
  114. Security for Wireless Sensor Networks
  115. Security in Ad-hoc and Sensor Networks
  116. Security in British Politics, 1945–99
  117. Security in Communication Networks
  118. Security in Communication Networks
  119. Security in Computer and Information Sciences
  120. Security in Computer and Information Sciences
  121. Security in Computing Systems
  122. Security in Computing and Communications
  123. Security in Computing and Communications
  124. Security in Computing and Communications
  125. Security in Computing and Communications
  126. Security in Computing and Communications
  127. Security in Computing and Communications
  128. Security in Computing and Communications
  129. Security in Computing and Communications
  130. Security in Cyber-Physical Systems
  131. Security in E-Learning
  132. Security in Embedded Devices
  133. Security in Emerging Wireless Communication and Networking Systems
  134. Security in Network Coding
  135. Security in Pervasive Computing
  136. Security in Pervasive Computing
  137. Security in Pervasive Computing
  138. Security in Shared Neighbourhoods
  139. Security in Smart Cities: Models, Applications, and Challenges
  140. Security in Smart Home Networks
  141. Security in Translation
  142. Security in Wireless Sensor Networks
  143. Security in a Post-Cold War World
  144. Security in an Interconnected World
  145. Security in the Global Commons and Beyond
  146. Security in the Information Society
  147. Security in the Persian Gulf
  148. Security in the Persian Gulf Region
  149. Security of Biochip Cyberphysical Systems
  150. Security of Computer Based Information Systems
  151. Security of Cyber-Physical Systems
  152. Security of Cyber-Physical Systems: State Estimation and Control
  153. Security of Data and Transaction Processing
  154. Security of FPGA-Accelerated Cloud Computing Environments
  155. Security of Industrial Control Systems and Cyber Physical Systems
  156. Security of Industrial Control Systems and Cyber-Physical Systems
  157. Security of Industrial Water Supply and Management
  158. Security of Natural Gas Supply through Transit Countries
  159. Security of Networks and Services in an All-Connected World
  160. Security of Public Water Supplies
  161. Security of Ubiquitous Computing Systems
  162. Security of Water Supply Systems: from Source to Tap
  163. Security with Intelligent Computing and Big-Data Services 2019
  164. Security with Intelligent Computing and Big-data Services
  165. Security with Intelligent Computing and Big-data Services
  166. Security with Noisy Data
  167. Security, Citizenship and Human Rights
  168. Security, Clans and Tribes: Unstable Governance in Somaliland, Yemen and the Gulf of Aden
  169. Security, Democracy and War Crimes
  170. Security, Democracy, and Society in Bali
  171. Security, Disinformation and Harmful Narratives: RT and Sputnik News Coverage about Sweden
  172. Security, Economics and Nuclear Non-Proliferation Morality
  173. Security, Identity, and British Counterterrorism Policy
  174. Security, Privacy and Anonymity in Computation, Communication and Storage
  175. Security, Privacy and Data Analytics
  176. Security, Privacy and Data Analytics
  177. Security, Privacy and Trust in Cloud Systems
  178. Security, Privacy and Trust in the IoT Environment
  179. Security, Privacy and User Interaction
  180. Security, Privacy, and Anonymity in Computation, Communication, and Storage
  181. Security, Privacy, and Anonymity in Computation, Communication, and Storage
  182. Security, Privacy, and Anonymity in Computation, Communication, and Storage
  183. Security, Privacy, and Anonymity in Computation, Communication, and Storage
  184. Security, Privacy, and Anonymity in Computation, Communication, and Storage
  185. Security, Privacy, and Anonymity in Computation, Communication, and Storage
  186. Security, Privacy, and Anonymity in Computation, Communication, and Storage
  187. Security, Privacy, and Anonymity in Computation, Communication, and Storage
  188. Security, Privacy, and Applied Cryptography Engineering
  189. Security, Privacy, and Applied Cryptography Engineering
  190. Security, Privacy, and Applied Cryptography Engineering
  191. Security, Privacy, and Applied Cryptography Engineering
  192. Security, Privacy, and Applied Cryptography Engineering
  193. Security, Privacy, and Applied Cryptography Engineering
  194. Security, Privacy, and Applied Cryptography Engineering
  195. Security, Privacy, and Applied Cryptography Engineering
  196. Security, Privacy, and Applied Cryptography Engineering
  197. Security, Privacy, and Applied Cryptography Engineering
  198. Security, Privacy, and Applied Cryptography Engineering
  199. Security, Privacy, and Applied Cryptography Engineering
  200. Security, Privacy, and Trust in Modern Data Management