Cs-Cr
Secure FSM- based arithmetic codes
Secure management of logs in internet of things
Secure voice based authentication for mobile devices: Vaulted Voice Verification
Secure Zones: An Attribute-Based Encryption advisory system for safe firearms
Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)
Securing Cloud - The Quantum Way
Securing IEEE 802.11G WLAN Using OpenVPN and Its Impact Analysis
Security Metrics in Industrial Control Systems
Security-aware selection of Web Services for Reliable Composition
Selective Watchdog Technique for Intrusion Detection in Mobile Ad-Hoc Network
Spread Spectrum based Robust Image Watermark Authentication
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System
Stickler: Defending Against Malicious CDNs in an Unmodified Browser
Study the function of building blocks in SHA Family
Sudoku Associated Two Dimensional Bijections for Image Scrambling
Systems-theoretic Safety Assessment of Robotic Telesurgical Systems
Technical Analysis of Security Infrastructure in RFID Technology
The Arduino as a Hardware Random-Number Generator
The Power of Linear Reconstruction Attacks
Towards Design and Implementation of Space Efficient and Secured Transmission scheme on EGovernance data
Towards Security of Additive Layer Manufacturing
Tracking and Quantifying Censorship on a Chinese Microblogging Site