| Issue | Title | |
| Vol 39, No 2: August 2025 | Secure lightweight CAN protocol handling for electric vehicles | Abstract PDF |
| Vandana Vijaykumar Hanchate, Rupali Kamathe, Meghana Deshpande, Kalyani Joshi, Sheetal Borde, Abrar Inamdar, Vijayalakshmi Madduru | ||
| Vol 28, No 1: October 2022 | Secure smart home automation and monitoring system using internet of things | Abstract PDF |
| Mohamed Khudhair Al-Gburi, Laith Ali Abdul-Rahaim | ||
| Vol 19, No 1: July 2020 | Secure vehicle to vehicle voice chat based MQTT and CoAP internet of things protocol | Abstract PDF |
| Noor A. Hussein, Mohamed Ibrahim. Shujaa | ||
| Vol 15, No 3: September 2015 | Secured Communication Among HMI and Controller using RC-4 Algorithmand Raspberry Pi | Abstract PDF |
| Albert Sagala, Deni Parlindungan Lumbantoruan, Epelin Manurung, Iroma Situmorang, Adi Gunawan | ||
| Vol 29, No 2: February 2023 | Secured drone communication based on Esalsa20 algorithm and 1d logistic map | Abstract PDF |
| Ibtesam Jomaa, Worud Mahdi Saleh, Rasha Rokan Ismail Hassan, Saja Huzber Hussien Wadi | ||
| Vol 23, No 1: July 2021 | Secured protection of transmission line by distance relay using data mining approach | Abstract PDF |
| M. Kiruthika, Bindu S. | ||
| Vol 35, No 3: September 2024 | Secured web application based on CapsuleNet and OWASP in the cloud | Abstract PDF |
| Rohith Vallabhaneni, Sanjaikanth E. Vadakkethil Somanathan Pillai, Srinivas A. Vaddadi, Santosh Reddy Addula, Bhuvanesh Ananthan | ||
| Vol 16, No 2: November 2015 | SecureDBaaS Model for Accessing Encrypted Cloud Databases | Abstract PDF |
| Palle Jagadeeswaraiah, M.R. Pavan Kumar | ||
| Vol 22, No 3: June 2021 | Securing audio transmission based on encoding and steganography | Abstract PDF |
| Enas Wahab Abood, Zaid Ameen Abduljabbar, Mustafa A. Al Sibahee, Mohammed Abdulridha Hussain, Zaid Alaa Hussien | ||
| Vol 10, No 2: May 2018 | Securing Data Communication for Data Driven Applications Using End to End Encryption | Abstract PDF |
| Subhi Almohtasib, Alaa H Al-Hamami | ||
| Vol 28, No 3: December 2022 | Securing data using deep hiding selected least significant bit and adaptive swarm algorithm | Abstract PDF |
| Bashar Izzeddin Issa Aljidi, Sundresan Perumal, Sakinah Ali Pitchay | ||
| Vol 11, No 4: April 2013 | Securing Personal Health Records in the Cloud by Enforcing Sticky Policies | Abstract PDF |
| Chunxia Leng, Huiqun Yu, Jingming Wang, Jianhua Huang | ||
| Vol 13, No 1: January 2019 | Securing SAAS service under cloud computing based multi-tenancy systems | Abstract PDF |
| Trinathbasu Miriyala, JKR Sastry | ||
| Vol 22, No 1: April 2021 | Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device | Abstract PDF |
| Seniman Seniman, Baihaqi Siregar, Rani Masyithah Pelle, Fahmi Fahmi | ||
| Vol 18, No 2: May 2020 | Securing speech signals by watermarking binary images in the wavelet domain | Abstract PDF |
| Rakan Saadallah Rashid, Jafar Ramadhan Mohammed | ||
| 7681 - 7695 of 9148 Items | << < 508 509 510 511 512 513 514 515 516 517 > >> | |
