Search Constraints
Search Results
Select an image to start the slideshow
Secure and Reliable Data Outsourcing in Cloud Computing
1 of 6
User-Centric Security and Privacy Mechanisms in Untrusted Networking and Computing Environments
2 of 6
Network Coding in Multihop Wireless Networks: Throughput Analysis and Protocol Design
3 of 6
Data Sharing on Untrusted Storage with Attribute-Based Encryption
4 of 6
Opportunistic Routing in Multihop Wireless Networks: Capacity, Energy Efficiency, and Security
5 of 6
Communication Security in Wireless Sensor Networks
6 of 6