Search Constraints
« Previous |
11 - 18 of 18
|
Next »
Search Results
Select an image to start the slideshow
Wireless Sensor Network for Monitoring Applications
1 of 8
Secure and Reliable Data Outsourcing in Cloud Computing
2 of 8
User-Centric Security and Privacy Mechanisms in Untrusted Networking and Computing Environments
3 of 8
Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption
4 of 8
Network Coding in Multihop Wireless Networks: Throughput Analysis and Protocol Design
5 of 8
Data Sharing on Untrusted Storage with Attribute-Based Encryption
6 of 8
Opportunistic Routing in Multihop Wireless Networks: Capacity, Energy Efficiency, and Security
7 of 8
Communication Security in Wireless Sensor Networks
8 of 8