| Issue | Title | |
| Vol 14, No 3: June 2025 | Secure and efficient elliptic curve-based certificate-less authentication scheme for solar-based smart grids | Abstract PDF |
| Reduanul Bari Shovon, Ashif Mohammad, Rimi Das, Tuhin Hossain, Md Ahasun Habib Ratul, Ronjon Kundu, Md. Ahsan Arif | ||
| Vol 13, No 2: April 2024 | Secure Euclidean random distribution for patients’ magnetic resonance imaging privacy protection | Abstract PDF |
| Ali Jaber Tayh Albderi, Lamjed Ben Said | ||
| Vol 11, No 2: April 2022 | Secure lightweight obfuscated delay-based physical unclonable function design on FPGA | Abstract PDF |
| Mohammad Haziq Ishak, Mohd Syafiq Mispan, Wong Yan Chiew, Muhammad Raihaan Kamaruddin, Mikhail Aleksandrovich Korobkov | ||
| Vol 13, No 3: June 2024 | Secure map-based crypto-stego technique based on mac address | Abstract PDF |
| Dima S. Kasasbeh, Bushra M. Al-Ja’afreh, Mohammed Anbar, Iznan H. Hasbullah, Mahmoud Al Khasawneh | ||
| Vol 10, No 3: June 2021 | Secure message transmission scheme in wireless sensor networks | Abstract PDF |
| Kameran Ali Ameen, Baban Ahmed Mahmood, Yalmaz Najm Aldeen Taher | ||
| Vol 10, No 2: April 2021 | Secure outage probability of cognitive radio network relying non-orthogonal multiple access scheme | Abstract PDF |
| Chi-Bao Le, Dinh-Thuan Do | ||
| Vol 5, No 4: December 2016 | Secure Routing Protocol for Integrated UMTS and WLAN Ad Hoc Networks | Abstract PDF |
| Shashank Tripathi, A. K. Jain | ||
| Vol 12, No 4: August 2023 | Secure two-factor mutual authentication scheme using shared image in medical healthcare environment | Abstract PDF |
| Husam A. Abdulmalik, Ali A. Yassin | ||
| Vol 13, No 6: December 2024 | Securing IoT edge device communication with efficient ECC middleware for resource-constrained systems | Abstract PDF |
| Zainatul Yushaniza Mohamed Yusoff, Mohamad Khairi Ishak, Lukman AB Rahim | ||
| Vol 13, No 1: February 2024 | Securing laboratories through internet of things networks: a comprehensive approach for ensuring safety and efficiency | Abstract PDF |
| Tamali Abderrahmane, Nourredine Amardjia, Tamali Mohammed | ||
| Vol 14, No 4: August 2025 | Securing patient data and access control in electronic health records with Ethereum blockchain | Abstract PDF |
| Shruthi Kumarswamy, Poornima Athikatte Sampigerayappa | ||
| Vol 12, No 6: December 2023 | Security analysis of encrypted audio based on elliptic curve and hybrid chaotic maps within GFDM modulator in 5G networks | Abstract PDF |
| Mohammed Jabbar Mohammed Ameen, Saad S. Hreshee | ||
| Vol 15, No 1: February 2026 | Security challenges in the internet of things for higher education: a study of vulnerabilities and emerging solutions | Abstract PDF |
| Kamal Elhattab, Driss Naji, Abdelouahed Ait Ider, Abdelali Joumad, Abdelkbir Ouisaadane, Karim Abouelmehdi | ||
| Vol 9, No 2: April 2020 | Security issues and framework of electronic medical record: A review | Abstract PDF |
| Jibril Adamu, Raseeda Hamzah, Marshima Mohd Rosli | ||
| Vol 12, No 1: February 2023 | Security of private cloud using machine learning and cryptography | Abstract PDF |
| Ali Abdulsattar Jabbar, Wesam Sameer Bhaya | ||
| Vol 9, No 3: June 2020 | Security performance analysis for power domain NOMA employing in cognitive radio networks | Abstract PDF |
| Thi-Anh Hoang, Chi-Bao Le, Dinh-Thuan Do | ||
| Vol 10, No 3: June 2021 | Security system with RFID control using E-KTP and internet of things | Abstract PDF |
| Andi Ainun Najib, Rendy Munadi, Nyoman Bogi Aditya Karna | ||
| Vol 5, No 3: September 2016 | Security Technology by using Firewall for Smart Grid | Abstract PDF |
| Ayla Hasanalizadeh Khosroshahi, Hossein Shahinzadeh | ||
| Vol 13, No 4: August 2024 | Security-based low-density parity check encoder for 5G communication | Abstract PDF |
| Balamurugan Rajangam, Manjunathan Alagarsamy, Chirakkal Rathish Radhakrishnan, Tsehay Admassu Assegie, Ayodeji Olalekan Salau, Andrew Quansah, Nur Mohammad Chowdhury, Ismatul Jannat Chowdhury | ||
| Vol 14, No 1: February 2025 | SeeAround: an offline mobile live support system for the visually impaired | Abstract PDF |
| Othmane Sebban, Ahmed Azough, Mohamed Lamrini | ||
| Vol 6, No 1: March 2017 | Segmentation Comparing Eggs Watermarking Image and Original Image | Abstract PDF |
| Anton Yudhana, Sunardi Sunardi, Shoffan Saifullah | ||
| Vol 12, No 4: August 2023 | Segmenting the eating behaviour of university students using the K-means algorithm | Abstract PDF |
| Lenin Quiñones Huatangari, MarÃa Alina Cueva RÃos, Rafaela Teodosia Huerta Camones | ||
| Vol 5, No 2: June 2016 | Selection of Gate Dielectrics for ZnO Based Thin-Film Transistors | Abstract PDF |
| Vaibhav Garg, Navneet Gupta | ||
| Vol 10, No 1: February 2021 | Selection of optimal hyper-parameter values of support vector machine for sentiment analysis tasks using nature-inspired optimization methods | Abstract PDF |
| Lakshmana Kumar Ramasamy, Seifedine Kadry, Sangsoon Lim | ||
| Vol 13, No 1: February 2024 | Self-adaptive differential evolution algorithm with dynamic fitness-ranking mutation and pheromone strategy | Abstract PDF |
| Pirapong Singsathid, Jeerayut Wetweerapong, Pikul Puphasuk | ||
| 2551 - 2575 of 3037 Items | << < 98 99 100 101 102 103 104 105 106 107 > >> | |