Search Results

There are 10171 results for: content related to: Call for Papers for Special Issue of Security and Communication Networks , “Security and Privacy in Ubiquitous Computing”

  1. You have free access to this content
    Special issue on “Applications of machine learning techniques to intrusion detection and digital forensics”

    Security and Communication Networks

    Volume 4, Issue 7, July 2011, Page: e1,

    Article first published online : 24 MAY 2011, DOI: 10.1002/sec.344

  2. You have free access to this content
    Issue Information

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: i–vi,

    Article first published online : 19 DEC 2014, DOI: 10.1002/sec.1120

  3. Special issue on the Design and Engineering of Cryptographic Solutions for Secure Information Systems

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: e1–e2,

    Article first published online : 22 FEB 2011, DOI: 10.1002/sec.325

  4. You have free access to this content
    Issue Information

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: i–vi,

    Article first published online : 12 MAR 2015, DOI: 10.1002/sec.1124

  5. You have free access to this content
    Issue Information

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: i–iv,

    Article first published online : 19 MAY 2015, DOI: 10.1002/sec.1128

  6. You have free access to this content
    Issue Information

    Security and Communication Networks

    Volume 7, Issue 10, October 2014, Pages: i–iii,

    Article first published online : 25 SEP 2014, DOI: 10.1002/sec.892

  7. You have free access to this content
    Issue Information

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: i–vi,

    Article first published online : 17 FEB 2015, DOI: 10.1002/sec.1123

  8. You have free access to this content
    Issue Information

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: i–iv,

    Article first published online : 5 MAY 2015, DOI: 10.1002/sec.1127

  9. You have free access to this content
    Issue Information

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: i–iii,

    Article first published online : 24 AUG 2014, DOI: 10.1002/sec.891

  10. You have free access to this content
    Issue Information

    Security and Communication Networks

    Volume 7, Issue 6, June 2014, Pages: i–iii,

    Article first published online : 24 APR 2014, DOI: 10.1002/sec.888

  11. You have free access to this content
    Issue Information

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: i–vi,

    Article first published online : 16 JAN 2015, DOI: 10.1002/sec.1122

  12. You have free access to this content
    Issue Information

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: i–iv,

    Article first published online : 15 APR 2015, DOI: 10.1002/sec.1126

  13. You have free access to this content
    Issue Information

    Security and Communication Networks

    Volume 8, Issue 1, 10 January 2015, Pages: i–iv,

    Article first published online : 15 DEC 2014, DOI: 10.1002/sec.1119

  14. You have free access to this content
    Issue Information

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: i–iii,

    Article first published online : 27 NOV 2014, DOI: 10.1002/sec.894

  15. You have free access to this content
    Issue Information

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: i–vi,

    Article first published online : 12 JAN 2015, DOI: 10.1002/sec.1121

  16. You have free access to this content
    Issue Information

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: i–iv,

    Article first published online : 23 MAR 2015, DOI: 10.1002/sec.1125

  17. You have free access to this content
    Issue Information

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: i–iii,

    Article first published online : 24 OCT 2014, DOI: 10.1002/sec.893

  18. Issue Information

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: i–iv,

    Article first published online : 21 JUN 2013, DOI: 10.1002/sec.659

  19. You have free access to this content
    Trends in modern information hiding: techniques, applications and detection

    Security and Communication Networks

    Volume 6, Issue 11, November 2013, Pages: 1414–1415, Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian and Yali Liu

    Article first published online : 24 OCT 2013, DOI: 10.1002/sec.919

  20. You have free access to this content
    Security and communication networks (SCN) special issue on “security for mobile internet applications”

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: e3–e4,

    Article first published online : 25 OCT 2011, DOI: 10.1002/sec.397