Academic literature on the topic 'Secur'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secur.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secur"
Zivanovic, Irena, Jacek Kociszewski, Jakob Eberhard, and Volker Viereck. "Bladder perforation after TVT-Secur™ procedure: how secure is TVT-Secur™?" Archives of Gynecology and Obstetrics 289, no. 1 (2013): 131–34. http://dx.doi.org/10.1007/s00404-013-2968-8.
Full textIncavo, Stephen J., Bruce D. Beynnon, and Kathryn M. Coughlin. "Total Hip Arthroplasty with the Secur-Fit and Secur-Fit Plus Femoral Stem Design." Journal of Arthroplasty 23, no. 5 (2008): 670–76. http://dx.doi.org/10.1016/j.arth.2007.05.044.
Full textHota, Lekha S., Katherine Hanaway, Michele R. Hacker, et al. "TVT-Secur (Hammock) Versus TVT-Obturator." Female Pelvic Medicine & Reconstructive Surgery 18, no. 1 (2012): 39–43. http://dx.doi.org/10.1097/spv.0b013e31823bdbcf.
Full textMolden, Stephanie M., and Vincent R. Lucente. "New minimally invasive slings: TVT Secur." Current Urology Reports 9, no. 5 (2008): 358–61. http://dx.doi.org/10.1007/s11934-008-0062-8.
Full textUddain, Jasim. "Enhancing food safety and security through organic agriculture and innovative fertilizer management." Asian-Australasian Journal of Food Safety and Security 8, no. 2 (2024): 27–31. http://dx.doi.org/10.3329/aajfss.v8i2.74060.
Full textKabir, SM Lutful. "Nourishing minds and bodies: the imperative of food safety and security." Asian-Australasian Journal of Food Safety and Security 8, no. 1 (2024): 1–4. http://dx.doi.org/10.3329/aajfss.v8i1.71842.
Full textNeogi, Sucharit Basu. "Addressing the climate-food-health nexus: strengthening ecosystem-based adaptation and One Health." Asian-Australasian Journal of Food Safety and Security 9, no. 1 (2025): 1–4. https://doi.org/10.3329/aajfss.v9i1.79031.
Full textRichard, Patrick, Louis-Olivier Gagnon, and Le Mai Tu. "“U-Method” TVT-Secur Slings: Are they obstructive?" Canadian Urological Association Journal 6, no. 2 (2012): 104–7. http://dx.doi.org/10.5489/cuaj.11124.
Full textHale, John, and Paul Brusil. "Secur(e/ity) Management: A Continuing Uphill Climb." Journal of Network and Systems Management 15, no. 4 (2007): 525–53. http://dx.doi.org/10.1007/s10922-007-9079-4.
Full textKhandwala, Salil, and Chaandini Jayachandran. "TVT-Secur in Office Sling Procedure Under Local Anesthesia." Female Pelvic Medicine & Reconstructive Surgery 18, no. 4 (2012): 233–38. http://dx.doi.org/10.1097/spv.0b013e318259f6b2.
Full textDissertations / Theses on the topic "Secur"
Lakshmanan, Subramanian. "Secure store a secure distributed storage service /." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-08052004-010409/unrestricted/lakshmanan%5Fsubramanian%5F200412%5Fphd.pdf.
Full textNeubert, Janek. "Secure WebServer." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400894.
Full textBelostotsky, Eugene B. (Eugene Boris). "Secure SNMP." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42758.
Full textMahar, Anthony J. "Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms." Thesis, Virginia Tech, 2005. http://hdl.handle.net/10919/34434.
Full textTanik, Guven Orkun. "Secure Mail Gateway." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612038/index.pdf.
Full textMuhovic, Admir. "Secure Wireless Communication." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92023.
Full textSt-Jules, Michael. "Secure Quantum Encryption." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35371.
Full textGuler, Sevil. "Secure Bitcoin Wallet." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177587.
Full textVolaco, Gustavo Capobiano. "Viver ou secar?" reponame:Repositório Institucional da UFPR, 2010. http://hdl.handle.net/1884/23548.
Full textHu, Nan. "SECURE IMAGE PROCESSING." UKnowledge, 2007. http://uknowledge.uky.edu/gradschool_theses/448.
Full textBooks on the topic "Secur"
Laird, Robbin F. Britain's security policy: The Modern Soviet view. Alliance for the Institute for European Defence & Strategic Studies, 1988.
Find full textDonnelly, C. N. Nations, alliances and security: A collection of writings. Akadémiai Kiadó, 2004.
Find full textMima, Cataldo, ed. The Women's encampment for a future of peace and justice: Images and writings. Temple University Press, 1987.
Find full textBaumgart, Rainer. Secure Networking — CQRE [Secure] ’ 99. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46701-7.
Full textHegarty, Cain. Suffolk's defended shore: Coastal fortifications from the air. English Heritage, 2007.
Find full textLeader, Jeffery J. Chaotic keystream generators for additive stream ciphers. Naval Postgraduate School, 1993.
Find full textBook chapters on the topic "Secur"
Sakamuri, Lokesh, Sai Chandana Thiruvuru, Rohit Gupta Kunala, et al. "Optimum Transportation Scheme for Healthcare Supply Chain Management." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-8.
Full textHammad, Mohamed, Gauhar Ali, Mohammed A. El-Affendi, Yassine Maleh, and Ahmed A. Abd El-Latif. "Introduction." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-1.
Full textAli, Gauhar, Mohammed El-Affendi, and Ahmed A. Abd El-Latif. "Securing Digital Health." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-4.
Full textSahid, Abdelkebir. "Securing Healthcare." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-9.
Full textYassine, Maleh, and Taqafi Issam. "Securing the Future of E-health." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-3.
Full textJafar, Uzma, and Hafiz Adnan Hussain. "Addressing Unique Cybersecurity Challenges in Telehealth and Remote Physiologic Monitoring." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-7.
Full textZainuddin, Ahmad Anwar, Muhammad Hazrin Fahmi bin Abd Halim, Nur Syafika Bahrudin, Aida Shahiedun, Nik Muhammd Faris Firdaus bin Norazman, and Muhammad Falikh Fikri bin Mohd Fauzi. "IoT Application, Privacy, and Security in Healthcare." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-2.
Full textHammad, Mohamed. "Biometric Security and Access Management in E-health Services." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-5.
Full textDo, Phuc Hao, Thanh Liem Tran, Van Dai Pham, Abdelhamied A. Ateya, and Tran Duc Le. "Investigating the Effectiveness of Different GNN Models for IoT-Healthcare Systems Botnet Traffic Classification." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-6.
Full textHughes, Vera, and David Weller. "Secure." In People in Retailing. Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-09897-2_18.
Full textConference papers on the topic "Secur"
Sulimany, Kfir, Sri Krishna Vadlamani, Ryan Hamerly, Prahlad Iyengar, and Dirk Englund. "Quantum-Secure Deep Learning in Optical Networks." In Optical Fiber Communication Conference. Optica Publishing Group, 2025. https://doi.org/10.1364/ofc.2025.m4e.6.
Full textNath, Sumon, Agustin Navarro-Torres, Alberto Ros, and Biswabandan Panda. "Secure Prefetching for Secure Cache Systems." In 2024 57th IEEE/ACM International Symposium on Microarchitecture (MICRO). IEEE, 2024. https://doi.org/10.1109/micro61859.2024.00017.
Full textRezaei, Tahereh, Chitra Vadlamani, Amir Kalev, and Jonathan L. Habif. "Quantum Pulse Position Modulation using Entangled States for Communication Security." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.jw2a.86.
Full textMeng, Xuanqi, Jiarun Zhou, Xiulong Liu, Xinyu Tong, Wenyu Qu, and Jianrong Wang. "Secur-Fi: A Secure Wireless Sensing System Based on Commercial Wi-Fi Devices." In IEEE INFOCOM 2023 - IEEE Conference on Computer Communications. IEEE, 2023. http://dx.doi.org/10.1109/infocom53939.2023.10229055.
Full textOvilla-Martinez, Brisbane, and Lilian Bossuet. "Restoration protocol: Lightweight and secur devices authentication based on PUF." In 2017 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC). IEEE, 2017. http://dx.doi.org/10.1109/vlsi-soc.2017.8203460.
Full textSteger, Marco, Carlo Boano, Michael Karner, Joachim Hillebrand, Werner Rom, and Kay Romer. "SecUp: Secure and Efficient Wireless Software Updates for Vehicles." In 2016 Euromicro Conference on Digital System Design (DSD). IEEE, 2016. http://dx.doi.org/10.1109/dsd.2016.11.
Full textWang, Chao, Wen Yu Kon, Hong Jie Ng, and Charles C. W. Lim. "Experimental symmetric private information retrieval with measurement-device-independent quantum network." In CLEO: Fundamental Science. Optica Publishing Group, 2023. http://dx.doi.org/10.1364/cleo_fs.2023.ff1a.3.
Full textKumar, Arvind, Ashish Gholve, and Kedar Kotalwar. "Automotive Security Solution Using Hardware Security Module (HSM)." In International Automotive CAE Conference – Road to Virtual World. SAE International, 2024. http://dx.doi.org/10.4271/2024-28-0037.
Full textFelcan, Miroslav. "Historical Cross-Section of Arson." In Safe and Secure Society. The College of European and Regional Studies, 2020. http://dx.doi.org/10.36682/ssc_2020/1.
Full textYun-kyung Lee and Jeong-Nye Kim. "Secure mobile services using secure region." In 2013 International Conference on ICT Convergence (ICTC). IEEE, 2013. http://dx.doi.org/10.1109/ictc.2013.6675510.
Full textReports on the topic "Secur"
Nelson, Cynthia Lee. Secure portal. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/921125.
Full textDunigan, T. H., and N. Venugopal. Secure PVM. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/406053.
Full textKrishnan, S., J. Laganier, M. Bonola, and A. Garcia-Martinez. Secure Proxy ND Support for SEcure Neighbor Discovery (SEND). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6496.
Full textArcher, M., D. A. Frincke, and K. Levitt. Secure resource management: Specifying and testing secure operating systems. Office of Scientific and Technical Information (OSTI), 1990. http://dx.doi.org/10.2172/6023693.
Full textShands, Deborah. Secure Virtual Enclaves. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada402350.
Full textLuu, Brian B. Secure Link Middleware. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada485508.
Full textDougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada501670.
Full textAderholdt, Ferrol, Blake A. Caldwell, Susan Elaine Hicks, et al. Secure Storage Architectures. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1195819.
Full textDougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada636498.
Full textGibbs, P. W. Secure Transportation Management. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1160060.
Full text