A secured MAC address based Login System Secured virtual network in a gaming environment Secured Finger Vein Authentication System Using Contourlet Transform and SVMJini & Friends @ Work: Towards Secured Service Access Apparatus and method for providing secured communications Secured Lending and Default Risk: Equilibrium Analysis, Policy Implications and Empirical Results Handheld remote computer control and methods for secured interactive real-time telecommunications HANDHELD REMOTE COMPUTER CONTROL AND METHODS FOR SECURED INTERACTIVE REAL-TIME TELECOMMUNICATIONS Whirlpool Algorithm with Hash Function Based Watermarking Algorithm for the Secured Transmission of Digital Medical Images United Arab Emirates Chapter – The International Comparative Legal Guide to Lending & Secured Finance 2015, 3rd Edition