Yazar
Malkin, Tal. editor.
Format:
Electronic Resources
Alıntı:
; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy
Yazar
Tubaro, Paola. author.
Format:
Electronic Resources
Alıntı:
privacy"? Under which conditions might this scenario come to be? What are the business and policy
View Other Search Results
Yazar
Chen, Thomas M. editor.
Format:
Electronic Resources
Alıntı:
experts with backgrounds including international relations, law, engineering, computer science, public
Yazar
Benatallah, Boualem. editor.
Format:
Electronic Resources
Alıntı:
-- Integrating Social Media and Open Data in a Cloud-based Platform for Public Sector Advertising -- A Survey on
Yazar
Hoepman, Jaap-Henk. editor.
Format:
Electronic Resources
Alıntı:
to Detect Cyber Attacks on a Water Treatment System -- Expression and Enforcement of Security Policy
Yazar
Staggs, Jason. editor.
Format:
Electronic Resources
Alıntı:
Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to
Yazar
Nyberg, Kaisa. editor.
Format:
Electronic Resources
Alıntı:
Projection-KDM Security for Public Key Encryption -- Format Oracles on OpenPGP -- Algorithms for Solving Hard
Yazar
Kliks, Adrian. editor. (orcid)0000-0001-6766-7836
Format:
Electronic Resources
Alıntı:
Admission Control using Neural Networks-Based Policy Agent Main Track -- Novel Filter Bank Based Cooperative
Yazar
Au, Man Ho. editor.
Format:
Electronic Resources
Alıntı:
Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage -- A Formal Model for Isolation
Yazar
Meersman, Robert. editor.
Format:
Electronic Resources
Alıntı:
Service-Based System for Homecare Self-Management -- Incorporating Policy-Based Authorization Framework in Audit
Arama Sonuçlarını Sınırlandır
Daraltılmış: