Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Information protection")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 4248

  • Page / 170
Export

Selection :

  • and

Information integrityBECKER, H.Information age. 1984, Vol 6, Num 1, pp 3-13, issn 0261-4103Article

Security kernel design and implementation: an introductionAMES, S. R. JR; GASSER, M; SCHELL, R. R et al.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 14-22, issn 0018-9162Article

Protection du secret en information scientifique et technique = The secret protection in the scientific and technical information areaBOUJU, A.Le Progrès technique (Paris). 1989, Num 4, pp 39-41, issn 0397-8060, 3 p.Article

Security, steganography, and watermarking of multimedia contents IX (29 January-1 February, 2007, San Jose, California, USA)Delp, Edward J; Wong, Ping Wah.Proceedings of SPIE, the International Society for Optical Engineering. 2007, issn 0277-786X, isbn 978-0-8194-6618-1, 1 v. (various pagings), isbn 978-0-8194-6618-1Conference Proceedings

Inference controls for statistical databasesDENNING, D. E; SCHLÖRER, J.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 69-82, issn 0018-9162Article

Trapdoor knapsacks without superincreasing structureWILLETT, M.Information processing letters. 1983, Vol 17, Num 1, pp 7-11, issn 0020-0190Article

The real cost of software piracyCOOPER, C.Information age. 1984, Vol 6, Num 2, pp 98-102, issn 0261-4103Article

Accès au dossier médicalDESCOINGS, R.LE JOURNAL DU SIDA. 1991, Num 25, pp 45-46Article

Gründe und Hintergründe der Verfassungsbeschwerde gegen das Volkszählungsgesetz 1983 = Raisons et raisons secrètes du recours constitutionnel contre la loi sur le recensement 1983WILD, G.Datenverarbeitung im Recht. Beiheft. 1985, Num 18, pp 28-32, issn 0722-4257Conference Paper

Access control with single-key-lockMENG-LIH WU; TAI-YANG HWANG.IEEE transactions on software engineering. 1984, Vol 10, Num 2, pp 185-191, issn 0098-5589Article

Chameleon : A new kind of stream cipherANDERSON, R; MANIFAVAS, C.Lecture notes in computer science. 1997, pp 107-113, issn 0302-9743, isbn 3-540-63247-6Conference Paper

Finite subsequences of shift register sequencesBOURNE, C; PIPER, F.IMA journal of applied mathematics. 1985, Vol 35, Num 1, pp 13-22, issn 0272-4960Article

A security kemel for a multiprocessor microcomputerSCHELL, R. R.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 47-53, issn 0018-9162Article

On the security of self-synchronous ciphersMILLAN, W; DAWSON, E.Lecture notes in computer science. 1997, pp 159-170, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Aids and medical confidentiality = SIDA et confidentialité médicaleGILLON, R.BMJ : BRITISH MEDICAL JOURNAL. 1987, Vol 294, pp 1675-1677, issn 0959-8138Article

The best available technologies for computer securityLANDWEHR, C. E.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 86-95, issn 0018-9162Article

Scomp: a solution to the multilevel security problemFRAIM, L. J.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 26-34, issn 0018-9162Article

Security information flow in multidimensional arraysKRAMER, S. M; SIDHU, D. P.IEEE transactions on computers. 1983, Vol 32, Num 12, pp 1188-1191, issn 0018-9340Article

Time-memory tradeoff in exponentiating a fixed element of GF(qn) requiring a short reference to the memoryARAZI, B.IEE proceedings. Part E. Computers and digital techniques. 1984, Vol 131, Num 4, pp 148-150, issn 0143-7062Article

A distributed secure systemRUSHBY, J; RANDELL, B.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 55-67, issn 0018-9162Article

Prospectives for modelling trust in information securityJØSANG, A.Lecture notes in computer science. 1997, Vol 1270, pp 2-13, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Analysis and implementation of a formal authorization policy design approachBAI, Y; VARADHARAJAN, V.Lecture notes in computer science. 1997, Vol 1270, pp 14-25, issn 0302-9743, isbn 3-540-63232-8Conference Paper

An approach to dynamic domain and type enforcementTIDSWELL, J; POTTER, J.Lecture notes in computer science. 1997, pp 26-37, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Deniable encryptionCANETTI, R; DWORK, C; NAOR, M et al.Lecture notes in computer science. 1997, pp 90-104, issn 0302-9743, isbn 3-540-63384-7Conference Paper

Design and analyses of two basic protocols for use in TTP-based key escrowBAO, F; DENG, R; HAN, Y et al.Lecture notes in computer science. 1997, pp 261-270, issn 0302-9743, isbn 3-540-63232-8Conference Paper

  • Page / 170