Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Confidencialidad")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 4306

  • Page / 173
Export

Selection :

  • and

ConfidentialityBOURKE, Julius; WESSELY, Simon.BMJ. British medical journal (International ed.). 2008, Vol 336, Num 7649, pp 888-891, issn 0959-8146, 4 p.Article

Efficient distributed signcryption scheme as group signcryptionKWAK, Dongjin; MOON, Sangjae.Lecture notes in computer science. 2003, pp 403-417, issn 0302-9743, isbn 3-540-20208-0, 15 p.Conference Paper

Internet et sécurité des données médicalesDOWIDAR, Sammy.PHARMACEUTIQUES : SANTE, MEDICAMENT ET INDUSTRIE. 1998, Num 56, pp 54-55Article

Confidentiality policies and their enforcement for controlled query evaluationBISKUP, Joachim; BONATTI, Piero.Lecture notes in computer science. 2002, pp 39-54, issn 0302-9743, isbn 3-540-44345-2, 16 p.Conference Paper

Informatisation du système de santé et confidentialitéCOINTE, Christine.Le Journal du SIDA (Paris). 1999, Num 118, pp 19-20, issn 1153-0863Article

Willis Ware's Lasting Contribution to Privacy: Fair Information PracticesGELLMAN, Robert.IEEE security & privacy. 2014, Vol 12, Num 4, pp 51-54, issn 1540-7993, 4 p.Article

The threat from within : trade secret theft by employeesMOLLMAN ELLIOTT, Sharon.Nature biotechnology (Print). 2007, Vol 25, Num 3, pp 293-295, issn 1087-0156, 3 p.Article

Information security and privacy (11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006)Batten, Lynn Margaret; Safavi-Naini, Reihanah.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-35458-1, 1Vol, XII-446 p, isbn 3-540-35458-1Conference Proceedings

2004 IEEE symposium on security and privacy (Proceedings)IEEE symposium on security and privacy. 2004, isbn 0-7695-2136-3, 1Vol, IX-283 p, isbn 0-7695-2136-3Conference Proceedings

A lesson on authentication protocol designWOO, T. Y. C; LAM, S. S.Operating systems review. 1994, Vol 28, Num 3, pp 24-37, issn 0163-5980Article

Stratfor or StratagainstBERGHEL, Hal.Computer (Long Beach, CA). 2012, Vol 45, Num 11, pp 82-85, issn 0018-9162, 4 p.Article

Cryptanalysis and improvement of signcryption schemesPETERSEN, H; MICHELS, M.IEE proceedings. Computers and digital techniques. 1998, Vol 145, Num 2, pp 149-151, issn 1350-2387Article

Recommendation N° (97) 5 of the Committee of ministers to member states on the protection of medical dataEUROPEAN JOURNAL OF HEALTH LAW. 1997, Vol 4, Num 4, pp 405-414, issn 0929-0273Article

WikiLeaks and the Matter of Private ManningBERGHEL, Hal.Computer (Long Beach, CA). 2012, Vol 45, Num 3, pp 70-73, issn 0018-9162, 4 p.Article

Privacy enhancing technologies (6th International workshop, PET 2006, Cambridge, UK, June 28-30, 2006)Danezis, George; Golle, Philippe.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-68790-4, 1Vol, VIII-429 p, isbn 3-540-68790-4Conference Proceedings

Ensuring fast implementations of symmetric ciphers on the intel pentium 4 and beyondHENRICKSEN, Matt; DAWSON, Ed.Lecture notes in computer science. 2006, pp 52-63, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

PSD 2004 : privacy in statistical databases (Barcelona, 9-11 June 2004)Domingo-Ferrer, Josep; Torra, Vincenç.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-22118-2, IX, 365 p, isbn 3-540-22118-2Conference Proceedings

SwissDRG und Datenschutz : nur tarifrelevante Daten ùbermittelnTHUR, Hanspeter.COMPETENCE. 2011, Num 6, issn 1424-2168, 17Article

Trustworthy global computing (International symposium, TGC 2005, Edinburgh, UK, April 7-9, 2005)Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-30007-4, 1Vol, VIII-369 p, isbn 3-540-30007-4Conference Proceedings

Typed processes in untyped contextsBUGLIESI, Michele; GIUNTI, Marco.Lecture notes in computer science. 2005, pp 19-32, issn 0302-9743, isbn 3-540-30007-4, 1Vol, 14 p.Conference Paper

Consensus sur la cryptographie = Consensus on the cryptographyKAMATA, H; PETERS, T.L' Observateur de l'OCDE (Print). 1997, Num 207, pp 13-15, issn 0304-3398Article

Technical Perspective Programming with Differential PrivacyGEHRKE, Johannes.Communications of the ACM. 2010, Vol 53, Num 9, issn 0001-0782, p. 88Article

Secure data management (Third VLDB workshop, SDM 2006, Seoul, Korea, September 10-11, 2006)Jonker, Willem; Petkovic, Milan.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-38984-9, 1Vol, X-183 p, isbn 3-540-38984-9Conference Proceedings

The CASC projectHUNDEPOOL, Anco.Lecture notes in computer science. 2002, pp 172-180, issn 0302-9743, isbn 3-540-43614-6Conference Paper

P3P: Platform for privacy preferences projectFRANKE, Thomas.Wirtschaftsinformatik. 2001, Vol 43, Num 2, pp 197-199, issn 0937-6429, 214 [4 p.]Article

  • Page / 173