Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Private life")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 3375

  • Page / 135
Export

Selection :

  • and

Informatique : comment protéger notre vie privée ? = Computer sciences: how to protect your private life ?LOINTIER, Pascal; LONGEON, Robert; PALLEZ, Christophe et al.Sciences (1969). 2004, Num 3, pp 23-38, issn 0151-0304, 16 p.Article

MONTAIGNE AND THE COMIC: EXPOSING PRIVATE LIFECALHOUN, Alison.Philosophy and literature (Print). 2011, Vol 35, Num 2, pp 303-319, issn 0190-0013, 17 p.Article

Privacy enhancing technologies (6th International workshop, PET 2006, Cambridge, UK, June 28-30, 2006)Danezis, George; Golle, Philippe.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-68790-4, 1Vol, VIII-429 p, isbn 3-540-68790-4Conference Proceedings

Privateers in Cyberspace: Aargh!LESK, Michael.IEEE security & privacy. 2013, Vol 11, Num 3, pp 81-84, issn 1540-7993, 4 p.Article

Privacy and the Moral Right to Personal AutonomyWALL, Edmund.The International journal of applied philosophy. 2011, Vol 25, Num 1, pp 69-85, issn 0739-098X, 17 p.Article

Privacy, Speech, and the LawMOORE, Adam D.Journal of information ethics. 2013, Vol 22, Num 1, pp 21-43, issn 1061-9321, 23 p.Article

Privacy and Security Security Risks in Next-Generation Emergency ServicesTSCHOFENIG, Hannes.Communications of the ACM. 2011, Vol 54, Num 11, pp 23-25, issn 0001-0782, 3 p.Article

Technical Perspective Programming with Differential PrivacyGEHRKE, Johannes.Communications of the ACM. 2010, Vol 53, Num 9, issn 0001-0782, p. 88Article

Privacy im World Wide WebSACKMANN, Stefan.Wirtschaftsinformatik. 2007, Vol 49, Num 1, pp 49-54, issn 0937-6429, 6 p.Article

Commentary : Legal effect of revealing private information in the US and abroad : Data communicationsSTEWART, Radcliff.Information systems management. 2007, Vol 24, Num 4, pp 343-344, issn 1058-0530, 2 p.Article

IEEE Security & Privacy: The Early YearsCYBENKO, George; CLARK-FISHER, Kathy.IEEE security & privacy. 2014, Vol 12, Num 3, pp 18-19, issn 1540-7993, 2 p.Conference Paper

The IEEE Symposium on Security and and Privacy, in RetrospectNEUMANN, Peter G; PEISERT, Sean; SCHAEFER, Marvin et al.IEEE security & privacy. 2014, Vol 12, Num 3, pp 15-17, issn 1540-7993, 3 p.Conference Paper

Sticky Policies: An Approach for Managing Privacy across Multiple Parties : Security and Privacy in an Online WorldPEARSON, Siani; CASASSA MONT, Marco.Computer (Long Beach, CA). 2011, Vol 44, Num 9, pp 60-68, issn 0018-9162, 9 p.Article

FOURTEEN REASONS PRIVACY MATTERS: A MULTIDISCIPLINARY REVIEW OF SCHOLARLY LITERATURE'MAGI, Trina J.The Library quarterly (Chicago, IL). 2011, Vol 81, Num 2, pp 187-209, issn 0024-2519, 23 p.Article

EINE SCHWESTER TRITT AUS DEM SCHATTENKRIEGEL, Peter.Hegel-Studien. 2010, Vol 45, pp 19-34, issn 0073-1587, 16 p.Article

Communications Surveillance: Privacy and Security at RiskDIFFIE, Whitfield; LANDAU, Susan.Communications of the ACM. 2009, Vol 52, Num 11, pp 42-47, issn 0001-0782, 6 p.Article

Privacy-enhanced personalizationKOBSA, Alfred.Communications of the ACM. 2007, Vol 50, Num 8, pp 24-33, issn 0001-0782, 10 p.Article

Information security and privacy (Sydney, 13-15 July 2004)Wang, Huaxiong; Pieprzyk, Josef; Varadharajan, Vijay et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-22379-7, XII, 494 p, isbn 3-540-22379-7Conference Proceedings

Security and privacy in pervasive computing state of the art and future directionsHUTTER, Dieter; STEPHAN, Werner; ULLMANN, Markus et al.Lecture notes in computer science. 2004, pp 285-289, issn 0302-9743, isbn 3-540-20887-9, 5 p.Conference Paper

Technological Threats to Privacy and Information AccessSTUART, David.Online (Weston, CT). 2012, Vol 36, Num 5, pp 35-37, issn 0146-5422, 3 p.Article

The Ethics of Archiving Murderabilia: The Papers of Ted KaczynskiDEVLIN, Nora.Journal of information ethics. 2010, Vol 19, Num 1, pp 126-140, issn 1061-9321, 15 p.Article

Données personnelles: trois ordres de relation entre le droit et l'économie : Présence numérique: de la gestion d'une identité à l'exercice d'une libertéKESSOUS, Emmanuel.Documentaliste (Paris). 2010, Vol 47, Num 1, pp 61-62, issn 0012-4508, 2 p.Article

Privacy? Fuggedaboutit!BATES, Mary Ellen.EContent (Wilton, Conn.). 2008, Vol 31, Num 3, pp 39-39, issn 1525-2531, 1 p.Article

cybersurveillance: les droits et devoirs De l'employeurBAUDOIN, Christine; DESMAZURE, Fabien.Archimag (Vincennes). 2013, Num 265, pp 38-39, issn 0769-0975, 2 p.Article

Privacy enhancing technologies (5th international workshop, PET 2005, Cavtat, Croatia, May 30 - June 1, 2005)Danezis, George; Martin, David.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-34745-3, 1Vol, VIII-272 p, isbn 3-540-34745-3Conference Proceedings

  • Page / 135