Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Vida privada")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 3274

  • Page / 131
Export

Selection :

  • and

Informatique : comment protéger notre vie privée ? = Computer sciences: how to protect your private life ?LOINTIER, Pascal; LONGEON, Robert; PALLEZ, Christophe et al.Sciences (1969). 2004, Num 3, pp 23-38, issn 0151-0304, 16 p.Article

Privacy enhancing technologies (6th International workshop, PET 2006, Cambridge, UK, June 28-30, 2006)Danezis, George; Golle, Philippe.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-68790-4, 1Vol, VIII-429 p, isbn 3-540-68790-4Conference Proceedings

Privacy, Speech, and the LawMOORE, Adam D.Journal of information ethics. 2013, Vol 22, Num 1, pp 21-43, issn 1061-9321, 23 p.Article

Privacy and Security Security Risks in Next-Generation Emergency ServicesTSCHOFENIG, Hannes.Communications of the ACM. 2011, Vol 54, Num 11, pp 23-25, issn 0001-0782, 3 p.Article

Technical Perspective Programming with Differential PrivacyGEHRKE, Johannes.Communications of the ACM. 2010, Vol 53, Num 9, issn 0001-0782, p. 88Article

Privacy im World Wide WebSACKMANN, Stefan.Wirtschaftsinformatik. 2007, Vol 49, Num 1, pp 49-54, issn 0937-6429, 6 p.Article

Commentary : Legal effect of revealing private information in the US and abroad : Data communicationsSTEWART, Radcliff.Information systems management. 2007, Vol 24, Num 4, pp 343-344, issn 1058-0530, 2 p.Article

Privateers in Cyberspace: Aargh!LESK, Michael.IEEE security & privacy. 2013, Vol 11, Num 3, pp 81-84, issn 1540-7993, 4 p.Article

IEEE Security & Privacy: The Early YearsCYBENKO, George; CLARK-FISHER, Kathy.IEEE security & privacy. 2014, Vol 12, Num 3, pp 18-19, issn 1540-7993, 2 p.Conference Paper

The IEEE Symposium on Security and and Privacy, in RetrospectNEUMANN, Peter G; PEISERT, Sean; SCHAEFER, Marvin et al.IEEE security & privacy. 2014, Vol 12, Num 3, pp 15-17, issn 1540-7993, 3 p.Conference Paper

Sticky Policies: An Approach for Managing Privacy across Multiple Parties : Security and Privacy in an Online WorldPEARSON, Siani; CASASSA MONT, Marco.Computer (Long Beach, CA). 2011, Vol 44, Num 9, pp 60-68, issn 0018-9162, 9 p.Article

FOURTEEN REASONS PRIVACY MATTERS: A MULTIDISCIPLINARY REVIEW OF SCHOLARLY LITERATURE'MAGI, Trina J.The Library quarterly (Chicago, IL). 2011, Vol 81, Num 2, pp 187-209, issn 0024-2519, 23 p.Article

Communications Surveillance: Privacy and Security at RiskDIFFIE, Whitfield; LANDAU, Susan.Communications of the ACM. 2009, Vol 52, Num 11, pp 42-47, issn 0001-0782, 6 p.Article

Privacy-enhanced personalizationKOBSA, Alfred.Communications of the ACM. 2007, Vol 50, Num 8, pp 24-33, issn 0001-0782, 10 p.Article

Information security and privacy (Sydney, 13-15 July 2004)Wang, Huaxiong; Pieprzyk, Josef; Varadharajan, Vijay et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-22379-7, XII, 494 p, isbn 3-540-22379-7Conference Proceedings

Security and privacy in pervasive computing state of the art and future directionsHUTTER, Dieter; STEPHAN, Werner; ULLMANN, Markus et al.Lecture notes in computer science. 2004, pp 285-289, issn 0302-9743, isbn 3-540-20887-9, 5 p.Conference Paper

Technological Threats to Privacy and Information AccessSTUART, David.Online (Weston, CT). 2012, Vol 36, Num 5, pp 35-37, issn 0146-5422, 3 p.Article

The Ethics of Archiving Murderabilia: The Papers of Ted KaczynskiDEVLIN, Nora.Journal of information ethics. 2010, Vol 19, Num 1, pp 126-140, issn 1061-9321, 15 p.Article

Données personnelles: trois ordres de relation entre le droit et l'économie : Présence numérique: de la gestion d'une identité à l'exercice d'une libertéKESSOUS, Emmanuel.Documentaliste (Paris). 2010, Vol 47, Num 1, pp 61-62, issn 0012-4508, 2 p.Article

Privacy? Fuggedaboutit!BATES, Mary Ellen.EContent (Wilton, Conn.). 2008, Vol 31, Num 3, pp 39-39, issn 1525-2531, 1 p.Article

Privacy Issues in Identity VerificationSLOMOVIC, Anna.IEEE security & privacy. 2014, Vol 12, Num 3, pp 71-73, issn 1540-7993, 3 p.Article

Privacy and Security Can You Engineer Privacy?GURSES, Seda.Communications of the ACM. 2014, Vol 57, Num 8, pp 20-23, issn 0001-0782, 4 p.Article

Written for the MomentFULDA, Joseph S.Journal of information ethics. 2012, Vol 21, Num 1, pp 21-26, issn 1061-9321, 6 p.Article

Réseaux sociaux: privés, publics, ou quoi ? : Présence numérique: de la gestion d'une identité à l'exercice d'une libertéBOYD, Danah.Documentaliste (Paris). 2010, Vol 47, Num 1, pp 48-49, issn 0012-4508, 2 p.Article

Entre vie professionnelle et vie privéeWALON-TOUSSAINT, Diane.Expertises des systèmes d'information. 2008, Num 330, pp 386-387, issn 0221-2102, 2 p.Article

  • Page / 131