Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Protección información")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 3615

  • Page / 145
Export

Selection :

  • and

Protection du secret en information scientifique et technique = The secret protection in the scientific and technical information areaBOUJU, A.Le Progrès technique (Paris). 1989, Num 4, pp 39-41, issn 0397-8060, 3 p.Article

Security, steganography, and watermarking of multimedia contents IX (29 January-1 February, 2007, San Jose, California, USA)Delp, Edward J; Wong, Ping Wah.Proceedings of SPIE, the International Society for Optical Engineering. 2007, issn 0277-786X, isbn 978-0-8194-6618-1, 1 v. (various pagings), isbn 978-0-8194-6618-1Conference Proceedings

Chameleon : A new kind of stream cipherANDERSON, R; MANIFAVAS, C.Lecture notes in computer science. 1997, pp 107-113, issn 0302-9743, isbn 3-540-63247-6Conference Paper

Accès au dossier médicalDESCOINGS, R.LE JOURNAL DU SIDA. 1991, Num 25, pp 45-46Article

On the security of self-synchronous ciphersMILLAN, W; DAWSON, E.Lecture notes in computer science. 1997, pp 159-170, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Aids and medical confidentiality = SIDA et confidentialité médicaleGILLON, R.BMJ : BRITISH MEDICAL JOURNAL. 1987, Vol 294, pp 1675-1677, issn 0959-8138Article

protéger ses données sans bon sens, la technologie n'est rienNUTTIN, Guillaume.Archimag (Vincennes). 2009, Num 230, pp 40-41, issn 0769-0975, 2 p.Article

Capacity and Optimal Collusion Attack Channels for Gaussian Fingerprinting GamesYING WANG; MOULIN, Pierre.Proceedings of SPIE, the International Society for Optical Engineering. 2007, pp 65050J.1-65050J.9, issn 0277-786X, isbn 978-0-8194-6618-1Conference Paper

CMS 2005 : communications and multimedia security (Salzburg, 9-21 September 2005)Dittmann, Jana; Katzenbeisser, Stefan; Uhl, Andreas et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-28791-4, XIII, 360 p, isbn 3-540-28791-4Conference Proceedings

On unequal error protection for information symbols via active distancesPAVLUSHKOV, Victor; JOHANNESSON, Rolf; ZYABLOV, Viktor V et al.IEEE International Symposium on Information Theory. 2004, isbn 0-7803-8280-3, 1Vol, p. 452Conference Paper

A new hash function based on block cipherYI, X; LAM, K.-Y.Lecture notes in computer science. 1997, pp 139-146, issn 0302-9743, isbn 3-540-63232-8Conference Paper

On characterizations of escrow encryption schemesFRANKEL, Y; YUNG, M.Lecture notes in computer science. 1997, pp 705-715, issn 0302-9743, isbn 3-540-63165-8Conference Paper

Plug and play encryptionBEAVER, D.Lecture notes in computer science. 1997, pp 75-89, issn 0302-9743, isbn 3-540-63384-7Conference Paper

Secret sharing with reusable polynomialsCHEN, L; GOLLMANN, D; MITCHELL, C. J et al.Lecture notes in computer science. 1997, pp 183-193, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Unconditional security against memory-bounded adversariesCACHIN, C; MAURER, U.Lecture notes in computer science. 1997, pp 292-306, issn 0302-9743, isbn 3-540-63384-7Conference Paper

Prospectives for modelling trust in information securityJØSANG, A.Lecture notes in computer science. 1997, Vol 1270, pp 2-13, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Analysis and implementation of a formal authorization policy design approachBAI, Y; VARADHARAJAN, V.Lecture notes in computer science. 1997, Vol 1270, pp 14-25, issn 0302-9743, isbn 3-540-63232-8Conference Paper

An approach to dynamic domain and type enforcementTIDSWELL, J; POTTER, J.Lecture notes in computer science. 1997, pp 26-37, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Deniable encryptionCANETTI, R; DWORK, C; NAOR, M et al.Lecture notes in computer science. 1997, pp 90-104, issn 0302-9743, isbn 3-540-63384-7Conference Paper

Design and analyses of two basic protocols for use in TTP-based key escrowBAO, F; DENG, R; HAN, Y et al.Lecture notes in computer science. 1997, pp 261-270, issn 0302-9743, isbn 3-540-63232-8Conference Paper

On key agreement and conference key agreementBOYD, C.Lecture notes in computer science. 1997, pp 294-302, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Tables de jurisprudence = Case laws boardRevue internationale du droit d'auteur. 1980, issn 0035-3515, 276 p., TABLESSerial Issue

Risques du cloud ouvrir le parapluieNUTTIN, Guillaume.Archimag (Vincennes). 2012, Num 251, pp 22-24, issn 0769-0975, 3 p.Article

Lossless data hiding : Fundamentals, algorithms and applicationsSHI, Yun Q; ZHICHENG NI; DEKUN ZOU et al.IEEE International Symposium on Circuits and Systems. 2004, pp 33-36, isbn 0-7803-8251-X, 4 p.Conference Paper

Enabling technology for the trading of MPEG-encoded videoDITTMANN, J; STEINMETZ, A.Lecture notes in computer science. 1997, pp 314-324, issn 0302-9743, isbn 3-540-63232-8Conference Paper

  • Page / 145