Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Information protection")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 2850

  • Page / 114
Export

Selection :

  • and

Information integrityBECKER, H.Information age. 1984, Vol 6, Num 1, pp 3-13, issn 0261-4103Article

Security kernel design and implementation: an introductionAMES, S. R. JR; GASSER, M; SCHELL, R. R et al.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 14-22, issn 0018-9162Article

Protection du secret en information scientifique et technique = The secret protection in the scientific and technical information areaBOUJU, A.Le Progrès technique (Paris). 1989, Num 4, pp 39-41, issn 0397-8060, 3 p.Article

Inference controls for statistical databasesDENNING, D. E; SCHLÖRER, J.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 69-82, issn 0018-9162Article

Trapdoor knapsacks without superincreasing structureWILLETT, M.Information processing letters. 1983, Vol 17, Num 1, pp 7-11, issn 0020-0190Article

The real cost of software piracyCOOPER, C.Information age. 1984, Vol 6, Num 2, pp 98-102, issn 0261-4103Article

Accès au dossier médicalDESCOINGS, R.LE JOURNAL DU SIDA. 1991, Num 25, pp 45-46Article

Gründe und Hintergründe der Verfassungsbeschwerde gegen das Volkszählungsgesetz 1983 = Raisons et raisons secrètes du recours constitutionnel contre la loi sur le recensement 1983WILD, G.Datenverarbeitung im Recht. Beiheft. 1985, Num 18, pp 28-32, issn 0722-4257Conference Paper

Access control with single-key-lockMENG-LIH WU; TAI-YANG HWANG.IEEE transactions on software engineering. 1984, Vol 10, Num 2, pp 185-191, issn 0098-5589Article

On the security of self-synchronous ciphersMILLAN, W; DAWSON, E.Lecture notes in computer science. 1997, pp 159-170, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Aids and medical confidentiality = SIDA et confidentialité médicaleGILLON, R.BMJ : BRITISH MEDICAL JOURNAL. 1987, Vol 294, pp 1675-1677, issn 0959-8138Article

The best available technologies for computer securityLANDWEHR, C. E.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 86-95, issn 0018-9162Article

Scomp: a solution to the multilevel security problemFRAIM, L. J.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 26-34, issn 0018-9162Article

Security information flow in multidimensional arraysKRAMER, S. M; SIDHU, D. P.IEEE transactions on computers. 1983, Vol 32, Num 12, pp 1188-1191, issn 0018-9340Article

Time-memory tradeoff in exponentiating a fixed element of GF(qn) requiring a short reference to the memoryARAZI, B.IEE proceedings. Part E. Computers and digital techniques. 1984, Vol 131, Num 4, pp 148-150, issn 0143-7062Article

A distributed secure systemRUSHBY, J; RANDELL, B.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 55-67, issn 0018-9162Article

Prospectives for modelling trust in information securityJØSANG, A.Lecture notes in computer science. 1997, Vol 1270, pp 2-13, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Analysis and implementation of a formal authorization policy design approachBAI, Y; VARADHARAJAN, V.Lecture notes in computer science. 1997, Vol 1270, pp 14-25, issn 0302-9743, isbn 3-540-63232-8Conference Paper

An approach to dynamic domain and type enforcementTIDSWELL, J; POTTER, J.Lecture notes in computer science. 1997, pp 26-37, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Deniable encryptionCANETTI, R; DWORK, C; NAOR, M et al.Lecture notes in computer science. 1997, pp 90-104, issn 0302-9743, isbn 3-540-63384-7Conference Paper

Design and analyses of two basic protocols for use in TTP-based key escrowBAO, F; DENG, R; HAN, Y et al.Lecture notes in computer science. 1997, pp 261-270, issn 0302-9743, isbn 3-540-63232-8Conference Paper

On key agreement and conference key agreementBOYD, C.Lecture notes in computer science. 1997, pp 294-302, issn 0302-9743, isbn 3-540-63232-8Conference Paper

On improvements to password securityKAMALJIT SINGH.Operating systems review. 1985, Vol 19, Num 1, pp 53-60, issn 0163-5980Article

Cryptology and number sequences: pseudorandom, random, and perfectly randomPORTER, S.Computers & security. 1984, Vol 3, Num 1, pp 43-44, issn 0167-4048Article

A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystemSHAMIR, A.IEEE transactions on information theory. 1984, Vol 30, Num 5, pp 699-704, issn 0018-9448Article

  • Page / 114