Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Intégrité donnée")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 392

  • Page / 16
Export

Selection :

  • and

Technical Perspective : Safeguarding Online Information against Failures and AttacksLISKOV, Barbara.Communications of the ACM. 2008, Vol 51, Num 11, pp 85-85, issn 0001-0782, 1 p.Article

Qualité des entrepôts de données : Conception et manipulationFEKI, Jamel; BEN-ABDALLAH, Hanene.Ingénierie des systèmes d'information (2001). 2011, Vol 16, Num 6, issn 1633-1311, 158 p.Serial Issue

Guaranteeing the Integrity of Data by Using a Digital SignatureYUCHT, Eliezer; ENGELBERG, Shlomo; COHEN, Benjamin et al.IEEE instrumentation & measurement magazine. 2009, Vol 12, Num 5, pp 45-49, issn 1094-6969, 5 p.Article

Dynamic Steganography Adds Additional Data SecurityZAVALETA, Richard; WUNNAVA, Subbarao.IEEE Southeastcon. 2004, pp 390-394, isbn 0-7803-8367-2, 1Vol, 5 p.Conference Paper

An efficient dynamic and distributed cryptographic accumulatorGOODRICH, Michael T; TAMASSIA, Roberto; HASI, Jasminka et al.Lecture notes in computer science. 2002, pp 372-388, issn 0302-9743, isbn 3-540-44270-7, 17 p.Conference Paper

Perspectives on the CAP Theorem : THE GROWING IMPACT OF THE CAP THEOREMGILBERT, Seth; LYNCH, Nancy A.Computer (Long Beach, CA). 2012, Vol 45, Num 2, pp 30-36, issn 0018-9162, 7 p.Article

A coding approach for detection of tampering in write-once optical disksBLAUM, M; BRUCK, J; RUBIN, K et al.IEEE transactions on computers. 1998, Vol 47, Num 1, pp 120-125, issn 0018-9340Article

Estimating the Principal of an Application's Technical Debt : TECHNICAL DEBTCURTIS, Bill; SAPPIDI, Jay; SZYNKARSKI, Alexandra et al.IEEE software. 2012, Vol 29, Num 6, pp 34-42, issn 0740-7459, 9 p.Article

Security protocols for biometrics-based cardholder authentication in smartcardsRILA, Luciano; MITCHELL, Chris J.Lecture notes in computer science. 2003, pp 254-264, issn 0302-9743, isbn 3-540-20208-0, 11 p.Conference Paper

Consistency Tradeoffs in Modern Distributed Database System Design : THE GROWING IMPACT OF THE CAP THEOREMABADI, Daniel J.Computer (Long Beach, CA). 2012, Vol 45, Num 2, pp 37-42, issn 0018-9162, 6 p.Article

Efficient Consistency Achievement of Federated Identity and Access Management Based on a Novel Self-Adaptable ApproachCHA, Shi-Cho; CHANG, Hsiang-Meng.IEICE transactions on information and systems. 2012, Vol 95, Num 2, pp 577-587, issn 0916-8532, 11 p.Article

Definition of primary flight referenceNEWMAN, R. L.Journal of aircraft. 1998, Vol 35, Num 3, pp 497-500, issn 0021-8669Article

Analysing the impact of adding integrity constraints to information systemsEMBURY, Suzanne M; JIANHUA SHAO.Lecture notes in computer science. 2003, pp 175-192, issn 0302-9743, isbn 3-540-40442-2, 18 p.Conference Paper

Group Diffie-Hellman key exchange secure against dictionary attacksBRESSON, Emmanuel; CHEVASSUT, Olivier; POINTCHEVAL, David et al.Lecture notes in computer science. 2002, pp 497-514, issn 0302-9743, isbn 3-540-00171-9, 18 p.Conference Paper

Overcoming CAP with Consistent Soft-State Replication : THE GROWING IMPACT OF THE CAP THEOREMBIRMAN, Kenneth P; FREEDMAN, Daniel A; QI HUANG et al.Computer (Long Beach, CA). 2012, Vol 45, Num 2, pp 50-57, issn 0018-9162, 8 p.Article

Meeting the challenge of high quality data entry : a free double-entry systemBARCHARD, Kimberly A; PACE, Larry A.International journal of services and standards (Print). 2008, Vol 4, Num 4, pp 359-376, issn 1740-8849, 18 p.Article

Ensuring compliance with 21 CFR Part 11FELICIANO-WELPE, Diane; KATZER, David.Heating/piping/air conditioning engineering. 2003, Vol jul, pp 60-64, issn 1527-4055, 5 p., SUPArticle

Eternal War in MemorySZEKERES, László; PAYER, Mathias; LENX TAO WEI et al.IEEE security & privacy. 2014, Vol 12, Num 3, pp 45-53, issn 1540-7993, 9 p.Conference Paper

Example Labeling Difficulty within Repeated LabelingSHENG, Victor S.Data mining. International conferenceWorldComp'2011. 2011, pp 301-307, isbn 1-60132-168-6, 7 p.Conference Paper

Some Methods of Data Improvement in EISVARGA, Mladen; CURKO, Katarina.International Conference on Information Technology Interfaces. 2010, pp 211-216, isbn 978-953-7138-18-9, 1Vol, 6 p.Conference Paper

Diagnosis of dyslexia with low quality data with genetic fuzzy systemsPALACIOS, Ana M; SANCHEZ, Luciano; COUSO, Inés et al.International journal of approximate reasoning. 2010, Vol 51, Num 8, pp 993-1009, issn 0888-613X, 17 p.Article

Design of secure mobile application on cellular phonesKURODA, Masahiro; YOSHIDA, Mariko; SAKURAI, Shoji et al.Lecture notes in computer science. 2002, pp 17-24, issn 0302-9743, isbn 3-540-00262-6, 8 p.Conference Paper

Discovery and application of check constraints in DB2GRYZ, Jarek; SCHIEFER, Berni; JIAN ZHENG et al.Data engineering. 2001, pp Vol.1.557-Vol.1.564, issn 1063-6382, isbn 0-7695-1001-9, 2VolConference Paper

MA 2001 : mobile agents (Atlanta GA, 2-4 December 2001)Picco, Gian Pietro.Lecture notes in computer science. 2001, issn 0302-9743, isbn 3-540-42952-2, XIII, 275 p, isbn 3-540-42952-2Conference Proceedings

Secure books : Protecting the distribution of knowledgeANDERSON, R. J; MATYAS, V. JR; PETITCOLAS, F. A et al.Lecture notes in computer science. 1998, Vol 1361, pp 1-11, issn 0302-9743, isbn 3-540-64040-1Conference Paper

  • Page / 16