Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Protección información")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 2440

  • Page / 98
Export

Selection :

  • and

Protection du secret en information scientifique et technique = The secret protection in the scientific and technical information areaBOUJU, A.Le Progrès technique (Paris). 1989, Num 4, pp 39-41, issn 0397-8060, 3 p.Article

Accès au dossier médicalDESCOINGS, R.LE JOURNAL DU SIDA. 1991, Num 25, pp 45-46Article

On the security of self-synchronous ciphersMILLAN, W; DAWSON, E.Lecture notes in computer science. 1997, pp 159-170, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Aids and medical confidentiality = SIDA et confidentialité médicaleGILLON, R.BMJ : BRITISH MEDICAL JOURNAL. 1987, Vol 294, pp 1675-1677, issn 0959-8138Article

Prospectives for modelling trust in information securityJØSANG, A.Lecture notes in computer science. 1997, Vol 1270, pp 2-13, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Analysis and implementation of a formal authorization policy design approachBAI, Y; VARADHARAJAN, V.Lecture notes in computer science. 1997, Vol 1270, pp 14-25, issn 0302-9743, isbn 3-540-63232-8Conference Paper

An approach to dynamic domain and type enforcementTIDSWELL, J; POTTER, J.Lecture notes in computer science. 1997, pp 26-37, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Deniable encryptionCANETTI, R; DWORK, C; NAOR, M et al.Lecture notes in computer science. 1997, pp 90-104, issn 0302-9743, isbn 3-540-63384-7Conference Paper

Design and analyses of two basic protocols for use in TTP-based key escrowBAO, F; DENG, R; HAN, Y et al.Lecture notes in computer science. 1997, pp 261-270, issn 0302-9743, isbn 3-540-63232-8Conference Paper

On key agreement and conference key agreementBOYD, C.Lecture notes in computer science. 1997, pp 294-302, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Tables de jurisprudence = Case laws boardRevue internationale du droit d'auteur. 1980, issn 0035-3515, 276 p., TABLESSerial Issue

Risques du cloud ouvrir le parapluieNUTTIN, Guillaume.Archimag (Vincennes). 2012, Num 251, pp 22-24, issn 0769-0975, 3 p.Article

Lossless data hiding : Fundamentals, algorithms and applicationsSHI, Yun Q; ZHICHENG NI; DEKUN ZOU et al.IEEE International Symposium on Circuits and Systems. 2004, pp 33-36, isbn 0-7803-8251-X, 4 p.Conference Paper

Enabling technology for the trading of MPEG-encoded videoDITTMANN, J; STEINMETZ, A.Lecture notes in computer science. 1997, pp 314-324, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Visual authentication and identificationNAOR, M; PINKAS, B.Lecture notes in computer science. 1997, pp 322-336, issn 0302-9743, isbn 3-540-63384-7Conference Paper

Risky Business : The Importance of Data Audits for Content SecurityMARQUETTE POREMBA, Sue.EContent (Wilton, Conn.). 2008, Vol 31, Num 8, issn 1525-2531, 6, 32-36 [5 p.]Article

CryptoPalm : A cryptographic library for PalmOSALEXANDRIDIS, Georgios C; VOYIATZIS, Artemios G; SERPANOS, Dimitrios N et al.Lecture notes in computer science. 2005, pp 651-660, issn 0302-9743, isbn 3-540-29673-5, 1Vol, 10 p.Conference Paper

Critique to Burmester and Le attack to Sebé and Domingo-Ferrer fingerprinting schemeSEBE, F; DOMINGO-FERRER, J.Electronics Letters. 2004, Vol 40, Num 20, pp 1261-1262, issn 0013-5194, 2 p.Article

information security and privacy (Sydney, July 7-9, 1997)Varadharajan, Vijay; Pieprzyk, Josef; Yi Mu et al.Lecture notes in computer science. 1997, issn 0302-9743, isbn 3-540-63232-8, XI, 336 p, isbn 3-540-63232-8Conference Proceedings

Randomness-efficient Non-Interactive Zero KnowledgeDE SANTIS, A; DI CRESCENZO, G; PERSIANO, P et al.Lecture notes in computer science. 1997, pp 716-726, issn 0302-9743, isbn 3-540-63165-8Conference Paper

Security issues in asynchronous transfer modeVARADHARAJAN, V; SHANKARAN, R; HITCHENS, M et al.Lecture notes in computer science. 1997, pp 76-89, issn 0302-9743, isbn 3-540-63232-8Conference Paper

L'art d'exploiter les brevets des autres = The art of patent utilization of othersMAIRE, G.Le Progrès technique (Paris). 1989, Num 4, pp 33-38, issn 0397-8060, 6 p.Article

Positive alternatives: a report on an ACM panel on hackingLEE, J. A. N; SEGAL, G; STEIER, R et al.Communications of the ACM. 1986, Vol 29, Num 4, pp 297-299, issn 0001-0782Article

Embedding Considering Dependencies between PixelsFRANZ, Elke.Proceedings of SPIE, the International Society for Optical Engineering. 2008, pp 68191D.1-68191D.12, issn 0277-786X, isbn 978-0-8194-6991-5Conference Paper

Automatic verification of cryptographic protocols with SETHEOSCHUMANN, J.Lecture notes in computer science. 1997, pp 87-100, issn 0302-9743, isbn 3-540-63104-6Conference Paper

  • Page / 98