kw.\*:("Protection information")
Results 1 to 25 of 2881
Selection :
Information integrityBECKER, H.Information age. 1984, Vol 6, Num 1, pp 3-13, issn 0261-4103Article
Security kernel design and implementation: an introductionAMES, S. R. JR; GASSER, M; SCHELL, R. R et al.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 14-22, issn 0018-9162Article
Protection du secret en information scientifique et technique = The secret protection in the scientific and technical information areaBOUJU, A.Le Progrès technique (Paris). 1989, Num 4, pp 39-41, issn 0397-8060, 3 p.Article
Inference controls for statistical databasesDENNING, D. E; SCHLÖRER, J.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 69-82, issn 0018-9162Article
Trapdoor knapsacks without superincreasing structureWILLETT, M.Information processing letters. 1983, Vol 17, Num 1, pp 7-11, issn 0020-0190Article
The real cost of software piracyCOOPER, C.Information age. 1984, Vol 6, Num 2, pp 98-102, issn 0261-4103Article
On the security of self-synchronous ciphersMILLAN, W; DAWSON, E.Lecture notes in computer science. 1997, pp 159-170, issn 0302-9743, isbn 3-540-63232-8Conference Paper
Aids and medical confidentiality = SIDA et confidentialité médicaleGILLON, R.BMJ : BRITISH MEDICAL JOURNAL. 1987, Vol 294, pp 1675-1677, issn 0959-8138Article
The best available technologies for computer securityLANDWEHR, C. E.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 86-95, issn 0018-9162Article
Accès au dossier médicalDESCOINGS, R.LE JOURNAL DU SIDA. 1991, Num 25, pp 45-46Article
Gründe und Hintergründe der Verfassungsbeschwerde gegen das Volkszählungsgesetz 1983 = Raisons et raisons secrètes du recours constitutionnel contre la loi sur le recensement 1983WILD, G.Datenverarbeitung im Recht. Beiheft. 1985, Num 18, pp 28-32, issn 0722-4257Conference Paper
Access control with single-key-lockMENG-LIH WU; TAI-YANG HWANG.IEEE transactions on software engineering. 1984, Vol 10, Num 2, pp 185-191, issn 0098-5589Article
Scomp: a solution to the multilevel security problemFRAIM, L. J.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 26-34, issn 0018-9162Article
Security information flow in multidimensional arraysKRAMER, S. M; SIDHU, D. P.IEEE transactions on computers. 1983, Vol 32, Num 12, pp 1188-1191, issn 0018-9340Article
Time-memory tradeoff in exponentiating a fixed element of GF(qn) requiring a short reference to the memoryARAZI, B.IEE proceedings. Part E. Computers and digital techniques. 1984, Vol 131, Num 4, pp 148-150, issn 0143-7062Article
A distributed secure systemRUSHBY, J; RANDELL, B.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 55-67, issn 0018-9162Article
Risques du cloud ouvrir le parapluieNUTTIN, Guillaume.Archimag (Vincennes). 2012, Num 251, pp 22-24, issn 0769-0975, 3 p.Article
Lossless data hiding : Fundamentals, algorithms and applicationsSHI, Yun Q; ZHICHENG NI; DEKUN ZOU et al.IEEE International Symposium on Circuits and Systems. 2004, pp 33-36, isbn 0-7803-8251-X, 4 p.Conference Paper
Enabling technology for the trading of MPEG-encoded videoDITTMANN, J; STEINMETZ, A.Lecture notes in computer science. 1997, pp 314-324, issn 0302-9743, isbn 3-540-63232-8Conference Paper
Visual authentication and identificationNAOR, M; PINKAS, B.Lecture notes in computer science. 1997, pp 322-336, issn 0302-9743, isbn 3-540-63384-7Conference Paper
How to detect tampering of dataKAK, S. C.Information processing letters. 1985, Vol 20, Num 2, pp 109-110, issn 0020-0190Article
Wahrung der Arbeitnehmerinteressen beim Einsatz von Personal-informationssystemen = Garantie des intérêts des personnels dans l'application des systèmes d'information sur les personnelsDÖLL, B. P.Datenverarbeitung im Recht. Beiheft. 1985, Num 18, pp 4-7, issn 0722-4257Conference Paper
Personalinformationssysteme im Unternehmen = Systèmes d'information sur le personnel dans l'entrepriseHENTSCHEL, B.Datenverarbeitung im Recht. Beiheft. 1985, Num 18, pp 15-22, issn 0722-4257Conference Paper
The library and information profession's response to data protectionDAVIES, J. E.Aslib proceedings. 1985, Vol 37, Num 8, pp 293-300, issn 0001-253XArticle
A note on the mathematics of public-key cryptosystemsMULLIN, A. A.Computers & security. 1984, Vol 3, Num 1, pp 45-47, issn 0167-4048Article