Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Protection information")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 2881

  • Page / 116
Export

Selection :

  • and

Information integrityBECKER, H.Information age. 1984, Vol 6, Num 1, pp 3-13, issn 0261-4103Article

Security kernel design and implementation: an introductionAMES, S. R. JR; GASSER, M; SCHELL, R. R et al.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 14-22, issn 0018-9162Article

Protection du secret en information scientifique et technique = The secret protection in the scientific and technical information areaBOUJU, A.Le Progrès technique (Paris). 1989, Num 4, pp 39-41, issn 0397-8060, 3 p.Article

Inference controls for statistical databasesDENNING, D. E; SCHLÖRER, J.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 69-82, issn 0018-9162Article

Trapdoor knapsacks without superincreasing structureWILLETT, M.Information processing letters. 1983, Vol 17, Num 1, pp 7-11, issn 0020-0190Article

The real cost of software piracyCOOPER, C.Information age. 1984, Vol 6, Num 2, pp 98-102, issn 0261-4103Article

On the security of self-synchronous ciphersMILLAN, W; DAWSON, E.Lecture notes in computer science. 1997, pp 159-170, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Aids and medical confidentiality = SIDA et confidentialité médicaleGILLON, R.BMJ : BRITISH MEDICAL JOURNAL. 1987, Vol 294, pp 1675-1677, issn 0959-8138Article

The best available technologies for computer securityLANDWEHR, C. E.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 86-95, issn 0018-9162Article

Accès au dossier médicalDESCOINGS, R.LE JOURNAL DU SIDA. 1991, Num 25, pp 45-46Article

Gründe und Hintergründe der Verfassungsbeschwerde gegen das Volkszählungsgesetz 1983 = Raisons et raisons secrètes du recours constitutionnel contre la loi sur le recensement 1983WILD, G.Datenverarbeitung im Recht. Beiheft. 1985, Num 18, pp 28-32, issn 0722-4257Conference Paper

Access control with single-key-lockMENG-LIH WU; TAI-YANG HWANG.IEEE transactions on software engineering. 1984, Vol 10, Num 2, pp 185-191, issn 0098-5589Article

Scomp: a solution to the multilevel security problemFRAIM, L. J.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 26-34, issn 0018-9162Article

Security information flow in multidimensional arraysKRAMER, S. M; SIDHU, D. P.IEEE transactions on computers. 1983, Vol 32, Num 12, pp 1188-1191, issn 0018-9340Article

Time-memory tradeoff in exponentiating a fixed element of GF(qn) requiring a short reference to the memoryARAZI, B.IEE proceedings. Part E. Computers and digital techniques. 1984, Vol 131, Num 4, pp 148-150, issn 0143-7062Article

A distributed secure systemRUSHBY, J; RANDELL, B.Computer (Long Beach, CA). 1983, Vol 16, Num 7, pp 55-67, issn 0018-9162Article

Risques du cloud ouvrir le parapluieNUTTIN, Guillaume.Archimag (Vincennes). 2012, Num 251, pp 22-24, issn 0769-0975, 3 p.Article

Lossless data hiding : Fundamentals, algorithms and applicationsSHI, Yun Q; ZHICHENG NI; DEKUN ZOU et al.IEEE International Symposium on Circuits and Systems. 2004, pp 33-36, isbn 0-7803-8251-X, 4 p.Conference Paper

Enabling technology for the trading of MPEG-encoded videoDITTMANN, J; STEINMETZ, A.Lecture notes in computer science. 1997, pp 314-324, issn 0302-9743, isbn 3-540-63232-8Conference Paper

Visual authentication and identificationNAOR, M; PINKAS, B.Lecture notes in computer science. 1997, pp 322-336, issn 0302-9743, isbn 3-540-63384-7Conference Paper

How to detect tampering of dataKAK, S. C.Information processing letters. 1985, Vol 20, Num 2, pp 109-110, issn 0020-0190Article

Wahrung der Arbeitnehmerinteressen beim Einsatz von Personal-informationssystemen = Garantie des intérêts des personnels dans l'application des systèmes d'information sur les personnelsDÖLL, B. P.Datenverarbeitung im Recht. Beiheft. 1985, Num 18, pp 4-7, issn 0722-4257Conference Paper

Personalinformationssysteme im Unternehmen = Systèmes d'information sur le personnel dans l'entrepriseHENTSCHEL, B.Datenverarbeitung im Recht. Beiheft. 1985, Num 18, pp 15-22, issn 0722-4257Conference Paper

The library and information profession's response to data protectionDAVIES, J. E.Aslib proceedings. 1985, Vol 37, Num 8, pp 293-300, issn 0001-253XArticle

A note on the mathematics of public-key cryptosystemsMULLIN, A. A.Computers & security. 1984, Vol 3, Num 1, pp 45-47, issn 0167-4048Article

  • Page / 116