Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("SECRECY")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 941

  • Page / 38
Export

Selection :

  • and

FERNSCHREIBER 1000 CA, EINE INVESTITION FUER DIE SICHERHEIT. = 4 TELESCRIPTEURS 1000CA, INVESTISSEMENT DE SECURITESTRASSER F.1978; SIEMENS L.; DTSCH.; DA. 1978; VOL. 52; NO 4; PP. 239-242; ABS. ANGL.; BIBL. 1 REF.Article

ENERGING FEDERAL GOVERNMENT ACTIONS IN TELECOMMUNICATIONS PROTECTIONSKRAFT DE; WILK CK.1979; PROC. NATION. ELECTRON. CONF.; USA; DA. 1979; VOL. 33; PP. 314-317; BIBL. 6 REF.Conference Paper

On a Conjecture by Belfiore and Sole on Some LatticesERNVALL-HYTÖNEN, Anne-Maria.IEEE transactions on information theory. 2012, Vol 58, Num 9, pp 5950-5955, issn 0018-9448, 6 p.Article

MESSAGE REDUNDANCY REDUCTION BY MULTIPLE SUBSTITUTION: A PREPROCESSING SCHEME FOR SECURE COMMUNICATIONSLU SC; LEE LN.1979; COMSAT TECH. REV.; USA; DA. 1979; VOL. 9; NO 1; PP. 37-47; BIBL. 4 REF.Article

TRANSCRIPT OF AD HOC PRESENTATION.JOINET L.1978; IN: TRANSNATL. DATA REGUL. CONF.; BRUSSELS; 1978; UXBRIDGE; ONLINE CONFERENCES; DA. 1978; PP. 277-280Conference Paper

DATENBANK, DATENTRANSPARENZ UND DATENSCHUTZ = BANQUE DE DONNEES, ACCES AUX DONNEES ET PROTECTION DES DONNEES1972; NACHR. DOKUMENT.; DTSCH.; DA. 1972; VOL. 23; NO 4; PP. 148-153; ABS. ANGL.Serial Issue

LES STATISTIQUES ET LE SECRET: GARANTIE DE LA QUALITE DES RESULTATS ET DE LA LIBERTE ECONOMIQUE OU CONTRACTION ABUSIVE DE L'INFORMATION.GRENIER M.1979; REV. ENTREPR.; FRA; DA. 1979; NO 24; PP. 67-70Article

CONFIDENTIALITY OF INFORMATIONROOS H.1981; INF. MANAGE.; ISSN 0378-7206; NLD; DA. 1981; VOL. 4; NO 1; PP. 17-21; BIBL. 3 REF.Article

AN ADDRESSABLE SATELLITE ENCRYPTON SYSTEM FOR PREVENTING SIGNAL PIRACYHANAS OJ; DEN TOONDER P; PENNYPACKER F et al.1981; IEEE TRANS. CONSUM. ELECTRON.; ISSN 0098-3063; USA; DA. 1981; VOL. 27; NO 4; PP. 631-636Article

MASKING CIPHERSKAK SC.1980; IEE PROC., PART F; ISSN 0143-7070; GBR; DA. 1980; VOL. 127; NO 3; PP. 185-189; BIBL. 5 REF.Article

SUPPRESSION METHODOLOGY AND STATISTICAL DISCLOSURE CONTROLCOX LH.1980; J. AMER. STATIST. ASS.; USA; DA. 1980; VOL. 75; NO 370; PP. 377-385; BIBL. 10 REF.Article

THE FUTURE OF ORGANIZATIONAL PRIVACYHUFF AS.1979; INFORM. AND MANAG.; NLD; DA. 1979; VOL. 2; NO 5; PP. 197-201; BIBL. 9 REF.Article

ASPECTOS ALGEBRICOS DA SEGURANCA DA INFORMACAO. = ASPECTS ALGEBRIQUES DE LA SECURITE DE L'INFORMATIONEUCLIDES DA ROCHA VIEIRA A.1977; CI DA INFORM.; BRAS.; DA. 1977; VOL. 6; NO 2; PP. 59-68; ABS. ANGL.Article

DATA BANK CONTROL BEGINS IN SWEDENBLOOR J.1974; NEW SCIENTIST; G.B.; DA. 1974; VOL. 63; NO 915; PP. 718-720Article

EXERCICES SUR LES FANTOMESPOIVET DV.1981; REV. MED. PSYCHOSOM. PSYCHOL. MED.; ISSN 0397-930X; FRA; DA. 1981; VOL. 23; NO 2; PP. 117-124; ABS. ENGArticle

PRIVACY, SECURITY AND RESPONSIBILITY.BENJAMIN AA.1978; IN: TRANSNATL DATA REGUL. CONF.; BRUSSELS; 1978; UXBRIDGE; ONLINE CONFERENCES LTD; DA. 1978; PP. 1-8Conference Paper

SECURITY IN A STATISTICAL DATA BASEMOHAMMED INAM ULHAQ.1974; IN: INF. UTIL. PROC. 37TH. ASIS ANNU. MEET. XI; ATLANTA, GA.; 1974; WASHINGTON, D.C.; AM. SOC. INF. SCI.; DA. 1974; PP. 33-39; BIBL. 11REF.Conference Paper

2.226.688 (B) (74 13471). - 18AVRIL1974. PROCEDE ET PRODUIT D'INTERDICTION DE PHOTOCOPIEsdPatent

Donor gametes : anonymous or identified?DANIELS, Ken.Baillière's best practice & research. Clinical obstetrics & gynaecology. 2007, Vol 21, Num 1, pp 113-128, issn 1521-6934, 16 p.Article

COMMUNICATIONS SECURITY WITH ELECTRONIC MAILWOOD CC.1980; OFFICE; USA; DA. 1980; VOL. 92; NO 2; PP. 22-158; 4 P.Article

A SIMPLE AND EFFECTIVE PUBLIC-KEY CRYPTOSYSTEMLU SC; LEE LN.1979; COMSAT TECH. REV.; USA; DA. 1979; VOL. 9; NO 1; PP. 15-24; BIBL. 6 REF.Article

AN OVERVIEW OF THE EMERGING STATUTORY "RIGHT" OF INFORMATION PRIVACY.ANDREWS WH.1977; LAW COMPUTER TECHNOL.; U.S.A.; DA. 1977; VOL. 10; NO 4; PP. 82-94; BIBL. 1 REF.Serial Issue

DISCOVERING ILLICIT COMPUTER USAGE.BURKE EL.1976; IN: COMPUT. NEXT 5 YEARS. COMPCON 76. IEEE COMPUT. SOC. INT. CONF. 12; SAN FRANCISCO, CALIF.; 1976; LONG BEACH, CALIF.; INST. ELECTR. ELECTRON. ENG.; DA. 1976; PP. 178-180; BIBL. 10 REF.Conference Paper

A PUBLIC RIGHT TO KNOWMEDAWAR C.1976; ASLIB PROC.; G.B.; DA. 1976; VOL. 28; NO 2; PP. 69-75Article

Secure key-evolving protocols for discrete logarithm schemesLU, Cheng-Fen; SHIUHPYNG WINSTON SHIEH.Lecture notes in computer science. 2002, pp 300-309, issn 0302-9743, isbn 3-540-43224-8Conference Paper

  • Page / 38