kw.\*:("SECRECY")
Results 1 to 25 of 941
Selection :
FERNSCHREIBER 1000 CA, EINE INVESTITION FUER DIE SICHERHEIT. = 4 TELESCRIPTEURS 1000CA, INVESTISSEMENT DE SECURITESTRASSER F.1978; SIEMENS L.; DTSCH.; DA. 1978; VOL. 52; NO 4; PP. 239-242; ABS. ANGL.; BIBL. 1 REF.Article
ENERGING FEDERAL GOVERNMENT ACTIONS IN TELECOMMUNICATIONS PROTECTIONSKRAFT DE; WILK CK.1979; PROC. NATION. ELECTRON. CONF.; USA; DA. 1979; VOL. 33; PP. 314-317; BIBL. 6 REF.Conference Paper
On a Conjecture by Belfiore and Sole on Some LatticesERNVALL-HYTÖNEN, Anne-Maria.IEEE transactions on information theory. 2012, Vol 58, Num 9, pp 5950-5955, issn 0018-9448, 6 p.Article
MESSAGE REDUNDANCY REDUCTION BY MULTIPLE SUBSTITUTION: A PREPROCESSING SCHEME FOR SECURE COMMUNICATIONSLU SC; LEE LN.1979; COMSAT TECH. REV.; USA; DA. 1979; VOL. 9; NO 1; PP. 37-47; BIBL. 4 REF.Article
TRANSCRIPT OF AD HOC PRESENTATION.JOINET L.1978; IN: TRANSNATL. DATA REGUL. CONF.; BRUSSELS; 1978; UXBRIDGE; ONLINE CONFERENCES; DA. 1978; PP. 277-280Conference Paper
DATENBANK, DATENTRANSPARENZ UND DATENSCHUTZ = BANQUE DE DONNEES, ACCES AUX DONNEES ET PROTECTION DES DONNEES1972; NACHR. DOKUMENT.; DTSCH.; DA. 1972; VOL. 23; NO 4; PP. 148-153; ABS. ANGL.Serial Issue
LES STATISTIQUES ET LE SECRET: GARANTIE DE LA QUALITE DES RESULTATS ET DE LA LIBERTE ECONOMIQUE OU CONTRACTION ABUSIVE DE L'INFORMATION.GRENIER M.1979; REV. ENTREPR.; FRA; DA. 1979; NO 24; PP. 67-70Article
CONFIDENTIALITY OF INFORMATIONROOS H.1981; INF. MANAGE.; ISSN 0378-7206; NLD; DA. 1981; VOL. 4; NO 1; PP. 17-21; BIBL. 3 REF.Article
AN ADDRESSABLE SATELLITE ENCRYPTON SYSTEM FOR PREVENTING SIGNAL PIRACYHANAS OJ; DEN TOONDER P; PENNYPACKER F et al.1981; IEEE TRANS. CONSUM. ELECTRON.; ISSN 0098-3063; USA; DA. 1981; VOL. 27; NO 4; PP. 631-636Article
MASKING CIPHERSKAK SC.1980; IEE PROC., PART F; ISSN 0143-7070; GBR; DA. 1980; VOL. 127; NO 3; PP. 185-189; BIBL. 5 REF.Article
SUPPRESSION METHODOLOGY AND STATISTICAL DISCLOSURE CONTROLCOX LH.1980; J. AMER. STATIST. ASS.; USA; DA. 1980; VOL. 75; NO 370; PP. 377-385; BIBL. 10 REF.Article
THE FUTURE OF ORGANIZATIONAL PRIVACYHUFF AS.1979; INFORM. AND MANAG.; NLD; DA. 1979; VOL. 2; NO 5; PP. 197-201; BIBL. 9 REF.Article
ASPECTOS ALGEBRICOS DA SEGURANCA DA INFORMACAO. = ASPECTS ALGEBRIQUES DE LA SECURITE DE L'INFORMATIONEUCLIDES DA ROCHA VIEIRA A.1977; CI DA INFORM.; BRAS.; DA. 1977; VOL. 6; NO 2; PP. 59-68; ABS. ANGL.Article
DATA BANK CONTROL BEGINS IN SWEDENBLOOR J.1974; NEW SCIENTIST; G.B.; DA. 1974; VOL. 63; NO 915; PP. 718-720Article
EXERCICES SUR LES FANTOMESPOIVET DV.1981; REV. MED. PSYCHOSOM. PSYCHOL. MED.; ISSN 0397-930X; FRA; DA. 1981; VOL. 23; NO 2; PP. 117-124; ABS. ENGArticle
PRIVACY, SECURITY AND RESPONSIBILITY.BENJAMIN AA.1978; IN: TRANSNATL DATA REGUL. CONF.; BRUSSELS; 1978; UXBRIDGE; ONLINE CONFERENCES LTD; DA. 1978; PP. 1-8Conference Paper
SECURITY IN A STATISTICAL DATA BASEMOHAMMED INAM ULHAQ.1974; IN: INF. UTIL. PROC. 37TH. ASIS ANNU. MEET. XI; ATLANTA, GA.; 1974; WASHINGTON, D.C.; AM. SOC. INF. SCI.; DA. 1974; PP. 33-39; BIBL. 11REF.Conference Paper
2.226.688 (B) (74 13471). - 18AVRIL1974. PROCEDE ET PRODUIT D'INTERDICTION DE PHOTOCOPIEsdPatent
Donor gametes : anonymous or identified?DANIELS, Ken.Baillière's best practice & research. Clinical obstetrics & gynaecology. 2007, Vol 21, Num 1, pp 113-128, issn 1521-6934, 16 p.Article
COMMUNICATIONS SECURITY WITH ELECTRONIC MAILWOOD CC.1980; OFFICE; USA; DA. 1980; VOL. 92; NO 2; PP. 22-158; 4 P.Article
A SIMPLE AND EFFECTIVE PUBLIC-KEY CRYPTOSYSTEMLU SC; LEE LN.1979; COMSAT TECH. REV.; USA; DA. 1979; VOL. 9; NO 1; PP. 15-24; BIBL. 6 REF.Article
AN OVERVIEW OF THE EMERGING STATUTORY "RIGHT" OF INFORMATION PRIVACY.ANDREWS WH.1977; LAW COMPUTER TECHNOL.; U.S.A.; DA. 1977; VOL. 10; NO 4; PP. 82-94; BIBL. 1 REF.Serial Issue
DISCOVERING ILLICIT COMPUTER USAGE.BURKE EL.1976; IN: COMPUT. NEXT 5 YEARS. COMPCON 76. IEEE COMPUT. SOC. INT. CONF. 12; SAN FRANCISCO, CALIF.; 1976; LONG BEACH, CALIF.; INST. ELECTR. ELECTRON. ENG.; DA. 1976; PP. 178-180; BIBL. 10 REF.Conference Paper
A PUBLIC RIGHT TO KNOWMEDAWAR C.1976; ASLIB PROC.; G.B.; DA. 1976; VOL. 28; NO 2; PP. 69-75Article
Secure key-evolving protocols for discrete logarithm schemesLU, Cheng-Fen; SHIUHPYNG WINSTON SHIEH.Lecture notes in computer science. 2002, pp 300-309, issn 0302-9743, isbn 3-540-43224-8Conference Paper