Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Security")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 15360

  • Page / 615
Export

Selection :

  • and

The birth of biometric security = La naissance de la sécurité biométriqueMAGUIRE, Mark.Anthropology today. 2009, Vol 25, Num 2, pp 9-14, issn 0268-540X, 6 p.Article

Contrat de travail et sécurité des parcours sur le marché du travail = Employment contract and security of career path in the labour marketBRUYERE, Mireille; LIZE, Laurence.Economies et sociétés (Paris). 2012, Vol 46, Num 6, pp 1129-1155, issn 0013-0567, 27 p.Article

Secrecy and National Security WhistleblowingELLSBERG, Daniel.Social research. 2010, Vol 77, Num 3, pp 773-804, issn 0037-783X, 32 p.Article

L'EXTENSION DES FICHIERS DE SÉCURITÉ PUBLIQUE : Traçabilité et réseaux = The Growth of Police RecordsPIAZZA, Pierre.Hermès (Paris. 1988). 2009, Num 53, issn 0767-9513, 69-74, 231 [7 p.]Article

Security, Profiling and EqualityBOU-HABIB, Paul.Ethical theory and moral practice. 2008, Vol 11, Num 2, pp 149-164, issn 1386-2820, 16 p.Article

La gouvernance sécuritaire dans les stations de sports d'hiver françaises = Safety policies in French winter sports resortsCOMELOUP, Jean; SOULE, Bastien.Espaces et sociétés. 2007, Num 128-129, issn 0014-0481, 135-150, 253-254, 258-259, 263-264 [22 p.]Article

Energy security and co-benefits of energy efficiency improvement in three Asian countriesSELVAKKUMARAN, Sujeetha; LIMMEECHOKCHAI, Bundit.Renewable & sustainable energy review. 2013, Vol 20, pp 491-503, issn 1364-0321, 13 p.Article

Factors influencing information security management in small- and medium-sized enterprises: A case study from TurkeyYILDIRIM, Ebru Yeniman; AKALP, Gizem; AYTAC, Serpil et al.International journal of information management. 2011, Vol 31, Num 4, pp 360-365, issn 0268-4012, 6 p.Article

Provably secure non-interactive key distribution based on pairingsDUPONT, Régis; ENGE, Andreas.Discrete applied mathematics. 2006, Vol 154, Num 2, pp 270-276, issn 0166-218X, 7 p.Conference Paper

Social Security: Strengthen Not DismantleSEIPEL, Michael M. O.Journal of sociology and social welfare. 2013, Vol 40, Num 3, pp 69-84, issn 0191-5096, 16 p.Article

Canadian Muslims, Islamophobia and national securityHANNIMAN, Wayne.International journal of law, crime and justice (Print). 2008, Vol 36, Num 4, pp 271-285, issn 1756-0616, 15 p.Article

Climate protection and China's energy security: Win-win or tradeoffGANG WU; LIU, Lan-Cui; HAN, Zhi-Yong et al.Applied energy. 2012, Vol 97, pp 157-163, issn 0306-2619, 7 p.Conference Paper

China's energy security: The perspective of energy usersMALAVIKA JAIN BAMBAWALE; SOVACOOL, Benjamin K.Applied energy. 2011, Vol 88, Num 5, pp 1949-1956, issn 0306-2619, 8 p.Article

India's energy security: A sample of business, government, civil society, and university perspectivesJAIN BAMBAWALE, Malavika; SOVACOOL, Benjamin K.Energy policy. 2011, Vol 39, Num 3, pp 1254-1264, issn 0301-4215, 11 p.Article

A situation awareness model for information security risk managementWEBB, Jeb; AHMAD, Atif; MAYNARD, Sean B et al.Computers & security. 2014, Vol 44, pp 1-15, issn 0167-4048, 15 p.Article

Nature and future of IT-security regulationRATAI, Balazs.International journal of technology transfer and commercialisation. 2007, Vol 6, Num 1, pp 64-75, issn 1470-6075, 12 p.Article

Information security management standards: Problems and solutionsSIPONEN, Mikko; WILLISON, Robert.Information & management. 2009, Vol 46, Num 5, pp 267-270, issn 0378-7206, 4 p.Article

A Proof of Security of Yao's Protocol for Two-Party ComputationLINDELL, Yehuda; PINKAS, Benny.Journal of cryptology. 2009, Vol 22, Num 2, pp 161-188, issn 0933-2790, 28 p.Article

Special Issue on Muslim Communities post 9/11 - citizenship, security and social justiceSPALEK, Basia.International journal of law, crime and justice (Print). 2008, Vol 36, Num 4, issn 1756-0616, 88 p.Serial Issue

Muslims : Citizenship, security and social justice in FranceBODY-GENDROT, Sophie.International journal of law, crime and justice (Print). 2008, Vol 36, Num 4, pp 247-256, issn 1756-0616, 10 p.Article

An electronic online bidding auction protocol with both security and efficiencyLIAW, Horng-Twu; JUANG, Wen-Shenq; LIN, Chi-Kai et al.Applied mathematics and computation. 2006, Vol 174, Num 2, pp 1487-1497, issn 0096-3003, 11 p.Article

Providing and consuming security in Canada's centuryCanadian historical review. 2000, Vol 81, Num 1, pp 2-28, issn 0008-3755Article

Key trees and the security of interval multicastGOUDA, Mohamed G; HUANG, Chin-Tser; ELNOZAHY, E. N et al.Proceedings of the ... International Conference on Distributed Computing Systems. 2002, pp 467-468, issn 1063-6927, isbn 0-7695-1585-1, 2 p.Conference Paper

Les tendances de l'opinion suisse en matière de politique de sécurité = The trends of Swiss opinion relating to security policyW.HALTINER, Karl; BENNETT, Jonathan; MATOUSEK, Elisabeth et al.Les Champs de Mars. 2001, Num 9, pp 37-48, issn 1253-1871, 14 p.Article

Energy security level assessment technologyAUGUTIS, Juozas; KRIKSTOLAITIS, Ricardas; MARTISAUSKAS, Linas et al.Applied energy. 2012, Vol 97, pp 143-149, issn 0306-2619, 7 p.Conference Paper

  • Page / 615