Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Vida privada")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 2209

  • Page / 89
Export

Selection :

  • and

Informatique : comment protéger notre vie privée ? = Computer sciences: how to protect your private life ?LOINTIER, Pascal; LONGEON, Robert; PALLEZ, Christophe et al.Sciences (1969). 2004, Num 3, pp 23-38, issn 0151-0304, 16 p.Article

Privacy enhancing technologies (6th International workshop, PET 2006, Cambridge, UK, June 28-30, 2006)Danezis, George; Golle, Philippe.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-68790-4, 1Vol, VIII-429 p, isbn 3-540-68790-4Conference Proceedings

Privacy, Speech, and the LawMOORE, Adam D.Journal of information ethics. 2013, Vol 22, Num 1, pp 21-43, issn 1061-9321, 23 p.Article

Privacy and Security Security Risks in Next-Generation Emergency ServicesTSCHOFENIG, Hannes.Communications of the ACM. 2011, Vol 54, Num 11, pp 23-25, issn 0001-0782, 3 p.Article

Technical Perspective Programming with Differential PrivacyGEHRKE, Johannes.Communications of the ACM. 2010, Vol 53, Num 9, issn 0001-0782, p. 88Article

Privacy im World Wide WebSACKMANN, Stefan.Wirtschaftsinformatik. 2007, Vol 49, Num 1, pp 49-54, issn 0937-6429, 6 p.Article

Commentary : Legal effect of revealing private information in the US and abroad : Data communicationsSTEWART, Radcliff.Information systems management. 2007, Vol 24, Num 4, pp 343-344, issn 1058-0530, 2 p.Article

Privateers in Cyberspace: Aargh!LESK, Michael.IEEE security & privacy. 2013, Vol 11, Num 3, pp 81-84, issn 1540-7993, 4 p.Article

IEEE Security & Privacy: The Early YearsCYBENKO, George; CLARK-FISHER, Kathy.IEEE security & privacy. 2014, Vol 12, Num 3, pp 18-19, issn 1540-7993, 2 p.Conference Paper

The IEEE Symposium on Security and and Privacy, in RetrospectNEUMANN, Peter G; PEISERT, Sean; SCHAEFER, Marvin et al.IEEE security & privacy. 2014, Vol 12, Num 3, pp 15-17, issn 1540-7993, 3 p.Conference Paper

Sticky Policies: An Approach for Managing Privacy across Multiple Parties : Security and Privacy in an Online WorldPEARSON, Siani; CASASSA MONT, Marco.Computer (Long Beach, CA). 2011, Vol 44, Num 9, pp 60-68, issn 0018-9162, 9 p.Article

FOURTEEN REASONS PRIVACY MATTERS: A MULTIDISCIPLINARY REVIEW OF SCHOLARLY LITERATURE'MAGI, Trina J.The Library quarterly (Chicago, IL). 2011, Vol 81, Num 2, pp 187-209, issn 0024-2519, 23 p.Article

Communications Surveillance: Privacy and Security at RiskDIFFIE, Whitfield; LANDAU, Susan.Communications of the ACM. 2009, Vol 52, Num 11, pp 42-47, issn 0001-0782, 6 p.Article

Privacy-enhanced personalizationKOBSA, Alfred.Communications of the ACM. 2007, Vol 50, Num 8, pp 24-33, issn 0001-0782, 10 p.Article

Information security and privacy (Sydney, 13-15 July 2004)Wang, Huaxiong; Pieprzyk, Josef; Varadharajan, Vijay et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-22379-7, XII, 494 p, isbn 3-540-22379-7Conference Proceedings

Security and privacy in pervasive computing state of the art and future directionsHUTTER, Dieter; STEPHAN, Werner; ULLMANN, Markus et al.Lecture notes in computer science. 2004, pp 285-289, issn 0302-9743, isbn 3-540-20887-9, 5 p.Conference Paper

The life and death of Private Harry FarrWESSELY, Simon.Journal of the Royal Society of Medicine. 2006, Vol 99, Num 9, pp 440-443, issn 0141-0768, 4 p.Article

Model for types of privacy by privacy functionsPEDERSEN, D. M.Journal of environmental psychology. 1999, Vol 19, Num 4, pp 397-405, issn 0272-4944Article

Caller ID: Whose Privacy?LESK, Michael.IEEE security & privacy. 2014, Vol 12, Num 2, pp 77-79, issn 1540-7993, 3 p.Article

Privacy Requirements in an Age of Increased SharingBREAUX, Travis.IEEE software. 2014, Vol 31, Num 5, pp 24-27, issn 0740-7459, 4 p.Article

LA VIE PRIVÉE COMME OUTIL DE GOUVERNANCE: Surveiller et fidéliser le lien marchand = Privacy as a tool of governance: Disciplining customer loyaltyCOLL, Sami.Les Cahiers du numérique. 2014, Vol 10, Num 1, issn 1622-1494, 45-68, 159-160 [26 p.]Article

Press photographs: protecting the privacy of celebrities and their childrenFOSTER, Steve.Communications law (Haywards Heath). 2014, Vol 19, Num 3, pp 86-92, issn 1746-7616, 7 p.Article

Gone in 15 Seconds: The Limits of Privacy Transparency and ControlACQUISTI, Alessandro; ADJERID, Idris; BRANDIMARTE, Laura et al.IEEE security & privacy. 2013, Vol 11, Num 4, pp 72-74, issn 1540-7993, 3 p.Article

What Engineers Should Know about US Security and Privacy LawBREAUX, Travis; GORDON, David.IEEE security & privacy. 2013, Vol 11, Num 3, pp 72-76, issn 1540-7993, 5 p.Article

Security in pervasive computing (Boppard, 12-14 March 2003, revised papers)Hutter, Dieter; Muller, Günter; Stephan, Werner et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-20887-9, XI, 289 p, isbn 3-540-20887-9Conference Proceedings

  • Page / 89