The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Confidentiality with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1985 (16) 1986-1990 (16) 1991-1994 (23) 1995-1996 (27) 1997 (20) 1998 (18) 1999 (29) 2000 (41) 2001 (40) 2002 (52) 2003 (91) 2004 (130) 2005 (176) 2006 (212) 2007 (199) 2008 (200) 2009 (167) 2010 (76) 2011 (81) 2012 (62) 2013 (59) 2014 (65) 2015 (61) 2016 (65) 2017 (58) 2018 (82) 2019 (91) 2020 (83) 2021 (93) 2022 (78) 2023 (82) 2024 (14)
Publication types (Num. hits)
article(774) incollection(28) inproceedings(1665) phdthesis(40)
Venues (Conferences, Journals, ...)
J. Priv. Confidentiality(181) CoRR(76) Privacy in Statistical Databas...(28) ARES(26) CSFW(23) ESORICS(22) DBSec(20) IACR Cryptol. ePrint Arch.(19) ACSAC(18) CCS(17) S&P(17) HICSS(16) AsiaCCS(15) ISCC(13) ITNG(12) IEEE Access(11) More (+10 of total 1048)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1928 occurrences of 929 keywords

Results
Found 2507 publication records. Showing 2507 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
14Nevena Stolba, Marko Banek, A Min Tjoa The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough DSO: Dependable Signing Overlay. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF P2P overlay, digital signing service, fault-tolerance, dependable, intrusion-tolerance
14Ulrich Flegel, Joachim Biskup Requirements of Information Reductions for Cooperating Intrusion Detection Agents. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Erkut Sinan Ayla, Attila Ozgit An architecture for end-to-end and inter-domain trusted mail delivery service. Search on Bibsonomy ISCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Heiko Rossnagel, Tobias Scherner Secure Mobile Notifications of Civilians in Case of a Disaster. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Yiliang Han, Xiaoyuan Yang 0002, Ping Wei 0005, Yuming Wang, Yupu Hu ECGSC: Elliptic Curve Based Generalized Signcryption. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Dimitris K. Tasoulis, Elena C. Laskari, Gerasimos C. Meletiou, Michael N. Vrahatis Privacy Preserving Unsupervised Clustering over Vertically Partitioned Data. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jong-Hyuk Roh, Seunghun Jin, Kyoon-Ha Lee Topology-Aware Key Management Scheme for Secure Overlay Multicast. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Stephen E. Fienberg, William J. Fulp, Aleksandra B. Slavkovic, Tracey A. Wrobel "Secure" Log-Linear and Logistic Regression Analysis of Distributed Databases. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Zhiqiang Yang, Sheng Zhong 0002, Rebecca N. Wright Privacy-Preserving Queries on Encrypted Data. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Himanshu Khurana, Jin Heo, Meenal Pant From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Ashish Kundu, Elisa Bertino Secure Dissemination of XML Content Using Structure-based Routing. Search on Bibsonomy EDOC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Youtao Zhang, Jun Yang 0002, Yongjing Lin, Lan Gao Architectural support for protecting user privacy on trusted processors. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14David Dagon, Wenke Lee, Richard J. Lipton Protecting Secret Data from Insider Attacks. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Jong-Hyuk Roh, Kyoon-Ha Lee Key Management for Secure Overlay Multicast. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Key hierarchy, Key Management, Overlay Multicast, Secure Multicast
14David J. Power, Mark Slaymaker, Eugenia A. Politou, Andrew C. Simpson Protecting sensitive patient data via query modification. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, medical databases, query modification
14Chad D. Mano, Aaron Striegel Trusted Security Devices for Bandwidth Conservation in IPSec Environments. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Gérard Boudol On Typing Information Flow. Search on Bibsonomy ICTAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Tao Zhang 0037, Xiaotong Zhuang, Santosh Pande Building Intrusion-Tolerant Secure Software. Search on Bibsonomy CGO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Josenildo Costa da Silva, Matthias Klusch Inference on Distributed Data Clustering. Search on Bibsonomy MLDM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Johannes Gehrke Models and methods for privacy-preserving data publishing and analysis: invited tutorial. Search on Bibsonomy PODS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Manhee Lee, Eun Jung Kim 0001, Mazin S. Yousif Security Enhancement in InfiniBand Architecture. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Fuwen Liu, Hartmut König A Token Based Key Distribution Protocol for Closed Group Meetings. Search on Bibsonomy Net-Con The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Fuwen Liu, Hartmut König Efficient Key Distribution for Closed Meetings in the Internet. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Yonghwan Lee, Eunmi Choi, Dugki Min An Authenticated Key Exchange Mechanism Using One-Time Shared Key. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF One-Time Shared key, Authentication, Key Exchange, Diffie- Hellman
14Fuwen Liu, Hartmut König Secure and efficient key distribution for collaborative applications. Search on Bibsonomy CollaborateCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14G. Nacira, A. Abdelaziz Secured net-banking by θ-Vigenere in Syverson's protocol. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Jun Li 0001, Xun Kang mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Tom Walcott, Matt Bishop Traducement: A model for record security. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF traducement, Integrity, security policy, recordation
14Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell KNOW Why your access was denied: regulating feedback for usable security. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF policy protection, security, privacy, usability, access control, feedback
14Pawan Jadia, Anish Mathuria Efficient Secure Aggregation in Sensor Networks. Search on Bibsonomy HiPC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Tawfiq S. M. Barhoom, Shen-sheng Zhang Trusted Exam Marks System at IUG Using XML-Signature. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XML Digital Signature, Multi-Signed Document, non-repudiation, XML security
14Eduardo Fernández-Medina, Juan Trujillo 0001, Rodolfo Villarroel, Mario Piattini Extending UML for Designing Secure Data Warehouses. Search on Bibsonomy ER The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Secure data warehouses, OCL, multidimensional modeling, UML extension
14Danny Hesse, Jana Dittmann, Andreas Lang 0001 Network Based Intrusion Detection to Detect Steganographic Communication Channels - On the Example of Images. Search on Bibsonomy EUROMICRO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Luke McAven, Reihaneh Safavi-Naini, Moti Yung Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Seung-Hyun Seo, Sang-Ho Lee A Secure and Flexible Multi-signcryption Scheme. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Signcryption, multi-signature
14Juan José Salazar González, Philip Lowthian, Caroline Young, Giovanni Merola, Stephen Bond, David Brown Getting the Best Results in Controlled Rounding with the Least Effort. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Silvia Polettini Maximum entropy simulation for microdata protection. Search on Bibsonomy Stat. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF business microdata, record re-identification, simulation, regression, maximum entropy, disclosure limitation
14Farzin Deravi, Michael C. Fairhurst, Richard M. Guest, Nick Jeremy Mavity, Anne M. P. Canuto Intelligent agents for the management of complexity in multimodal biometrics. Search on Bibsonomy Univers. Access Inf. Soc. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Universal access, Multimodal biometrics, Intelligent software agents
14Stefano Chessa, Piero Maestrini Dependable and Secure Data Storage and Retrieval in Mobile, Wireless Networks. Search on Bibsonomy DSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Jian Yin 0002, Jean-Philippe Martin, Arun Venkataramani, Lorenzo Alvisi, Michael Dahlin Towards a Practical Approach to Confidential Byzantine Fault Tolerance. Search on Bibsonomy Future Directions in Distributed Computing The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Xavier Leroy Computer Security from a Programming Language and Static Analysis Perspective. Search on Bibsonomy ESOP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Dong Jin Kwak, Sang-Jae Moon Efficient Distributed Signcryption Scheme as Group Signcryption. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Public-key Cryptography, Group signature, Signcryption
14Shoichi Sakane, Nobuo Okabe, Kenichi Kamada, Hiroshi Esaki Applying Kerberos to the Communication Environment for Information Appliances. Search on Bibsonomy SAINT Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Jian Yin 0002, Jean-Philippe Martin, Arun Venkataramani, Lorenzo Alvisi, Michael Dahlin Separating agreement from execution for byzantine fault tolerant services. Search on Bibsonomy SOSP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF confidentialiy, trustworthy systems, security, reliability, byzantine fault tolerance, state machine replication
14Rogardt Heldal, Fredrik Hultin Bridging Model-Based and Language-Based Security. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Lantian Zheng, Stephen Chong, Andrew C. Myers, Steve Zdancewic Using Replication and Partitioning to Build Secure Distributed Systems. Search on Bibsonomy S&P The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Michael C. Fairhurst Document Identity, Authentication and Ownership: The Future of Biometric Verification. Search on Bibsonomy ICDAR The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14David Sands 0001 Probability and Timing: Challenges for Secure Programming. Search on Bibsonomy PAPM-PROBMIV The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Soichi Furuya, Kouichi Sakurai Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF real-or-random security, Stream cipher, provable security, message authentication, mode of operation
14Refik Molva, Alain Pannetrat Network Security in the Multicast Framework. Search on Bibsonomy NETWORKING Tutorials The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Joonsang Baek, Ron Steinfeld, Yuliang Zheng 0001 Formal Proofs for the Security of Signcryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Domenico Cotroneo, Antonino Mazzeo, Luigi Romano, Stefano Russo 0001 Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications. Search on Bibsonomy OTM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Steve Zdancewic, Andrew C. Myers Robust Declassification. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Elena Dasseni, Vassilios S. Verykios, Ahmed K. Elmagarmid, Elisa Bertino Hiding Association Rules by Using Confidence and Support. Search on Bibsonomy Information Hiding The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Donald E. Brown, Louise F. Gunderson, Marc H. Evans Interactive Analysis of Computer Crimes. Search on Bibsonomy Computer The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Jay J. Wylie, Michael W. Bigrigg, John D. Strunk, Gregory R. Ganger, Han Kiliççöte, Pradeep K. Khosla Survivable Information Storage Systems. Search on Bibsonomy Computer The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Virgil D. Gligor, Matt Blaze, John Ioannidis Denial of Service - Panel Discussion. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Hartmut Pohl, Dietrich Cerny Enterprise Key Recovery: Vertrauenswürdige Server mit skalierbarer Sicherheit zur Archivierung von Konzelationsschlüsseln. Search on Bibsonomy Inform. Spektrum The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Sicherheitsarchitektur, Sicherheitsniveau, Skalierbarkeit, Unternehmen, Verschlüsselung, Electronic commerce, Key recovery, Sicherheit
14Janice Singer, Norman G. Vinson Empirical Software Engineering Research Ethics. Search on Bibsonomy IEEE METRICS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
14Stefan Pütz, Roland Schmitz, Benno Tietz Secure Transport of Authentication Data in Third Generation Mobile Phone Networks. Search on Bibsonomy CQRE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
14David Rosenthal, Francis Fung A Test for Non-Disclosure in Security Level Translations. Search on Bibsonomy S&P The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
14Jean-François Blanchette, Deborah G. Johnson Cryptography, data retention, and the panopticon society (abstract). Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
14Sumitra Mukherjee, George T. Duncan Disclosure Limitation through Additive Noise Data Masking: Analysis of Skewed Sensitive Data. Search on Bibsonomy HICSS (3) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
14Masayuki Abe, Eiichiro Fujisaki How to Date Blind Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
14Marjan Jurecic, Herbert Bunz Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
14Josep Domingo-Ferrer Untransferable Rights in a Client-Independent Server Environment. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
14Steven P. Reiss Practical Data-Swapping: The First Steps. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
14Eric Affum, Marian Enchill Data Confidentiality in Machine Learning: Exploring Multivariate Regression and Its Application on Encrypted Medical Data. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Jean Liénardy, Frédéric Lafitte A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Iuon-Chang Lin, Yi-Hsuan Kuo, Ching-Chun Chang, Jui-Chuan Liu, Chin-Chen Chang 0001 Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality. Search on Bibsonomy Symmetry The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Ali Afraz, Mahdieh Montazeri, Mahin Eslami Shahrbabaki, Leila Ahmadian, Yunes Jahani The viewpoints of parents of children with mental disorders regarding the confidentiality and security of their children's information in the Iranian national electronic health record system. Search on Bibsonomy Int. J. Medical Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Elmehdi Illi, Marwa K. Qaraqe, Saud Althunibat, Abdullah Al-Hasanat, Moath Alsafasfeh, Marcus de Ree, Georgios Mantas, Jonathan Rodriguez 0001, Waqas Aman, Saif Al-Kuwari Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks. Search on Bibsonomy IEEE Commun. Surv. Tutorials The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yuechen Tao, Bo Li 0001, Baochun Li On Atomicity and Confidentiality Across Blockchains Under Failures. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Jonathan Evertz, Merlin Chlosta, Lea Schönherr, Thorsten Eisenhofer Whispers in the Machine: Confidentiality in LLM-integrated Systems. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Ingo Weber, Hendrik Linka, Daniel Mertens, Tamara Muryshkin, Heinrich Opgenoorth, Stefan Langer FhGenie: A Custom, Confidentiality-preserving Chat AI for Corporate and Scientific Use. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Qiuhao Wang, Xu Yang, Saiyu Qi, Yong Qi SecGraph: Towards SGX-based Efficient and Confidentiality-Preserving Graph Search. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Rongwu Xu, Zhixuan Fang Tempo: Confidentiality Preservation in Cloud-Based Neural Network Training. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Haodi Wang, Yu Guo 0003, Rongfang Bie, Xiaohua Jia Verifiable Arbitrary Queries With Zero Knowledge Confidentiality in Decentralized Storage. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Zhang Wenhua, Mohammad Kamrul Hasan, Norleyza Binti Jailani, Shayla Islam, Nurhizam Safie 0001, Hussain Mobarak Albarakati, Abeer Aljohani, Muhammad Attique Khan A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Daxing Xu, Zhiqiang Chen, Hailun Wang Event-Triggered confidentiality fusion estimation against eavesdroppers in cyber-physical systems. Search on Bibsonomy EURASIP J. Adv. Signal Process. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Bernard McWeeney, Ilya Mudritskiy, Renaat Verbruggen Analysis of Payload Confidentiality for the IoT/ LPWAN Technology 'Lora'. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Shamiek Mangipudi, Pavel Chuprikov, Patrick Eugster, Malte Viering, Savvas Savvides Generalized Policy-Based Noninterference for Efficient Confidentiality-Preservation. Search on Bibsonomy Proc. ACM Program. Lang. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Irfan Alam, Manoj Kumar A novel authentication protocol to ensure confidentiality among the Internet of Medical Things in covid-19 and future pandemic scenario. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Mostefa Kara, Abdelkader Laouid, Ahcène Bounceur, Mohammad Hammoudeh, Muath AlShaikh Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2023 DBLP  BibTeX  RDF
14Públio M. Lima, Lilian K. Carvalho, Marcos V. Moreira Ensuring confidentiality of cyber-physical systems using event-based cryptography. Search on Bibsonomy Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Trupti Shripad Tagare, Rajashree Narendra Confidentiality Enhancement Using Spread Spectrum Modulation Technique for Aggregated Data in Wireless Sensor Networks. Search on Bibsonomy J. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Sandesh Achar, Nuruzzaman Faruqui, Anusha Bodepudi, Manjunath Reddy Confimizer: A Novel Algorithm to Optimize Cloud Resource by Confidentiality-Cost Trade-Off Using BiLSTM Network. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Maximilian Walter, Sebastian Hahner, Tomás Bures, Petr Hnetynka, Robert Heinrich, Ralf H. Reussner Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0. Search on Bibsonomy Autom. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Bin Zhang, Bahbibi Rahmatullah, Shir Li Wang, A. A. Zaidan 0001, B. B. Zaidan, Penghui Liu A review of research on medical image confidentiality related technology coherent taxonomy, motivations, open challenges and recommendations. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Lal Said Khan, Majid Khan, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal A novel combination of information confidentiality and data hiding mechanism. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Amina Souyah Multimedia contents confidentiality preservation in constrained environments: a dynamic approach. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Amna Zafar, Ammar S. Alanazi, Majid Khan, Iqtadar Hussain New image confidentiality mechanism based on Arneodos chaotic dynamical system and quadratic congruential generator. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Florian Wohner Outsourced Computations Maintaining Confidentiality and Authenticity. Search on Bibsonomy ERCIM News The full citation details ... 2023 DBLP  BibTeX  RDF
14Megan Schröder, Sam H. A. Muller, Eleni Vradi, Johanna Mielke, Yvonne M. F. Lim, Fabrice Couvelard, Menno Mostert, Stefan Koudstaal, Marinus J. C. Eijkemans, Christoph Gerlinger Sharing Medical Big Data While Preserving Patient Confidentiality in Innovative Medicines Initiative: A Summary and Case Report from BigData@Heart. Search on Bibsonomy Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Jahanpour Alipour, Yousef Mehdipour, Afsaneh Karimi, Mohadeseh Khorashadizadeh, Maryam Akbarpour Security, confidentiality, privacy and patient safety in the hospital information systems from the users' perspective: A cross-sectional study. Search on Bibsonomy Int. J. Medical Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Jegadeesan Subramani, Maria Azees, Arun Sekar Rajasekaran, Fadi M. Al-Turjman EPF-FDA: Efficient Pairing Free and Confidentiality Preserving Fog-Based Data Aggregation Scheme for WBANs. Search on Bibsonomy IEEE Instrum. Meas. Mag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Maria A. Poltavtseva, E. A. Rudnitskaya Confidentiality of Machine Learning Models. Search on Bibsonomy Autom. Control. Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Lakshmanarao Namamula, Daniel Chaytor Enhancing the Confidentiality and Integrity of Uncertain Dynamic Data Workflows of B2C (Business-2-Consumers) Using Blockchain Technology. Search on Bibsonomy J. Uncertain Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Lionel Morel, Damien Couroussé, Thomas Hiscock Code Polymorphism Meets Code Encryption: Confidentiality and Side-Channel Protection of Software Components. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 2507 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license