|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1928 occurrences of 929 keywords
|
|
|
Results
Found 2507 publication records. Showing 2507 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
14 | Nevena Stolba, Marko Banek, A Min Tjoa |
The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough |
DSO: Dependable Signing Overlay. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
P2P overlay, digital signing service, fault-tolerance, dependable, intrusion-tolerance |
14 | Ulrich Flegel, Joachim Biskup |
Requirements of Information Reductions for Cooperating Intrusion Detection Agents. |
ETRICS |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Erkut Sinan Ayla, Attila Ozgit |
An architecture for end-to-end and inter-domain trusted mail delivery service. |
ISCN |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Heiko Rossnagel, Tobias Scherner |
Secure Mobile Notifications of Civilians in Case of a Disaster. |
Communications and Multimedia Security |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Yiliang Han, Xiaoyuan Yang 0002, Ping Wei 0005, Yuming Wang, Yupu Hu |
ECGSC: Elliptic Curve Based Generalized Signcryption. |
UIC |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Dimitris K. Tasoulis, Elena C. Laskari, Gerasimos C. Meletiou, Michael N. Vrahatis |
Privacy Preserving Unsupervised Clustering over Vertically Partitioned Data. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Jong-Hyuk Roh, Seunghun Jin, Kyoon-Ha Lee |
Topology-Aware Key Management Scheme for Secure Overlay Multicast. |
ICOIN |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Stephen E. Fienberg, William J. Fulp, Aleksandra B. Slavkovic, Tracey A. Wrobel |
"Secure" Log-Linear and Logistic Regression Analysis of Distributed Databases. |
Privacy in Statistical Databases |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Zhiqiang Yang, Sheng Zhong 0002, Rebecca N. Wright |
Privacy-Preserving Queries on Encrypted Data. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Himanshu Khurana, Jin Heo, Meenal Pant |
From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Ashish Kundu, Elisa Bertino |
Secure Dissemination of XML Content Using Structure-based Routing. |
EDOC |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Youtao Zhang, Jun Yang 0002, Yongjing Lin, Lan Gao |
Architectural support for protecting user privacy on trusted processors. |
SIGARCH Comput. Archit. News |
2005 |
DBLP DOI BibTeX RDF |
|
14 | David Dagon, Wenke Lee, Richard J. Lipton |
Protecting Secret Data from Insider Attacks. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Jong-Hyuk Roh, Kyoon-Ha Lee |
Key Management for Secure Overlay Multicast. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
Key hierarchy, Key Management, Overlay Multicast, Secure Multicast |
14 | David J. Power, Mark Slaymaker, Eugenia A. Politou, Andrew C. Simpson |
Protecting sensitive patient data via query modification. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
security, medical databases, query modification |
14 | Chad D. Mano, Aaron Striegel |
Trusted Security Devices for Bandwidth Conservation in IPSec Environments. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Gérard Boudol |
On Typing Information Flow. |
ICTAC |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Tao Zhang 0037, Xiaotong Zhuang, Santosh Pande |
Building Intrusion-Tolerant Secure Software. |
CGO |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Josenildo Costa da Silva, Matthias Klusch |
Inference on Distributed Data Clustering. |
MLDM |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Johannes Gehrke |
Models and methods for privacy-preserving data publishing and analysis: invited tutorial. |
PODS |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Manhee Lee, Eun Jung Kim 0001, Mazin S. Yousif |
Security Enhancement in InfiniBand Architecture. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Fuwen Liu, Hartmut König |
A Token Based Key Distribution Protocol for Closed Group Meetings. |
Net-Con |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Fuwen Liu, Hartmut König |
Efficient Key Distribution for Closed Meetings in the Internet. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Yonghwan Lee, Eunmi Choi, Dugki Min |
An Authenticated Key Exchange Mechanism Using One-Time Shared Key. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
One-Time Shared key, Authentication, Key Exchange, Diffie- Hellman |
14 | Fuwen Liu, Hartmut König |
Secure and efficient key distribution for collaborative applications. |
CollaborateCom |
2005 |
DBLP DOI BibTeX RDF |
|
14 | G. Nacira, A. Abdelaziz |
Secured net-banking by θ-Vigenere in Syverson's protocol. |
AICCSA |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Jun Li 0001, Xun Kang |
mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Tom Walcott, Matt Bishop |
Traducement: A model for record security. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
traducement, Integrity, security policy, recordation |
14 | Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell |
KNOW Why your access was denied: regulating feedback for usable security. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
policy protection, security, privacy, usability, access control, feedback |
14 | Pawan Jadia, Anish Mathuria |
Efficient Secure Aggregation in Sensor Networks. |
HiPC |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Tawfiq S. M. Barhoom, Shen-sheng Zhang |
Trusted Exam Marks System at IUG Using XML-Signature. |
CIT |
2004 |
DBLP DOI BibTeX RDF |
XML Digital Signature, Multi-Signed Document, non-repudiation, XML security |
14 | Eduardo Fernández-Medina, Juan Trujillo 0001, Rodolfo Villarroel, Mario Piattini |
Extending UML for Designing Secure Data Warehouses. |
ER |
2004 |
DBLP DOI BibTeX RDF |
Secure data warehouses, OCL, multidimensional modeling, UML extension |
14 | Danny Hesse, Jana Dittmann, Andreas Lang 0001 |
Network Based Intrusion Detection to Detect Steganographic Communication Channels - On the Example of Images. |
EUROMICRO |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Luke McAven, Reihaneh Safavi-Naini, Moti Yung |
Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Seung-Hyun Seo, Sang-Ho Lee |
A Secure and Flexible Multi-signcryption Scheme. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
Signcryption, multi-signature |
14 | Juan José Salazar González, Philip Lowthian, Caroline Young, Giovanni Merola, Stephen Bond, David Brown |
Getting the Best Results in Controlled Rounding with the Least Effort. |
Privacy in Statistical Databases |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Silvia Polettini |
Maximum entropy simulation for microdata protection. |
Stat. Comput. |
2003 |
DBLP DOI BibTeX RDF |
business microdata, record re-identification, simulation, regression, maximum entropy, disclosure limitation |
14 | Farzin Deravi, Michael C. Fairhurst, Richard M. Guest, Nick Jeremy Mavity, Anne M. P. Canuto |
Intelligent agents for the management of complexity in multimodal biometrics. |
Univers. Access Inf. Soc. |
2003 |
DBLP DOI BibTeX RDF |
Universal access, Multimodal biometrics, Intelligent software agents |
14 | Stefano Chessa, Piero Maestrini |
Dependable and Secure Data Storage and Retrieval in Mobile, Wireless Networks. |
DSN |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Jian Yin 0002, Jean-Philippe Martin, Arun Venkataramani, Lorenzo Alvisi, Michael Dahlin |
Towards a Practical Approach to Confidential Byzantine Fault Tolerance. |
Future Directions in Distributed Computing |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Xavier Leroy |
Computer Security from a Programming Language and Static Analysis Perspective. |
ESOP |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Dong Jin Kwak, Sang-Jae Moon |
Efficient Distributed Signcryption Scheme as Group Signcryption. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
Public-key Cryptography, Group signature, Signcryption |
14 | Shoichi Sakane, Nobuo Okabe, Kenichi Kamada, Hiroshi Esaki |
Applying Kerberos to the Communication Environment for Information Appliances. |
SAINT Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Jian Yin 0002, Jean-Philippe Martin, Arun Venkataramani, Lorenzo Alvisi, Michael Dahlin |
Separating agreement from execution for byzantine fault tolerant services. |
SOSP |
2003 |
DBLP DOI BibTeX RDF |
confidentialiy, trustworthy systems, security, reliability, byzantine fault tolerance, state machine replication |
14 | Rogardt Heldal, Fredrik Hultin |
Bridging Model-Based and Language-Based Security. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Lantian Zheng, Stephen Chong, Andrew C. Myers, Steve Zdancewic |
Using Replication and Partitioning to Build Secure Distributed Systems. |
S&P |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Michael C. Fairhurst |
Document Identity, Authentication and Ownership: The Future of Biometric Verification. |
ICDAR |
2003 |
DBLP DOI BibTeX RDF |
|
14 | David Sands 0001 |
Probability and Timing: Challenges for Secure Programming. |
PAPM-PROBMIV |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Soichi Furuya, Kouichi Sakurai |
Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
real-or-random security, Stream cipher, provable security, message authentication, mode of operation |
14 | Refik Molva, Alain Pannetrat |
Network Security in the Multicast Framework. |
NETWORKING Tutorials |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Joonsang Baek, Ron Steinfeld, Yuliang Zheng 0001 |
Formal Proofs for the Security of Signcryption. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Domenico Cotroneo, Antonino Mazzeo, Luigi Romano, Stefano Russo 0001 |
Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications. |
OTM |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Steve Zdancewic, Andrew C. Myers |
Robust Declassification. |
CSFW |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Elena Dasseni, Vassilios S. Verykios, Ahmed K. Elmagarmid, Elisa Bertino |
Hiding Association Rules by Using Confidence and Support. |
Information Hiding |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Donald E. Brown, Louise F. Gunderson, Marc H. Evans |
Interactive Analysis of Computer Crimes. |
Computer |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Jay J. Wylie, Michael W. Bigrigg, John D. Strunk, Gregory R. Ganger, Han Kiliççöte, Pradeep K. Khosla |
Survivable Information Storage Systems. |
Computer |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Virgil D. Gligor, Matt Blaze, John Ioannidis |
Denial of Service - Panel Discussion. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Hartmut Pohl, Dietrich Cerny |
Enterprise Key Recovery: Vertrauenswürdige Server mit skalierbarer Sicherheit zur Archivierung von Konzelationsschlüsseln. |
Inform. Spektrum |
1999 |
DBLP DOI BibTeX RDF |
Sicherheitsarchitektur, Sicherheitsniveau, Skalierbarkeit, Unternehmen, Verschlüsselung, Electronic commerce, Key recovery, Sicherheit |
14 | Janice Singer, Norman G. Vinson |
Empirical Software Engineering Research Ethics. |
IEEE METRICS |
1999 |
DBLP DOI BibTeX RDF |
|
14 | Stefan Pütz, Roland Schmitz, Benno Tietz |
Secure Transport of Authentication Data in Third Generation Mobile Phone Networks. |
CQRE |
1999 |
DBLP DOI BibTeX RDF |
|
14 | David Rosenthal, Francis Fung |
A Test for Non-Disclosure in Security Level Translations. |
S&P |
1999 |
DBLP DOI BibTeX RDF |
|
14 | Jean-François Blanchette, Deborah G. Johnson |
Cryptography, data retention, and the panopticon society (abstract). |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
|
14 | Sumitra Mukherjee, George T. Duncan |
Disclosure Limitation through Additive Noise Data Masking: Analysis of Skewed Sensitive Data. |
HICSS (3) |
1997 |
DBLP DOI BibTeX RDF |
|
14 | Masayuki Abe, Eiichiro Fujisaki |
How to Date Blind Signatures. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
14 | Marjan Jurecic, Herbert Bunz |
Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
|
14 | Josep Domingo-Ferrer |
Untransferable Rights in a Client-Independent Server Environment. |
EUROCRYPT |
1993 |
DBLP DOI BibTeX RDF |
|
14 | Steven P. Reiss |
Practical Data-Swapping: The First Steps. |
ACM Trans. Database Syst. |
1984 |
DBLP DOI BibTeX RDF |
|
14 | Eric Affum, Marian Enchill |
Data Confidentiality in Machine Learning: Exploring Multivariate Regression and Its Application on Encrypted Medical Data. |
SN Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Jean Liénardy, Frédéric Lafitte |
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality. |
Inf. Process. Lett. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Iuon-Chang Lin, Yi-Hsuan Kuo, Ching-Chun Chang, Jui-Chuan Liu, Chin-Chen Chang 0001 |
Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality. |
Symmetry |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Ali Afraz, Mahdieh Montazeri, Mahin Eslami Shahrbabaki, Leila Ahmadian, Yunes Jahani |
The viewpoints of parents of children with mental disorders regarding the confidentiality and security of their children's information in the Iranian national electronic health record system. |
Int. J. Medical Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Elmehdi Illi, Marwa K. Qaraqe, Saud Althunibat, Abdullah Al-Hasanat, Moath Alsafasfeh, Marcus de Ree, Georgios Mantas, Jonathan Rodriguez 0001, Waqas Aman, Saif Al-Kuwari |
Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks. |
IEEE Commun. Surv. Tutorials |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Yuechen Tao, Bo Li 0001, Baochun Li |
On Atomicity and Confidentiality Across Blockchains Under Failures. |
IEEE Trans. Knowl. Data Eng. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Jonathan Evertz, Merlin Chlosta, Lea Schönherr, Thorsten Eisenhofer |
Whispers in the Machine: Confidentiality in LLM-integrated Systems. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Ingo Weber, Hendrik Linka, Daniel Mertens, Tamara Muryshkin, Heinrich Opgenoorth, Stefan Langer |
FhGenie: A Custom, Confidentiality-preserving Chat AI for Corporate and Scientific Use. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Qiuhao Wang, Xu Yang, Saiyu Qi, Yong Qi |
SecGraph: Towards SGX-based Efficient and Confidentiality-Preserving Graph Search. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Rongwu Xu, Zhixuan Fang |
Tempo: Confidentiality Preservation in Cloud-Based Neural Network Training. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Haodi Wang, Yu Guo 0003, Rongfang Bie, Xiaohua Jia |
Verifiable Arbitrary Queries With Zero Knowledge Confidentiality in Decentralized Storage. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Zhang Wenhua, Mohammad Kamrul Hasan, Norleyza Binti Jailani, Shayla Islam, Nurhizam Safie 0001, Hussain Mobarak Albarakati, Abeer Aljohani, Muhammad Attique Khan |
A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications. |
Comput. Hum. Behav. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Daxing Xu, Zhiqiang Chen, Hailun Wang |
Event-Triggered confidentiality fusion estimation against eavesdroppers in cyber-physical systems. |
EURASIP J. Adv. Signal Process. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Bernard McWeeney, Ilya Mudritskiy, Renaat Verbruggen |
Analysis of Payload Confidentiality for the IoT/ LPWAN Technology 'Lora'. |
ICISSP |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Shamiek Mangipudi, Pavel Chuprikov, Patrick Eugster, Malte Viering, Savvas Savvides |
Generalized Policy-Based Noninterference for Efficient Confidentiality-Preservation. |
Proc. ACM Program. Lang. |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Irfan Alam, Manoj Kumar |
A novel authentication protocol to ensure confidentiality among the Internet of Medical Things in covid-19 and future pandemic scenario. |
Internet Things |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Mostefa Kara, Abdelkader Laouid, Ahcène Bounceur, Mohammad Hammoudeh, Muath AlShaikh |
Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key. |
J. Inf. Sci. Eng. |
2023 |
DBLP BibTeX RDF |
|
14 | Públio M. Lima, Lilian K. Carvalho, Marcos V. Moreira |
Ensuring confidentiality of cyber-physical systems using event-based cryptography. |
Inf. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Trupti Shripad Tagare, Rajashree Narendra |
Confidentiality Enhancement Using Spread Spectrum Modulation Technique for Aggregated Data in Wireless Sensor Networks. |
J. Commun. |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Sandesh Achar, Nuruzzaman Faruqui, Anusha Bodepudi, Manjunath Reddy |
Confimizer: A Novel Algorithm to Optimize Cloud Resource by Confidentiality-Cost Trade-Off Using BiLSTM Network. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Maximilian Walter, Sebastian Hahner, Tomás Bures, Petr Hnetynka, Robert Heinrich, Ralf H. Reussner |
Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0. |
Autom. |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Bin Zhang, Bahbibi Rahmatullah, Shir Li Wang, A. A. Zaidan 0001, B. B. Zaidan, Penghui Liu |
A review of research on medical image confidentiality related technology coherent taxonomy, motivations, open challenges and recommendations. |
Multim. Tools Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Lal Said Khan, Majid Khan, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal |
A novel combination of information confidentiality and data hiding mechanism. |
Multim. Tools Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Amina Souyah |
Multimedia contents confidentiality preservation in constrained environments: a dynamic approach. |
Multim. Tools Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Amna Zafar, Ammar S. Alanazi, Majid Khan, Iqtadar Hussain |
New image confidentiality mechanism based on Arneodos chaotic dynamical system and quadratic congruential generator. |
Multim. Tools Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Florian Wohner |
Outsourced Computations Maintaining Confidentiality and Authenticity. |
ERCIM News |
2023 |
DBLP BibTeX RDF |
|
14 | Megan Schröder, Sam H. A. Muller, Eleni Vradi, Johanna Mielke, Yvonne M. F. Lim, Fabrice Couvelard, Menno Mostert, Stefan Koudstaal, Marinus J. C. Eijkemans, Christoph Gerlinger |
Sharing Medical Big Data While Preserving Patient Confidentiality in Innovative Medicines Initiative: A Summary and Case Report from BigData@Heart. |
Big Data |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Jahanpour Alipour, Yousef Mehdipour, Afsaneh Karimi, Mohadeseh Khorashadizadeh, Maryam Akbarpour |
Security, confidentiality, privacy and patient safety in the hospital information systems from the users' perspective: A cross-sectional study. |
Int. J. Medical Informatics |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Jegadeesan Subramani, Maria Azees, Arun Sekar Rajasekaran, Fadi M. Al-Turjman |
EPF-FDA: Efficient Pairing Free and Confidentiality Preserving Fog-Based Data Aggregation Scheme for WBANs. |
IEEE Instrum. Meas. Mag. |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Maria A. Poltavtseva, E. A. Rudnitskaya |
Confidentiality of Machine Learning Models. |
Autom. Control. Comput. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Lakshmanarao Namamula, Daniel Chaytor |
Enhancing the Confidentiality and Integrity of Uncertain Dynamic Data Workflows of B2C (Business-2-Consumers) Using Blockchain Technology. |
J. Uncertain Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Lionel Morel, Damien Couroussé, Thomas Hiscock |
Code Polymorphism Meets Code Encryption: Confidentiality and Side-Channel Protection of Software Components. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 2507 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|