The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for protection with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1968 (18) 1969-1973 (23) 1974-1975 (29) 1976 (30) 1977 (21) 1978 (25) 1979 (21) 1980 (15) 1981 (17) 1982 (23) 1983 (18) 1984 (27) 1985 (23) 1986 (23) 1987 (27) 1988 (33) 1989 (44) 1990 (36) 1991 (91) 1992 (55) 1993 (68) 1994 (59) 1995 (65) 1996 (96) 1997 (118) 1998 (131) 1999 (168) 2000 (232) 2001 (339) 2002 (361) 2003 (639) 2004 (843) 2005 (1008) 2006 (1107) 2007 (1175) 2008 (1164) 2009 (987) 2010 (662) 2011 (701) 2012 (807) 2013 (856) 2014 (912) 2015 (802) 2016 (966) 2017 (881) 2018 (1037) 2019 (1164) 2020 (1157) 2021 (1209) 2022 (1166) 2023 (1181) 2024 (253)
Publication types (Num. hits)
article(7850) book(33) data(8) incollection(362) inproceedings(14243) phdthesis(341) proceedings(76)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7090 occurrences of 2819 keywords

Results
Found 22916 publication records. Showing 22913 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
24Katja De Vries Avatars Out of Control: Gazira Babeli, Pose Balls and "Rape" in Second Life. Search on Bibsonomy Computers, Privacy and Data Protection The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Wolter Pieters Security and Privacy in the Clouds: A Bird's Eye View. Search on Bibsonomy Computers, Privacy and Data Protection The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Fadhila Mazanderani, Ian Brown Privacy as a Practice: Exploring the Relational and Spatial Dynamics of HIV-Related Information Seeking. Search on Bibsonomy Computers, Privacy and Data Protection The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Gerrit Hornung, Ralf Bendrath, Andreas Pfitzmann Surveillance in Germany: Strategies and Counterstrategies. Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Seda F. Gürses, Bettina Berendt PETs in the Surveillance Society: A Critical Review of the Potentials and Limitations of the Privacy as Confidentiality Paradigm. Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Gloria González Fuster, Serge Gutwirth, Paul de Hert From Unsolicited Communications to Unsolicited Adjustments. Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Wolter Pieters Verifiability of Electronic Voting: Between Confidence and Trust. Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Tal Z. Zarsky Responding to the Inevitable Outcomes of Profiling: Recent Lessons from Consumer Financial Markets, and Beyond. Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Gordon Nardell Levelling up: Data Privacy and the European Court of Human Rights. Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Serge Gutwirth, Mireille Hildebrandt Some Caveats on Profiling. Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Bart Jacobs 0001 Architecture Is Politics: Security and Privacy Issues in Transport and Beyond. Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Walter Peissl Information Privacy in Europe from a TA Perspective. Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Franck Dumortier Facebook and Risks of "De-contextualization" of Information. Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Sylvia Mercado Kierkegaard DNA Data Exchange: Germany Flexed Its Muscle. Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Johann Cas Privacy and Security: A Brief Synopsis of the Results of the European TA-Project PRISE. Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Melanie Volkamer Electronic Voting in Germany. Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Daniel Le Métayer Privacy by Design: A Matter of Choice. Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Rosa Barcelo, Peter Traung The Emerging European Union Security Breach Legal Framework: The 2002/58 ePrivacy Directive and Beyond. Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Rocco Bellanova The Case of the 2008 German-US Agreement on Data Exchange: An Opportunity to Reshape Power Relations? Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Krzysztof Trojanowski, Slawomir T. Wierzchon On Some Properties of the B-Cell Algorithm in Non-Stationary Environments. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Khalid Saeed 0001, Marcin Adamski Signature Verification by View-Based Feature Extractor and DTW Classifier. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Krzysztof Chmiel On Intermediate Evaluation of Block Ciphers. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Krzysztof Bucholc, Ewa Idzikowska Multiple Error Detection in Substitution Blocks for Block Ciphers. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Ewa Adamus, Andrzej Piegat Predicting Incomplete Data on the Basis of Non Symmetric Similarity Relation. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Anna Borowska The Grouping of Valuations in Probabilistic Algorithms. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Karina Murawko-Wisniewska, Andrzej Piegat Singleton Representation of Fuzzy Set for Computing Fuzzy Model Response for Fuzzy Inputs. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Toru Yamaguchi, Eri Sato Humatronics and RT-Middleware. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Tindara Addabbo, Gisella Facchinetti, Giovanni Mastroleo, Giovanni Solinas A Fuzzy Way to Measure Quality of Work in a Multidimensional Perspective. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Matthieu Voiry, Véronique Amarger, Kurosh Madani, François Houbre Design and Prototyping of an Industrial Fault Clustering System Combining Image Processing and Artificial Neural Network Based Approaches. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Georgy Kukharev, Edward Pólrolniczak Increasing Performance of Fingerprint Recognition Systems Using Reconstruction of Ridge Lines Methods. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Yoshiharu Yoshida, Toru Yamaguchi, Eri Sato, Toshihiro Shibano Networked Robots Personal Tastes Acquisition and Sharing. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Wlodzimierz Bielecki, Maciej Poliwoda Hyperplane Method Implementation for Loops Parallelization in the .NET Environment. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Piotr Kotlarz, Zbigniew Kotulski Neural Network as a Programmable Block Cipher. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Khalid Saeed 0001, Marek Tabedzki New Experiments on Word Recognition Without Segmentation. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Dariusz Czerski, Krzysztof Ciesielski, Michal Draminski, Mieczyslaw A. Klopotek, Slawomir T. Wierzchon Inverted Lists Compression Using Contextual Information. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Adam Szustalewicz Minimal Coverage of Investigated Object when Seeking for its Fractal Dimension. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Ryszard S. Choras JPEG 2000 Image Coding Standard - A Review and Applications. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Marcin Plucinski, Marcin Korzen Application of the Peano Curve for the Robot Trajectory Generating. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Eugeniusz Zieniuk, Agnieszka Boltuc, Andrzej Kuzelewski Algorithms of Identification of Multi-connected BoundaryGeometry and Material Parameters in Problems Described by Navier-Lame Equation Using the PIES. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Amine Chohra, Nadia Kanaoui, Kurosh Madani Hybrid Intelligent Diagnosis Approaches: Analysis and Comparison under a Biomedicine Application. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Yuji Kinoshita, Koichi Kashiwagi, Yoshinobu Higami, Shin-ya Kobayashi Development of Concealing the Purpose of Processing for Programs in a Distributed Computing Environment. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Akira Imada When a Family of Iris Flower is Normal, Then are Others Abnormal? Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Jerzy Pejas, Michal Zawalich Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Orest Popov, Tatiana Tretyakova, Anna Barcz, Piotr Piela Methodology of Developing Computer-Based Training Systems for Operators of Dynamic Objects. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Walenty Oniszczuk Analysis of an Open Linked Series Three-station Network with Blocking. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Wlodzimierz Bielecki, Dariusz Burak Parallelization Method of Encryption Algorithms. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24A. Yu. Dorogov Methods of Designing and System Analysis of Fast Neural Networks and Linear Tunable Transformations. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Michihiko Kudo, Koichi Kashiwagi, Yoshinobu Higami, Shin-ya Kobayashi Reliability of Node Information on Autonomous Load Distribution Method. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Dariusz Frejlichowski, Alji Maow Application of Improved Projection Method to Binary Images. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Stanislaw Bylka, Ryszarda Rempala On a Nonlinear Production-Inventory Problem. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Anna Witkowska, Roman Smierzchalski Tuning of Parameters Backstepping Ship Course Controller by Genetic Algorithm. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Izabela Rejer Reduction of Rules of a Fuzzy Model with a Chain Model. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Koichi Kashiwagi, Yoshinobu Higami, Shin-ya Kobayashi A Consideration of Processor Utilization on Multi-Processor System. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Anna Grocholewska-Czurylo Strong Boolean Functions with Compact ANF Representation. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Wojciech Mazurczyk, Zbigniew Kotulski Covert Channel for Improving VoIP Security. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Larisa Dobryakova, Orest Popov Embedding of Stego-Messages in Monochrome Images on the Base of Rank Filtering. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Michal Choras Image Pre-classification for Biometrics Identification Systems. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Adrian Skrobek, Pawel Sukiennik Cryptanalysis of Chaotic Product Cipher. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Anna Bartkowiak, Niki Evelpidou, Andreas Vassilopoulos Visualization of Five Erosion Risk Classes using Kernel Discriminants. Search on Bibsonomy Advances in Information Processing and Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati, Marco Viviani 0001 Measuring Inference Exposure in Outsourced Encrypted Databases. Search on Bibsonomy Quality of Protection The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Andy Ozment Software Security Growth Modeling: Examining Vulnerabilities with Reliability Growth Models. Search on Bibsonomy Quality of Protection The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Iliano Cervesato Towards a Notion of Quantitative Security Analysis. Search on Bibsonomy Quality of Protection The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Judith E. Y. Rossebeø, Mass Soldal Lund, Knut Eilif Husa, Atle Refsdal A Conceptual Model for Service Availability. Search on Bibsonomy Quality of Protection The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Eric Alata, Marc Dacier, Yves Deswarte, M. Kaaâniche, K. Kortchinsky, Vincent Nicomette, Van-Hau Pham, Fabien Pouget Collection and analysis of attack data based on honeypots deployed on the Internet. Search on Bibsonomy Quality of Protection The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Günter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner Service-oriented Assurance - Comprehensive Security by Explicit Assurances. Search on Bibsonomy Quality of Protection The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak A SLA evaluation methodology in Service Oriented Architectures. Search on Bibsonomy Quality of Protection The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Davide Balzarotti, Mattia Monga, Sabrina Sicari Assessing the risk of using vulnerable components. Search on Bibsonomy Quality of Protection The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Reine Lundin, Stefan Lindskog, Anna Brunström, Simone Fischer-Hübner Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages. Search on Bibsonomy Quality of Protection The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Miles A. McQueen, Wayne F. Boyer, Mark A. Flynn, George A. Beitel Time-to-Compromise Model for Cyber Risk Reduction Estimation. Search on Bibsonomy Quality of Protection The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Andrea S. Atzeni, Antonio Lioy Why to adopt a security metric? A brief survey. Search on Bibsonomy Quality of Protection The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Dogan Kesdogan, Lexi Pimenidis The Lower Bound of Attacks on Anonymity Systems - A Unicity Distance Approach. Search on Bibsonomy Quality of Protection The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Dogan Kesdogan, Lexi Pimenidis, Tobias Kölsch Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis. Search on Bibsonomy Quality of Protection The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Rüdiger Heimgärtner Identification of the User by Analyzing Human Computer Interaction. Search on Bibsonomy HCI (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF HCI analysis, interaction indicator, theft protection, computer protection, user interface, personalization, user interface design, tool, culture, recognition, identification, interaction analysis, user identification
23Anirban Majumdar 0001, Clark D. Thomborson Manufacturing opaque predicates in distributed systems for code obfuscation. Search on Bibsonomy ACSC The full citation details ... 2006 DBLP  BibTeX  RDF distributed predicate detection, mobile code protection, opaque predicates, software protection, distributed systems security, code obfuscation
23Lu Shen, Xi Yang 0001, Byrav Ramamurthy Shared risk link group (SRLG)-diverse path provisioning under hybrid service level agreements in wavelength-routed optical mesh networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF capacity minimization problem, dedicated-path protection, revenue maximization problem, shared-path protection, wavelength-routed optical network, tabu search, shared risk link group (SRLG)
23Patrick Cousot, Radhia Cousot An abstract interpretation-based framework for software watermarking. Search on Bibsonomy POPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF software authorship, stegoanalyst, stegoattacks, stegokey, stegomark, stegosignature, validation watermarking, authentication, static analysis, abstract interpretation, steganography, fingerprinting, identification, copyrights protection, trustworthiness, obfuscation, intellectual property protection, software watermarking, tamper-proofing
23Dimitrios Simitopoulos, Nikolaos Zissis, Panagiotis Georgiadis 0002, Vasileios Emmanouilidis, Michael G. Strintzis Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD. Search on Bibsonomy Multim. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF DVD copy protection, Watermarking, Encryption, Copyright protection
23Sabu Emmanuel, Mohan S. Kankanhalli A digital rights management scheme for broadcast video. Search on Bibsonomy Multim. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Subscriber's rights protection, Digital watermarks, Copyright protection, Digital rights management, Video watermarking, Pay TV, Digital video broadcasting
23Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, Y. Zhang Experience with Software Watermarking. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF program-transformation attacks, heap-space usage, watermark retrieval time, protection technique, tamperproofing, Java, Java, data structures, security of data, execution times, obfuscation, dynamic data structures, code size, software watermarking, copy protection
23Petra Wohlmacher, Peter Pharow Applications in Health Care using Public-Key Certificates and Attribute Certificates. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures
23Casey O'Donnell Production Protection to Copy(right) Protection: From the 10NES to DVDs. Search on Bibsonomy IEEE Ann. Hist. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Nintendo, DMCA, 10NES, production protection, videogame development, history of computing, Copyright, CSS, DVD
22Tan Phan, Jun Han 0004, Garth Heward, Steven Versteeg Protecting data in multi-stakeholder web service system. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data security, propagation, protection mechanism
22Marco Scaioni, Mario Alba, Renato Rota, Simona Caragliano A GIS-Based SW Prototype for Emergency Preparedness Management Applied to a Real Case Study. Search on Bibsonomy ICCSA (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hazard Management, Civil Protection, GIS, Emergency Management
22Srinivasan Ramasubramanian, Amit Chandak Dual-link failure resiliency through backup link mutual exclusion. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF backup link mutual exclusion, dual-link failures, optical networks, link protection
22Jens Grossklags, Nicolas Christin, John Chuang Secure or insure?: a game-theoretic analysis of information security games. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF economics of the internet, incentive-centered design and engineering, self-insurance, security, game theory, protection, public goods
22Shujuan Wang, Qingtang Liu ERDRM: A Digital Rights Management System Model for Educational Resources. Search on Bibsonomy ICWL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distance education, DRM, intellectual property protection, educational resources
22Alexander Roßnagel Personalisierung in der E-Welt Aus dem Blickwinkel der informationellen Selbstbestimmung gesehen. Search on Bibsonomy Wirtschaftsinf. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Restricted Data Processing, informational Separation of Powers, Identity Infrastructure, Control, Data Protection, Personal Data, Technology Design, Personality Profile
22Maher Ali Generalized sharing in survivable optical networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF shared protection, optical networks
22Mark Aiken, Manuel Fähndrich, Chris Hawblitzel, Galen C. Hunt, James R. Larus Deconstructing process isolation. Search on Bibsonomy Memory System Performance and Correctness The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hardware isolated process (HIP), hardware protection domain, software isolated process (SIP), singularity
22Wenyin Zhang Content-Based Information Security Technique for Chinese Text. Search on Bibsonomy FSKD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Chinese Text Watermarking, Information security, Copyright Protection
22Paul Massell, Laura Zayatz, Jeremy Funk Protecting the Confidentiality of Survey Tabular Data by Adding Noise to the Underlying Microdata: Application to the Commodity Flow Survey. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Disclosure Avoidance, Noise Protection, Microdata, Tabular Data
22Changjie Wang, Ho-fung Leung A secure voter-resolved approval voting protocol over internet. Search on Bibsonomy ICEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF approval voting, universal verification, voter-resolved, security, privacy protection, electronic voting, ElGamal encryption
22Jordi Cucurull-Juan, Joan Ametller, Jose A. Ortega-Ruiz, Sergi Robles, Joan Borrell Protecting Mobile Agent Loops. Search on Bibsonomy MATA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Itinerary Protection, Security, Mobile Agents, Loops
22Antonio Mana, Javier López 0001, Juan J. Ortega, Ernesto Pimentel 0001, José M. Troya A framework for secure execution of software. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Smart cards, Information security, Software protection
22Changjie Wang, Ho-fung Leung A Secure and Fully Private Borda Voting Protocol with Universal Verifiability. Search on Bibsonomy COMPSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Borda voting protocol, universal verification, Security, Privacy protection, Electronic voting, ElGamal encryption
22Changjie Wang, Ho-fung Leung A secure and private clarke tax voting protocol without trusted authorities. Search on Bibsonomy ICEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Clarke tax voting protocol, universal verification, security, privacy protection, electronic voting, mix network, ElGamal encryption
22Hoon-Jae Lee 0001, ManKi Ahn, Seongan Lim, Sang-Jae Moon A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Protection Profiles, Vulnerability Assessment Activities, SPA/DPA, Smart Card, Side Channel Attacks, Common Criteria
22Josep Domingo-Ferrer Advances in Inference Control in Statistical Databases: An Overview. Search on Bibsonomy Inference Control in Statistical Databases The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Inference control in statistical database, Statistical disclosure limitation, Respondents' privacy, Official statistics, Data security, Statistical disclosure control, Statistical database protection
22Torsten Grzebiela Insurability of Electronic Commerce Risks. Search on Bibsonomy HICSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Internet risks, multilateral security, protection goals, risk management
22Jan Magott, Pawel Skrobanek A Method of Analysis of Fault Trees with Time Dependencies. Search on Bibsonomy SAFECOMP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Safety-Critical System, Protection, Time Petri Net, Fault Tree, Time Dependency
Displaying result #701 - #800 of 22913 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license