The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for protection with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1968 (18) 1969-1973 (23) 1974-1975 (29) 1976 (30) 1977 (21) 1978 (25) 1979 (21) 1980 (15) 1981 (17) 1982 (23) 1983 (18) 1984 (27) 1985 (23) 1986 (23) 1987 (27) 1988 (33) 1989 (44) 1990 (36) 1991 (91) 1992 (55) 1993 (68) 1994 (59) 1995 (65) 1996 (96) 1997 (118) 1998 (131) 1999 (168) 2000 (232) 2001 (339) 2002 (361) 2003 (639) 2004 (843) 2005 (1008) 2006 (1107) 2007 (1175) 2008 (1164) 2009 (987) 2010 (662) 2011 (701) 2012 (807) 2013 (856) 2014 (912) 2015 (802) 2016 (966) 2017 (881) 2018 (1037) 2019 (1164) 2020 (1157) 2021 (1209) 2022 (1166) 2023 (1181) 2024 (253)
Publication types (Num. hits)
article(7850) book(33) data(8) incollection(362) inproceedings(14243) phdthesis(341) proceedings(76)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7090 occurrences of 2819 keywords

Results
Found 22916 publication records. Showing 22913 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
22Andrew A. Chien, Jay H. Byun Safe and Protected Execution for the Morph/AMRM Reconfigurable Processor. Search on Bibsonomy FCCM The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Multiprocess Protection, Process isolation, Machine Virtualization, Adaptive Computing, Reconfigurable Processor
22Dixie B. Baker, Robert M. Barnhart, T. T. Buss PCASSO: Applying and Extending State-of-the-Art Security in the Healthcare Domain. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF PCASSO, Patient Centered Access to Secure Systems Online, healthcare domain, patient privacy protection, life-critical information, patient empowerment, safety, security of data, Internet access, security technology, sensitive information
22Gabriele Gianini, Ernesto Damiani A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study. Search on Bibsonomy Secure Data Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Si Choon Noh, Dong Chun Lee, Kuinam J. Kim Multi-level Protection Building for Virus Protection Infrastructure. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Olivier Bonaventure, Clarence Filsfils, Pierre François Achieving sub-50 milliseconds recovery upon BGP peering link failures. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF fast recovery, routing, BGP, computer network reliability
22John A. Bullinaria The effect of learning on life history evolution. Search on Bibsonomy GECCO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF life histories, learning, evolution, artificial life
22Krishanthmohan Ratnam, Luying Zhou, Mohan Gurusamy Efficient multi-layer operational strategies for survivable IP-over-WDM networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Luísa Jorge, Teresa Gomes Survey of Recovery Schemes in MPLS Networks. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Rémy Haemmerlé, François Fages Modules for Prolog Revisited. Search on Bibsonomy ICLP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Nicholas Paul Sheppard, Reihaneh Safavi-Naini Protecting Privacy with the MPEG-21 IPMP Framework. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Edward T. Chow Autonomous Information Unit: Why Making Data Smart Can Also Make Data Secured? Search on Bibsonomy WETICE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Zhe-Ming Lu, Dianguo Xu 0001, Sheng-He Sun Multipurpose image watermarking algorithm based on multistage vector quantization. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Franco Frattolillo, Salvatore D'Onofrio An Effective and Dynamically Extensible DRM Web Platform. Search on Bibsonomy HPCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Olivier Bonaventure, Clarence Filsfils, Pierre François Achieving sub-50 milliseconds recovery upon BGP peering link failures. Search on Bibsonomy CoNEXT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF IP tunnels, MPLS VPN, fast restoration, border gateway protocol (BGP)
22Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki Towards Modeling Wireless Location Privacy. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Reinhard Seyer, Christian Siemers, Rainer Falsett, Klaus H. Ecker, Harald Richter 0001 Robust Partitioning for Reliable Real-Time Systems. Search on Bibsonomy IPDPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Mechatronic System, Time Supervision, Reliability, Distributed Real-Time Systems, Imprecise Computation
22Cheng-Ching Huang, Hsueh-Ming Hang, Hsiang-Cheh Huang MPEG IPMP Concepts and Implementation. Search on Bibsonomy IEEE Pacific Rim Conference on Multimedia The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Mihaela van der Schaar, Hayder Radha Unequal packet loss resilience for fine-granular-scalability video. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Hoi Chang, Mikhail J. Atallah Protecting Software Code by Guards. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Mariana Dumitrescu, Toader Munteanu Fuzzy Probability and Power System Safety. Search on Bibsonomy Fuzzy Days The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Izuru Kume An Object-Oriented Analysis and Design Approach for Safe Object Sharing. Search on Bibsonomy ICECCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Fritz Hohl A Framework to Protect Mobile Agents by using Reference States. Search on Bibsonomy ICDCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
22John T. Robinson, Murthy V. Devarakonda Note on a Problem with Reed and Long's FBR Results. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
22Gilles Brassard, Moti Yung One-Way Group Actions. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
21Pierangela Samarati, Sabrina De Capitani di Vimercati Data protection in outsourcing scenarios: issues and directions. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF privacy, access control, encryption, confidentiality, data protection, data outsourcing, data fragmentation
21Jibang Liu, Karthik Kumar, Yung-Hsiang Lu Tradeoff between energy savings and privacy protection in computation offloading. Search on Bibsonomy ISLPED The full citation details ... 2010 DBLP  DOI  BibTeX  RDF image retrieval, steganography, energy saving, privacy protection, computation offloading
21Ruirui C. Huang, Daniel Y. Deng, G. Edward Suh Orthrus: efficient software integrity protection on multi-cores. Search on Bibsonomy ASPLOS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF replication-aware architecture, software diversity and redundancy, software security, multi-core architecture, memory protection
21Cheng-Yaw Low, Andrew Beng Jin Teoh, Tee Connie Fusion of LSB and DWT Biometric Watermarking Using Offline Handwritten Signature for Copyright Protection. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Biometric watermarking, offline handwritten signature, copyright protection
21Vishnu Naresh Boddeti, Fei Su, B. V. K. Vijaya Kumar A Biometric Key-Binding and Template Protection Framework Using Correlation Filters. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key-Binding, Face Recognition, Biometrics, Encryption, Template Protection, Correlation Filters
21Vladimir Kotenko, Alexey Evseev, Stas Kotenko, Konstantin E. Rumyantsev New approach to evaluate the effectiveness of the audio information protection for determining the identity of virtual speech images. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF effectiveness of the audio information protection, virtual adaptive scrambling, virtual scrambling, redundancy, information security, legibility, scrambling
21Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar, Samar Sen-Sarma An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking. Search on Bibsonomy SBCCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intellectual property protection (IPP), watermarking, encryption, decryption
21Yixin Diao, Xiaolei Hu, Asser N. Tantawi, Haishan Wu An adaptive feedback controller for SIP server memory overload protection. Search on Bibsonomy ICAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF memory overload protection, modeling, adaptive control, workload characterization
21Xuebing Zhou, Stephen D. Wolthusen, Christoph Busch 0001, Arjan Kuijper A Security Analysis of Biometric Template Protection Schemes. Search on Bibsonomy ICIAR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Biometric encryption, biometric template protection, correlation, attacks, security analysis
21Carl E. Landwehr Results of Workshops on Privacy Protection Technologies. Search on Bibsonomy ISIPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy protection technologies, intelligence community, strategies, workshop
21Daniel J. Weitzner Beyond Secrecy: New Privacy Protection Strategies for Open Information Spaces. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF digital privacy protection, Technology and Society, cryptography
21Avesh Kumar Agarwal, Wenye Wang On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF quality of protection, quality of service, performance analysis, security protocols, mobile IP, wireless local area networks
21Nizar Bouabdallah, Bruno Sericola Introducing a Relative Priority for the Shared-Protection Schemes. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF performance analysis, Optical networks, protection
21Julian Ligertwood, Margaret Jackson Transborder Data Protection and the Effects on Business and Government. Search on Bibsonomy HCI (11) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF EU, government, law, India, data protection, business, Australia
21Gee-Yong Park, Jang-Soo Lee, Se Woo Cheon, Kee-Choon Kwon, Eunkyoung Jee, Kwang Yong Koh Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System. Search on Bibsonomy SAFECOMP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Software Safety Analysis, Software FTA, Software HAZOP, Function Block Diagram, Nuclear Reactor Protection System
21Marianthi Theoharidou, Eleftheria Stougiannou, Dimitris Gritzalis A CBK for Information Security and Critical Infrastructure Protection. Search on Bibsonomy World Conference on Information Security Education The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Common Body of Knowledge (CBK), Academic Curriculum, Academic Programme, Critical Infrastructure Protection
21Helen J. Wang, Xiaofeng Fan, Jon Howell, Collin Jackson Protection and communication abstractions for web browsers in MashupOS. Search on Bibsonomy SOSP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-principal OS, security, communications, web, abstractions, protection, browser, same-origin policy
21Chen Yongxi Crisis of personal data protection during the construction of e-government: reaction and limits of Hong Kong privacy laws. Search on Bibsonomy ICEGOV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF legal deficiency, personal data protection, privacy law, e-government, Hong Kong
21Eun Young Choi, Su-Mi Lee, Dong Hoon Lee 0001 Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes. Search on Bibsonomy UIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RFID-tagged Banknotes, Self-updating, Privacy protection
21Yi Ren, Min Luo, Zukai Tang, Lingqing Ye A Composite Privacy Protection Model. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Privacy Data Model, Privacy Database, Deputy Mechanism, Privacy Protection
21George O. M. Yee A privacy controller approach for privacy protection in web services. Search on Bibsonomy SWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy controller, user privacy policy, web services, privacy protection
21Soo-Young Kang, Im-Yeong Lee Privacy Protection Scheme of RFID Using Random Number. Search on Bibsonomy PAKDD Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RFID, Privacy Protection, Random Number
21Jung-Chun Liu, Chu-Hsing Lin, Li-Ching Kuo, Jen-Chieh Chang Robust Multi-scale Full-Band Image Watermarking for Copyright Protection. Search on Bibsonomy IEA/AIE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Distributed discrete wavelet transformation, Image attack, Data hiding and recovery, Image processing, Singular value decomposition, Digital watermark, Copyright protection
21Yong-Joon Park, Zhao Zhang, Gyungho Lee Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks. Search on Bibsonomy IEEE Micro The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Microarchitectural protection, stack-based, buffer overflow, RAS
21Shuting Xu, Jun Zhang 0001, Dianwei Han, Jie Wang 0008 Singular value decomposition based data distortion strategy for privacy protection. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data distortion, Security, Data mining, Singular value decomposition, Privacy protection
21Radu Sion, Mikhail J. Atallah, Sunil Prabhakar Rights Protection for Discrete Numeric Streams. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Rights protection, discrete streams, sensor networks, watermarking
21M. Ali Akcayol 0001 Application of Fuzzy Logic Controlled Cathodic Protection on Iraq-Turkey Crude Oil Pipeline. Search on Bibsonomy Appl. Intell. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cathodic protection, fuzzy control, microcontroller
21Lan Gao, Jun Yang 0002, Marek Chrobak, Youtao Zhang, San Nguyen, Hsien-Hsin S. Lee A low-cost memory remapping scheme for address bus protection. Search on Bibsonomy PACT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF address bus leakage protection, secure processor
21Hans Georg Schaathun On Watermarking/Fingerprinting for Copyright Protection. Search on Bibsonomy ICICIC (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF collusion-secure fingerprinting, watermarking, error-correcting codes, copyright protection, soft-decision decoding
21Maurizio Murroni Broadcasting of digital cimema streams over wireless channels: a power-based unequal error protection approach. Search on Bibsonomy MobiMedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wavelet transmultiplexing, JPEG2000, wireless channel, unequal error protection, digital cinema
21Dulce B. Ponceleon, Julian A. Cerruti Multimedia content protection. Search on Bibsonomy ACM Multimedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AACS, CPRM, watermarking, encryption, tracing, revocation, broadcast encryption, content protection, piracy
21Shang-Lin Hsieh, Hsuan-Chieh Huang, I-Ju Tsai A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fingerprint enhancement, digital watermarking, discrete wavelet transform, copyright protection, secret sharing scheme
21Daniel Socek, Michal Sramka, Oge Marques, Dubravko Culibrk An improvement to a biometric.based multimedia content protection scheme. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multimedia content protection, security, authentication, biometrics, digital rights management
21Dragan Jevtic, Marijan Kunstic, Stjepan Matijasevic Load Protection Model Based on Intelligent Agent Regulation. Search on Bibsonomy KES (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF load protection, reinforcement learning, intelligent agent
21Khaled E. A. Negm Design, Implementation and Testing of Mobile Agent Protection Mechanism for Manets. Search on Bibsonomy WEBIST (Selected Papers) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure Mobile Transactions, Mobile Agent Protection, Business to Business Secure Transaction
21Mihai Budiu, Úlfar Erlingsson, Martín Abadi Architectural support for software-based protection. Search on Bibsonomy ASID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF control-flow integrity, software fault isolation, security, control-flow graph, hardware support, memory protection, binary rewriting
21Josep Maria Mateo-Sanz, Josep Domingo-Ferrer, Francesc Sebé Probabilistic Information Loss Measures in Confidentiality Protection of Continuous Microdata. Search on Bibsonomy Data Min. Knowl. Discov. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF information loss measures, privacy, database security, statistical disclosure control, microdata protection
21Radu Sion, Mikhail J. Atallah, Sunil Prabhakar Rights Protection for Categorical Data. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Rights protection, watermarking, information hiding, categorical data, relational data
21Yimei Guo A comment on chinese legal environment of online copyright protection. Search on Bibsonomy ICEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Chinese legal environment of online copyright protection, internet piracy, corporation
21Larry Huston, Rahul Sukthankar, Yan Ke Evaluating keypoint methods for content-based copyright protection of digital images. Search on Bibsonomy ICME The full citation details ... 2005 DBLP  DOI  BibTeX  RDF descriptor matching, keypoint method evaluation, content-based copyright protection, digital image encoding, nearest-neighbor indexing scheme, image transformation
21Kenichi Yabuta, Hitoshi Kitazawa, Toshihisa Tanaka A New Concept of Security Camera Monitoring with Privacy Protection by Masking Moving Objects. Search on Bibsonomy PCM (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security camera, JPEG encoding, watermarking, Privacy protection
21Alessandra Carbone, Chengde Mao, Pamela E. Constantinou, Baoquan Ding, Jens Kopatsch, William B. Sherman, Nadrian C. Seeman 3D Fractal DNA Assembly from Coding, Geometry and Protection. Search on Bibsonomy Nat. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF coding of times, DNA 3D assembly, DNA protection, geometry of tiles, Sierpinski cube, tiling, DNA nanotechnology, DNA molecules
21Ziad Sakr, Nicolas D. Georganas A MPEG-4 XMT Scene Structure Algorithm for Authentication and Copyright Protection. Search on Bibsonomy RIDE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Authentication, digital watermarking, protection, XMT, BIFS
21Florian Pestoni, Clemens Drews eXtensible content protection. Search on Bibsonomy ACM Multimedia The full citation details ... 2003 DBLP  DOI  BibTeX  RDF home networking, peer-to-peer computing, digital media, content protection
21David Megías 0001, Jordi Herrera-Joancomartí, Julià Minguillón A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Frequency domain methods, Copyright protection, Audio watermarking
21Ming-Dou Ker, Chien-Hui Chuang, Kuo-Chun Hsu, Wen-Yu Lo ESD Protection Design for Mixed-Voltage I/O Circuit with Substrate-Triggered Technique in Sub-Quarter-Micron CMOS Process. Search on Bibsonomy ISQED The full citation details ... 2002 DBLP  DOI  BibTeX  RDF ESD, ESD protection circuit, substrate-triggered technique
21Dimitris K. Tsolis, George K. Tsolis, Emmanouil G. Karatzas, Theodore S. Papatheodorou Copyright protection and management and a web based library for digital images of the Hellenic cultural heritage. Search on Bibsonomy Virtual Reality, Archeology, and Cultural Heritage The full citation details ... 2001 DBLP  DOI  BibTeX  RDF digital web archives, databases, information systems, watermarking, copyright protection, java applets
21Sylvia B. Encheva, Gérard D. Cohen Partially Identifying Codes for Copyright Protection. Search on Bibsonomy AAECC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Secure frameproof codes, designs, copyright protection
21Yang-Koo Kang, Moon-Hyun Kim Real-Time Fingerprints Recognition Mechanism-Based on Digital Contents Protection System for Interaction on Web. Search on Bibsonomy PRDC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Digital Contents protection, Digital Rights Providers, Fingerprint Recognition Mechanism, DRM
21Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyuan Wang Practical Key Distribution Schemes for Channel Protection. Search on Bibsonomy COMPSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF channel protection, network security and key distribution scheme, Pay-per-view
21Jaap Haitsma, Michiel van der Veen, Ton Kalker, Fons Bruekers Audio watermarking for monitoring and copy protection. Search on Bibsonomy ACM Multimedia Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF broadcast monitoring, audio, copy protection, watermark embedding, watermark detection
21Rogers Alunge Consolidating the Right to Data Protection in the Information Age: A Comparative Appraisal of the Adoption of the OECD (Revised) Guidelines into the EU GDPR, the Ghanaian Data Protection Act 2012 and the Kenyan Data Protection Act 2019. Search on Bibsonomy InterSol The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
21Fulong Chen 0002, Yonglong Luo, Ji Zhang 0001, Junru Zhu, Ziyang Zhang, Chuanxin Zhao, Taochun Wang An infrastructure framework for privacy protection of community medical internet of things - Transmission protection, storage protection and access control. Search on Bibsonomy World Wide Web The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Sarah Ellis, Charles Oppenheim Legal issues for information professionals, Part III: Data protection and the media - background to the Data Protection Act 1984 and the EC Draft Directive on Data Protection. Search on Bibsonomy J. Inf. Sci. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
21Frank Hearl Using Risk Analysis to Guide Worker Protection. Search on Bibsonomy EnviroInfo (2) The full citation details ... 2009 DBLP  BibTeX  RDF
20Dan Lin 0001, Anna Cinzia Squicciarini Data protection models for service provisioning in the cloud. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cloud computing, data privacy
20Zhiguo Wan, Kui Ren 0001, Bo Zhu 0001, Bart Preneel, Ming Gu 0001 Anonymous user communication for privacy protection in wireless metropolitan mesh networks. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymous routing, information security, wireless mesh networks
20Jongeun Lee, Aviral Shrivastava Compiler-managed register file protection for energy-efficient soft error reduction. Search on Bibsonomy ASP-DAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Thomas H. Morris, V. S. S. Nair Encryption Key Protection for Private Computing on Public Platforms. Search on Bibsonomy PerCom Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Ying Li, Guifen Zhao, Tong Liu Research on Data Protection System in Computer Network. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Ghassan Jabbour, Daniel A. Menascé The Insider Threat Security Architecture: A Framework for an Integrated, Inseparable, and Uninterrupted Self-Protection Mechanism. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Chen 0003 Noise Injection for Search Privacy Protection. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Thibault Cholez, Isabelle Chrisment, Olivier Festor Evaluation of Sybil Attacks Protection Schemes in KAD. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, DHT, P2P networks, Sybil attack, KAD, defense
20Maria Fresia, Fabio Lavagetto Determination of Optimal Distortion-Based Protection in Progressive Image Transmission: A Heuristic Approach. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Amir Askarian, Yuxiang Zhai, Suresh Subramaniam 0001, Yvan Pointurier, Maïté Brandt-Pearce Protection and Restoration from Link Failures in DWDM Networks: A Cross-Layer Study. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Shangping Ren, Kevin A. Kwiat A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF legacy control systems, behavior observation, feedback loop
20Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems. Search on Bibsonomy PerCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RFID security and privacy
20Muhammad S. Javed, Krishnaiyan Thulasiraman, Guoliang Xue Logical Topology Design for IP-over-WDM Networks: A Hybrid Approach for Minimum Protection Capacity. Search on Bibsonomy ICCCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Rohit Chadha, Carl A. Gunter, José Meseguer 0001, Ravinder Shankesi, Mahesh Viswanathan 0001 Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers. Search on Bibsonomy FMOODS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Walter Grote, Alvaro Arenas, Alejandra Zapata NetFailPAC: A Single Failure Protection Algorithm with QoS Provision for Optical WDM Networks. Search on Bibsonomy ICONS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Da-Wei Wang 0004, Churn-Jung Liau, Tsan-sheng Hsu Granulation as a Privacy Protection Mechanism. Search on Bibsonomy Trans. Rough Sets The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington Program Fragmentation as a Metamorphic Software Protection. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Neele von Deetzen, Sara Sandberg Design of Unequal Error Protection LDPC Codes for Higher Order Constellations. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Salima Hacini, Zizette Boufaïda 0001, Haoua Cheribi Mobile Agent Protection in E-Business Application A Dynamic Adaptability Based Approach. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF environment key, trust, mobile agent security, malicious host
20Tim Güneysu, Bodo Möller, Christof Paar New Protection Mechanisms for Intellectual Property in Reconfigurable Logic. Search on Bibsonomy FCCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Zhen Xiao, Xiaofeng Meng 0001, Jianliang Xu Quality Aware Privacy Protection for Location-Based Services. Search on Bibsonomy DASFAA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF QoS, Privacy, Location-based Services
Displaying result #801 - #900 of 22913 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license