CORC

浏览/检索结果: 共86条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks. 期刊论文
International Journal of Communication Systems, 2018, 卷号: Vol.31 No.1
作者:  Chen,GC;  Arain,QA;  Chen,L;  Memon,I;  Memon,H
收藏  |  浏览/下载:13/0  |  提交时间:2019/12/24
Detecting the Detectable: Unintended Consequences of Cryptographic Election Verification 期刊论文
IEEE Security and Privacy, 2017, 页码: 1
作者:  AleksanderEssex
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/24
Enforcing Differential Privacy for Shared Collaborative Filtering 期刊论文
IEEE Access, 2017, 卷号: Vol.5, 页码: 35-49
作者:  JingBi;  QingWang;  JianqiangLi;  YuZhao;  Ji-JiangYang
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/24
Policy Rationales for Electronic Information Systems: An Area of Ambiguity 期刊论文
The British Journal of Social Work, 2017, 卷号: Vol.47 No.5, 页码: 1500-1516
作者:  JochenDevlieghere;  RudiRoose;  LieveBradt
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/24
Анализ изменения сущности понятия «Финансовая криптография» на основе 20-летней тематики международной конференции «Financial cryptography and data security»:Текст научной статьи по специальности «Экономика и экономические науки» 期刊论文
Статистика и экономика, 2016, 卷号: No.4
作者:  ВАРФОЛОМЕЕВАЛЕКСАНДРАЛЕКСЕЕВИЧ
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/24
New Victorian protective data security standards roll-out: Will you be at the table? 期刊论文
IQ: The RIM Quarterly, 2016, 卷号: Vol.32 No.2, 页码: 16-19
作者:  Toohey,Alison
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/24
Conception of EGNOS Integrity Data Utilization in ENC Systems 期刊论文
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation, 2016, 卷号: Vol.10 No.3, 页码: 389-393
作者:  MateuszBilewski;  PawelZalewski
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/24
The fate of 'privacy' in an automated society 期刊论文
Pandora's Box, 2016, 页码: 75-81
作者:  Richardson,Megan
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/24
A CONCEPTUAL MODEL FOR MANAGING PROTECTION INFORMATION RESOURCE ELECTRONIC DOCUMENT MANAGEMENT SYSTEM 期刊论文
Modeling of systems and processes Моделирование систем и процессов, 2016, 卷号: Vol.8, 页码: 23-27
作者:  L.Obuhova;  E.Rogozin;  I.Zastrognov
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/24
What can lawyers do to protect themselves from cyber crime? 期刊论文
Bulletin (Law Society of South Australia), 2016, 卷号: Vol.38 No.9, 页码: 14-15
作者:  Derkley,Karin
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/24


©版权所有 ©2017 CSpace - Powered by CSpace