Перейти к основному содержанию
Мемориальная библиотека А.П. Ершова
Toggle navigation
Издания
Журналы
Новые поступления
Вы здесь
Главная
секретность
Связанные издания:
Database Systems for Advanced Applications. Part II: Proc./15th International Conference, DASFAA 2010, Tsukuba, Japan, April 2010
Database Systems for Advanced Applications, Part I: Proc./20th International Conference, DASFAA 2015, Hanoi, Vietnam, April 2015
Database Systems for Advanced Applications, Part I: Proc./23rd International Conference, DASFAA 2018, Gold Coast, QLD, Australia, May 2018
Database Systems for Advanced Applications: Proc./18th International Conference, DASFAA 2013, International Workshops: BDMA, SNSM, SeCoP, Wuhan, China, April 2013
Data Mining, the Internet, and Privacy
Data Warehousing and Knowledge Discovery: Proc./13th International Conference, DaWaK 2011, Toulouse, France, August 2011
DES Watch: An Examination of the Sufficiency of the Data Encryption Standard for Financial Institution Information Security in the 1990 s
Detection and Intrusions and Malware, and Vulnerability Assessment: Proc./14th International Conference, DIMVA 2017, Bonn, Germany, July 2017
Detection of Intrusions and Malware, and Vulnerability Assessment: Proc./15th International Conference, DIMVA 2018, Saclay, France, June 2018
Detection of Intrusions and Malware, and Vulnerabitity Assessment: Proc./8th International Conference, DIMVA 2011, Amsterdam, The Netherlandsm July 2011
Digital Libraries: Knowledge, Information, and Data in an Open Access Society: Proc./18th International Conference on Asia-Pacific Digital Libraries, ICADL 2016, Tsukuba, Japan, December 2016
Digital Watermarking: Proc./4th International Workshop, IWDW 2005. Siena, Italy, September 2005
Digital Watermarking: Selected Papers/7th International Workshop IWDW 2008 Busan, Korea, November 2008
Discovering Shared Interests Using Graph Analysis
Distributed Computing and Internet Technology: Proc./13th International Conference, ICDCIT 2017, Bhubaneswar, India, January 2017
Distributed Computing: Proc./19th International Conference, DISC 2005. Cracow, Poland, September 2005
Distribution and Management of Secret Sequence Numbers for Large Computer Networks in an Internet Security Access Control Scheme
Dynamic Swapping Schemes and Differential Cryptanalysis
ECML PKDD 2018 Workshops: Proc./Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe 2018, and Green Data Mining 2018, Dublin, Ireland, September 2018
Efficient Execution of Aggregation Queries over Encrypted Relational Databases
Electronic Government and the Information Systems Perspective: Proc./10th International Conference, EGOVIS 2021, Virtual Event, September 2021
Electronic Government and the Information Systems Perspective: Proc./3rd International Conference, EGOVIS 2014, Munich, Germany, September 2014
Electronic Government: Proc./Third International Conference, EGOV 2004. Zaragoza, Spain, August/September 2004
Engineering Societies in the Agents World X: Proc./10th International Workshop, ESAW 2009, Utrecht, The Netherlands, November 2009
Ethics and Policy of Biometrics: Revised Selected Papers/Third International Conference, ICEB 2010, Hong Kong, January 2010
Fair Information Practices with Computer Supported Cooperative Work
Financial Cryptography and Data Security, Part II: Revised Selected Papers/25th International Conference, FC 2021, Virtual Event, March 2021
Financial Cryptography and Data Security, Part I: Revised Selected Papers/25th International Conference, FC 2021, Virtual Event, March 2021
FM 2015: Formal Methods: Proc./20th International Symposium, Oslo, Norway, June 2015
Formal Aspects in Security and Trust: Revised Selected Papers/5th International Workshop, FAST 2008, Malaga, Spain, October 2008
Foundational and Practical Aspects of Resource Analysis: Revised Selected Papers/3rd International Workshop, FOPARA 2013, Bertinoro, Italy, August 2013
Global Software Privacy Revisited
HCI and Cybersecurity, Privacy and Trust: Proc./2nd International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 2020
How to Break Fraud-Detectable Key Recovery
Human Aspects of IT for the Aged Population, Part I: Aging, Design and User Experience: Proc./3rd International Conference, ITAP 2017 Held as Part of HCI International 2017, Vancouver,BC, Canada, July 2017
Human-Computer Interaction: Part I: User Interface Design, Development and Multimodality: Proc./19th International Conference, HCI International 2017, Vancouver,BC,Canada, July 2017
Information and Communication Technology: Proc./ International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 2013
Information and Security and Cryptology: Revised Selected Papers/16th International Conference, Inscrypt 2020, Guangzhou, China, December 2020
Information Hiding: Revised Selected Papers/12th International Conference, IH 2010, Calgary,AB,Canada, June 2010
Information Security and Cryptology: Revised Selected Papers/17th International Conference, Inscrypt 2021, Virtual Event, August 2021
Information Security and Privacy: Proc./Third Australian Conf., ACISP 98. Brisbane, Australia, July 1998
Information Security: Proc./23rd International Conference, ISC 2020, Bali, Indonesia, December 2020
Information Systems Security: Proc./16th International Conference, ICISS 2020, Jammu, India, December 2020
Information Theory and Applications: Proc./Third Canadian Wirkshop. Rockland, Ontario, Canada, May-June 1993
Interactive Knowledge Discovery and Data Mining in Biomedical Informatics: State-of-the-Art and Future Challenges
Internet and Network Economics: Proc./8th International Workshop, WINE 2012, Liverpool, UK, December 2012
Internet Privacy Concerns Confirm the Case for Intervention
Internet Science: Proc./2nd International Conference, INSCI 2015, Brussels, Belgium, May 2015
Interoperability and Open-Source Solutions for the Internet of Things: Invited Papers/2nd International Workshop, InterOSS-IoT 2016, Held in Conjunction with IoT 2016, Stuttgart, Germany, November 2016
Is Software Warfare "Unthinkable" or Is There a Rational Basis for Its Adoption?: A proposal for Ethical Reflection and Action
« первая
‹ предыдущая
1
2
3
4
следующая ›
последняя »