Перейти к основному содержанию
Мемориальная библиотека А.П. Ершова
Toggle navigation
Издания
Журналы
Новые поступления
Вы здесь
Главная
секретность
Связанные издания:
Leveraging Applications of Formal Methods, Verification and Validation, Part I: Foundational Techniques: Proc./7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 2016
Machine Learning and Knowledge Extraction: Proc./2nd IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference, CD-MAKE 2018, Hamburg, Germany, August 2018
Managing User Perceptions of Email Privacy
Middleware 2009: Proc/ ACM/IFIP/USENIX 10th International Middleware Conference, Urbana,IL,USA, November/December 2009
Mining Intelligence and Knowledge Exploration: Revised Selected Papers/4th International Conference, MIKE 2016, Mexico City, Mexico, November 2016
Model-Driven Simulation and Training Environments for Cybersecurity: Revised Selected Papers/2nd International Workshop, MSTC 2020, Guildford,UK,September 2020
Modeling Decisions for Artificial Intelligence: Proc./11th International Conference, MDAI 2014, Tokyo, Japan, October 2014
Modeling Decisions for Artificial Intelligence: Proc./7th International Conference, MDAI 2010, Perpignan, France, October 2010
Multimedia Technology and Privacy: A Case in Neurosurgery
Networked Systems: Proc./5th International Conference, NETYS 2017, Marrakech, Morocco, May 2017
Networked Systems: Revised Selected Papers/2nd International Conference, NETYS 2014, Marrakech, Morocco, May 2014
Off-Line Electronic Cash Based on Secret-Key Certificates
Onion Routing for Anonymous and Private Internet Connections
On the Move to Meaningful Internet Systems: OTM 2010, Part I: Proc./Confederated International Conferences: CoopIS,IS,DOA and ODBASE, Hersonissos, Crete, Greece, October 2010
On the Move to Meaningful Internet Systems: OTM 2012, Part I: Proc./ Confederated International Conference: CoopIS, DOA-SVI, and ODBASE 2012, Rome, Italy, September 2012
On the Move to Meaningful Internet Systems: OTM 2013 Conferences: Proc./ Confederated International Conferences: CooplS, DOA-Trusted Cloud, and ODBASE 2013, Graz, Austria, September 2013
Optimal Privacy and Authentication on a Portable Communications System
Passive and Active Measurement: Proc./17th International Conference, PAM 2016, Heraklion, Greece, March 2016
Pervasive Computing: Proc./4th International Conference, PERVASIVE 2006. Dublin, Ireland, May 2006
Pervasive Computing: Proc./7th International Conference, Pervasive 2009, Nara, Japan, May 2009
Principles of Practice in Multi-Agent Systems: Proc./12th International Conference, PRIMA 2009, Nagoya, Japan, December 2009
Privacy Enhanced Mail Design and Implementation Perspectives
Privacy, Information Technology, and Health Care
Privacy Interfaces for Information Management
Privacy-Preserving Data Mining
Privacy Preserving Mining of Association Rules
Progress in Cryptology - INDOCRYPT 2020: Proc./21st International Conference on Cryptology in India, Bangalore, India, December 2020
Protecting Persons While Protecting the People: Revised Selected Papers/2nd Annual Workshop ISIPS 2008, New Brunswick, NJ, USA, May 2008
Protecting Telecommunications Privacy in Japan
Provenance and Annotation of Data and Processes: Revised Selectes Papers/ Third International Workshop, IPAW 2010, Troy,NY,USA, June 2010
Proving Location Information in a Ubiquitous Computing Environment
Querying Databases Privately: A New Approach to Private Information Retrieval
Recent Advances in Intrusion Detection: Proc./10th International Symposium, RAIS 2007. Gold Coast, Australia, September 2007
Recent Advances in Intrusion Detection: Proc./12th International Symposium, RAID 2009, Saint-Malo, France, September 2009
Reference Model for Data Management Security and Privacy
Risk Assessment and Risk-Driven Quality Assurance: Revised Selected Papers/4th International Workshop, RISK 2016 Held in Conjunction with ICTSS 2016, Graz, Austria, October 2016
Safety Aspects of the Ariane 5 On-Board Software
Scenarios and Analyses: Privacy Issues in the Workplace
Secret Sharers: Consensual and Participatory Surveillance Concerns in the Context of Network-Based Computer Systems
Secure Data Management: Proc./VLDB 2004 Workshop, SDM 2004. Toronto, Canada, August 2004
Secure IT Systems: Proc./25th Nordic Conference, NordSec 2020, Virtual Event, November 2020
Secure Network Access Using Multiple Applications of AT&T s Smart Card
Security and Privacy for Web Databases and Services
Security Requirements of the TMN X-Interface within End-to-End Service Management of Virtual Private Networks
Security Standardization Research: Proc./6th International Conference, SSR 2020, London, UK, November 2020
Smart Card Research and Advanced Application: Proc./9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 2010
Social Informatics, Part I: Proc./8th International Conference, SocInfo 2016, Bellevue,WA,USA, November 2016
Social Informatics, Part I: Proc./9th International Conference, SocInfo 2017, Oxford, UK, September 2017
Social Informatics: Proc./Second International Conference, SocInfo 2010, Laxenburg, Austria, October 2010
Social Robotics: Proc./6th International Conference, ICSR 2014, Sydney,NSW,Australia, October 2014
« первая
‹ предыдущая
1
2
3
4
следующая ›
последняя »