Перейти к основному содержанию
Мемориальная библиотека А.П. Ершова
Toggle navigation
Издания
Журналы
Новые поступления
Вы здесь
Главная
секретность
Связанные издания:
Socio-Technical Aspects in Security and Trust: Revised Selected Papers/10th International Workshop,, STAST 2020, Virtual Event, September 2020
Socio-Technical Aspects in Security and Trust: Revised Selected Papers/9th International Workshop, STAST 2019, Luxembourg City, Luxembourg, September 2019
Taming the Wolf in Sheep s Clothing: Privacy in Multimedia Communications
The Ethical and Legal Quandary of Email Privacy
The Internet s Challenge to Privacy
Theory and Application of Models of Computation: Proc./11th Annual Conference, TAMC 2014, Chennai, India, April 2014
The Platform for Privacy Preferences
The Requirements for a Methodology to Test Secure Open Systems
The Underpinnings of Privacy Protection
Toward Autonomous, Adaptive, and Context-Aware Multimodal Interfaces. Theoretical and Practical Issues: Revised Selected Papers/3rd COST 2102 International Training School, Casetra, Italy, March 2010
Towards Trustworthy Elections: New Directions in Electronic Voting
Transactions on Computational Science XI: Special Issue on Security in Computing, Part II
Transactions on Large-Scale Data-and Knowledge-Centered Systems XVI
Transactions on Large-Scale Data-and Knowledge-Centered Systems XXXVII
Trastworthy Global Computing: Revised Selected Papers/4th International Symposium, TGC 2008, Barcelona, Spain, November 2008
Trust and Trustworthy Computing: Proc./4th International Conference, TRUST 2011, Pittsburg,PA,USA, June 2011
Trust and Trustworthy Computing: Proc./7th International Conference, TRUST 2014, Heraclion, Crete, Greece, June 2014
Trust and Trustworthy Computing: Proc./8th International Conference, TRUST 2015, Heraklion, Greece, August 2015
TRUSTe: An Online Privacy Seal Program
Trusted Computing: Proc./Second International Conference, Trust 2009, Oxford, UK, April 2009
Trust in the New Information Age
Trustworthy Global Computing: Revised Selected Papers/5th International Symposium, TGC 2010, Munich, Germany, February 2010
Trustworthy Global Computing: Revised Selected Papers/International Symposium, TGC 2005. Edinburgh, UK, April 2005
Trustworthy Global Computing: Revised Selectes Papers/7th International Symposium, TGC 2012, Newcastle upon Tune, UK, September 2012
Two Scenarios in Information Privacy
Ubiquitous Computing and Ambient Intelligence: Personalisation and User Adapted Services: Proc./8th International Conference, UCAml 2014, Belfast, UK, December 2014
Ubiquitous Networking: Revised Selected Papers/7th International Symposium,Virtual Event, May 2021
Values, Personal Information Privacy, and Regulatory Approaches
Verification, Model Checking, and Abstract Interpretation: Proc./16th International Conference, VMCAI 2015, Mumbai, India, January, 2915
Web-Age Information Management, Part I: Proc./17th International Conference, WAIM 2016, Nanchang, China, June 2016
Web Information Systems and Applications: Proc./16th International Conference, WISA 2019, Qindao, China, September 2019
Web Information Systems Engineering - WISE 2014 Workshops: Revised Selected Papers/15th International Workshops IWCSN 2014, Org2 2014, PCS 2014, and QUAT 2014, Thessaloniki, Greece, October 2014
Web Information Systems Engineering - WISE 2015, Part I:Proc./16th International Conference, Miami,FL,USA, November 2015
Web Information Systems Engineering - WISE 2018, Part II: Proc./19th International Conference, Dubai, United Arab Emirates, November 2018
Web Services and Formal Methods: Revised Selected Papers/7th International Workshop, WS-FM 2010, Hoboken,NJ,USA, September 2010
Web Technologies and Applications: Proc./16th Asia-Pacific Web Conference, APWeb 2014, Changsha, China, September 2014
Wireless Algorithms, Systems, and Applications: Proc./14th International Conference, WASA 2019, Honolulu,HI,USA, June 2019
Wireless Algorithms, Systems, and Applications: Proc./9th International Conference, WASA 2014, Harbin, China, June 2014
Workplace Privacy in the Newly Integrated Manufacturing Environments
Секретность в Интернет
Шпионы среди нас
« первая
‹ предыдущая
1
2
3
4