Search alternatives:
"protectionism" » "protections"

1
Published 2022
Springer International Publishing
Table of Contents: ... -- CryptKSP: A Kernel Stack Protection Model based on AES-NI Hardware Feature -- Usable Security -- Usability...

2
Published 2015
Springer International Publishing
Table of Contents: ...ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life...

3
Published 2014
Springer International Publishing
Table of Contents: ... and Biometrics -- Patients’ Privacy Protection against Insurance Companies in eHealth Systems -- Segmentation...

4
Published 2016
Springer International Publishing
Table of Contents: ... -- Accountability in the EU Data Protection Reform - Moving from Theory to Practice -- Towards Authenticity...

5
Published 2015
Springer International Publishing
Table of Contents: ... -- Protecting Android Apps against Reverse Engineering by the Use of the Native Code -- Designing Privacy-Aware...

6
Published 2021
Springer International Publishing
Subjects: ...Data protection...

7
Published 2016
Springer International Publishing
Table of Contents: ...Big Data -- Big Data Privacy and Anonymization -- Data Protection by Design and by Default à la...

8
Published 2012
Springer Berlin Heidelberg
Subjects: ...Data protection...

9
Published 2011
Springer Berlin Heidelberg
Subjects: ...Data protection...

10
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Towards Practical Attribute-Based Identity Management: The IRMA -- Data Protection by Default...

11
Published 2017
Springer International Publishing
Subjects: ...Data protection...

12
Published 2009
Springer Berlin Heidelberg
Subjects: ...Data protection...

13
Published 2018
Springer International Publishing
Table of Contents: ... Protection by Design: Promises and Perils in Crossing the Rubicon Between Law and Engineering -- Anonymity...

14
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... to Solve the Privacy Paradox? -- Testing Privacy Awareness -- The Relationship between Data Protection...

15
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases -- Verification of Security...

16
Published 2019
Springer International Publishing
Table of Contents: ... Theories for Research on Personal Data Transparency -- Data Protection by Design for cross-border...

17
Published 2008
Springer US
Table of Contents: ... -- Identity and Privacy Protection -- Keynote Paper: Are State-Mediated Forms of Identification a Reaction...

18
Published 2008
Springer US
Table of Contents: ... and Identification Aspects -- Data Protection and the Use of Biometric Data in the EU -- Keynote Session 4: -- ICT...

19
Published 2011
Springer Berlin Heidelberg
..., and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging...

20
Published 2006
Springer US
Table of Contents: ...-Respecting Reputation Systems within Centralised Internet Communities -- Protecting (Anonymous) Credentials...