Search alternatives:
projectiona review » production review, projection view, projections view
protection review » prosecution review, production review, protection reviewing

1
Published 2022
Springer International Publishing
Table of Contents: ... -- CryptKSP: A Kernel Stack Protection Model based on AES-NI Hardware Feature -- Usable Security -- Usability...

2
Published 2015
Springer International Publishing
Table of Contents: ...ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life...

3
Published 2016
Springer International Publishing
Table of Contents: ... -- Accountability in the EU Data Protection Reform - Moving from Theory to Practice -- Towards Authenticity...

4
Published 2014
Springer International Publishing
Table of Contents: ... and Biometrics -- Patients’ Privacy Protection against Insurance Companies in eHealth Systems -- Segmentation...

5
Published 2015
Springer International Publishing
Table of Contents: ... -- Protecting Android Apps against Reverse Engineering by the Use of the Native Code -- Designing Privacy-Aware...

6
Published 2021
Springer International Publishing
Subjects: ...Data protection...

7
Published 2016
Springer International Publishing
Table of Contents: ...Big Data -- Big Data Privacy and Anonymization -- Data Protection by Design and by Default à la...

8
Published 2011
Springer Berlin Heidelberg
Subjects: ...Data protection...

9
Published 2009
Springer Berlin Heidelberg
Subjects: ...Data protection...

10
Published 2017
Springer International Publishing
Subjects: ...Data protection...

11
Published 2018
Springer International Publishing
Table of Contents: ... Protection by Design: Promises and Perils in Crossing the Rubicon Between Law and Engineering -- Anonymity...

12
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... to Solve the Privacy Paradox? -- Testing Privacy Awareness -- The Relationship between Data Protection...

13
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases -- Verification of Security...

14
Published 2019
Springer International Publishing
Table of Contents: ... Theories for Research on Personal Data Transparency -- Data Protection by Design for cross-border...

15
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...: Defining Prejudice by Learning -- Session 7: Security Protocols -- How to Protect a Signature from Being...

16
Published 2011
Springer Berlin Heidelberg
... of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social...