Search alternatives:
"protectionism" » "protections"

1
Published 2024
Springer Nature Switzerland
Table of Contents: ... Synthetic Data preserve Manifold properties?. -- ”Alexa, How Do You Protect My Privacy?” A Quantitative...

2
Published 2021
Springer International Publishing
Subjects: ...Data protection...

3
Published 2024
Springer Nature Switzerland
Subjects: ...Data protection / Law and legislation...

4
Published 2016
Springer International Publishing
Table of Contents: ...Security and privacy -- Data protection -- Systems security -- Network security -- Access control...

5
Published 2016
Springer International Publishing
Table of Contents: ...Security and privacy -- Data protection -- Systems security -- Network security -- Access control...

6
Published 2020
Springer International Publishing
Subjects: ...Data protection...

8
Published 2022
Springer International Publishing
Table of Contents: ... as Contextual Integrity in the Internet of Things (Short Paper) -- Data Protection Impact Assessments...

9
Published 2008
Springer Berlin Heidelberg
Subjects: ...Data protection...

11
Published 2016
Springer International Publishing
Subjects: ...Data protection...

12
Published 2023
Springer International Publishing
Table of Contents: ...Influencing Factors for Users' Privacy and Security Protection Behavior in Smart Speakers: Insights...

15
Published 2022
Springer International Publishing
Subjects: ...Data protection...

16
Published 2016
Springer International Publishing
Table of Contents: ...ICSs: Cyber protection and cyber defense of SCADA systems -- Plant control systems -- Engineering...

17
Published 2003
Springer US
Table of Contents: ... -- Establishing Chain of Evidence as a Base for Non-Repudiation Services -- Two Content Protection -- Securing XML...

18
Published 2020
Springer International Publishing
Table of Contents: ...Privacy and Data Protection -- E-Government -- E-Voting and Forensics -- Online Social Networks...

19
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases -- Verification of Security...