Search alternatives:
"protections" » "projections", "protecting"

1
Published 2014
Springer New York
Subjects: ...Data protection...

2
Published 2013
Springer Berlin Heidelberg
Subjects: ...Data protection...

3
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... for Collaborative Intrusion and Malware Detection on a Large Scale -- F3ildCrypt: End-to-End Protection of Sensitive...

4
Published 2015
Springer International Publishing
Table of Contents: ... -- Sanitization of Call Detail Records via Differentially-Private Bloom Filters -- Protecting Personal Data...

5
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Embedded Security -- Efficient and Effective Buffer Overflow Protection on ARM Processors...

6
Published 2018
Springer International Publishing
Table of Contents: ...-of-Everything -- Protecting Resources and Regulating Access in Cloud-based Object Storage -- Function-Based...

7
Published 2016
Springer International Publishing
Subjects: ...Data protection...

8
Published 2008
Springer US
Table of Contents: ... Spywares by Generating Bogus Events -- A Security Protocol for Self-Organizing Data Storage -- Protecting...

9
Published 2017
Springer International Publishing
Subjects: ...Data protection...

10
Published 2012
Springer Berlin Heidelberg
Subjects: ...Data protection...

11
Published 2023
Springer Nature Switzerland
Table of Contents: ... Protection Perspective -- Technology Transfer and Valuation Methods in Use by University Technology Transfer...

12
Published 2003
Springer US
Table of Contents: ... -- Establishing Chain of Evidence as a Base for Non-Repudiation Services -- Two Content Protection -- Securing XML...

13
Published 2018
Springer International Publishing
Table of Contents: ... -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection...

14
Published 2004
Springer US
Table of Contents: ... Real-Time Update of Access Control Policies -- Data Protection Techniques -- Defending Against Additive...

15
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Protection in Location-Based Services Through a Public-Key Privacy Homomorphism -- A Critical View on RFC...