Search alternatives:
"protectionism" » "protections"

1
Published 2004
Springer US
Table of Contents: ... Proxies with Multiple-Channel SSL -- A Content-Protection Scheme for Multi-Layered Reselling Structures...

3
by Wang, Lingyu, Albanese, Massimiliano, Jajodia, Sushil
Published 2014
Springer International Publishing
Subjects: ...Data protection...

4
by Wang, Lingyu, Jajodia, Sushil, Singhal, Anoop
Published 2017
Springer International Publishing
Subjects: ...Data protection...

5
Published 2011
Springer New York
Subjects: ...Data protection...

6
Published 2015
Springer International Publishing
Subjects: ...Data protection...

7
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... and Technologies -- E-voting and Privacy -- Malware Detection -- Access Control.- Language-Based Protection...

8
Published 2017
Springer International Publishing
Subjects: ...Data protection...

9
Published 2016
Springer International Publishing
Subjects: ...Data protection...

10
Published 2013
Springer New York
Subjects: ...Data protection...

11
Published 2008
Springer US
Table of Contents: ... Spywares by Generating Bogus Events -- A Security Protocol for Self-Organizing Data Storage -- Protecting...

12
Published 2011
Springer Berlin Heidelberg
Subjects: ...Data protection...

13
Published 2010
Springer US
Subjects: ...Data protection...

14
Published 2008
Springer US
Table of Contents: ... and Techniques -- Database Watermarking for Copyright Protection -- Database Watermarking: A Systematic View...

15
Published 2019
Springer International Publishing
Table of Contents: ... Protection against Zero-Day Attacks -- Adaptive Cyber Defenses for Botnet Detection and Mitigation...

16
Published 2007
Springer US
Table of Contents: ... in Peer-to-Peer Systems -- Privacy in Cross-Domain Information Sharing -- Microdata Protection...

17
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Logic of Privacy -- Understanding Privacy Risk of Publishing Decision Trees -- Data Protection -- Secure...

18
Published 2004
Springer US
Table of Contents: ... -- CIIP-RAM- A Security Risk Analysis Methodology for Critical Information Infrastructure Protection -- A...

19
Published 2015
Springer International Publishing
Table of Contents: ... Resource Sharing and Access Control -- Secure Resource Sharing for Embedded Protected Module Architectures...

20
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... to Map Local Access Control Policies to Credential Based Access Control Policies -- Protection...