Search alternatives:
"protectionism" » "protections"

1
Published 2014
Springer Berlin Heidelberg
Table of Contents: ... for 2D Geometric Shortest Path Problems -- Protecting Biometric Features by Periodic Function-Based...

4
Published 2019
Springer International Publishing
Subjects: ...Data protection...

5
Published 2019
Springer International Publishing
Subjects: ...Data protection...

6
Published 2018
Springer International Publishing
Subjects: ...Data protection...

7
Published 2019
Springer International Publishing
Table of Contents: ...: Toward a User-Oriented Tool for Security and Privacy Protection on the Web -- Blockchain-based Open Data...

8
Published 2020
Springer International Publishing
Subjects: ...Data protection...

9
Published 2017
Springer Berlin Heidelberg
Subjects: ...Data protection...

10
Published 2015
Springer International Publishing
Subjects: ...Data protection...

11
Published 2016
Springer International Publishing
Table of Contents: ... and Privacy Engineering -- Data Protection and Data Hiding -- Advances in Authentication and Data Access...

12
Published 2017
Springer Berlin Heidelberg
Subjects: ...Data protection...

13
Published 2017
Springer Berlin Heidelberg
Table of Contents: ... -- Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos...

14
Published 2017
Springer International Publishing
Subjects: ...Data protection...

16
Published 2016
Springer Berlin Heidelberg
Subjects: ...Data protection...

18
Published 2015
Springer Berlin Heidelberg
Table of Contents: ... Clustering of Linked Data: Techniques and Applications -- ProProtect3: An Approach for Protecting User...

19
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... of XML-Based Business Objects -- SimulPh.D.: A Physical Design Simulator Tool -- Protecting Database...