Die gezeigten Posts sind akkurat bei Änderungen, die vor Kurzem vorgenommen worden. Wollen Sie jedoch mehr Sortierungsmöglichkeiten, folgen Sie dem folgenden Link.
K. Stoffel, und T. Studer. Database and Expert Systems Applications, Volume 3588 von Lecture Notes in Computer Science, Springer, Berlin / Heidelberg, (2005)
I. Clarke, O. Sandberg, B. Wiley, und T. Hong. INTERNATIONAL WORKSHOP ON DESIGNING PRIVACY ENHANCING TECHNOLOGIES: DESIGN ISSUES IN ANONYMITY AND UNOBSERVABILITY, Seite 46--66. Springer-Verlag New York, Inc., (2001)
K. Desouza, und G. Vanapalli. System Sciences, 2005. HICSS '05. Proceedings of the 38th Annual Hawaii International Conference on, Seite 27b. (Januar 2005)
C. Blackwell. Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, Seite 45:1--45:4. New York, NY, USA, ACM, (2009)
M. Allen, D. Armstrong, M. Reid, und C. Riemenschneider. Proceedings of the special interest group on management information system's 47th annual conference on Computer personnel research, Seite 95--100. New York, NY, USA, ACM, (2009)
K. Brancik, und G. Ghinita. Proceedings of the first ACM conference on Data and application security and privacy, Seite 231--236. New York, NY, USA, ACM, (2011)
S. Sanyal, A. Shelat, und A. Gupta. (2010)cite arxiv:1010.1938
Comment: 4 Pages, Invited Paper in VCON'10: 2nd Vaagdevi International
Conference on Information Technology for Real World Problems Vaagdevi College
of Engineering, Warangal, Andhra Pradesh, India, December 9-11, 2010.
R. Bhadauria, R. Chaki, N. Chaki, und S. Sanyal. (2011)cite arxiv:1109.5388
Comment: The paper is communicated to the IEEE Communications Surveys and
Tutorials.