Works matching DE "DATA protection"
Results: 5000
Boj za prevlado nad internetom - internetno upravljanje in nadzorovanje.
- Published in:
- Journal of Criminal Investigation & Criminology / Revija za Kriminalistiko in Kriminologijo, 2008, v. 59, n. 4, p. 321
- By:
- Publication type:
- Article
VOICES OF SOUTHERN PATAGONIA: DIGITAL PRESERVATION OF SOUND MATERIAL.
- Published in:
- IASA Journal, 2015, n. 44, p. 105
- By:
- Publication type:
- Article
Consumers’ Willingness to Share Personal Data: Implications for Newspapers’ Business Models.
- Published in:
- JMM: The International Journal on Media Management, 2016, v. 18, n. 1, p. 25, doi. 10.1080/14241277.2016.1166429
- By:
- Publication type:
- Article
Data, data everywhere...
- Published in:
- 2005
- Publication type:
- Editorial
The Trouble with Algorithmic Decisions.
- Published in:
- Science, Technology & Human Values, 2016, v. 41, n. 1, p. 118, doi. 10.1177/0162243915605575
- By:
- Publication type:
- Article
New Knowledge from Old Data.
- Published in:
- Science, Technology & Human Values, 2008, v. 33, n. 5, p. 631, doi. 10.1177/0162243907306704
- By:
- Publication type:
- Article
Overseeing Research Practice.
- Published in:
- Science, Technology & Human Values, 2008, v. 33, n. 5, p. 605, doi. 10.1177/0162243907306702
- By:
- Publication type:
- Article
Never lose data again with online backup: Backing up your electronic data off site isn't just smart; it could soon be required.
- Published in:
- Urology Times, 2006, v. 34, n. 13, p. 18
- Publication type:
- Article
Commonwealth Update.
- Published in:
- Round Table, 2017, v. 106, n. 1, p. 1, doi. 10.1080/00358533.2017.1285527
- By:
- Publication type:
- Article
LA BIBLIOTECA PÚBLICA COMO COMUNICADORA: PROCEDIMIENTOS, CANALES Y DIFICULTADES. EL EJEMPLO DE LA REGIÓN DE MURCIA (ESPAÑA).
- Published in:
- Anales de Documentación, 2020, v. 23, n. 2, p. 1, doi. 10.6018/analesdoc.403411
- By:
- Publication type:
- Article
Symbolic and Nonsymbolic Pathways of Number Processing.
- Published in:
- Philosophical Psychology, 2008, v. 21, n. 4, p. 539, doi. 10.1080/09515080802285545
- By:
- Publication type:
- Article
TRATAMIENTO DE DATOS PARA CREDIT SCORING Y USO SECUNDARIO DE DATOS. EXAMEN DESDE LA PRESUNCIÓN DE COMPATIBILIDAD DEL ART. 5.1.B RGPD.
- Published in:
- Revista Jurídica de la Universidad Autonóma de Madrid, 2024, n. 50, p. 37, doi. 10.15366/rjuam2024.50.001
- By:
- Publication type:
- Article
LA CONSTITUCIÓN DEL ALGORITMO.
- Published in:
- Revista Jurídica de la Universidad Autonóma de Madrid, 2024, n. 49, p. 221
- By:
- Publication type:
- Article
COMPETENCIA JUDICIAL INTERNACIONAL Y PROTECCIÓN DE DATOS PERSONALES EN EL REGLAMENTO GENERAL DE PROTECCIÓN DE DATOS: SU ENCAJE CON EL REGLAMENTO BRUSELAS I BIS.
- Published in:
- Revista Jurídica de la Universidad Autonóma de Madrid, 2022, n. 45, p. 127, doi. 10.15366/rjuam2022.45.006
- By:
- Publication type:
- Article
EL NUEVO REGLAMENTO DE PROTECCIÓN DE DATOS PERSONALES. ANÁLISIS DE SU EFICACIA EN LA DETERMINACIÓN DE SU ÁMBITO TERRITORIAL Y LOS REMEDIOS EN CASO DE TRATAMIENTO ILÍCITO.
- Published in:
- Revista Jurídica de la Universidad Autonóma de Madrid, 2018, n. 37, p. 415, doi. 10.15366/rjuam2018.37.015
- By:
- Publication type:
- Article
A VUELTAS CON EL "DERECHO AL OLVIDO". CONSTRUCCIÓN NORMATIVA Y JURISPRUDENCIAL DEL DERECHO DE PROTECCIÓN DE DATOS DE CARÁCTER PERSONAL EN EL ENTORNO DIGITAL.
- Published in:
- Revista Jurídica de la Universidad Autonóma de Madrid, 2014, n. 30, p. 129
- By:
- Publication type:
- Article
IDAS Y VENIDAS DE LA "LEY SINDE". COMENTARIO A LA DISPOSICIÓN FINAL 43<sup>a</sup> DE LA LEY 2/2011, DE 4 DE MARZO, DE ECONOMÍA SOSTENIBLE.
- Published in:
- Revista Jurídica de la Universidad Autonóma de Madrid, 2011, n. 23, p. 215
- By:
- Publication type:
- Article
UNIVERSALLY COMPOSABLE BLIND SIGNATURE FUNCTIONALITY.
- Published in:
- International Journal of Information Technology & Decision Making, 2004, v. 3, n. 4, p. 673, doi. 10.1142/S0219622004001318
- By:
- Publication type:
- Article
DECISION MAKING FOR NETWORK HEALTH ASSESSMENT IN AN INTELLIGENT INTRUSION DETECTION SYSTEM ARCHITECTURE.
- Published in:
- International Journal of Information Technology & Decision Making, 2004, v. 3, n. 2, p. 281, doi. 10.1142/S0219622004001057
- By:
- Publication type:
- Article
Electret Molecular Configuration Induced Programmable Photonic Memory for Advanced Logic Operation and Data Encryption.
- Published in:
- Advanced Functional Materials, 2023, v. 33, n. 28, p. 1, doi. 10.1002/adfm.202213341
- By:
- Publication type:
- Article
A Repeatable Dual‐Encryption Platform from Recyclable Thermosets with Self‐Healing Ability and Shape Memory Effect.
- Published in:
- Advanced Functional Materials, 2022, v. 32, n. 34, p. 1, doi. 10.1002/adfm.202205177
- By:
- Publication type:
- Article
3D Fluorescent Hydrogel Origami for Multistage Data Security Protection.
- Published in:
- Advanced Functional Materials, 2019, v. 29, n. 46, p. N.PAG, doi. 10.1002/adfm.201905514
- By:
- Publication type:
- Article
On the infeasibility of modeling polymorphic shellcode.
- Published in:
- Machine Learning, 2010, v. 81, n. 2, p. 179, doi. 10.1007/s10994-009-5143-5
- By:
- Publication type:
- Article
Digital twin for product versus project lifecycles' development in manufacturing and construction industries.
- Published in:
- Journal of Intelligent Manufacturing, 2025, v. 36, n. 2, p. 801, doi. 10.1007/s10845-023-02301-2
- By:
- Publication type:
- Article
The long-term preservation of identifiable personal data: a comparative archival perspective on privacy regulatory models in the European Union, Australia, Canada and the United States.
- Published in:
- Archival Science, 2007, v. 7, n. 1, p. 107, doi. 10.1007/s10502-007-9055-5
- By:
- Publication type:
- Article
Mapping terminological variation and ideology in data protection laws.
- Published in:
- Terminology, 2020, v. 26, n. 2, p. 159, doi. 10.1075/term.00049.pei
- By:
- Publication type:
- Article
Secure speech coding communication using hyperchaotic key generators for AMR-WB codec.
- Published in:
- Multimedia Systems, 2021, v. 27, n. 2, p. 247, doi. 10.1007/s00530-020-00738-6
- By:
- Publication type:
- Article
Security and privacy requirements in interactive TV.
- Published in:
- Multimedia Systems, 2011, v. 17, n. 5, p. 393, doi. 10.1007/s00530-010-0221-x
- By:
- Publication type:
- Article
A survey on JPEG2000 encryption.
- Published in:
- Multimedia Systems, 2009, v. 15, n. 4, p. 243, doi. 10.1007/s00530-008-0150-0
- By:
- Publication type:
- Article
On the Suitability of Applying WordNet to Privacy Measurement.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 1, p. 359, doi. 10.1007/s11277-018-5447-5
- By:
- Publication type:
- Article
A High Security RFID System Authentication Protocol Design Base on Cloud Computer.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 2, p. 1255, doi. 10.1007/s11277-017-5192-1
- By:
- Publication type:
- Article
Cooperative Caching for Efficient Data Search in Mobile P2P Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 3, p. 4087, doi. 10.1007/s11277-017-4714-1
- By:
- Publication type:
- Article
On Erasure Coding in Intermittently Connected Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 1, p. 1579, doi. 10.1007/s11277-017-4587-3
- By:
- Publication type:
- Article
A Cluster-Based Cooperative Spectrum Sensing Strategy to Maximize Achievable Throughput.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 3, p. 4557, doi. 10.1007/s11277-017-4403-0
- By:
- Publication type:
- Article
An Improved Algorithm of Individuation K-Anonymity for Multiple Sensitive Attributes.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2003, doi. 10.1007/s11277-016-3922-4
- By:
- Publication type:
- Article
A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 1215, doi. 10.1007/s11277-016-3825-4
- By:
- Publication type:
- Article
Construction of Pseudoinverse Matrix Over Finite Field and Its Applications.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 3, p. 455, doi. 10.1007/s11277-015-3095-6
- By:
- Publication type:
- Article
A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 3, p. 1263, doi. 10.1007/s11277-016-3681-2
- By:
- Publication type:
- Article
On Supporting Secure Information Distribution in Heterogeneous Systems Using Standard Technologies.
- Published in:
- Wireless Personal Communications, 2014, v. 76, n. 1, p. 99, doi. 10.1007/s11277-013-1482-4
- By:
- Publication type:
- Article
To Federate or Not To Federate: A Reputation-Based Mechanism to Dynamize Cooperation in Identity Management.
- Published in:
- Wireless Personal Communications, 2014, v. 75, n. 3, p. 1769, doi. 10.1007/s11277-013-1338-y
- By:
- Publication type:
- Article
Efficient Linear Homomorphic Encryption from LWE Over Rings.
- Published in:
- Wireless Personal Communications, 2014, v. 74, n. 2, p. 1005, doi. 10.1007/s11277-013-1335-1
- By:
- Publication type:
- Article
A New Secure Authenticated Group Key Transfer Protocol.
- Published in:
- Wireless Personal Communications, 2014, v. 74, n. 2, p. 457, doi. 10.1007/s11277-013-1298-2
- By:
- Publication type:
- Article
Integrating Identity-Based Encryption in the Return Routability Protocol to Enhance Signal Security in Mobile IPv6.
- Published in:
- Wireless Personal Communications, 2013, v. 68, n. 3, p. 655, doi. 10.1007/s11277-011-0474-5
- By:
- Publication type:
- Article
An Ad Hoc Routing Protocol with Multiple Backup Routes.
- Published in:
- Wireless Personal Communications, 2011, v. 57, n. 4, p. 533, doi. 10.1007/s11277-009-9860-7
- By:
- Publication type:
- Article
A Distributed Energy-Aware Routing Protocol for Underwater Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2011, v. 57, n. 4, p. 607, doi. 10.1007/s11277-009-9864-3
- By:
- Publication type:
- Article
A Security Model Based on Relational Model for Semantic Sensor Networks.
- Published in:
- Wireless Personal Communications, 2011, v. 56, n. 1, p. 131, doi. 10.1007/s11277-009-9878-x
- By:
- Publication type:
- Article
An Ontology-driven Model for Digital Forensics Investigations of Computer Incidents under the Ubiquitous Computing Environments.
- Published in:
- Wireless Personal Communications, 2011, v. 56, n. 1, p. 5, doi. 10.1007/s11277-009-9886-x
- By:
- Publication type:
- Article
Verifiable Threshold Scheme in Multi-Secret Sharing Distributions upon Extensions of ECC.
- Published in:
- Wireless Personal Communications, 2011, v. 56, n. 1, p. 173, doi. 10.1007/s11277-009-9875-0
- By:
- Publication type:
- Article
Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents.
- Published in:
- Wireless Personal Communications, 2011, v. 56, n. 1, p. 73, doi. 10.1007/s11277-009-9876-z
- By:
- Publication type:
- Article
Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks.
- Published in:
- Wireless Personal Communications, 2010, v. 52, n. 2, p. 393, doi. 10.1007/s11277-008-9655-2
- By:
- Publication type:
- Article