Works matching DE "DATA protection research"
Results: 61
A Study on the Authentication and Security of Financial Settlement Using the Finger Vein Technology in Wireless Internet Environment.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 3, p. 761, doi. 10.1007/s11277-015-3116-5
- By:
- Publication type:
- Article
A Cloud Computing-Based Analysis System for the National R&D Information Concerning with the Data Security.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 3, p. 977, doi. 10.1007/s11277-016-3359-9
- By:
- Publication type:
- Article
Injecting Subject Policy into Access Control for Strengthening the Protection of Personal Information.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 3, p. 715, doi. 10.1007/s11277-015-3094-7
- By:
- Publication type:
- Article
Personal data leakage prevention system for network channels.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 279, doi. 10.18372/2225-5036.20.7556
- By:
- Publication type:
- Article
Stretching the Limit, The Functioning of the GDPR's Notion of Consent in the context of Data Intermediary Services.
- Published in:
- European Data Protection Law Review (EDPL), 2022, v. 8, n. 2, p. 238, doi. 10.21552/edpl/2022/2/10
- By:
- Publication type:
- Article
Integrating privacy and ethical impact assessments.
- Published in:
- Science & Public Policy (SPP), 2013, v. 40, n. 6, p. 755, doi. 10.1093/scipol/sct083
- By:
- Publication type:
- Article
Privacy Expectations of Social Media Users: The Role of Informed Consent in Privacy Policies.
- Published in:
- Policy & Internet, 2014, v. 6, n. 3, p. 268, doi. 10.1002/1944-2866.POI366
- By:
- Publication type:
- Article
Big Data and the 21<sup>st</sup> Century Church.
- Published in:
- Dialog: A Journal of Theology, 2014, v. 53, n. 1, p. 23, doi. 10.1111/dial.12085
- By:
- Publication type:
- Article
FACEBOOK TE TIENE FICHADO.
- Published in:
- Revista de Comunicación (1888198X), 2011, n. 21, p. 6
- Publication type:
- Article
Application of Digital Rights Management in Library.
- Published in:
- DESIDOC Journal of Library & Information Technology, 2014, v. 34, n. 1, p. 11, doi. 10.14429/djlit.34.5490
- By:
- Publication type:
- Article
Differentiated quality-of-protection provisioning with probabilistic-shared risk link group in survivable flexi-grid optical networks.
- Published in:
- Optical Engineering, 2014, v. 53, n. 6, p. 1, doi. 10.1117/1.OE.53.6.066111
- By:
- Publication type:
- Article
Three random phase encryption technology in the Fresnel diffraction system based on computer-generated hologram.
- Published in:
- Optical Engineering, 2014, v. 53, n. 1, p. 1, doi. 10.1117/1.OE.53.1.011004
- By:
- Publication type:
- Article
An unsupervised approach for traffic trace sanitization based on the entropy spaces.
- Published in:
- Telecommunication Systems, 2016, v. 61, n. 3, p. 609, doi. 10.1007/s11235-015-0017-6
- By:
- Publication type:
- Article
Data Protection in the Federal Republic of Germany and the European Union: An Unequal Playing Field.
- Published in:
- German Law Journal, 2014, v. 15, n. 3, p. 461, doi. 10.1017/s207183220001899x
- By:
- Publication type:
- Article
A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 5, p. 1313, doi. 10.3837/tiis.2013.05.021
- By:
- Publication type:
- Article
Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 5, p. 1328, doi. 10.3837/tiis.2013.05.022
- By:
- Publication type:
- Article
MBNS Steganogram Detection and Payload Capacity Estimation Exploiting the Statistical Moments of Entropy Measure.
- Published in:
- Information Security Journal: A Global Perspective, 2011, v. 20, n. 2, p. 78, doi. 10.1080/19393555.2011.560922
- By:
- Publication type:
- Article
Investigating Information Security Awareness: Research and Practice Gaps.
- Published in:
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 5/6, p. 207, doi. 10.1080/19393550802492487
- By:
- Publication type:
- Article
Information Security Issues in a Digital Library Environment: A Literature Review.
- Published in:
- Information World / Bilgi Dünyası, 2012, v. 13, n. 1, p. 117, doi. 10.15612/bd.2012.171
- By:
- Publication type:
- Article
PROTECȚIA DATELOR CU CARACTER PERSONAL ÎN CADRUL PROCESULUI DECIZIONAL ADMINISTRATIV.
- Published in:
- Strategic Universe Journal / Univers Strategic, 2014, n. 2, p. 111
- By:
- Publication type:
- Article
Electronic retention: what does your mobile phone reveal about you?
- Published in:
- International Journal of Information Security, 2011, v. 10, n. 6, p. 337, doi. 10.1007/s10207-011-0144-3
- By:
- Publication type:
- Article
„Persoana vizată”, titularul dreptului la protecšia datelor personale: anonimizarea şi pseudonimizarea.
- Published in:
- Review of Juridical Sciences / Revista de Științe Juridice, 2013, v. 23, n. 1, p. 237
- By:
- Publication type:
- Article
Cross-border exchange of information between the member states of the European Union aimed at preventing and combating violations of traffic rules affecting road safety. Some critical opinions.
- Published in:
- Acta Universitatis George Bacovia. Juridica, 2016, v. 5, n. 1, p. 59
- By:
- Publication type:
- Article
Database Fortification using Demand Data Enciphering.
- Published in:
- International Journal of Computer Science & Management Studies, 2013, v. 13, n. 4, p. 37
- By:
- Publication type:
- Article
MagicNET: mobile agents data protection system.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2015, v. 26, n. 5, p. 813, doi. 10.1002/ett.2742
- By:
- Publication type:
- Article
MODELO DE ACESSO MULTINÍVEL EM SISTEMAS WEB UTILIZANDO PROGRAMAÇÃO ORIENTADA A ASPECTOS.
- Published in:
- Brazilian Journal of Scientific Administration / Revista Brasileira de Administração Científica, 2012, v. 3, n. 2, p. 57, doi. 10.6008/ESS2179-684X.2012.002.0004
- By:
- Publication type:
- Article
PROBLEMY ANONIMIZACJI DOKUMENTÓW MEDYCZNYCH . CZĘŚĆ 2. ANONIMIZACJA ZAAWANSOWANA ORAZ STEROWANA PRZEZ POSIADACZA DANYCH WRAŻLIWYCH.
- Published in:
- Higher School's Pulse, 2014, v. 8, n. 2, p. 13, doi. 10.5604/01.3001.0003.3161
- By:
- Publication type:
- Article
Economic and Legal Conceptual Framework of Viral Marketing.
- Published in:
- Marketing (0354-3471), 2015, v. 46, n. 2, p. 115, doi. 10.5937/markt1502115k
- By:
- Publication type:
- Article
Reliability and Performance of Mirrored Disk Organizations.
- Published in:
- Computer Journal, 2008, v. 51, n. 6, p. 615, doi. 10.1093/comjnl/bxm079
- By:
- Publication type:
- Article
Privacy Concern in Western Balkan Countries: Developing a Typology of Citizens.
- Published in:
- Journal of Balkan & Near Eastern Studies, 2015, v. 17, n. 1, p. 29, doi. 10.1080/19448953.2014.990278
- By:
- Publication type:
- Article
DATA INTEGRITY: THE VALUE OF CLINICAL CONTEXT IN DATA PREPARATION AND ENTRY.
- Published in:
- Oncology Nursing Forum, 2007, v. 34, n. 1, p. 245
- By:
- Publication type:
- Article
BERICHT ÜBER DEN VERBUNDTAG 2010 DES ÖSTER-REICHISCHEN BIBLIOTHEKENVERBUNDES (INNSBRUCK, 20.5.2010).
- Published in:
- 2010
- By:
- Publication type:
- Proceeding
INSIDERS' PROTECTION OF ORGANIZATIONAL INFORMATION ASSETS: DEVELOPMENT OF A SYSTEMATICS-BASED TAXONOMY AND THEORY OF DIVERSITY FOR PROTECTION-MOTIVATED BEHAVIORS.
- Published in:
- MIS Quarterly, 2013, v. 37, n. 4, p. 1189
- By:
- Publication type:
- Article
THE PROPOSAL OF THE EUROPEAN COMMISSION FOR A DATA PROTECTION DIRECTIVE IN THE POLICE AND CRIMINAL JUSTICE FIELD.
- Published in:
- International Journal on Information Technologies & Security, 2015, v. 7, n. 2, p. 37
- By:
- Publication type:
- Article
Security and Administrative of Limited Data Servicing in Cloud Computing.
- Published in:
- International Journal of Advanced Research in Computer Science, 2015, v. 6, n. 6, p. 61
- By:
- Publication type:
- Article
Image Encryption for Separable Reversible Data Hiding.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 5, p. 230
- By:
- Publication type:
- Article
A Review on Detection of Session Hijacking and Ip Spoofing.
- Published in:
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 9, p. 104
- By:
- Publication type:
- Article
Protected Multi-tiered Sensor Network Uses Spatiotemporal Feature.
- Published in:
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 1, p. 124
- By:
- Publication type:
- Article
Fuzzy Approach for Intrusion Detection System: A Survey.
- Published in:
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 1, p. 101
- By:
- Publication type:
- Article
Security Policies of Sharing Health Care Data with Authentication and Authorization.
- Published in:
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 5, p. 56
- By:
- Publication type:
- Article
NMIBAS: A NOVEL MULTI-RECEIVER ID-BASED ANONYMOUS SIGNCRYPTION WITH DECRYPTION FAIRNESS.
- Published in:
- Computing & Informatics, 2013, v. 32, n. 3, p. 441
- By:
- Publication type:
- Article
Trust and Privacy Solutions Based on Holistic Service Requirements.
- Published in:
- Sensors (14248220), 2016, v. 16, n. 1, p. 16, doi. 10.3390/s16010016
- By:
- Publication type:
- Article
Sensor Data Security Level Estimation Scheme for Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2015, v. 15, n. 1, p. 2104, doi. 10.3390/s150102104
- By:
- Publication type:
- Article
Double Cluster Heads Model for Secure and Accurate Data Fusion in Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2015, v. 15, n. 1, p. 2021, doi. 10.3390/s150102021
- By:
- Publication type:
- Article
Privacy-Preserving Data Aggregation in Two-Tiered Wireless Sensor Networks with Mobile Nodes.
- Published in:
- Sensors (14248220), 2014, v. 14, n. 11, p. 21174, doi. 10.3390/s141121174
- By:
- Publication type:
- Article
Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess.
- Published in:
- Journal of the Association for Information Systems, 2016, v. 17, n. 1, p. 39
- By:
- Publication type:
- Article
Secure Information Market: A Model to Support Information Sharing, Data Fusion, Privacy, and Decisions.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 1, p. 269, doi. 10.2308/isys-50705
- By:
- Publication type:
- Article
Understanding Compliance with Bring Your Own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 1, p. 209, doi. 10.2308/isys-50704
- By:
- Publication type:
- Article
Privacy Analysis of User Behavior Using Alignments.
- Published in:
- IT: Information Technology, 2013, v. 55, n. 6, p. 255, doi. 10.1524/itit.2013.2006
- By:
- Publication type:
- Article
ENCODING THE INFORMATION IN A LOGISTICAL SYSTEM.
- Published in:
- Journal Scientific & Applied Research, 2013, v. 4, p. 127, doi. 10.46687/jsar.v4i1.90
- By:
- Publication type:
- Article