Works matching DE "CONFIDENTIAL communication access control"
Results: 25
Redacted Disclosure.
- Published in:
- Journal of Accounting Research (Wiley-Blackwell), 2006, v. 44, n. 4, p. 791, doi. 10.1111/j.1475-679X.2006.00216.x
- By:
- Publication type:
- Article
Principles- Versus Rules-Based Output Statistical Disclosure Control In Remote Access Environments.
- Published in:
- IASSIST Quarterly, 2015, v. 39, n. 2, p. 5, doi. 10.29173/iq778
- By:
- Publication type:
- Article
COMMUNICATIONS PRIVACY IN THE MILITARY.
- Published in:
- Berkeley Technology Law Journal, 2010, v. 25, n. 2, p. 831
- By:
- Publication type:
- Article
Adaptive Context-Aware Access Control Model for Ubiquitous Learning Environment.
- Published in:
- BVICAM's International Journal of Information Technology, 2016, v. 8, n. 1, p. 922
- By:
- Publication type:
- Article
Super-Activation as a Unique Feature of Secure Communication in Malicious Environments.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 24, doi. 10.3390/info7020024
- By:
- Publication type:
- Article
Understanding the US Food and Drug Administration's May 2007 Guidance - 'Computerized Systems Used in Clinical Investigations'.
- Published in:
- Drug Development, 2010, v. 5, p. 56
- By:
- Publication type:
- Article
The Growing Complexity of Clinical Trials Requires a Software-as-a-Service-based Approach to Document Exchange.
- Published in:
- Drug Development, 2010, v. 5, p. 50
- By:
- Publication type:
- Article
Understanding the Political PNR Debate in Europe: A Discourse Analytical Perspective.
- Published in:
- European Politics & Society, 2015, v. 16, n. 2, p. 241, doi. 10.1080/23745118.2014.997593
- By:
- Publication type:
- Article
Disclosure Risk from Factor Scores.
- Published in:
- Journal of Official Statistics (JOS), 2014, v. 30, n. 1, p. 107, doi. 10.2478/jos-2014-0006
- By:
- Publication type:
- Article
Strongly Menger Connectedness of a Class of Recursive Networks.
- Published in:
- Computer Journal, 2024, v. 67, n. 6, p. 2030, doi. 10.1093/comjnl/bxad121
- By:
- Publication type:
- Article
Utilizing Machine Learning Techniques to Assess Technical Document Quality.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 6, p. 57, doi. 10.14569/ijacsa.2024.0150608
- By:
- Publication type:
- Article
Access to Documents, Accountability and the Rule of Law-Do Private Watchdogs Matter?
- Published in:
- European Law Journal, 2014, v. 20, n. 4, p. 520, doi. 10.1111/eulj.12052
- By:
- Publication type:
- Article
A secret transmission method via numeric data with a blind authentication capability.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 13, p. 16623, doi. 10.1007/s11042-017-5231-7
- By:
- Publication type:
- Article
Enforcing mobile security with location-aware role-based access control.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 5, p. 429, doi. 10.1002/sec.879
- By:
- Publication type:
- Article
A Review On Video Steganography Techniques.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 1015
- By:
- Publication type:
- Article
Combined Strength of Steganography and Cryptography- A Literature Survey.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 1007
- By:
- Publication type:
- Article
Confidentiality of Patient Communications.
- Published in:
- South Dakota Medicine, 2014, v. 67, n. 5, p. 213
- Publication type:
- Article
CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection.
- Published in:
- International Journal of Information Security, 2011, v. 10, n. 5, p. 301, doi. 10.1007/s10207-011-0133-6
- By:
- Publication type:
- Article
Keeping secrets in incomplete databases.
- Published in:
- International Journal of Information Security, 2008, v. 7, n. 3, p. 199, doi. 10.1007/s10207-007-0037-7
- By:
- Publication type:
- Article
Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.
- Published in:
- Sensors (14248220), 2017, v. 17, n. 4, p. 733, doi. 10.3390/s17040733
- By:
- Publication type:
- Article
Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security.
- Published in:
- Computer Systems Science & Engineering, 2024, v. 48, n. 3, p. 739, doi. 10.32604/csse.2024.042607
- By:
- Publication type:
- Article
PRIVACY AND CONFIDENTIALITY: THE IMPORTANCE OF CONTEXT.
- Published in:
- Monist, 2008, v. 91, n. 1, p. 52
- By:
- Publication type:
- Article
THE FREEDOM OF INFORMATION ACT AND ITS EXCEPTIONS.
- Published in:
- Connecticut Bar Journal, 2018, v. 91, n. 4, p. 350
- By:
- Publication type:
- Article
Openness of patients' reporting with use of electronic records: psychiatric clinicians' views.
- Published in:
- Journal of the American Medical Informatics Association, 2010, v. 17, n. 1, p. 54, doi. 10.1197/jamia.M3341
- By:
- Publication type:
- Article
Near-optimal pitch of a moiré grating in dynamic visual cryptography.
- Published in:
- Journal of Vibroengineering, 2018, v. 20, n. 6, p. 2504, doi. 10.21595/jve.2018.20189
- By:
- Publication type:
- Article