Works matching DE "CONFIDENTIAL communication access control"
1
- Information (2078-2489), 2016, v. 7, n. 2, p. 24, doi. 10.3390/info7020024
- Schaefer, Rafael F.;
- Boche, Holger;
- Poor, H. Vincent
- Article
2
- European Law Journal, 2014, v. 20, n. 4, p. 520, doi. 10.1111/eulj.12052
- Article
3
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 1015
- Saini, Anamika;
- Joshi, Kamaldeep;
- Allawadhi, Sachin
- Article
4
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 1007
- Baby, Aiswarya;
- Krishnan, Hema
- Article
5
- Computer Systems Science & Engineering, 2024, v. 48, n. 3, p. 739, doi. 10.32604/csse.2024.042607
- Ganguli, Chirag;
- Shandilya, Shishir Kumar;
- Gregus, Michal;
- Basystiuk, Oleh
- Article
6
- European Politics & Society, 2015, v. 16, n. 2, p. 241, doi. 10.1080/23745118.2014.997593
- Huijboom, Noor;
- Bodea, Gabriela
- Article
7
- Journal of the American Medical Informatics Association, 2010, v. 17, n. 1, p. 54, doi. 10.1197/jamia.M3341
- Salomon, Ronald M.;
- Blackford, Jennifer Urbano;
- Rosenbloom, S. Trent;
- Seidel, Sandra;
- Clayton, Ellen Wright;
- Dilts, David M.;
- Finder, Stuart G.
- Article
8
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 6, p. 57, doi. 10.14569/ijacsa.2024.0150608
- Iqbal, Muhammad Junaid;
- Zanzotto, Fabio Massimo;
- Nawaz, Usman
- Article
9
- IASSIST Quarterly, 2015, v. 39, n. 2, p. 5, doi. 10.29173/iq778
- Ritchie, Felix;
- Elliot, Mark
- Article
10
- Berkeley Technology Law Journal, 2010, v. 25, n. 2, p. 831
- Article
11
- Monist, 2008, v. 91, n. 1, p. 52
- Francis, Leslie Pickering
- Article
12
- South Dakota Medicine, 2014, v. 67, n. 5, p. 213
- Article
13
- Connecticut Bar Journal, 2018, v. 91, n. 4, p. 350
- Article
14
- Multimedia Tools & Applications, 2018, v. 77, n. 13, p. 16623, doi. 10.1007/s11042-017-5231-7
- Article
15
- Drug Development, 2010, v. 5, p. 56
- Article
16
- Drug Development, 2010, v. 5, p. 50
- Article
17
- Sensors (14248220), 2017, v. 17, n. 4, p. 733, doi. 10.3390/s17040733
- Rivero-García, Alexandra;
- Santos-González, Iván;
- Hernández-Goya, Candelaria;
- Caballero-Gil, Pino;
- Yung, Moti
- Article
18
- BVICAM's International Journal of Information Technology, 2016, v. 8, n. 1, p. 922
- Jagadamba, G.;
- Sathish Babu, B.
- Article
19
- International Journal of Information Security, 2011, v. 10, n. 5, p. 301, doi. 10.1007/s10207-011-0133-6
- Marconi, Luciana;
- Conti, Mauro;
- Di Pietro, Roberto
- Article
20
- International Journal of Information Security, 2008, v. 7, n. 3, p. 199, doi. 10.1007/s10207-007-0037-7
- Biskup, Joachim;
- Weibert, Torben
- Article
21
- Security & Communication Networks, 2016, v. 9, n. 5, p. 429, doi. 10.1002/sec.879
- Ulltveit-Moe, Nils;
- Oleshchuk, Vladimir
- Article
22
- Journal of Vibroengineering, 2018, v. 20, n. 6, p. 2504, doi. 10.21595/jve.2018.20189
- Saunoriene, Loreta;
- Petrauskiene, Vilma;
- Aleksiene, Sandra;
- Ragulskiene, Jurate
- Article
23
- Journal of Official Statistics (JOS), 2014, v. 30, n. 1, p. 107, doi. 10.2478/jos-2014-0006
- Drechsler, Jörg;
- Ronning, Gerd;
- Bleninger, Philipp
- Article
24
- Journal of Accounting Research (Wiley-Blackwell), 2006, v. 44, n. 4, p. 791, doi. 10.1111/j.1475-679X.2006.00216.x
- VERRECCHIA, ROBERT E.;
- WEBER, JOSEPH
- Article
25
- Computer Journal, 2024, v. 67, n. 6, p. 2030, doi. 10.1093/comjnl/bxad121
- Wang, Yihong;
- Cheng, Baolei;
- Wang, Yan;
- Yu, Jia;
- Fan, Jianxi
- Article