Works about DATA security


Results: 5000
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33

    Safe and sure.

    Published in:
    Computing & Control Engineering, 2006, v. 17, n. 5, p. 44, doi. 10.1049/cce:20060514
    By:
    • Stripf, W.
    Publication type:
    Article
    34
    35
    36

    Blockchain applications in PLM towards smart manufacturing.

    Published in:
    International Journal of Advanced Manufacturing Technology, 2022, v. 118, n. 7/8, p. 2669, doi. 10.1007/s00170-021-07802-z
    By:
    • Chen, Shikang;
    • Cai, Xinjiang;
    • Wang, Xingzhi;
    • Liu, Ang;
    • Lu, Qinghua;
    • Xu, Xiwei;
    • Tao, Fei
    Publication type:
    Article
    37
    38

    Secret sharing for cloud data security: a survey.

    Published in:
    VLDB Journal International Journal on Very Large Data Bases, 2017, v. 26, n. 5, p. 657, doi. 10.1007/s00778-017-0470-9
    By:
    • Attasena, Varunya;
    • Darmont, Jérôme;
    • Harbi, Nouria
    Publication type:
    Article
    39

    Query reverse engineering.

    Published in:
    VLDB Journal International Journal on Very Large Data Bases, 2014, v. 23, n. 5, p. 721, doi. 10.1007/s00778-013-0349-3
    By:
    • Tran, Quoc;
    • Chan, Chee-Yong;
    • Parthasarathy, Srinivasan
    Publication type:
    Article
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50