Search Results - "data privacy"
Suggested Topics within your search.
Suggested Topics within your search.
- Business mathematics & systems 7
- Computer science 6
- Entrepreneurship 6
- Computer security 5
- Research & development management 5
- Business & management 4
- Innovation and Technology Management 4
- Technological innovations 4
- Data and Information Security 3
- Data protection 3
- Ethical & social aspects of IT 3
- Ethics & moral philosophy 3
- Finance 3
- Media studies 3
- Technology: general issues 3
- Agriculture & farming 2
- Business applications 2
- Business information services 2
- Business strategy 2
- Company, commercial & competition law 2
- Comparative law 2
- Data Analysis and Big Data 2
- Data protection law 2
- Electronic commerce 2
- History of engineering & technology 2
- IT in Business 2
- Information technology industries 2
- Information technology: general issues 2
- Internet & WWW industries 2
- Law 2
-
101
-
102
-
103
-
104
The Cloud-to-Thing Continuum Opportunities and Challenges in Cloud, Fog and Edge Computing /
Published 2020Table of Contents: “…Optimising availability in IoT -- Chapter 5 - End to End Security and Identity Management Across the Cloud-to-Things Continuum -- Chapter 6 - Trust and Data Privacy in the Internet of Things -- Chapter 7 - Monitoring and Visualizing the Internet of Things -- Chapter 8 - Capturing the Business Value of IOT.…”
Link to Metadata
Electronic eBook -
105
Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessalonik...
Published 2018Table of Contents: “…Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.…”
Link to Metadata
Electronic eBook -
106
The application of metaverse in occupational health
Published 2024Connect to this object online.
Book -
107
-
108
-
109
-
110
-
111
-
112
-
113
-
114
-
115
-
116
-
117
-
118
-
119
-
120