Wyniki wyszukiwania dla: Marco Casassa-Mont
Communications in Computer and Information Science > Secure and Trust Computing, Data Management, and Applications > 146-155
Lecture Notes in Computer Science > Trust, Privacy, and Security in Digital Business > Privacy > 226-235
Lecture Notes in Computer Science > Digital Privacy > What Technology Can Do for Privacy and How > 331-361
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Access Control > 153-164
Lecture Notes in Computer Science > Digital Privacy > What Technology Can Do for Privacy and How > 569-595
Lecture Notes in Computer Science > Trust and Privacy in Digital Business > Session 4: Privacy Enhancing Technologies and Privacy Management > 91-102
Lecture Notes in Computer Science > Trust and Privacy in Digital Business > Session 1: Privacy and Identity Management > 1-10
Lecture Notes in Computer Science > Digital Privacy > What Technology Can Do for Privacy and How > 397-426
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Session 3: Identity Management and Usage Control > 94-103
Lecture Notes in Computer Science > Trust, Privacy, and Security in Digital Business > Privacy > 236-245
Lecture Notes in Computer Science > Trust Management > Full Papers > 267-282
Lecture Notes in Computer Science > Privacy Enhancing Technologies > 6th Workshop on Privacy Enhancing Technologies > 118-134
Lecture Notes in Computer Science > Infrastructure Security > Identification, Authentication, and Process > 59-72
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Trustbus’7 Keynote Talk Privacy Enhanced Personalization > 2-2
Communications in Computer and Information Science > Secure and Trust Computing, Data Management, and Applications > 166-173
IFIP — The International Federation for Information Processing > Privacy and Identity Management for Life > Privacy Policies > 258-270
International Journal of Information Security > 2015 > 14 > 4 > 319-334