Search results
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Security and Privacy in Mobile Information and Communication Systems > Session 3: Location and Tracking > 80-90
Lecture Notes in Computer Science > Ethics and Policy of Biometrics > Ethical and Medical Concerns > 96-101
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2007 > Workshop on Advanced Security Services (ASS 7) > 987-995
IFIP — The International Federation for Information Processing > Privacy and Identity Management for Life > Privacy for eGovernment and AAL Applications > 206-218
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Primitives and Foundations > 336-353
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Management of Privacy and Confidentiality > 186-197
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Legal Aspects > 150-171
Communications in Computer and Information Science > Secure and Trust Computing, Data Management, and Applications > 146-155
The International Series in Engineering and Computer Science > Privacy, Security and Trust within the Context of Pervasive Computing > Social and Technical Approaches to Privacy Protection > 147-155
IFIP — The International Federation for Information Processing > Smart Card Research and Advanced Applications VI > Privacy > 49-66
Lecture Notes in Computer Science > Information Security > Privacy > 159-165
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2002 > Multiparty and Multicast > 502-517
Lecture Notes in Computer Science > Universal Access in Human-Computer Interaction. Design for All and eInclusion > eInclusion Policy, Good Practice, Legislation and Security Issues > 433-442
Lecture Notes in Computer Science > Cryptology and Network Security > Identification, Authentication and Key Management > 149-161
Lecture Notes in Computer Science > Data Privacy Management and Autonomous Spontaneous Security > Data Privacy Management > 121-135