Search

Your search keyword '"Data_MISCELLANEOUS"' showing total 3,511 results

Search Constraints

Start Over You searched for: Descriptor "Data_MISCELLANEOUS" Remove constraint Descriptor: "Data_MISCELLANEOUS" Language english Remove constraint Language: english
3,511 results on '"Data_MISCELLANEOUS"'

Search Results

1. There is an elephant in the room: towards a critique on the use of fairness in biometrics

2. Trust Based Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks

3. An Encrypted Cloud Email Searching and Filtering Scheme Based on Hidden Policy Ciphertext-Policy Attribute-Based Encryption With Keyword Search

4. Fingerprint-based robust medical image watermarking in hybrid transform

5. A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol

6. Blind Camcording-Resistant Video Watermarking in the DTCWT and SVD Domain

7. Understanding the effects of conceptual and analytical choices on ‘finding’ the privacy paradox:A specification curve analysis of large-scale survey data

8. Trust in financial institutions: A survey

9. Blockchain-Based Electronic Health Records Sharing Scheme with Data Privacy Verifiable

10. Provocări tehnologice în crearea standardelor pentru analiza amprentelor digitale // Technological Challenges in Creating Standards for Fingerprint Analysis

11. Auditory memory among a sample of students with learning disabilities in English in Irbid Governorate

12. DPLQ: Location‐based service privacy protection scheme based on differential privacy

13. A PARITY FOR 2-COLOURABLE LINKS

14. Evaluating biometrics by using a hybrid MCDM model

15. Verifiable image revision from chameleon hashes

16. Leading the way together

17. A blind robust color image watermarking method based on discrete wavelet transform and discrete cosine transform using grayscale watermark image

18. Predicting Power Conversion Efficiency of Organic Photovoltaics: Models and Data Analysis

19. Anonymous deniable predicate authentication scheme with revocability

20. Replication and trustworthiness

21. Biometric Systems De-Identification: Current Advancements and Future Directions

22. Facial Feature Removal for Anonymization of Neurological Image Data

23. Gastric Bypass Sensitizes Sympathetic and Thermogenic Activity of Brown Adipose Tissue to Cold Exposure

24. Limits of data anonymity: lack of public awareness risks trust in health system activities

25. Topology and adjunction in promise constraint satisfaction

26. Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing

27. Equi-joins over encrypted data for series of queries

28. Beyond the crisis : trust repair in an interorganizational network

29. Smooth Anonymity for Sparse Binary Matrices

30. A review of schemes for fingerprint image quality computation

31. Ground truth of Encrypted Traffic Detection

32. Robust Watermarking for Video Forgery Detection with Improved Imperceptibility and Robustness

33. Development of a method for improving stability method of applying digital watermarks to digital images

34. RBP: a website fingerprinting obfuscation method against intelligent fingerprinting attacks

35. Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment

36. A Review on Various Applications of Reputation Based Trust Management

37. Advances in healthcare wearable devices

38. Designerly ways of knowing in HRI

39. Producing secure multimodal biometric descriptors using artificial neural networks

40. Optimized collusion prevention for online exams during social distancing

41. Benefits First: Consumer Trust Repair in Mobile Commerce

42. Application of a novel image moment computation in X‐ray and MRI image watermarking

43. A robust blind medical image watermarking approach for telemedicine applications

44. Why Users Comply with Wearables

45. Secure data outsourcing in presence of the inference problem: issues and directions

46. Pattern Mining and Detection of Malicious SQL Queries on Anonymization Mechanism

47. Robust Color Images Watermarking Using New Fractional-Order Exponent Moments

48. Comments on 'ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes'

49. Anonymization Techniques for Privacy Preserving Data Publishing: A Comprehensive Survey

50. Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding

Catalog

Books, media, physical & digital resources