Search

Your search keyword '"Milan P"' showing total 131 results

Search Constraints

Start Over You searched for: Author "Milan P" Remove constraint Author: "Milan P" Publication Type Books Remove constraint Publication Type: Books
131 results on '"Milan P"'

Search Results

3. Information Technologies: Alternative Delivery Systems for Rural Schools. Report Update.

4. Children, Spaces, Relations: Metaproject for an Environment for Young Children.

7. List of Contributors

8. Contributors

12. UCLA International Conference: “Few Particle Problems in the Nuclear Interaction” August 1972

13. PART I: LOVING ONE ANOTHER.

14. Synthesis and structure of single-crystal marcasite.

16. Topologies of Approximation Spaces of Rough Set Theory.

17. Virtual Liver Surgery Planning.

18. Evolution of the Photographic Lens in the 19th Century.

20. In Vitro Reconstitution of Progesterone-Dependent RNA Transcription in Nuclear Extracts of Human Breast Carcinoma Cells.

21. Puritanism and Social Authoritarianism: Authoritarian Mastery of Civil Society.

22. Authoritarian Legacy of Puritanism in Contemporary Society.

23. Neo-Puritanism and Authoritarianism.

24. Puritanism and Social Authoritarianism Continued.

25. Puritanism and Political Authoritarianism: Authoritarian Mastery of Politics.

26. Puritanism and Authoritarianism.

27. Communication of Science, Communication in Science.

28. D-optimal Designs and Equidistant Designs for Stationary Processes.

29. Bridging Concrete and Abstract Syntax of Web Rule Languages.

30. Forensic Watermarking in Digital Rights Management.

31. DRM for Protecting Personal Content.

32. Malicious Software in Ubiquitous Computing.

33. RFID and Privacy.

34. Private Person Authentication in an Ambient World.

35. Security and Privacy on the Semantic Web.

36. Privacy Policies.

37. The Persuasiveness of Ambient Intelligence.

38. Enhancing Privacy for Digital Rights Management.

39. Person-Based and Domain-Based Digital Rights Management.

40. Digital Rights Management Interoperability.

41. Copy Protection Systems.

42. Accountable Anonymous Communication.

43. Client-Server Trade-Offs in Secure Computation.

44. An Introduction to Digital Rights Management Systems.

45. Federated Identity Management.

46. Different Search Strategies on Encrypted Data Compared.

47. Strong Authentication with Physical Unclonable Functions.

48. Statistical Database Security.

49. Privacy-Preserving Data Mining.

50. Trusted Platforms.

Catalog

Books, media, physical & digital resources