Search

Your search keyword '"*DATA protection"' showing total 11,762 results

Search Constraints

Start Over You searched for: Descriptor "*DATA protection" Remove constraint Descriptor: "*DATA protection"
11,762 results on '"*DATA protection"'

Search Results

2. The Dangers of Digitization, and the Importance of Data Backup.

3. Data protection in digital learning space: An overview.

4. Standardised cookie banner: a solution to the cookie consent problem.

5. Perceptions of vulnerable roadway users on autonomous vehicle regulations.

6. Same Naira, More Possibilities! Assessing the Legal Status of the eNaira and Its Potential for Privacy and Inclusion.

7. Survey of research on confidential computing.

8. Advanced biometric system security: a novel hybrid approach integrating optical asymmetric PTFT and symmetric cipher techniques.

9. Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things.

10. Secure peer-to-peer learning using feature embeddings.

11. Maximum Load Consumption Capacity Maintenance of Distributed Storage Devices Based on Time-Varying Neurodynamic Algorithm.

12. Correction: Research using population-based administration data integrated with longitudinal data in child protection settings: A systematic review.

13. Beyond compliance: The impact of data protection on statistical excellence – A view from the 2021 Population-Housing Census in Greece.

14. Approaches and experiences implementing remote, electronic consent at the Leeds Clinical Trials Research Unit.

15. Writing opacity: Going beyond pseudonyms with spirit portraiture.

16. Predictive analytics and the collective dimensions of data protection.

17. The situation of the interface: Pashto master copies and data migration in Sharjah.

18. Development of secure and authentic access controlling techniques using the pushback request response (PRR) approach for blockchain healthcare applications.

19. An empirical investigation of the social web gendered privacy model.

20. Gesundheitsdaten im Internet.

21. On the Layout-Oriented Investigation of Power Attack Hardness of Spintronic-Based Logic Circuits.

22. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

23. Recent advances in research on phosphate starvation signaling in plants.

24. LF3PFL: A Practical Privacy-Preserving Federated Learning Algorithm Based on Local Federalization Scheme.

25. Incorporating privacy considerations into EU data-driven merger review.

26. Broad collection of consumer data by Big Tech: exclusionary or exploitative abuse?

27. Evaluation of the effects of different lightning protection rods on the data quality of C-Band weather radars.

28. Prediction of middle box-based attacks in Internet of Healthcare Things using ranking subsets and convolutional neural network.

29. 'I know you like the back of my hand': biometric practices of humanitarian organisations in international aid.

30. Application of computer simulation based on optical image processing in monitoring metabolic regulation data during exercise training.

31. Inhalt.

32. Gesundheitsdatennutzungsgesetz: Der Zielkonflikt zwischen Datenschutz und Datennutzung.

33. Der Abrechnungsbetrug des Hilfsmittelerbringers bei Verstößen gegen das Depot‑, Zuwendungs- und Beteiligungsverbot.

34. Olympus: a GDPR compliant blockchain system.

35. The rise of "security and privacy": bibliometric analysis of computer privacy research.

36. A Third Directive on Consumer Credit.

37. Dynamics analysis and cryptographic implementation of a fractional-order memristive cellular neural network model.

38. The Clocks Are Striking Thirteen: Congress, Not Courts, Must Save Us from Government Surveillance via Data Brokers.

39. Entropy-driven differential privacy protection scheme based on social graphlet attributes.

40. You only label once: A self‐adaptive clustering‐based method for source‐free active domain adaptation.

41. A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption.

42. Effective organization of personal data protection.

43. Geoinformation technologies and data protection.

44. Comparison of blockchain technologies for the digitalization of the social insurance healthcare system and their economic profitability.

45. High yield novel QKD protocol and its comparative analysis using QISKIT.

46. A medical data privacy protection schema based on block chain and cloud computing.

47. Data protection in IoT using CoAP based on enhanced DTLS.

48. A verilog implementation of advanced encryption algorithm on Artix-7.

49. Verfahren.

50. A generalisation of the aggregate association index (AAI): incorporating a linear transformation of the cells of a 2 × 2 table.

Catalog

Books, media, physical & digital resources