Search

Your search keyword '"CONFIDENTIAL communications"' showing total 14,968 results

Search Constraints

Start Over You searched for: Descriptor "CONFIDENTIAL communications" Remove constraint Descriptor: "CONFIDENTIAL communications"
14,968 results on '"CONFIDENTIAL communications"'

Search Results

3. The Buddy Program: High school students inform the design of a school-based peer support program for concussion.

4. Wie Mikrocontroller sich selbst und ganze System sichern.

5. Energy-Efficient Model for Intruder Detection Using Wireless Sensor Network.

6. Gandy & 'Books under threat: A response.

7. Efficient and secure message authentication algorithm at the physical layer.

8. Administrative guidance for the preparation of novel food applications in the context of Article 10 of Regulation (EU) 2015/2283.

9. The ‘soft’ sides of ISO17025.

10. Keylogger ve Gizlilik: Makine Öğrenimi Modellerinin Karşılaştırması.

11. EU: Provider of TikTok As Gatekeeper Under Digital Markets Act.

12. Satellite image encryption using 2D standard map and advanced encryption standard with scrambling.

13. Physical Layer Security of Ground-to-UAV Communication in the Presence of an Aerial Eavesdropper Outside the Guard Zone.

14. Data Hiding Scheme for Spatial Domain Images Using Fuzzy Logic and Modulus Operation.

15. Die Verschwiegenheitspflicht im Krankenanstaltenrecht.

16. Confidential Transaction Balance Verification by the Net Using Non-Interactive Zero-Knowledge Proofs.

17. The Research Ecosystem and the Collaborative Research Cycle.

18. BSAS: blockchain-based shareable authentication scheme for smart healthcare.

19. Gedanken über die misslingende Generativität an psychoanalytischen Instituten.

20. Fast Range Query on Encrypted Multi-dimensional Data in Cloud Environment.

21. A Partial-Filename Search Mechanism for Encrypted Filenames in a PZP Network.

22. Enhanced QSimon Algorithm for Attacking the Offset Two‐Round Scheme.

23. Transforming the Translation Industry: Innovative Applications of Blockchain Technology.

24. Proxy re-signature scheme with cryptographic reverse firewall for medical data security.

26. Blockchain-based evault for legal records: A framework for review.

27. A secure communication system based on deep image steganography technology.

28. Random shift and OTP based encryption and decryption.

30. Le conversioni silenti.

31. Noncompetes and Their Potential Impact on Trade Secret Cases.

32. Enhancing data authentication in software-defined networking (SDN) using multiparty computation.

33. Breaching Confidentiality in Genetic and Non-Genetic Cases: Two Problematic Distinctions.

34. Optimize Image Steganography Based on Distinction Disparity Value and HMPSO to Ensure Confidentiality and Integrity.

35. Stepping out of the shadows: the legitimacy of the Bahamas’ NCIA.

36. Secrecy Analysis of Decode-and-Forward Relay Based Heterogeneous Terrestrial RF - Underwater Acoustic System.

37. ¿REVELAR, VELAR O DEVELAR?: LA ANONIMIZACIÓN POR NIVELES EN LAS ENTREVISTAS CUALITATIVAS.

38. Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis.

39. Enhanced Multi-Party Privacy-Preserving Record Linkage Using Trusted Execution Environments.

40. Improving the lightweight implementation of SNOW-V.

41. BLE-based secure tracking system proposal.

42. Shhh... Do Gender-Diverse Boards Prioritize Product Market Concerns Over Capital Market Incentives?

43. Experimental demonstration of quantum encryption in phase space with displacement operator in coherent optical communications.

44. The attitudes, knowledge and confidence of healthcare professionals about cannabis-based products.

45. The Visual Governance of Canadian Migration Agencies.

46. A Browser Fingerprint Authentication Scheme Based on the Browser Cache Side-Channel Technology.

47. Qualitative evaluation of a multidisciplinary master of cancer sciences: impacts on graduates and influencing curricular factors.

48. Implementing a School‐Based Health Center Virtual Care Program: A Qualitative Exploration of the School Nurse Perspective.

49. WE MIGHT BE ON (TO) SOMETHING, BUT WHO KNOWS? A FRESH LOOK AT THE PHARMACIST-PATIENT PRIVILEGE.

50. Exploring Respondents' Problems and Evaluation in a Survey Proposing Voice Inputs.

Catalog

Books, media, physical & digital resources