Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

Data security in mobile healthcare.

  • Source: Military Technical Courier / Vojnotehnicki Glasnik. Jul-Sep2023, Vol. 71 Issue 3, p748-768. 21p.

Record details

×
Academic Journal

Akademisyenlerin Dijital Veri Güvenliği Farkındalıkları Üzerine Bir Araştırma: Malatya Örneği.

  • Source: Gümüshane University Journal of Social Sciences (GUSBID) / Gümüshane Üniversitesi Sosyal Bilimler Dergisi (GUSBID). 2023, Vol. 14 Issue 2, p429-439. 11p.

Record details

×
Academic Journal

An Attribute-Based End-to-End Policy-Controlled Signcryption Scheme for Secure Group Chat Communication.

  • Source: Mathematics (2227-7390). Sep2024, Vol. 12 Issue 18, p2906. 25p.

Record details

×
Academic Journal

A method for insider threat assessment by modeling the internal employee interactions.

  • Source: International Journal of Information Security. Oct2023, Vol. 22 Issue 5, p1385-1393. 9p.

Record details

×
Academic Journal

Utilizing Blockchain for Enhanced Security and Transparency in Library Transactions.

  • Source: Library of Progress-Library Science, Information Technology & Computer; Jan-Jun2024, Vol. 44 Issue 1, p123-141, 19p

Record details

×
Academic Journal

基于 OT 的多方匿名身份查询协议.

  • Source: Application Research of Computers / Jisuanji Yingyong Yanjiu. Apr2022, Vol. 39 Issue 4, p1190-1194. 5p.

Record details

×
Conference

RISK ASSESSMENT FOR RFID DATA SECURITY.

  • Source: ICTE in Regional Development: 2008 Annual Proceedings. 2008, p25-30. 6p. 1 Chart.

Record details

×
Academic Journal

On the construction of of q-ary constant-weight lexicodes.

  • Source: International Journal of Mathematics & Computer Science. 2022, Vol. 17 Issue 2, p923-930. 8p.

Record details

×
  • 1-10 of  493 results for ""Data security""