Search results for "information security"
pdf | | 2008-03-19 | Author:Unknown

( Category: other May 20,2023 )
pdf | | 2011-09-14 | Author:Unknown

( Category: other May 8,2023 )
epub |eng | | Author:Rabadão Carlos

Anonymization algorithms are applied on the QID values to prevent the intruder from causing privacy threat. Therefore, the privacy goal of any anonymization algorithms is to prevent the privacy threats. ...
( Category: Engineering May 6,2023 )
epub |eng | | Author:Unknown

( Category: other April 10,2023 )
pdf |en | | Author: Peter H. Gregory

( Category: Network Security February 23,2023 )
pdf | | 2016-10-13 | Author:Unknown

( Category: other February 20,2023 )