84 results on '"Wang, Lingyu"'
Search Results
2. Connecting the Precipitation Behaviors on Internal Cavity Surfaces and External Surfaces in an Al–Si Alloy
3. Optimum Wear Resistance Achieved by Balancing Bulk Hardness and Work-Hardening: A Case Study in Austenitic Stainless Steels
4. Twin Instability and Its Effect on the Dislocation Behavior of UFG Austenitic Steel Under Charpy Impact Test
5. Methodologies for Following EMT In Vivo at Single Cell Resolution
6. An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations
7. Security in Data Warehouses and OLAP Systems
8. Preserving Privacy in On-line Analytical Processing Data Cubes
9. Measurement of the Shift in the Distal Radioulnar Joint Using a Custom Platform
10. Towards Secure XML Federations
11. A Dansyl-Rhodamine Ratiometric Fluorescent Probe for Hg2+ Based on FRET Mechanism
12. Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection
13. Towards Secure XML Federations
14. An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations
15. Security in Data Warehouses and OLAP Systems
16. Preserving Privacy in On-line Analytical Processing Data Cubes
17. Inference Control in Statistical Databases
18. Lattice-based Inference Control in Data Cubes
19. Parity-based Inference Control for Range Queries
20. Query-driven Inference Control in Data Cubes
21. Inferences in Data Cubes
22. Cardinality-based Inference Control
23. OLAP and Data Cubes
24. Introduction
25. Fast Digital Certificate Revocation : An alternative to short lived certificates
26. A New Paradigm for Information Security Education at Doctoral Level
27. A Framework for Role-Based Monitoring of Insider Misuse
28. An Holistic Approach to an International Doctoral Program
29. Laboratory Support for Information Security Education
30. Investigating a Smart Technology
31. Update/Patch Management Systems : a protocol taxonomy with security implications
32. Infusing Privacy Norms in DRM : Incentives and perspectives from law
33. Towards Corporate Information Security Obedience
34. CIIP-RAM- A Security Risk Analysis Methodology for Critical Information Infrastructure Protection
35. Privacy-Invasive Software in Filesharing Tools
36. Corporate Information Security Education : Is Outcomes Based Education the Solution?
37. A Risk-Driven Approach to Designing Privacy-Enhanced Secure Applications
38. Privacy Preserving Online Reputation Systems
39. Identity Management for Self-Portrayal
40. Taxonomy of Mixes and Dummy Traffic
41. Private Information Storage with Logarithmic-Space Secure Hardware
42. A Security Model for Anonymous Credential Systems
43. Doctoral Programme on ICS Security at the University of the Aegean
44. A Doctoral Program with Specialization in Information Security : A High Assurance Constructive Security Approach
45. Contrasting Malicious Applets by Modifying the Java Virtual Machine
46. An International Security Education Perspective
47. DO Military Forces Need Ph.D.’s?
48. Doctor of Philosophy: It Security
49. Highly Qualified Information Security Personnel Training in Russia
50. A Case for Information Ownership in ERP Systems
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.