Search

Your search keyword '"Jonker P"' showing total 79 results

Search Constraints

Start Over You searched for: Author "Jonker P" Remove constraint Author: "Jonker P" Topic database management Remove constraint Topic: database management
79 results on '"Jonker P"'

Search Results

1. Forensic Watermarking in Digital Rights Management.

2. DRM for Protecting Personal Content.

3. Malicious Software in Ubiquitous Computing.

4. RFID and Privacy.

5. Private Person Authentication in an Ambient World.

6. Security and Privacy on the Semantic Web.

7. Privacy Policies.

8. The Persuasiveness of Ambient Intelligence.

9. Enhancing Privacy for Digital Rights Management.

10. Person-Based and Domain-Based Digital Rights Management.

11. Digital Rights Management Interoperability.

12. Copy Protection Systems.

13. Accountable Anonymous Communication.

14. Client-Server Trade-Offs in Secure Computation.

15. An Introduction to Digital Rights Management Systems.

16. Federated Identity Management.

17. Different Search Strategies on Encrypted Data Compared.

18. Strong Authentication with Physical Unclonable Functions.

19. Statistical Database Security.

20. Privacy-Preserving Data Mining.

21. Trusted Platforms.

22. Trust Management.

23. Database Security.

24. XML Security.

25. Role-Based Access Control.

26. Authorization and Access Control.

27. Ethical Aspects of Information Security and Privacy.

28. Privacy in the Law.

29. Privacy and Security Issues in a Digital World.

30. Designing Spatial and Temporal Data Warehouses.

31. Conclusions and Future Work.

32. Designing Conventional Data Warehouses.

33. Spatial Data Warehouses.

34. Temporal Data Warehouses.

35. Conventional Data Warehouses.

36. Introduction.

37. Introduction to Databases and Data Warehouses.

38. Open Problems.

39. Tools for Data Quality.

41. Data Quality Issues in Data Integration Systems.

42. Object Identification.

43. Activities and Techniques for Data Quality: Generalities.

44. Models for Data Quality.

45. Data Quality Dimensions.

46. Introduction to Data Quality.

47. Formalizing the XML Schema Matching Problem as a Constraint Optimization Problem.

48. Requirements for Secure Logging of Decentralized Cross-Organizational Workflow Executions.

49. Dynamic Disclosure Monitor (D2Mon): An Improved Query Processing Solution.

50. Improvement of Hsu-Wu-He's Proxy Multi-signature Schemes.

Catalog

Books, media, physical & digital resources