Search

Your search keyword '"Whang, K. -Y."' showing total 184 results

Search Constraints

Start Over You searched for: Author "Whang, K. -Y." Remove constraint Author: "Whang, K. -Y."
184 results on '"Whang, K. -Y."'

Search Results

6. Effect of starter feeding program on growth performance and gains of body components from weaning to market weight in swine

10. Database Publication Practices

12. Designing Spatial and Temporal Data Warehouses.

13. Conclusions and Future Work.

14. Designing Conventional Data Warehouses.

15. Spatial Data Warehouses.

16. Temporal Data Warehouses.

17. Conventional Data Warehouses.

18. Introduction.

19. Introduction to Databases and Data Warehouses.

20. Forensic Watermarking in Digital Rights Management.

21. DRM for Protecting Personal Content.

22. Malicious Software in Ubiquitous Computing.

23. RFID and Privacy.

24. Private Person Authentication in an Ambient World.

25. Security and Privacy on the Semantic Web.

26. Privacy Policies.

27. The Persuasiveness of Ambient Intelligence.

28. Enhancing Privacy for Digital Rights Management.

29. Person-Based and Domain-Based Digital Rights Management.

30. Digital Rights Management Interoperability.

31. Copy Protection Systems.

32. Accountable Anonymous Communication.

33. Client-Server Trade-Offs in Secure Computation.

34. An Introduction to Digital Rights Management Systems.

35. Federated Identity Management.

36. Different Search Strategies on Encrypted Data Compared.

37. Strong Authentication with Physical Unclonable Functions.

38. Statistical Database Security.

39. Privacy-Preserving Data Mining.

40. Trusted Platforms.

41. Trust Management.

42. Database Security.

43. XML Security.

44. Role-Based Access Control.

45. Authorization and Access Control.

46. Ethical Aspects of Information Security and Privacy.

47. Privacy in the Law.

48. Privacy and Security Issues in a Digital World.

49. Web Usage Mining.

50. Opinion Mining.

Catalog

Books, media, physical & digital resources