Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "privacy-by-design"

ADD TO MY LIST
 
SECURITY POLICIES APPROACHED BY VALUE ANALYSIS CONCEPTS

Author(s): Liliana Mihaela MOGA | Florin BUHOCIU | Florina Oana Varlanuta
A Novel Secret Sharing Technique Using QR Code

Author(s): Jun-Chou Chuang | Yu-Chen Hu | Hsien-Ju Ko
Energy Efficient Security Architecture for Wireless Bio-Medical Sensor Networks

Author(s): Rajeswari Mukesh | Dr. A. Damodaram | Dr. V. Subbiah Bharathi
Efficient Design of Nursing Unit Floors

Author(s): Z. Tuğçe KAZANASMAZ | Arda DÜZGÜNEŞ
Flexible Execution of Distributed Business Processes based on Process Instance Migration

Author(s): Sonja Zaplata | Kristof Hamann | Kristian Kottke | Winfried Lamersdorf
A Brief Survey on RFID Security and Privacy Issues

Author(s): Mohammad Tauhidul Islam
Satisfaction with web-based training in an integrated healthcare delivery network: do age, education, computer skills and attitudes matter?

Author(s): Atreja Ashish | Mehta Neil | Jain Anil | Harris CM | Ishwaran Hemant | Avital Michel | Fishleder Andrew
Consumer’s trust in Internet shopping: a modelling proposal based on the standard learning hierarchy

Author(s): FRANCISCO J. MARTÍNEZ LÓPEZ | MANUEL ORTIGUEIRA SÁNCHEZ | MARIO PÉREZ RONCHEL
Design of room acoustics for open offices

Author(s): Jukka Keränen | Petra Virjonen | David Oliva Elorza | O Valtteri Hongisto
Editorial

Author(s): Yacine Atif | Mohsen Guizani
Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond

Author(s): Marci Meingast | Jennifer King | Deirdre K. Mulligan
Guest Editorial

Author(s): Uwe Brinkschulte | Marcello Cinque | Tony Givargis | Stefano Russo
Purpose-based Access Control Exploits by HDB

Author(s): Rajneeshkaur K. Bedi | Anita M. Thengade
Privacy and Utility Preserving Task Independent Data Mining

Author(s): E. Poovammal | M. Ponnavaikko
A Comparative study of Multi Agent Based and High- Performance Privacy Preserving Data Mining

Author(s): Md Faizan Farooqui | Md Muqeem | Dr. Md Rizwan Beg
A Dynamic Trust-Based Context-Aware Authentication Framework with Privacy Preserving

Author(s): Abdallah MHAMED, Pierre E. ABI-CHAR, Bachar EL-HASSAN Mounir MOKHTARI
Reduce Threats in Competitive Intelligence System: A Generic Information Fusion Access Control Model

Author(s): Anass El haddadi | Hamid Hatim | Bernard Dousset | Ilham Berrada | Hanane El Bakkali
Prehospital evaluation and economic analysis of different coronary syndrome treatment strategies - PREDICT - Rationale, Development and Implementation

Author(s): Morrison Laurie | Rac Valeria | Bowen James | Schwartz Brian | Perreira Tyrone | Ryan Welson | Zahn Cathy | Chadha Rishab | Craig Alan | O'Reilly Daria | Goeree Ron
The Siblings With Ischemic Stroke Study (SWISS) Protocol

Author(s): Meschia James | Brown Robert | Brott Thomas | Chukwudelunzu Felix | Hardy John | Rich Stephen
The connection between academia and industry

Author(s): Ajai R. Singh | Shakuntala A. Singh
Privacy Negotiation in Socio-Technical Systems

Author(s): Dinesh Verma | Murthy Rallapalli
Privacy Negotiation in Socio-Technical Systems

Author(s): Dinesh Verma | Murthy Rallapalli
The Design of an Electronic Voting System

Author(s): G.O. Ofori-Dwumfuo | E. Paatey
Guest Editorial

Author(s): Lei Shu | Hsiao-Hwa Chen | Takahiro Hara | Der-Jiunn Deng | Lei Wang
Enhanced Intrusion Detection System for PKMv2 EAP-AKA used in WiBro

Author(s): Sang-Guun Yoo | Soojin Lee | Yunho Lee | Yeong-Kyu Yang | Juho Kim
Design and Hardware Implementation of QoSS - AES Processor for Multimedia applications

Author(s): Zeghid Medien | Mohsen Machhout | Belgacem Bouallegue | Lazhar Khriji | Adel Baganne | Rached Tourki
Comparison of user groups' perspectives of barriers and facilitators to implementing electronic health records: a systematic review

Author(s): McGinn Carrie | Grenier Sonya | Duplantie Julie | Shaw Nicola | Sicotte Claude | Mathieu Luc | Leduc Yvan | Légaré France | Gagnon Marie-Pierre
Land slide disaster in eastern Uganda: rapid assessment of water, sanitation and hygiene situation in Bulucheke camp, Bududa district

Author(s): Atuyambe Lynn | Ediau Michael | Orach Christopher | Musenero Monica | Bazeyo William
High Capacity Mobile Ad Hoc Network Using THz Frequency Enhancement

Author(s): Sawatsakorn Chaiyasoonthorn | Phongphun Limpaibool | Somsak Mitatha | Preecha P. Yupapin
DESIGNING DEPENDABLE AGILE LAYERED WEB SERVICES SECURITY ARCHITECTURE SOLUTIONS

Author(s): M.UPENDRA KUMAR | Dr.D.SRAVAN KUMAR | Dr. B.PADMAJA RANI | K.VENKATESWARA RAO
VIOLENCIA DOMéSTICA CONTRA EL HOMBRE EN LA CIUDAD DE LIMA - DOMESTIC VOLENCE AGAINST MEN LIMA

Author(s): SARA BECERRA FLORES | MARÍA FLORES VÁSQUEZ | JEANNETTE VÁSQUEZ VEGA
Why do you need a reservation system?      Affiliate Program