Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 569 matches
- 2024
- Jinwook Lee, Matthew J. Schneider:
Geometric series representation for robust bounds of exponential smoothing difference between protected and confidential data. Ann. Oper. Res. 332(1): 11-21 (2024) - Ghassan Al-Sumaidaee, Zeljko Zilic:
Sensing Data Concealment in NFTs: A Steganographic Model for Confidential Cross-Border Information Exchange. Sensors 24(4): 1264 (2024) - Iuon-Chang Lin, Yi-Hsuan Kuo, Ching-Chun Chang, Jui-Chuan Liu, Chin-Chen Chang:
Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality. Symmetry 16(2): 147 (2024) - Yuechen Tao, Bo Li, Baochun Li:
On Atomicity and Confidentiality Across Blockchains Under Failures. IEEE Trans. Knowl. Data Eng. 36(2): 766-780 (2024) - José Humberto Da Silva Soares Santos, Dalton Cézane Gomes Valadares, Kyller Costa Gorgônio, Angelo Perkusich:
Mobile Data Security with Attribute-based Encryption and Confidential Computing. ICCE 2024: 1-4 - 2023
- Divyansh Agrawal, Sachin Minocha:
Chapter Eight - Securing confidential data in the cloud environment by using DNA computing. Adv. Comput. 129: 281-316 (2023) - Megan Schröder, Sam H. A. Muller, Eleni Vradi, Johanna Mielke, Yvonne M. F. Lim, Fabrice Couvelard, Menno Mostert, Stefan Koudstaal, Marinus J. C. Eijkemans, Christoph Gerlinger:
Sharing Medical Big Data While Preserving Patient Confidentiality in Innovative Medicines Initiative: A Summary and Case Report from BigData@Heart. Big Data 11(6): 399-407 (2023) - Winnie Ng Picoto, Joana Carlota Abreu, Patrícia Martins:
Integrating the Internet of Things Into E-Commerce: The Role of Trust, Privacy, and Data Confidentiality Concerns in Consumer Adoption. Int. J. E Bus. Res. 19(1): 1-18 (2023) - K. Madhura, R. Mahalakshmi:
Designing an optimized confidential-data management system using preeminent access-control and block-chain. Int. J. Intell. Comput. Cybern. 16(1): 17-29 (2023) - Jegadeesan Subramani, Maria Azees, Arun Sekar Rajasekaran, Fadi M. Al-Turjman:
EPF-FDA: Efficient Pairing Free and Confidentiality Preserving Fog-Based Data Aggregation Scheme for WBANs. IEEE Instrum. Meas. Mag. 26(8): 10-16 (2023) - Trupti Shripad Tagare, Rajashree Narendra:
Confidentiality Enhancement Using Spread Spectrum Modulation Technique for Aggregated Data in Wireless Sensor Networks. J. Commun. 18(5): 294-300 (2023) - Kathy Etz, Heather Kimmel, Amy Pienta:
National Addiction and HIV Data Archive Program: Developing an Approach for Reuse of Sensitive and Confidential Data. J. Priv. Confidentiality 13(2) (2023) - Elizabeth Green, Felix Ritchie:
Using pedagogical and psychological insights to train analysts using confidential data. J. Priv. Confidentiality 13(2) (2023) - Joy Bohyun Jang, Amy M. Pienta, Margaret Levenstein, Joe Saul:
Restricted data management: the current practice and the future. J. Priv. Confidentiality 13(2) (2023) - Sebastian Karcher, Sefa Secen, Nicholas Weber:
Protecting Sensitive Data Early in the Research Data Lifecycle. J. Priv. Confidentiality 13(2) (2023) - John E. Marcotte, Sarah Rush, Kelly Ogden-Schuette:
Tiered Access to Research Data for Secondary Analysis. J. Priv. Confidentiality 13(2) (2023) - Amy M. Pienta, Joy Jang, Margaret Levenstein:
Beyond Legal Frameworks and Security Controls For Accessing Confidential Survey Data: Engaging Data Users in Data Protection. J. Priv. Confidentiality 13(2) (2023) - Lakshmanarao Namamula, Daniel Chaytor:
Enhancing the Confidentiality and Integrity of Uncertain Dynamic Data Workflows of B2C (Business-2-Consumers) Using Blockchain Technology. J. Uncertain Syst. 16(1): 2242009:1-2242009:17 (2023) - Lal Said Khan, Majid Khan, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal:
A novel combination of information confidentiality and data hiding mechanism. Multim. Tools Appl. 82(5): 6917-6941 (2023) - Gobikrishna Dhanuskodi, Sudeshna Guha, Vidhya Krishnan, Aruna Manjunatha, Michael O'Connor, Rob Nertney, Phil Rogers:
Creating the First Confidential GPUs: The team at NVIDIA brings confidentiality and integrity to user code and data for accelerated computing. ACM Queue 21(4): 68-93 (2023) - Bradley Wakefield, Yan-Xia Lin, Rathindra Sarathy, Krishnamurty Muralidhar:
Moment-based density estimation of confidential micro-data: a computational statistics approach. Stat. Comput. 33(1): 35 (2023) - Kapil Tiwari, Nirmalya Sarkar, Jossy P. George:
Confidential Training and Inference using Secure Multi-Party Computation on Vertically Partitioned Dataset. Scalable Comput. Pract. Exp. 24(4): 1065-1076 (2023) - Shuo-Tsung Chen, Ren-Jie Ye, Tsung-Hsien Wu, Chun-Wen Cheng, Po-You Zhan, Kuan-Ming Chen, Wan-Yu Zhong:
Patient Confidential Data Hiding and Transmission System Using Amplitude Quantization in the Frequency Domain of ECG Signals. Sensors 23(22): 9199 (2023) - Egor Litvinov, Henry Llumiguano, María J. Santofimia, Xavier del Toro, Felix Jesús Villanueva, Pedro Rocha:
Code Integrity and Confidentiality: An Active Data Approach for Active and Healthy Ageing. Sensors 23(10): 4794 (2023) - Kha Dinh Duy, Hojoon Lee:
SE-PIM: In-Memory Acceleration of Data-Intensive Confidential Computing. IEEE Trans. Cloud Comput. 11(3): 2473-2490 (2023) - Chenglu Jin, Zheng Yang, Tao Xiang, Sridhar Adepu, Jianying Zhou:
HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 18: 1080-1094 (2023) - Naweiluo Zhou, Florent Dufour, Vinzent Bode, Peter Zinterhof, Nicolay J. Hammer, Dieter Kranzlmüller:
Towards Confidential Computing: A Secure Cloud Architecture for Big Data Analytics and AI. CLOUD 2023: 293-295 - Anantaa Kotal, Lavanya Elluri, Deepti Gupta, Varun Mandalapu, Anupam Joshi:
Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis. IEEE Big Data 2023: 5519-5528 - Abdelhamid Garah, Nader Mbarek, Sergey Kirgizov:
IoT Data Confidentiality Self-Management. DASC/PiCom/CBDCom/CyberSciTech 2023: 395-400 - Edoardo Marangone, Claudio Di Ciccio, Daniele Friolo, Eugenio Nerio Nemmi, Daniele Venturi, Ingo Weber:
MARTSIA: Enabling Data Confidentiality for Blockchain-Based Process Execution. EDOC 2023: 58-76
skipping 539 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-18 13:55 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint