Showing 2,741 - 2,760 results of 2,762 for search '"data protection"', query time: 3.11s Refine Results
  1. 2741
    by Indra Suwahyono
    Published 2015-04-01
    ..., this application is expected to control the system remotely so the important data protected and cannot be accessed...
    Get full text
    Article
  2. 2742
    by Hui-Chung Ho, 何慧忠
    Published 2015
    ... and heterogeneous cloud environment it is a challenging task to maintain data protections by just utilizing fine...
    Get full text
    Others
  3. 2743
  4. 2744
    by Brawerman, Alessandro
    Published 2005
    ... the configuration data; protects sensitive information through the use of protected storage; creates and protects...
    Get full text
    Others
  5. 2745
    ... be divided to four groups: data protect, operation research, finance, and postage metering. Finally...
    Get full text
    Others
  6. 2746
    by Paes, William Neville Wayne
    Published 2015
    ... infections. Due to the paucity of robust clinical data, protective immune parameters have largely been...
    Get full text
  7. 2747
    by Bing-Rong Lin, Dan Kifer
    Published 2014-02-01
    ... data protections. Using privacy building blocks (which we refer to as axioms), we turn questions...
    Get full text
    Article
  8. 2748
    ..., volunteer preferences, and sensitive data protections. We present a typology for citizen science openness...
    Get full text
    Article
  9. 2749
    ... in clinical care. Respondents also recommended training regarding data protections for individuals involved...
    Get full text
    Article
  10. 2750
  11. 2751
  12. 2752
    ... centre. Need was recognised for standardized, data protective documentation and a health passport...
    Get full text
    Article
  13. 2753
    by Roux, Marike
    Published 2012
    ... to verify and integrate data. Protective and risk factors were explored within the toddler, the family...
    Get full text
    Others
  14. 2754
    by Roux, Marike
    Published 2012
    ... to verify and integrate data. Protective and risk factors were explored within the toddler, the family...
    Get full text
    Get full text
    Others
  15. 2755
    ... data into an encrypted file with the data protected in such a way that external data analyses are still...
    Get full text
    Article
  16. 2756
    ... another are its ability to ensure the data protected against attacks and their speed and efficiency to do...
    Get full text
    Article
  17. 2757
    by Sheng-Hsiung Lin, 林聖雄
    Published 2005
    ... to avoid being destroyed. In order to promote the security level that the data protect, a lot...
    Get full text
    Others
  18. 2758
  19. 2759
  20. 2760
    by Chao Kung, 孔朝
    Published 2014
    ... the operating need to check the personal data protect act. 6. Vertical and horizontal links between...
    Get full text
    Others