Search Results - acm: h.: informally system/h.2: database management/h.2.0: general/h.2.0.0: security
-
1
Authors:
Source: Computer Journal; Jan2001, Vol. 44 Issue 1, p54-66, 13p
-
2
Authors: et al.
Source: ACM Transactions on Database Systems; Jun2001, Vol. 26 Issue 2, p214-260, 47p
-
3
Authors:
Source: Communications of the ACM; Mar1976, Vol. 19 Issue 3, p148-159, 12p, 6 Diagrams
-
4
Authors: et al.
Source: Data Science & Engineering; Jun2023, Vol. 8 Issue 2, p196-219, 24p
Subject Terms: BLOCKCHAINS, DATABASES, DATA management, DATABASE security, CRYPTOCURRENCIES, COMMUNITIES, TECHNOLOGY management
-
5
Authors: et al.
Source: ACM Transactions on Programming Languages & Systems; Mar2023, Vol. 45 Issue 1, p1-35, 35p
-
6
Authors:
Source: ACM Transactions on Internet Technology; 2011, Vol. 10 Issue 4, p15:1-15:23, 23p
-
7
Authors: Li, Xi
Source: Information Security Journal: A Global Perspective; May2010, Vol. 19 Issue 3, p160-174, 15p
Subject Terms: CRYPTOGRAPHY, PROBABILITY theory, DATA security, DATABASE management, POLYNOMIALS, COMPUTER network protocols
-
8
Authors: et al.
Source: ACM Transactions on Privacy & Security; Jul2020, Vol. 23 Issue 3, p1-37, 37p
-
9
Authors: et al.
Source: ACM Transactions on Information & System Security (TISSEC); 2009, Vol. 12, p18-18:43, 43p, 5 Diagrams, 5 Charts, 2 Graphs
-
10
Authors:
Source: ACM Transactions on Database Systems; Mar2011, Vol. 36 Issue 1, p2-2:33, 33p, 2 Diagrams, 4 Charts, 10 Graphs
-
11
Authors:
Source: ACM Transactions on Database Systems; Nov2008, Vol. 33 Issue 4, p30:1-30:47, 47p, 4 Diagrams, 13 Charts, 10 Graphs
-
12
Authors:
Source: 5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007); 2007, p359-365, 7p
-
13
Authors:
Source: ACM Transactions on Database Systems; Sep2014, Vol. 39 Issue 3, p23-23:40, 40p
-
14
Authors: et al.
Source: International Journal of Communication Systems; Oct2017, Vol. 30 Issue 15, pn/a-N.PAG, 1p
-
15
Authors:
Source: Communications of the ACM; Feb1997, Vol. 40 Issue 2, p139-142, 4p
-
16
Authors: et al.
Source: ACM Transactions on Privacy & Security; Jul2019, Vol. 22 Issue 3, p17-17:21, 21p
Subject Terms: GAME theory, DATABASE management, ACQUISITION of data, LINEAR programming, CREDIT cards
-
17
Authors:
Source: ACM Transactions on Internet Technology; Aug2023, Vol. 23 Issue 3, p1-28, 28p
-
18
Authors: et al.
Source: ACM Transactions on Information & System Security (TISSEC); May2015, Vol. 18 Issue 1, p3:1-3:30, 30p
Subject Terms: VOTING, CRYPTOGRAPHY, MANAGEMENT of elections, ELECTION boards, DATA security
-
19
Authors:
Source: ACM Transactions on Information & System Security (TISSEC); 2011, Vol. 14 Issue 1, p10-10:28, 28p
-
20
Authors: et al.
Source: ACM Transactions on Database Systems; Mar2004, Vol. 29 Issue 1, p162-194, 33p
Nájsť tento článok vo Web of Science
Full Text Finder