ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Trust, Privacy and Security in Digital Business - Lecture Notes in Computer Science
Latest Publications
TOTAL DOCUMENTS
18
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By Springer Berlin Heidelberg
9783642228896, 9783642228902
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Towards Legal Privacy Risk Assessment and Specification
Trust, Privacy and Security in Digital Business - Lecture Notes in Computer Science
◽
10.1007/978-3-642-22890-2_15
◽
2011
◽
pp. 174-185
◽
Cited By ~ 2
Author(s):
Ebenezer Paintsil
Keyword(s):
Risk Assessment
◽
Privacy Risk
Start Chat
Download Full-text
Correcting a Delegation Protocol for Grids
Trust, Privacy and Security in Digital Business - Lecture Notes in Computer Science
◽
10.1007/978-3-642-22890-2_17
◽
2011
◽
pp. 198-209
Author(s):
Benjamin Aziz
Start Chat
Download Full-text
Privacy Preserving Tree Augmented Naïve Bayesian Multi-party Implementation on Horizontally Partitioned Databases
Trust, Privacy and Security in Digital Business - Lecture Notes in Computer Science
◽
10.1007/978-3-642-22890-2_6
◽
2011
◽
pp. 62-73
◽
Cited By ~ 4
Author(s):
Maria Eleni Skarkala
◽
Manolis Maragoudakis
◽
Stefanos Gritzalis
◽
Lilian Mitrou
Keyword(s):
Privacy Preserving
◽
Naive Bayesian
◽
Naïve Bayesian
Start Chat
Download Full-text
A Secure Smartphone Applications Roll-out Scheme
Trust, Privacy and Security in Digital Business - Lecture Notes in Computer Science
◽
10.1007/978-3-642-22890-2_5
◽
2011
◽
pp. 49-61
◽
Cited By ~ 7
Author(s):
Alexios Mylonas
◽
Bill Tsoumas
◽
Stelios Dritsas
◽
Dimitris Gritzalis
Keyword(s):
Smartphone Applications
◽
Roll Out
Start Chat
Download Full-text
An Evaluation of Anomaly-Based Intrusion Detection Engines for Mobile Ad Hoc Networks
Trust, Privacy and Security in Digital Business - Lecture Notes in Computer Science
◽
10.1007/978-3-642-22890-2_13
◽
2011
◽
pp. 150-160
◽
Cited By ~ 5
Author(s):
Christoforos Panos
◽
Christos Xenakis
◽
Ioannis Stavrakakis
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Risk Assessment for Mobile Devices
Trust, Privacy and Security in Digital Business - Lecture Notes in Computer Science
◽
10.1007/978-3-642-22890-2_18
◽
2011
◽
pp. 210-221
◽
Cited By ~ 9
Author(s):
Thomas Lederm
◽
Nathan L. Clarke
Keyword(s):
Risk Assessment
◽
Mobile Devices
Start Chat
Download Full-text
A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks
Trust, Privacy and Security in Digital Business - Lecture Notes in Computer Science
◽
10.1007/978-3-642-22890-2_12
◽
2011
◽
pp. 138-149
◽
Cited By ~ 1
Author(s):
Eleni Darra
◽
Christoforos Ntantogian
◽
Christos Xenakis
◽
Sokratis Katsikas
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Energy Aware
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
TRAP: Open Decentralized Distributed Spam Filtering
Trust, Privacy and Security in Digital Business - Lecture Notes in Computer Science
◽
10.1007/978-3-642-22890-2_8
◽
2011
◽
pp. 86-97
Author(s):
Nahid Shahmehri
◽
David Byers
◽
Rahul Hiran
Keyword(s):
Spam Filtering
Start Chat
Download Full-text
Decentralized Generation of Multiple, Uncorrelatable Pseudonyms without Trusted Third Parties
Trust, Privacy and Security in Digital Business - Lecture Notes in Computer Science
◽
10.1007/978-3-642-22890-2_10
◽
2011
◽
pp. 113-124
Author(s):
Jan Lehnhardt
◽
Adrian Spalka
Keyword(s):
Third Parties
◽
Decentralized Generation
◽
Trusted Third Parties
Start Chat
Download Full-text
Electrostatic Force Method:
Trust, Privacy and Security in Digital Business - Lecture Notes in Computer Science
◽
10.1007/978-3-642-22890-2_1
◽
2011
◽
pp. 1-12
Author(s):
Konrad Leszczyński
◽
Maciej Zakrzewicz
Keyword(s):
Electrostatic Force
◽
Force Method
Start Chat
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close