Showing 1 - 10 results of 19 for search 'Festin, Susan', 查詢時間: 0.01s
Refine Results
-
1
Using agent-centric approach in distributed ledger technology for storage in remote patient monitoring 由 Dang-awan, Ruahden F.
出版 2024索引號: loading...Abstract
位於: loading...
Thesis -
2
Worker selection in mobile crowdsensing for computation-heavy delay-sensitive applications 由 Zabala, Angela Margaret
出版 2024索引號: loading...Abstract
位於: loading...
Thesis -
3
Using zero-knowledge proofs in a blockchain-based distributed ledger for privacy and verifiability of identities in health research 由 Marasigan, Marbert John C.
出版 2023索引號: loading...Abstract
位於: loading...
Thesis -
4
On the release of differentially private graph statistics and synthetic graphs 由 Abad, Earl Andrea G.
出版 2019索引號: loading...Abstract
位於: loading...
Thesis -
5
A design for task-role based access control for personal health record systems 由 Zuñiga, Rose Ann
發表在 Philippine Engineering Journal (2017)索引號: loading...
位於: loading...Article loading... -
6
Context-sensitive cross-site scripting prevention through input-encoded HTML parsing 由 Miranda, Carlos Miguel A.
出版 2015索引號: loading...
位於: loading...Thesis loading... -
7
CXSense a scalable password-based key management scheme for mobile ad-hoc networks 由 Acang, James Patrick A.
出版 2015索引號: loading...
位於: loading...Thesis loading... -
8
Soul system secure online USB login system 由 Atienza, Kevin Charles
發表在 Philippine Engineering Journal (2012)索引號: loading...
位於: loading...Article loading... -
9
Intrusion detection clustering using OPTICS 由 Del Mundo, Joseph Benjamin T.
索引號: loading...
位於: loading...Thesis loading... -
10
Securing BGP AS path with hash chain and digital signature 由 Bibera, Wyndell Love M.
索引號: loading...
位於: loading...Thesis loading...
檢索工具:
相關主題
Access control
5G mobile communication systems
Ad hoc networks (Computer networks)
Algorithms
BGP (Computer network protocol)
Blockchains (Databases)
Computational linguistics
Computer network security
Computer security
Data encryption (Computer science)
Data processing
Data protection
Data security
Detectors
Distribution
Electronic health records
Employees
Energy consumption
Fake news
Game theory
Graph theory
Health information systems
Health information technology
Information storage and retrieval systems
Internetworking (Telecommunication)
Intrusion detection systems (Computer security)
Key agreement protocols (Computer network protocols)
Ledgers (Accounting)
Machine learning
Mathematical models