Search Results - Festin, Susan
- Showing 1 - 10 results of 19
- Go to Next Page
-
1
Worker selection in mobile crowdsensing for computation-heavy delay-sensitive applications by Zabala, Angela Margaret
Published 2024Call Number: Loading…Abstract
Located: Loading…
Thesis -
2
On the release of differentially private graph statistics and synthetic graphs by Abad, Earl Andrea G.
Published 2019Call Number: Loading…Abstract
Located: Loading…
Thesis -
3
Using zero-knowledge proofs in a blockchain-based distributed ledger for privacy and verifiability of identities in health research by Marasigan, Marbert John C.
Published 2023Call Number: Loading…Abstract
Located: Loading…
Thesis -
4
Intrusion detection clustering using OPTICS by Del Mundo, Joseph Benjamin T.
Call Number: Loading…
Located: Loading…Thesis Loading… -
5
CXSense a scalable password-based key management scheme for mobile ad-hoc networks by Acang, James Patrick A.
Published 2015Call Number: Loading…
Located: Loading…Thesis Loading… -
6
Resilient sensor placement in water distribution networks using multiobjective evolutionary algorithms by Tingzon, Isabelle B.
Call Number: Loading…
Located: Loading…Thesis Loading… -
7
Securing BGP AS path with hash chain and digital signature by Bibera, Wyndell Love M.
Call Number: Loading…
Located: Loading…Thesis Loading… -
8
Context-sensitive cross-site scripting prevention through input-encoded HTML parsing by Miranda, Carlos Miguel A.
Published 2015Call Number: Loading…
Located: Loading…Thesis Loading… -
9
Varying privacy budgets E for context-aware local differential privacy by Mendoza, Marie Jo-anne
Call Number: Loading…
Located: Loading…Thesis Loading… -
10
Using agent-centric approach in distributed ledger technology for storage in remote patient monitoring by Dang-awan, Ruahden F.
Published 2024Call Number: Loading…Abstract
Located: Loading…
Thesis
Search Tools:
Related Subjects
Access control
5G mobile communication systems
Ad hoc networks (Computer networks)
Algorithms
BGP (Computer network protocol)
Blockchains (Databases)
Computational linguistics
Computer network security
Computer security
Data encryption (Computer science)
Data processing
Data protection
Data security
Detectors
Distribution
Electronic health records
Employees
Energy consumption
Fake news
Game theory
Graph theory
Health information systems
Health information technology
Information storage and retrieval systems
Internetworking (Telecommunication)
Intrusion detection systems (Computer security)
Key agreement protocols (Computer network protocols)
Ledgers (Accounting)
Machine learning
Mathematical models