Showing 1 - 10 results of 13 for search 'Festin, Susan P.', query time: 0.01s
Refine Results
-
1
Using agent-centric approach in distributed ledger technology for storage in remote patient monitoring by Dang-awan, Ruahden F.
Published 2024Call Number: loading...Abstract
Located: loading...
Thesis -
2
Using zero-knowledge proofs in a blockchain-based distributed ledger for privacy and verifiability of identities in health research by Marasigan, Marbert John C.
Published 2023Call Number: loading...Abstract
Located: loading...
Thesis -
3
A design for task-role based access control for personal health record systems by Zuñiga, Rose Ann
Published in Philippine Engineering Journal (2017)Call Number: loading...
Located: loading...Article loading... -
4
Context-sensitive cross-site scripting prevention through input-encoded HTML parsing by Miranda, Carlos Miguel A.
Published 2015Call Number: loading...
Located: loading...Thesis loading... -
5
CXSense a scalable password-based key management scheme for mobile ad-hoc networks by Acang, James Patrick A.
Published 2015Call Number: loading...
Located: loading...Thesis loading... -
6
Intrusion detection clustering using OPTICS by Del Mundo, Joseph Benjamin T.
Call Number: loading...
Located: loading...Thesis loading... -
7
Securing BGP AS path with hash chain and digital signature by Bibera, Wyndell Love M.
Call Number: loading...
Located: loading...Thesis loading... -
8
An Adaptive, real-time speech hiding system using high-capacity steganography techniques applied in innocuous music streams by Tablang, Martin Leandro C.
Call Number: loading...
Located: loading...Thesis loading... -
9
Resilient sensor placement in water distribution networks using multiobjective evolutionary algorithms by Tingzon, Isabelle B.
Call Number: loading...
Located: loading...Thesis loading... -
10
A three-choice minority game-based mechanism design for the utilization of a capacity-constrained resource by Montes, Catalina
Call Number: loading...
Located: loading...Thesis loading...
Search Tools:
Related Subjects
Access control
Ad hoc networks (Computer networks)
BGP (Computer network protocol)
Blockchains (Databases)
Data encryption (Computer science)
Data protection
Detectors
Distribution
Electronic health records
Energy consumption
Game theory
Health information systems
Health information technology
Intrusion detection systems (Computer security)
Key agreement protocols (Computer network protocols)
Ledgers (Accounting)
Mathematical models
Mathematical optimization
Patient monitoring
Patient-centered health care
Records
Resource allocation
Security measures
Speech processing systems
Storage
Water
Web applications
Wireless sensor networks
Zero-knowledge proofs