検索結果 1 - 10 結果 / 13 検索語 'Festin, Susan P.', 処理時間: 0.01秒
結果の絞り込み
-
1
Using agent-centric approach in distributed ledger technology for storage in remote patient monitoring 著者: Dang-awan, Ruahden F.
出版事項 2024請求記号: loading...Abstract
配架場所: loading...
学位論文 -
2
Using zero-knowledge proofs in a blockchain-based distributed ledger for privacy and verifiability of identities in health research 著者: Marasigan, Marbert John C.
出版事項 2023請求記号: loading...Abstract
配架場所: loading...
学位論文 -
3
A design for task-role based access control for personal health record systems 著者: Zuñiga, Rose Ann
出版年 Philippine Engineering Journal (2017)請求記号: loading...
配架場所: loading...論文 loading... -
4
Context-sensitive cross-site scripting prevention through input-encoded HTML parsing 著者: Miranda, Carlos Miguel A.
出版事項 2015請求記号: loading...
配架場所: loading...学位論文 loading... -
5
CXSense a scalable password-based key management scheme for mobile ad-hoc networks 著者: Acang, James Patrick A.
出版事項 2015請求記号: loading...
配架場所: loading...学位論文 loading... -
6
Intrusion detection clustering using OPTICS 著者: Del Mundo, Joseph Benjamin T.
請求記号: loading...
配架場所: loading...学位論文 loading... -
7
Securing BGP AS path with hash chain and digital signature 著者: Bibera, Wyndell Love M.
請求記号: loading...
配架場所: loading...学位論文 loading... -
8
An Adaptive, real-time speech hiding system using high-capacity steganography techniques applied in innocuous music streams 著者: Tablang, Martin Leandro C.
請求記号: loading...
配架場所: loading...学位論文 loading... -
9
Resilient sensor placement in water distribution networks using multiobjective evolutionary algorithms 著者: Tingzon, Isabelle B.
請求記号: loading...
配架場所: loading...学位論文 loading... -
10
A three-choice minority game-based mechanism design for the utilization of a capacity-constrained resource 著者: Montes, Catalina
請求記号: loading...
配架場所: loading...学位論文 loading...
検索ツール:
関連主題
Access control
Ad hoc networks (Computer networks)
BGP (Computer network protocol)
Blockchains (Databases)
Data encryption (Computer science)
Data protection
Detectors
Distribution
Electronic health records
Energy consumption
Game theory
Health information systems
Health information technology
Intrusion detection systems (Computer security)
Key agreement protocols (Computer network protocols)
Ledgers (Accounting)
Mathematical models
Mathematical optimization
Patient monitoring
Patient-centered health care
Records
Resource allocation
Security measures
Speech processing systems
Storage
Water
Web applications
Wireless sensor networks
Zero-knowledge proofs