Search Results - Festin, Susan P.
- Showing 1 - 10 results of 13
- Go to Next Page
-
1
Using zero-knowledge proofs in a blockchain-based distributed ledger for privacy and verifiability of identities in health research by Marasigan, Marbert John C.
Published 2023Call Number: Loading…Abstract
Located: Loading…
Thesis -
2
Intrusion detection clustering using OPTICS by Del Mundo, Joseph Benjamin T.
Call Number: Loading…
Located: Loading…Thesis Loading… -
3
CXSense a scalable password-based key management scheme for mobile ad-hoc networks by Acang, James Patrick A.
Published 2015Call Number: Loading…
Located: Loading…Thesis Loading… -
4
Resilient sensor placement in water distribution networks using multiobjective evolutionary algorithms by Tingzon, Isabelle B.
Call Number: Loading…
Located: Loading…Thesis Loading… -
5
Securing BGP AS path with hash chain and digital signature by Bibera, Wyndell Love M.
Call Number: Loading…
Located: Loading…Thesis Loading… -
6
Context-sensitive cross-site scripting prevention through input-encoded HTML parsing by Miranda, Carlos Miguel A.
Published 2015Call Number: Loading…
Located: Loading…Thesis Loading… -
7
Varying privacy budgets E for context-aware local differential privacy by Mendoza, Marie Jo-anne
Call Number: Loading…
Located: Loading…Thesis Loading… -
8
Using agent-centric approach in distributed ledger technology for storage in remote patient monitoring by Dang-awan, Ruahden F.
Published 2024Call Number: Loading…Abstract
Located: Loading…
Thesis -
9
An Adaptive, real-time speech hiding system using high-capacity steganography techniques applied in innocuous music streams by Tablang, Martin Leandro C.
Call Number: Loading…
Located: Loading…Thesis Loading… -
10
A design for task-role based access control for personal health record systems by Zuniga, Rose Ann S.
Published in Philippine Engineering JournalCall Number: Loading…Also available online for University of the Philippines Diliman. Click here
Located: Loading…
Article
Search Tools:
Related Subjects
Access control
Ad hoc networks (Computer networks)
BGP (Computer network protocol)
Blockchains (Databases)
Data encryption (Computer science)
Data protection
Detectors
Distribution
Electronic health records
Energy consumption
Game theory
Health information systems
Health information technology
Intrusion detection systems (Computer security)
Key agreement protocols (Computer network protocols)
Ledgers (Accounting)
Mathematical models
Mathematical optimization
Patient monitoring
Patient-centered health care
Records
Resource allocation
Security measures
Speech processing systems
Storage
Water
Web applications
Wireless sensor networks
Zero-knowledge proofs