-
1دورية أكاديمية
المؤلفون: Besner, ManfredAff1, IDs00182024008854_cor1
المصدر: International Journal of Game Theory. :1-13
-
2دورية أكاديمية
المؤلفون: Lin, Xiaogang, Jin, Kangning, Fu, WenhuiAff2, IDs1151802255366_cor3, Lin, Qiang
المصدر: Journal of Systems Science and Systems Engineering. 31(5):619-647
-
3مؤتمر
المؤلفون: Vallve-Guionnet, C.
المصدر: International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II Technology: Coding and Computing Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on. 2:774-775 Vol. 2 2005
Relation: Proceedings. ITCC 2005 International Conference on Information Technology: Coding and Computing
-
4دورية أكاديمية
المؤلفون: Rivelois, Jean
المصدر: Cahiers des Amériques latinesOpenAIRE.
مصطلحات موضوعية: réseaux criminels, connivences, collusions, criminal networks, connivance, collusion, redes criminales, connivencia, colusión
Relation: http://journals.openedition.org/cal/basictei/8150; http://journals.openedition.org/cal/tei/8150
URL الوصول: http://journals.openedition.org/cal/8150
-
5دورية أكاديمية
المؤلفون: Anna Fornalczyk
المصدر: Yearbook of Antitrust and Regulatory Studies, Vol 2, Iss 2, Pp 33-48 (2009)
مصطلحات موضوعية: cartels, collusions, explicit and tacit collusions, transparent markets, relevant markets, anti-competitive agreements, Law, Social Sciences
وصف الملف: electronic resource
-
6كتاب إلكتروني
المؤلفون: Guth, Hans-JürgenAff5, Pfitzmann, BirgitAff5
المساهمون: Goos, Gerhard, editorAff1, Hartmanis, Juris, editorAff2, van Leeuwen, Jan, editorAff3, Pfitzmann, Andreas, editorAff4
المصدر: Information Hiding : Third International Workshop, IH’99, Dresden, Germany, September 29 - October 1, 1999 Proceedings. 1768:134-145
-
7دورية أكاديمية
لا يتم عرض هذه النتيجة على الضيوف.
تسجيل الدخول للوصول الكامل. -
8دورية أكاديمية
لا يتم عرض هذه النتيجة على الضيوف.
تسجيل الدخول للوصول الكامل. -
9
المؤلفون: Jemal H. Abawajy, Zulkefli Mohd Yusop
المصدر: Procedia - Social and Behavioral Sciences. 129:611-618
مصطلحات موضوعية: Cloud computing security, business.industry, Data management, Data Security, Internet privacy, Data_MISCELLANEOUS, Data security, Insider threat, Cloud computing, Information security, Cloud Computing, Computer security, computer.software_genre, Insider, ComputingMilieux_GENERAL, Business economics, Insider Attacks, Cloud Computing Security, General Materials Science, Business, Mitigation Strategies, computer, Malicious Insider Collusions
-
10
المؤلفون: Decouchant, Jérémie
المساهمون: Quéma, Vivien [superviser], Ben Mokhtar, Sonia [superviser], de Palma, Noël [president of the jury], Réveillère, Laurent [member of the jury], Tixeuil, Sébastien [member of the jury], Rivière, Étienne [member of the jury], Laboratoire d'Informatique de Grenoble (LIG), Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF), Université Grenoble Alpes, Vivien Quéma
المصدر: Cryptography and Security [cs.CR]. Université Grenoble Alpes, 2015. English. ⟨NNT : 2015GREAM034⟩
مصطلحات موضوعية: Computer science [C05] [Engineering, computing & technology], Tolérance aux fautes, Coalitions, [INFO.INFO-GT]Computer Science [cs]/Computer Science and Game Theory [cs.GT], Fault tolerance, Chiffrement homomorphique, Distributed systems, Sciences informatiques [C05] [Ingénierie, informatique & technologie], Homomorphic encryption, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI], Collusions, Privacy, Intimité, Peer-to-peer, Systèmes distribués, Accountability, [INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC], Responsabilisation
URL الوصول: https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::e464fe387aacd3790375056ccac5ac70
http://orbilu.uni.lu/handle/10993/28425