Search results for: Hoepman, Jaap-Henk
Showing 1 - 5 results of 5
Refine Results
-
1
Privacy is hard and seven other myths achieving privacy through careful design
Authors: Hoepman, Jaap-Henk
Published: The MIT Press, 2021Holdings: Loading…MIT Press Direct Backfile Trade Books Collection: 2021 (Digital Object Identifier Permalink)
EBSCO eBooks: 2021 (EBSCO)
IEEE Xplore MIT Press eBooks Library--Computing & Engineering Collection: 2021 (IEEE Xplore)
Electronic eBook -
2
ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings
Published: Springer International Publishing : Imprint: Springer, 2016Other Authors: “…Hoepman, Jaap-Henk…”
Holdings: Loading…Springer Computer Science eBooks 2016 English/International: 2016 (Springer Link)
Electronic eBook -
3
Radio Frequency Identification: Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers
Published: Springer Berlin Heidelberg : Imprint: Springer, 2013Other Authors: “…Hoepman, Jaap-Henk…”
Holdings: Loading…Springer English/International eBooks 2013 - Full Set: 2013 (Springer Link)
Electronic eBook -
4
Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21...
Published: Springer Berlin Heidelberg : Imprint: Springer, 2014Other Authors:Holdings: Loading…Springer English/International eBooks 2014 - Full Set: 2014 (Springer Link)
Electronic eBook -
5
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, Septemb...
Published: Springer Berlin Heidelberg : Imprint: Springer, 2009Other Authors:Holdings: Loading…Springer English/International eBooks 2009 - Full Set: 2009 (Springer Link)
Electronic eBook
Related Subjects
Data protection
Computer networks
Cryptography
Data encryption (Computer science)
Computers and civilization
Application software
Coding theory
Computer science—Mathematics
Computer security
Computers, Special purpose
Data structures (Computer science)
Electronic commerce
Electronic data processing—Management
Information technology—Management
Information theory
Privacy