Showing 1 - 7 results of 7 for search '"pseudonym"', query time: 0.20s Refine Results
  1. 1
    Published 2001
    Table of Contents: ...Pseudonymization of audit data for intrusion detection /...
    Connect to the full text of this electronic book
    Conference Proceeding eBook
  2. 2
    Published 2005
    Table of Contents: ...Non-expanding transaction specific pseudonymization for IP traffic monitoring /...
    Connect to the full text of this electronic book
    Conference Proceeding eBook
  3. 3
    Published 1973
    Conference Proceeding Book
  4. 4
    Published 2008
    Table of Contents: ... George, the Boer War, and the North Wales press / Lisa Peters -- Sievier's monthly (1909) : pseudonyms...
    Conference Proceeding Book
  5. 5
    Published 2000
    Table of Contents: ... optimization of decorrelation module / Fabrice Noilhan -- Pseudonym systems / Anna Lysyanskaya ... [et al...
    Conference Proceeding Book
  6. 6
    Published 2000
    Table of Contents: ... optimization of decorrelation module / Fabrice Noilhan -- Pseudonym systems / Anna Lysyanskaya ... [et al...
    Connect to the full text of this electronic book
    Conference Proceeding eBook
  7. 7
    Published 2002
    Table of Contents: ... and HongGeun Kim -- Pseudonymizing Unix Log Files / Ulrich Flegel -- DPS: An Architectural Style...
    Connect to the full text of this electronic book
    Conference Proceeding eBook
Search Tools: RSS Feed Email Search