-
1Published 2001Table of Contents: “...Pseudonymization of audit data for intrusion detection /...”
Connect to the full text of this electronic book
Conference Proceeding eBook -
2Published 2005Table of Contents: “...Non-expanding transaction specific pseudonymization for IP traffic monitoring /...”
Connect to the full text of this electronic book
Conference Proceeding eBook -
3Published 1973Conference Proceeding Book
-
4Published 2008Table of Contents: “... George, the Boer War, and the North Wales press / Lisa Peters -- Sievier's monthly (1909) : pseudonyms...”
Conference Proceeding Book -
5Published 2000Table of Contents: “... optimization of decorrelation module / Fabrice Noilhan -- Pseudonym systems / Anna Lysyanskaya ... [et al...”
Conference Proceeding Book -
6Published 2000Table of Contents: “... optimization of decorrelation module / Fabrice Noilhan -- Pseudonym systems / Anna Lysyanskaya ... [et al...”
Connect to the full text of this electronic book
Conference Proceeding eBook -
7Published 2002Table of Contents: “... and HongGeun Kim -- Pseudonymizing Unix Log Files / Ulrich Flegel -- DPS: An Architectural Style...”
Connect to the full text of this electronic book
Conference Proceeding eBook