Data protection
Resource Information
The concept Data protection represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
The Resource
Data protection
Resource Information
The concept Data protection represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
- Label
- Data protection
- Source
- fast
200 Items that share the Concept Data protection
Context
Context of Data protectionSubject of
No resources found
No enriched resources found
- 2020 census : conducting a secure and accurate count : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Sixteenth Congress, first session, July 16, 2019
- A survey of data leakage detection and prevention solutions
- About face : examining the Department Of Homeland Security's use of facial recognition and other biometric technologies : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress
- Achieving systems safety : proceedings of the twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012
- Advances in cryptology, CRYPTO '98 : 18th Annual International Conference, Santa Barbara, California, USA, August 23-27, 1998 : proceedings
- Advances in cryptology--ASIACRYPT'98 : International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18-22, 1998 : proceedings
- Advances in information and computer security : 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
- Advances in information security and assurance : third international conference and workshops, ISA 2009, Seoul, Korea, June 25-27, 2009 : proceedings
- Anonymization
- Applied information security : a hands-on approach
- Big data : seizing opportunities, preserving values
- Collaborative financial infrastructure protection : tools, abstractions, and middleware
- Communications and multimedia security : 11th IFIP TC 6/TC ; 11 international conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010 ; proceedings
- CompTIA security+ guide to network security fundamentals
- Computer security - ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013 : proceedings
- Computer security-- ESORICS 2012 : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings
- Computer security-- ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
- Computer security-- ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II
- Critical information infrastructures security : 4th international workshop, CRITIS 2009, Bonn, Germany, September 30-October 2, 2009 : revised papers
- Critical infrastructure protection VII : 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, revised selected papers
- Critical infrastructure protection VIII : 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised selected papers
- Customer data platforms : use people data to transform the future of marketing engagement
- Cyber Security and Privacy : Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers
- Cybersecurity in Switzerland
- Data and applications security and privacy XXIV : 24th annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010 ; proceedings
- Data and applications security and privacy XXVI : 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings
- Data and applications security and privacy XXVII : 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, proceedings
- Data and applications security and privacy XXVIII : 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014 : proceedings
- Data brokers and the impact on financial data privacy, credit, insurance, employment, and housing : hearing before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Sixteenth Congress, first session, on examining data brokers' industry practices and standards and the impact they have on access to, and eligibility for, credit, insurance, employment, and housing, June 11, 2019
- Data literacy in the real world : conversations & case studies
- Data privacy management and autonomous spontaneus [sic] security : 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised selected papers
- Data security and security data : 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29-July 1, 2010. Revised selected papers
- Data storage for social networks : a socially aware approach
- Department of Defense enterprise-wide cybersecurity policies and architecture : hearing before the Subcommittee on Cybersecurity of the Committee on Armed Services, United States Senate, One Hundred Sixteenth Congress, first session, January 29, 2019
- Dependable and Historic Computing : Essays Dedicated to Brian Randell on the Occasion of His 75th Birthday
- Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings
- Digital health information and the threat of cyberattack
- Digital privacy : PRIME--Privacy and Identity Management for Europe
- Digital rights management : ACM CCS-9 workshop DRM 2002, Washington, DC, USA, November 18, 2002 : revised papers
- Digital rights management : technological, economic, legal and political aspects
- Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers
- Digital watermarking : 4th international workshop, IWDW 2005, Siena, Italy, September 15-17, 2005 : proceedings
- Digital watermarking : 5th international workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006 : proceedings
- Digital watermarking : 8th international workshop, IWDW 2009, Guildford, UK, August 24-26, 2009 : proceedings
- Digital watermarking : First International Workshop, IWDW 2002, Seoul, Korea, November 21-22, 2002 : revised papers
- Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers
- Digital watermarking : third international workshop, IWDW 2004, Seoul, South Korea, October 30-November 1, 2004 : revised selected papers
- Encyclopedia of cryptography and security
- Error control, cryptology, and speech compression : Workshop on Information Protection, Moscow, Russia, December 6-9, 1993 : selected papers
- Examining the role of the Department of Health and Human Services in health care cybersecurity : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, first session, June 8, 2017
- Facebook nation : total information awareness
- Facebook nation : total information awareness
- Financial cryptography and data security : 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers
- Financial cryptography and data security : 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised selected papers
- Financial cryptography and data security : 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised selected papers
- Financial cryptography and data security : FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canaray Islands, Spain, January 25-28, 2010 : revised selected papers
- Financial cryptography and data security : FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28-March 4, 2011 : revised selected papers
- Formal aspects of security and trust : 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised selected papers
- Formal to practical security : papers issued from the 2005-2008 French-Japanese collaboration
- Foundations of security analysis and design VI : FOSAD tutorial lectures
- Frontiers in internet technologies : Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, revised selected papers
- Future of trust in computing : proceedings of the first international conference Future of Trust in Computing 2008
- Global security, safety, and sustainability & e-Democracy : 7th International and 4th e-Democracy Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised selected papers
- Global security, safety, and sustainability : 5th international conference, ICGS3 2009, London, UK, September 1-2, 2009 : proceedings
- Global security, safety, and sustainability : 6th international conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010. Proceedings
- Information and Communications Security : 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings
- Information and communications security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings
- Information assurance : security in the information environment
- Information hiding : 12th international conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010 : revised selected papers
- Information hiding : 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, revised selected papers
- Information hiding : 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised selected papers
- Information hiding : 4th international workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001 : proceedings
- Information hiding : 5th international workshop, IH 2002, Noordwijkerhout, the Netherlands, October 7-9, 2002 : revised papers
- Information hiding : 6th international workshop, IH 2004, Toronto, Canada, May 23-25 2004, revised selected papers
- Information hiding : 7th international workshop, IH 2005, Barcelona, Spain, June 6-8, 2005 : revised selected papers
- Information hiding : 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 : revised selected papers
- Information hiding : 9th international workshop, IH 2007, Saint Malo, France, June 11-13, 2007 : revised selected papers
- Information hiding : Second International Workshop, IH'98 : Portland, Oregon, USA, April 14-17, 1998 : proceedings
- Information hiding : third international workshop, IH'99, Dresden, Germany, September 29-October 1, 1999 : proceedings
- Information security : 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings
- Information security : 17th international conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings
- Information security and assurance : International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings
- Information security and privacy : 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings
- Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings
- Information security and privacy : 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008 : proceedings
- Information security and privacy : 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5-7, 2010 ; proceedings
- Information security and privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
- Information security and privacy : 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings
- Information security and privacy : 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings
- Information security and privacy : 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000 : proceedings
- Information security and privacy : 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001 : proceedings
- Information security and privacy : 7th Australasian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002 : proceedings
- Information security and privacy : 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003 : proceedings
- Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings
- Information security and privacy : Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 : proceedings
- Information security and privacy : third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings
- Information security and privacy research : 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings
- Information security applications : 10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers
- Information security applications : 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised selected papers
- Information security applications : 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013 : revised selected papers
- Information security applications : 8th international workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007 : revised selected papers
- Information security applications : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised selected papers
- Information security governance
- Information security practice and experience : 4th international conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008 : proceedings
- Information security practice and experience : 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 : proceedings
- Information security practice and experience : first international conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
- Information security practice and experience : second international conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006 : proceedings
- Information security practice and experience : third international conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007 : proceedings
- Information security technology for applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers
- Information security theory and practice : security and privacy of mobile devices in wireless communication : 5th IFIP WG 11.2 international workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011 : proceedings
- Information security theory and practice : security, privacy and trust in computing systems and ambient intelligent ecosystems ; 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings
- Information security theory and practice : smart devices, pervasive systems, and ubiquitous networks ; third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 ; proceedings
- Information security theory and practices : security and privacy of pervasive systems and smart devices : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010 : proceedings
- Information security theory and practices : smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings
- Information security theory and practices : smart devices, convergence and next generation networks : second IFIP WG 11.2 international workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 : proceedings
- Information systems security : 10th international conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, proceedings
- Information systems security : 8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings
- Information systems security : 9th international conference, ICISS 2013, Kolkata, India, December 16-20, 2013, proceedings
- Information theoretic security : 4th international conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009 : revised selected papers
- Information theoretic security : 7th international conference, ICITS 2013, Singapore, November 28-30, 2013, proceedings
- Information theoretic security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008 : proceedings
- Information theoretic security : second international conference, ICITS 2007, Madrid, Spain, May 25-29, 2007 : revised selected papers
- Information, Security and Cryptology--ICISC 2009 : 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers
- Infrastructure security : international conference, InfraSec 2002, Bristol, UK, October 1-3, 2002 : proceedings
- Integrity primitives for secure information systems : final report of RACE Integrity Primitives Evaluation RIPE RACE (1040)
- Lightweight Cryptography for Security and Privacy : Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013 : revised selected papers
- Mobile authentication : problems and solutions
- Modern cryptography primer : theoretical foundations and practical applications
- Of privacy and power : the transatlantic struggle over freedom and security
- Online advertising and hidden hazards to consumer security and data privacy : hearing before the Permanent Subcommittee on Investigations of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, second session, May 15, 2014
- Online platforms and market power : hearing before the Subcommittee on Antitrust, Commercial, and Administrative Law of the Committee on the Judiciary, House of Representatives, One Hundred Sixteenth Congress, first and second sessions
- Oversight of the Federal Bureau of Investigation : hearing before the Committee on the Judiciary, House of Representatives, One Hundred Fourteenth Congress, first session, October 22, 2015
- Passive and active measurement : 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014 : proceedings
- Preserving privacy in data outsourcing
- Privacy and anonymity in information management systems : new techniques for new practical problems
- Privacy and identity management for life : 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers
- Privacy and identity management for life : 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised selected papers
- Privacy and identity management for life : 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised selected papers
- Privacy and security for cloud computing
- Privacy enhancing technologies : 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings
- Privacy enhancing technologies : 13th international symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013, proceedings
- Privacy enhancing technologies : 14th International Symposium, PETS 2014, Amsterdam, the Netherlands, July 16-18, 2014. Proceedings
- Privacy in statistical databases : CENEX-SDC project international conference, PSD 2006, Rome, Italy, December 13-15, 2006 : proceedings
- Privacy in statistical databases : UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012. Proceedings
- Privacy in statistical databases : UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings
- Privacy in statistical databases : UNESCO Chair in Data Privacy, international conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008 : proceedings
- Privacy in statistical databases : UNESCO chair in data privacy, international conference, PSD 2010, Corfu, Greece, September 22-24, 2010 : proceedings
- Privacy preserving data mining
- Privacy technologies and policy : first Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised selected papers
- Privacy technologies and policy : second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, proceedings
- Privacy vs. security
- Privacy, regulations, and cybersecurity : the essential business guide
- Privacy, security, and trust in KDD : first ACM SIGKDD international workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007 : revised selected papers
- Privacy, security, and trust in KDD : second ACM SIGKDD international workshop, PinKDD 2008, Las Vegas, NV, USA, August 24-27, 2008 : revised selected papers
- Privacy-preserving data mining : models and algorithms
- Proceedings of The Ifip Tc 11 23rd International Information Security Conference : IFIP 20th World Computer Congress, IFIP SEC08, September 7-10, 2008, Milano, Italy
- Progress in cryptology -- AFRICACRYPT 2012 : 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings
- Progress in cryptology : Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings
- Proposals to strengthen the antitrust laws and restore competition online : hearing before the Subcommittee on Antitrust, Commercial, and Administrative Law of the Committee on the Judiciary, House of Representatives, One Hundred Sixteenth Congress, second session, October 1, 2020
- Protecting consumer information : can data breaches be prevented? : hearing before the Subcommittee on Commerce, Manufacturing, and Trade of the Committee on Energy and Commerce, House of Representatives, One Hundred Thirteenth Congress, second session, February 5, 2014
- Protecting personal consumer information from cyber attacks and data breaches : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, second session, March 26, 2014
- Provable security : 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings
- Provable security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
- Reauthorizing DHS : positioning DHS to address new and emerging threats to the homeland : roundtable before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fifteenth Congress, second session, February 7, 2018
- Red cloud rising : cloud computing in China
- Secure ICT service provisioning for cloud, mobile and beyond : a workable architectural approach balancing between buyers and providers
- Secure data management : 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings
- Secure data management : 7th VLDB workshop, SDM 2010, Singapore, September 17, 2010 : proceedings
- Secure data management : 8th VLDB workshop, SDM 2011, Seattle, WA, USA, September 2, 2011 : proceedings
- Secure data management : 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings
- Securing digital video : techniques for DRM and content protection
- Security and privacy in biometrics
- Security and privacy in communication networks : 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers
- Security and privacy in digital rights management : ACM CCS-8 workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001 : revised papers
- Security and privacy in mobile information and communication systems : 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised selected papers
- Security and privacy in social networks
- Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings
- Security and the networked society
- Security assessment in vehicular networks
- Security protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers
- Security technology, disaster recovery and business continuity : international conferences, SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010, proceedings
- Selected areas in cryptography -- SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 14-15, 2014 : revised selected papers
- Selected areas in cryptography : 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised selected papers
- Sensor systems and software : 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, revised selected papers
- Small business, big threat : protecting small businesses from cyber attacks : hearing before the Committee on Small Business, United States House of Representatives, One Hundred Fourteenth Congress, first session, hearing held April 22, 2015
- SmartData : privacy meets evolutionary robotics
- Software similarity and classification
- Statistical confidentiality : principles and practice
- The Economics of Information Security and Privacy
- The connected world : examining the Internet of Things : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, February 11, 2015
- The economics of financial and medical identity theft
- The future of identity in the information society : 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008 : revised Selected Papers
- The identity trade : selling privacy and reputation online
- The state of online consumer privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, first session, March 16, 2011
- Topics in cryptology-- CT-RSA 2012 : the Cryptographers' track at the RSA Conference 2012, San Francisco, CA, USA, February 27-March 2, 2012. Proceedings
- Towards sustainable society on ubiquitous networks : the 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24-16, 2008, Tokyo, Japan
- Transactions on data hiding and multimedia security V
- Transactions on data hiding and multimedia security VI
- Transactions on data hiding and multimedia security VII
- Trustworthy ubiquitous computing
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/LEgZbemuGx8/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/LEgZbemuGx8/">Data protection</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Data protection
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/LEgZbemuGx8/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/LEgZbemuGx8/">Data protection</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>