Arama Sonuçlarını Sınırlandır
by
Yaman, Okan, author.
Format:
Alıntı:
Location privacy in cellular networks/ Yaman, Okan, author.
by
Akkaya, Güliz, author.
Format:
Alıntı:
Privacy-Preserving rare disease analysis with fully homomorphic encryption / Akkaya, Güliz, author.
by
Sayin, Burcu, author.
Format:
Alıntı:
An analysis of information spreading and privacy issues on social networks / Sayin, Burcu, author.
by
Abdella, Juhar Ahmed, author.
Format:
Alıntı:
Privacy preservation on mobile systems using context-aware role based accss control / Abdella
by
Yıldız, Barış.
Format:
Alıntı:
Impacts of frequent itemset hiding algorithms on privacy preserving data mining/ Yıldız, Barış.
by
Karaçay, Mustafa, author.
Format:
Alıntı:
eligibility, privacy, authentication, etc. So that the system detects whether the data is coming from an
by
Kılınç, Vahdettin Onur, author.
Format:
Alıntı:
advancements, privacy concerns hindered the data collection and, hence advancement of research on fingerprint
by
Sönmeztürk, Osman, author.
Format:
Alıntı:
to privacy concerns. Therefore, the number of customers in the loyalty systems is decreasing day by
by
Yavuz, Merve, author.
Format:
Alıntı:
MAR application is security and privacy. The following factors are ease of learning, visual quality of
by
Öztürk, Ahmet Cumhur, author.
Format:
Alıntı:
confidential knowledge is not hidden before the data is published it may pose threat to security and privacy
by
Alp, Aysun, author.
Format:
Alıntı:
additive fashion. The circulation scheme is generally L formed in order to achieve privacy at the main
by
Çetinkal, Yağız, author.
Format:
Alıntı:
matching schema. Thus, public information can be exploited to pose a threat to the privacy of the people on
Eylem Seç