Showing 281 - 300 results of 602 for search 'Web Science Trust', query time: 0.33s Refine Results
  1. 281
    Published 2006
    Table of Contents: “… Private Organizations to Manage Security Policy Interoperability -- Privacy Preserving Web-Based Email…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 282
    Published 2006
    Table of Contents: “… Language for Service Behavior Modeling -- Dependability and Flexibility Centered Approach for Composite Web…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 283
    Published 2005
    Table of Contents: “… Architecture for Web Services -- Secure Model Management Operations for the Web -- A Credential-Based Approach…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 284
    Published 2007
    Table of Contents: “… II -- Data Mining I -- Semantic Web and Ontologies I -- Semantic Web and Ontologies II -- Data Mining…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 285
    Published 2009
    Table of Contents: “… on Malicious Web Servers in the .nz Domain -- A Combinatorial Approach for an Anonymity Metric -- On Improving…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 286
    Published 2016
    Table of Contents: “… Set Decoding -- A Cryptographic Approach for Implementing Semantic Web's Trust Layer -- Schnorr-like…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 287
    Published 2007
    Table of Contents: “… and Applications -- Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers -- Two-Party Privacy…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 288
    Published 2005
    Table of Contents: “… with Sponsorization -- DRM & E-Commerce -- Effective Protection Against Phishing and Web Spoofing -- Identity Based…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 289
    Published 2006
    Table of Contents: “… in the Life Sciences -- CombeChem: A Case Study in Provenance and Annotation Using the Semantic Web…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 290
    Published 2007
    Table of Contents: “…Conversations for reflection -- An Activity Centered Framework for Knowledge Management -- Trust…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 291
    Published 2009
    Table of Contents: “… in the Theatre Industry -- SME 2.0: Roadmap towards Web 2.0-Based Open Innovation in SME-Networks – A Case Study…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 292
    Published 2008
    Table of Contents: “… -- Cryptographic Approch for Workflow Systems -- A Fuzzy Model for Scalable Trust in E-Commerce -- Extending RBAC…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 293
    Published 2005
    Table of Contents: “… Descriptions -- LocalRank: Ranking Web Pages Considering Geographical Locality by Integrating Web and Databases…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 294
    Published 2006
    Subjects: “…Computer science.…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 295
    Published 2006
    Table of Contents: “… phone interface -- Secure web browsing over long-delay broadband networks -- Experimental based tool…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 296
    Published 2008
    Table of Contents: “… for Secure XML Query Processing in Data Streams -- An Approach to Trust Management Challenges for Critical…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 297
    Published 2004
    Table of Contents: “… and Social Groups -- Personalisation and Trust: A Reciprocal Relationship? -- I Didn’t buy It for Myself…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 298
    Published 2004
    Table of Contents: “… Mechanism for the Web -- Digital Signature -- Limited Verifier Signature from Bilinear Pairings -- Deniable…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 299
    Published 2008
    Table of Contents: “… Language for the World Wide Web -- A Case Study in Engineering SQL Constraint Database Systems (Extended…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 300
    Published 2006
    Table of Contents: “… SHA-2 Hardware Implementations -- Trusted Computing -- Offline Hardware/Software Authentication…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search