iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ privacy
جزئیات خدمات ترجمه در ترجمه تخصصی
computer law & security review 29 (2013) 601e609
The Privacy Policy describes what information is transmitted from a
have privacy policies that explain what information the service collects
The NSA is Watching You Leaked NSA source code from
The NSA is Watching You Leaked NSA source code from
A hack shown off by Dutch security researchers allows an
LIANG_LAYOUT_Layout 2/25/14 3:37 PM Page 33
LIANG_LAYOUT_Layout 2/25/14 3:37 PM Page 33
Business Horizons (2011) 54, 509—514
Business Horizons (2011) 54, 509—514
A general perspectiveLi Xiaoming Valon Sejdini Hasan ChowdhurySchool
Available online at www.sciencedirect.com
SECURITY AND COMMUNICATION NETWORKS
SECURITY AND COMMUNICATION NETWORKS
SECURITY AND COMMUNICATION NETWORKS
A Language for Automatically Enforcing Privacy Policies Abstract It is
SECURITY AND COMMUNICATION NETWORKS
Hippocratic Databases
Hippocratic Databases
Limiting Disclosure in Hippocratic Databases
Limiting Disclosure in Hippocratic Databases
VANETsim: An open source simulator for security
IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014 3
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎–∎∎∎
FutureGenerationComputerSystems ( ) –
FutureGenerationComputerSystems ( ) –
2012 IEEE First International Conference on Mobile Services 2012 IEEE First International Conference on Mobile Services 2012 IEEE First International Conference on Mobile Services
Privacy-Preserving Datamining
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
it is implicitly assumed that the location server receives actual
Knowl Inf Syst (2011) 26:435–465
Telematics and Informatics 32 (2015) 1–10
Available online at www.sciencedirect.com
Telematics and Informatics 32 (2015) 1–10
Knowl Inf Syst (2011) 26:435–465
Available online at www.sciencedirect.com
Two Can Keep a Secret: A Distributed Architecture for
2014 IEEE 6th International Conference on Cloud Computing Technology and Science
Journal of Strategic Information Systems 24 (2015) 3–14
ISSN 2348 – 9928
Chapter 3
Businesses need to provide information that helps customers to understand
Marketing Information Systems 149
150 Marketing Information Systems
2011 IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing
Computers and Electrical Engineering xxx (2015) xxx–xxx
An Efficient Approach for Privacy Preserving in Data
Computers and Electrical Engineering xxx (2015) xxx–xxx
examining ways ofPreserving privacy in social networks SECURITY AND PRIVACY
The concept of privacy and its effects on residential layout and design: Amman as a case study
The concept of privacy and its effects on residential layout and design: Amman as a case study
1
Privacy in Browser-Based Attribute Exchange
Privacy in Browser-Based Attribute Exchange
Privacy in Browser-Based Attribute Exchange
Figure
Privacy in Browser-Based Attribute Exchange
Privacy in Browser-Based Attribute Exchange
47213-1
47213-2
2014 International Conference on Electronics and Communication System (lCECS -2014)
Privacy-Mode Switching: Toward Flexible Privacy
ISSN:2229-6093
ISSN:2229-6093
pictures and videos thereby providing a deep insight into a
Chapter 15
FANG LAYOUT 7/8/10 12:10 PM Page 13
Network Working Group Z. Hu
FutureGenerationComputerSystems37(2014)496–511
TRADES RECOGNITION AUSTRALIA
TRADES RECOGNITION AUSTRALIA
A survey of privacy in multi-agent systems
data can be directly exchanged between the mobile devices people
Chapter 15
J Bus Ethics
Online Social Network
Security
Privacy
Privacy and Confidentiality issues in Cloud Computing architectures 35
random masking, TPA becomes unable to access the data content while it is
Privacy and Confidentiality issues in Cloud Computing architectures 35
Search on Encrypted Data 417
418 Hakan Haclgumug, Bijit Hore, Bala Iyer, and Sharad Mehrotra
2910
Available online at www.sciencedirect.com
Computers in Human Behavior 29 (2013) 2722–2729
Available online at www.sciencedirect.com
ARTICLE IN PRESS
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Pers Ubiquit Comput (2014) 18:163–175
Pers Ubiquit Comput (2014) 18:163–175
Room-to-Room Privacy and
Available online at www.sciencedirect.com
Security, Privacy and Trust in Cloud Computing:
Computers in Human Behavior 63 (2016) 453e462
CHAPTER
ONLINE PRIVACY ISSUES The online privacy issue encompasses topics such
Computer Standards & Interfaces 25 (2003) 119–129
Computer Standards & Interfaces 25 (2003) 119–129
Computer Standards & Interfaces 25 (2003) 119–129
Telecommun Syst (2013) 52:2163–2176
the world population aged 60years or over numbered 600
Eur.Phys.J.SpecialTopics214,153–181(2012)
AcceptedManuscript
Edith Cowan University
Edith Cowan University
1 Perceived privacyPrivacy in SNS is referred to as
Journal of King Saud University – Computer and Information Sciences (2016) xxx, xxx–xxx
ComputerStandards&Interfaces36(2014)759–775
ComputerStandards&Interfaces36(2014)759–775
Available online at www.sciencedirect.com
Privacy-PreservingDataPublishing:ASurveyof
Social Interactive Engagement has a positive effect on active use
Social Interactive Engagement has a positive effect on active use
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Journal of Business Research 82 (2018) 103–116
IOT SECURITY 1
IOT SECURITY 1
Information Systems 38 (2013) 491–494
Shirazi and Iqbal Journal of Cloud Computing: Advances, Systems and Applications
The First IEEE International Workshop on Context-Aware Smart Cities and Intelligent Transport Systems, 2016
The First IEEE International Workshop on Context-Aware Smart Cities and Intelligent Transport Systems, 2016
اینترنت اشیا و شهر هوشمند
Privacy is the condition of not having undocumented personal knowledge
Journal of Biomedical Informatics 46 (2013) 541–562
Sci Eng Ethics (2018) 24:905–925
Sci Eng Ethics (2018) 24:905–925
s developing as part of the plan to depreciate support
Privacy Policy for Aghaye Melk This Privacy Policy describes Our
Downloaded from https://iranpaper.ir
Downloaded from https://iranpaper.ir
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2020.3037194, IEEE Internet of
Downloaded from https://iranpaper.ir
Side Channel Security of Smart Meter Data