熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 11 筆, 頁數 1 / 1
呈現:
Differential Privacy: From Theory to Practice
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion ... more |
|||
Analysis Techniques for Information Security
Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastr... more |
|||
Trust Management III: Third IFIO WG 11.11 International Conference, IFIPTM 2009, West Lafayette, In, USA, June 15-19, 2009, Proc
This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, ... more |
|||
Information and Communications Security: 8th International Conference, Icics 2006 Raleigh, NC, USA, December 4-7, 2006 Proceedin
It is our great pleasure to welcome you to the Eighth International Conference on Information and Co... more |
|||
Computer Security - Esorics 2020: 25th European Symposium on Research in Computer Security, Esorics 2020, Guildford, Uk, September 14-18, 2020, Procee
The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium o... more |
|||
Computer Security - Esorics 2020: 25th European Symposium on Research in Computer Security, Esorics 2020, Guildford, Uk, September 14-18, 2020, Procee
The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium o... more |
|||
Trust Management III: Third Ifip Wg 11.11 International Conference, Ifiptm 2009, West Lafayette, In, Usa, June 15-19, 2009, Proceedings
This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, ... more |
|||
Transitions: Developing Chinese Fluency: An Intermediate Chinese
TRANSITIONS is an innovative intermediate Chinese course that focuses the learner on the active lear... more |
|||
Differential Privacy: From Theory to Practice
|
|||
Differential Privacy: From Theory to Practice
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion ... more |
|||
Analysis Techniques for Information Security
Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastr... more |