Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Primary User Privacy“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Primary User Privacy" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Primary User Privacy"
Clark, Matthew, und Konstantinos Psounis. „Optimizing Primary User Privacy in Spectrum Sharing Systems“. IEEE/ACM Transactions on Networking 28, Nr. 2 (April 2020): 533–46. http://dx.doi.org/10.1109/tnet.2020.2967776.
Der volle Inhalt der QuelleJagwani, Priti, und Saroj Kaushik. „Entropy-Based Quantification of Privacy Attained Through User Profile Similarity“. International Journal of Information Security and Privacy 15, Nr. 3 (Juli 2021): 19–32. http://dx.doi.org/10.4018/ijisp.2021070102.
Der volle Inhalt der QuelleUllah, Mohib, Muhammad Arshad Islam, Rafiullah Khan, Muhammad Aleem und Muhammad Azhar Iqbal. „ObSecure Logging (OSLo): A Framework to Protect and Evaluate the Web Search Privacy in Health Care Domain“. Journal of Medical Imaging and Health Informatics 9, Nr. 6 (01.08.2019): 1181–90. http://dx.doi.org/10.1166/jmihi.2019.2708.
Der volle Inhalt der QuelleJaiswal, Mimansa, und Emily Mower Provost. „Privacy Enhanced Multimodal Neural Representations for Emotion Recognition“. Proceedings of the AAAI Conference on Artificial Intelligence 34, Nr. 05 (03.04.2020): 7985–93. http://dx.doi.org/10.1609/aaai.v34i05.6307.
Der volle Inhalt der QuelleAlMarzooqi, Fatima Mohamed, Immanuel Azaad Moonesar und Raeda AlQutob. „Healthcare Professional and User Perceptions of eHealth Data and Record Privacy in Dubai“. Information 11, Nr. 9 (28.08.2020): 415. http://dx.doi.org/10.3390/info11090415.
Der volle Inhalt der QuelleS. Jahromi, Mohammad N., Pau Buch-Cardona, Egils Avots, Kamal Nasrollahi, Sergio Escalera, Thomas B. Moeslund und Gholamreza Anbarjafari. „Privacy-Constrained Biometric System for Non-Cooperative Users“. Entropy 21, Nr. 11 (24.10.2019): 1033. http://dx.doi.org/10.3390/e21111033.
Der volle Inhalt der QuelleGhosh, Isha, und Vivek Singh. „Phones, privacy, and predictions“. Online Information Review 44, Nr. 2 (23.10.2018): 483–502. http://dx.doi.org/10.1108/oir-03-2018-0112.
Der volle Inhalt der QuelleDeni Ardiansyah und Lies Handrijaningsih. „The Impact Of E-Service Quality To Wards Customre Satisfaction On The User Of Internet Banking In PT. Bank Rakyat Indonesia Tbk (Persero)“. International Journal of Science, Technology & Management 2, Nr. 4 (25.07.2021): 1415–22. http://dx.doi.org/10.46729/ijstm.v2i4.254.
Der volle Inhalt der QuelleCohn, Ellen R., und Jana Cason. „Editors' Note“. International Journal of Telerehabilitation 9, Nr. 1 (29.06.2017): 1–2. http://dx.doi.org/10.5195/ijt.2017.6221.
Der volle Inhalt der QuelleSharma, Dhruti P., und Devesh C. Jinwala. „Aggregate Searchable Encryption With Result Privacy“. International Journal of Information Security and Privacy 14, Nr. 2 (April 2020): 62–82. http://dx.doi.org/10.4018/ijisp.2020040104.
Der volle Inhalt der QuelleDissertationen zum Thema "Primary User Privacy"
Makin, Cameron. „Primary User Obfuscation in an Incumbent Informed Spectrum Access System“. Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104015.
Der volle Inhalt der QuelleMaster of Science
With a growing demand for spectrum availability, wireless spectrum sharing has become a high-profile solution to spectrum overcrowding. In order to enable spectrum sharing between incumbent/primary (e.g.,federal communications, naval radar, users already grandfathered into the band) and secondary users (e.g., commercial communications companies), incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the incumbent informed SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility of PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation tactic can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.
张弦 und Xian Zhang. „Explaining public-private partnerships in China: case study of primary land development in Beijing“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47849368.
Der volle Inhalt der Quellepublished_or_final_version
Politics and Public Administration
Doctoral
Doctor of Philosophy
Khemsiri, Praphamontripong Heyl Barbara Sherman Padavil George. „Leadership styles used in team building by administrators from accredited private primary schools in Bangkok“. Normal, Ill. Illinois State University, 2002. http://wwwlib.umi.com/cr/ilstu/fullcit?p3088030.
Der volle Inhalt der QuelleTitle from title page screen, viewed January 3, 2006. Dissertation Committee: Barbara Heyl, George Padavil (co-chairs), Linda Lyman, Paul Baker. Includes bibliographical references (leaves 208-215) and abstract. Also available in print.
Bücher zum Thema "Primary User Privacy"
Salleh, Dani, und Mazlan Ismail. Infrastructure procurement framework for local authority. UUM Press, 2015. http://dx.doi.org/10.32890/9789670474434.
Der volle Inhalt der QuellePaul, Torremans. Part VI The Law of Property, 33 Corporations. Oxford University Press, 2017. http://dx.doi.org/10.1093/law/9780199678983.003.0033.
Der volle Inhalt der QuelleRandhawa, Gurvaneet S., und Edwin A. Lomotan. Harnessing Big Data-Based Technologies to Improve Cancer Care. Herausgegeben von David A. Chambers, Wynne E. Norton und Cynthia A. Vinson. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190647421.003.0034.
Der volle Inhalt der QuelleKearney, Joseph D., und Thomas W. Merrill. Lakefront. Cornell University Press, 2021. http://dx.doi.org/10.7591/cornell/9781501754654.001.0001.
Der volle Inhalt der QuelleOlsen, Jan Abel. Funding sources: an overview. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198794837.003.0009.
Der volle Inhalt der QuelleFisher, Talia. Law and Economics of Alternative Dispute Resolution. Herausgegeben von Francesco Parisi. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199684250.013.008.
Der volle Inhalt der QuelleAdsul, Prajakta, und Purnima Madhivanan. Assessing the Community Context When Implementing Cervical Cancer Screening Programs. Herausgegeben von David A. Chambers, Wynne E. Norton und Cynthia A. Vinson. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190647421.003.0032.
Der volle Inhalt der QuelleDabhoiwala, Faramerz. Writing Petitions in Early Modern England. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198748267.003.0007.
Der volle Inhalt der QuelleRomanowski, Nick. Wetland Habitats. CSIRO Publishing, 2010. http://dx.doi.org/10.1071/9780643100220.
Der volle Inhalt der QuelleTrill, Suzanne. Lay Households. Herausgegeben von Andrew Hiscock und Helen Wilcox. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199672806.013.24.
Der volle Inhalt der QuelleBuchteile zum Thema "Primary User Privacy"
Çelik, Sabri. „The Conflict Management Styles Used by Managers of Private Primary Schools: An Example of Ankara“. In Chaos, Complexity and Leadership 2013, 315–26. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09710-7_28.
Der volle Inhalt der QuelleSzewczak, Edward J. „Personal Information Privacy and Internet Technology“. In Encyclopedia of Information Science and Technology, First Edition, 2272–76. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch400.
Der volle Inhalt der QuelleWarkentin, Merrill, Kimberly Davis und Ernst Bekkering. „Introducing the Check-Off Password System (COPS)“. In End-User Computing, 81–97. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-945-8.ch009.
Der volle Inhalt der QuelleGrandison, Tyrone, Pei-yun S. Hsueh, Liangzhao Zeng, Henry Chang, Yi-Hui Chen, Ci-Wei Lan, Hao-Ting (Howard) Pai und Li-Feng Tseng. „Privacy Protection Issues for Healthcare Wellness Clouds“. In Privacy Protection Measures and Technologies in Business Organizations, 227–44. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-501-4.ch009.
Der volle Inhalt der QuelleSharma, Dhruti P., und Devesh C. Jinwala. „Aggregate Searchable Encryption With Result Privacy“. In Research Anthology on Artificial Intelligence Applications in Security, 922–45. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch043.
Der volle Inhalt der QuelleSharma, Dhruti P., und Devesh C. Jinwala. „Aggregate Searchable Encryption With Result Privacy“. In Research Anthology on Artificial Intelligence Applications in Security, 922–45. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch043.
Der volle Inhalt der QuelleReddy, Keesara Sravanthi. „Blockchain-Enabled Decentralization Service for Automated Parking Systems“. In Advances in Data Mining and Database Management, 51–63. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3295-9.ch004.
Der volle Inhalt der QuelleWarkentin, Merrill, Kimberly Davis und Ernst Bekkering. „A TAM Analysis of an Alternative High-Security User Authentication Procedure“. In Advances in End User Computing, 280–300. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-474-3.ch014.
Der volle Inhalt der QuelleKakaletris, George, Dimitris Varoutas, Dimitris Katsianis und Thomas Sphicopoulos. „Design and Implementation Approaches for Location-Based, Tourism-Related Services“. In Geographic Information Systems, 258–94. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2038-4.ch018.
Der volle Inhalt der QuelleKakaletris, George, Dimitris Varoutas, Dimitris Katsianis und Thomas Sphicopoulos. „Design and Implementation Approaches for Location-Based, Tourism-Related Services“. In Information Communication Technologies, 951–87. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-949-6.ch065.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Primary User Privacy"
Rosenthal, Paul, und L. Jane Park. „Managing Information Systems Textbooks: Assessing their Orientation toward Potential General Managers“. In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3314.
Der volle Inhalt der QuelleBahrak, Behnam, Sudeep Bhattarai, Abid Ullah, Jung-Min Jerry Park, Jeffery Reed und David Gurney. „Protecting the primary users' operational privacy in spectrum sharing“. In 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2014. http://dx.doi.org/10.1109/dyspan.2014.6817800.
Der volle Inhalt der QuelleWang, Jingyi, Yanmin Gong, Lijun Qian, Riku Jaentti, Miao Pan und Zhu Han. „Primary Users' Operational Privacy Preservation via Data-Driven Optimization“. In 2017 IEEE Global Communications Conference (GLOBECOM 2017). IEEE, 2017. http://dx.doi.org/10.1109/glocom.2017.8254108.
Der volle Inhalt der QuelleLiu, Yao, Peng Ning und Huaiyu Dai. „Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures“. In 2010 IEEE Symposium on Security and Privacy. IEEE, 2010. http://dx.doi.org/10.1109/sp.2010.24.
Der volle Inhalt der QuelleLiu, Jianqing, Chi Zhang, Haichuan Ding, Hao Yue und Yuguang Fang. „Policy-Based Privacy-Preserving Scheme for Primary Users in Database-Driven Cognitive Radio Networks“. In GLOBECOM 2016 - 2016 IEEE Global Communications Conference. IEEE, 2016. http://dx.doi.org/10.1109/glocom.2016.7842151.
Der volle Inhalt der QuelleBrijaková, Annamária. „Information and digital literacy of teachers in Slovakia an their adaptation on homeschooling“. In Agria Média 2020 : „Az oktatás digitális átállása korunk pedagógiai forradalma”. Eszterházy Károly Egyetem Líceum Kiadó, 2021. http://dx.doi.org/10.17048/am.2020.69.
Der volle Inhalt der QuelleBonasif, Jorge. „Urban Transportation Conditions from the Metropolitan Area of Kuala Lumpur that will Impact and Endanger Putrajaya’s Sustainability Plan“. In Environmental Engineering. VGTU Technika, 2017. http://dx.doi.org/10.3846/enviro.2017.101.
Der volle Inhalt der QuelleSlusareva, Elena, und Maria Plugina. „Psychological Characteristics of Inclusive Educational Environments“. In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-45.
Der volle Inhalt der QuelleBarcelos Jorge da Silveira, Victoria, Diego Moreira Souza und Fabrício Peixoto Alvarenga. „Urban Landscape in the Historic Center of Campos dos Goytacazes:the effect of oil royalties on the use of public and private spaces between 1996 and 2020“. In 7th International Congress on Scientific Knowledge. Perspectivas Online: Humanas e Sociais Aplicadas, 2021. http://dx.doi.org/10.25242/8876113220212431.
Der volle Inhalt der QuelleRiis, Dan. „Developing Non-Gasoline Burning Outboard Motors for the UK MoD“. In ASME 2005 Internal Combustion Engine Division Fall Technical Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/icef2005-1223.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Primary User Privacy"
Punjabi, Maitri, Julianne Norman, Lauren Edwards und Peter Muyingo. Using ACASI to Measure Gender-Based Violence in Ugandan Primary Schools. RTI Press, März 2021. http://dx.doi.org/10.3768/rtipress.2021.rb.0025.2104.
Der volle Inhalt der QuelleSchnabel, Filipina, und Danielle Aldridge. Effectiveness of EHR-Depression Screening Among Adult Diabetics in an Urban Primary Care Clinic. University of Tennessee Health Science Center, April 2021. http://dx.doi.org/10.21007/con.dnp.2021.0003.
Der volle Inhalt der QuelleBaloch, Imdad, und Abeba Taddese. EdTech in Pakistan: A Rapid Scan. EdTech Hub, Juni 2020. http://dx.doi.org/10.53832/edtechhub.0035.
Der volle Inhalt der QuelleKhalayleh, A., und A. Taddese. EdTech in Jordan: A Rapid Scan. EdTech Hub, Juni 2020. http://dx.doi.org/10.53832/edtechhub.0031.
Der volle Inhalt der QuelleTaddese, A. EdTech in Ghana: A Rapid Scan. EdTech Hub, Juni 2020. http://dx.doi.org/10.53832/edtechhub.0030.
Der volle Inhalt der QuelleUpadhyay, Arjun, und Abeba Taddese. EdTech in Senegal: A Rapid Scan. EdTech Hub, Januar 2020. http://dx.doi.org/10.53832/edtechhub.0037.
Der volle Inhalt der QuelleMullan, Joel, und Abeba Taddese. EdTech in Sierra Leone: A Rapid Scan. EdTech Hub, Juni 2020. http://dx.doi.org/10.53832/edtechhub.0038.
Der volle Inhalt der QuelleUpadhyay, Arjun, und Abeba Taddese. EdTech in Liberia: A Rapid Scan. EdTech Hub, Januar 2020. http://dx.doi.org/10.53832/edtechhub.0033.
Der volle Inhalt der QuelleOtieno, J., und A. Taddese. EdTech in Kenya: A Rapid Scan. EdTech Hub, Juni 2020. http://dx.doi.org/10.53832/edtechhub.0032.
Der volle Inhalt der QuelleKimenyi, Eric, Rachel Chuang und Abeba Taddese. EdTech in Rwanda: A Rapid Scan. EdTech Hub, Juni 2020. http://dx.doi.org/10.53832/edtechhub.0036.
Der volle Inhalt der Quelle