Auswahl der wissenschaftlichen Literatur zum Thema „Private attribute“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Private attribute" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Private attribute"
Lai, Jianchang, Yi Mu, Fuchun Guo, Peng Jiang und Willy Susilo. „Privacy-enhanced attribute-based private information retrieval“. Information Sciences 454-455 (Juli 2018): 275–91. http://dx.doi.org/10.1016/j.ins.2018.04.084.
Der volle Inhalt der QuelleZhang, Hao, Yue Zhao, Jintao Meng, Xue Wang und Kaijun Wu. „Attribute-Based Encryption Scheme with k-Out-of-n Oblivious Transfer“. Electronics 12, Nr. 21 (01.11.2023): 4502. http://dx.doi.org/10.3390/electronics12214502.
Der volle Inhalt der QuelleBattaglia, Elena, Simone Celano und Ruggero G. Pensa. „Differentially Private Distance Learning in Categorical Data“. Data Mining and Knowledge Discovery 35, Nr. 5 (13.07.2021): 2050–88. http://dx.doi.org/10.1007/s10618-021-00778-0.
Der volle Inhalt der QuelleZhang, Guo Yan. „A Multi-Authority Attribute-Based Encryption System Against Malicious KGC“. Advanced Engineering Forum 6-7 (September 2012): 38–44. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.38.
Der volle Inhalt der QuelleRezaeifar, Shideh, Slava Voloshynovskiy, Meisam Asgari Asgari Jirhandeh und Vitality Kinakh. „Privacy-Preserving Image Template Sharing Using Contrastive Learning“. Entropy 24, Nr. 5 (03.05.2022): 643. http://dx.doi.org/10.3390/e24050643.
Der volle Inhalt der QuelleZhang, Runnan, Gang Liu, Shancang Li, Yongheng Wei und Quan Wang. „ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities“. Security and Communication Networks 2021 (20.03.2021): 1–11. http://dx.doi.org/10.1155/2021/5531369.
Der volle Inhalt der QuellePin, Lim Wei, und Manmeet Mahinderjit Singh. „User authentication using gait and enhanced attribute-based encryption: a case of smart home“. Bulletin of Electrical Engineering and Informatics 13, Nr. 3 (01.06.2024): 1839–46. http://dx.doi.org/10.11591/eei.v13i3.5347.
Der volle Inhalt der QuelleHan, Fei, und Jing Qin. „A Function Private Attribute-Based Encryption“. International Journal of Distributed Sensor Networks 10, Nr. 1 (Januar 2014): 749568. http://dx.doi.org/10.1155/2014/749568.
Der volle Inhalt der QuelleMosteiro-Sanchez, Aintzane, Marc Barcelo, Jasone Astorga und Aitor Urbieta. „Trustworthy Users: Using IOTA and IPFS for Attribute Validation in CP-ABE and dCP-ABE Schemes“. Smart Cities 6, Nr. 2 (10.03.2023): 913–28. http://dx.doi.org/10.3390/smartcities6020044.
Der volle Inhalt der QuelleArroyo Arevalo, Caridad, Sayedeh Leila Noorbakhsh, Yun Dong, Yuan Hong und Binghui Wang. „Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks“. Proceedings of the AAAI Conference on Artificial Intelligence 38, Nr. 10 (24.03.2024): 10909–17. http://dx.doi.org/10.1609/aaai.v38i10.28965.
Der volle Inhalt der QuelleDissertationen zum Thema "Private attribute"
Ahadzi, Marcus K. „Public private partnerships in infrastructure procurement : a generic multi-attribute hierarchical model for minimising pre-contract time and cost overruns (GmAHM)“. Thesis, Heriot-Watt University, 2004. http://hdl.handle.net/10399/1151.
Der volle Inhalt der QuelleGuerreiro, Ana José. „Marcas de distribuidor no sector alimentar“. Master's thesis, Universidade de Évora, 2006. http://hdl.handle.net/10174/16182.
Der volle Inhalt der QuelleAlipour, Pijani Bizhan. „Attaques par inférence d'attributs sur les publications des réseaux sociaux“. Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0009.
Der volle Inhalt der QuelleOnline Social Networks (OSN) are full of personal information such as gender, age, relationship status. The popularity and growth of OSN have rendered their platforms vulnerable to malicious activities and increased user privacy concerns. The privacy settings available in OSN do not prevent users from attribute inference attacks where an attacker seeks to illegitimately obtain their personal attributes (such as the gender attribute) from publicly available information. Disclosure of personal information can have serious outcomes such as personal spam, bullying, profile cloning for malicious activities, or sexual harassment. Existing inference techniques are either based on the target user behavior analysis through their liked pages and group memberships or based on the target user friend list. However, in real cases, the amount of available information to an attacker is small since users have realized the vulnerability of standard attribute inference attacks and concealed their generated information. To increase awareness of OSN users about threats to their privacy, in this thesis, we introduce a new class of attribute inference attacks against OSN users. We show the feasibility of these attacks from a very limited amount of data. They are applicable even when users hide all their profile information and their own comments. Our proposed methodology is to analyze Facebook picture metadata, namely (i) alt-text generated by Facebook to describe picture contents, and (ii) commenters’ words and emojis preferences while commenting underneath the picture, to infer sensitive attributes of the picture owner. We show how to launch these inference attacks on any Facebook user by i) handling online newly discovered vocabulary using a retrofitting process to enrich a core vocabulary that was built during offline training and ii) computing several embeddings for textual units (e.g., word, emoji), each one depending on a specific attribute value. Finally, we introduce ProPic, a protection mechanism that selects comments to be hidden in a computationally efficient way while minimizing utility loss according to a semantic measure. The proposed mechanism can help end-users to check their vulnerability to inference attacks and suggests comments to be hidden in order to mitigate the attacks. We have determined the success of the attacks and the protection mechanism by experiments on real data
Park, Sang Mork. „PRIVACY-PRESERVING ATTRIBUTE-BASED ACCESS CONTROL IN A GRID“. Wright State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=wright1283121251.
Der volle Inhalt der QuelleTHOBANI, SHAIRA. „CONTRATTO E ATTRIBUTI IMMATERIALI DELLA PERSONA“. Doctoral thesis, Università degli Studi di Milano, 2016. http://hdl.handle.net/2434/351967.
Der volle Inhalt der QuelleZHENG, YAO. „Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption“. Digital WPI, 2011. https://digitalcommons.wpi.edu/etd-theses/902.
Der volle Inhalt der QuelleSeethamraju, Arun Tej. „Attribute Based Encryption of Electronic Health Records : Comparative study of existing algorithms“. Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14093.
Der volle Inhalt der QuelleEdirisinghe, Edirisinghe Mudiyanselage Nalaka Sandeepa. „What are the perceptions and attributes that influence pupils and students in Sri Lanka regarding their selection between public and private higher education opportunities?“ Thesis, Boston University, 2002. https://hdl.handle.net/2144/33464.
Der volle Inhalt der QuellePLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.
Today, the demand for higher education is growing at a rapid rate in many developing countries throughout the world. Unfortunately, many governments have realized that their public higher education systems are unable to satisfy this demand. Under this condition and strong encouragement from international donors, private higher education has begun to emerge. Sri Lanka is an example where private higher education surfaced in response to a need from its society. However, private higher education remains a foreign and elusive concept for many Sri Lankans. This study seeks to determine what are the perceptions and attributes that influence pupils and students in Sri Lanka regarding their selection between public and private higher education opportunities. This study, using traditional push-pull theory, utilized a research design that combined both quantitative and qualitative research methods. The design focused on the pupil, student, teacher, and administrator populations in Colombo, Sri Lanka. Questionnaire surveys and interviews were administered. The data produced consisted of quantitative data from the questionnaire surveys and qualitative data from the interviews, all of which were analyzed for common themes. The study concluded that the major themes of the responses included the cost of higher education, quality of higher education, recognition of higher education, and the environment within higher education institutions. Further, the study also discovered several minor themes that played a role for some pupils and students. These included the medium of instruction and the issue of social class in higher education. The recommendations proposed include a need to provide pupils with loans to pursue higher education, to increase awareness of private higher education, to establish smaller private community colleges in rural areas of Sri Lanka and to provide more interaction between public and private higher education.
2031-01-01
Abid, Younes. „Analyse automatisée des risques sur la vie privée dans les réseaux sociaux“. Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0088/document.
Der volle Inhalt der QuelleIn this thesis we shed the light on the danger of privacy leakage on social network. We investigate privacy breaches, design attacks, show their feasibility and study their accuracies. This approach helps us to track the origin of threats and is a first step toward designing effective countermeasures. We have first introduced a subject sensitivity measure through a questionnaire survey. Then, we have designed on-line friendship and group membership link disclosure (with certainty) attacks on the largest social network “Facebook”. These attacks successfully uncover the local network of a target using only legitimate queries. We have also designed sampling techniques to rapidly collect useful data around a target. The collected data are represented by social-attribute networks and used to perform attribute inference (with uncertainty) attacks. To increase the accuracy of attacks, we have designed cleansing algorithms. These algorithms quantify the correlation between subjects, select the most relevant ones and combat data sparsity. Finally, we have used a shallow neural network to classify the data and infer the secret values of a sensitive attribute of a given target with high accuracy measured by AUC on real datasets. The proposed algorithms in this work are included in a system called SONSAI that can help end users analyzing their local network to take the hand over their privacy
Vasconcellos, Paulo Roberto Nascimento Meira. „Habilidades e Atitudes Relevantes na Composi??o do Perfil Profissional de Gestores de Institui??o de Ensino Superior de Car?ter Privado“. Universidade Federal Rural do Rio de Janeiro, 2006. https://tede.ufrrj.br/jspui/handle/tede/970.
Der volle Inhalt der QuelleThis study is based on a research aiming to verify the most relevant skills and attitudes for the composition of the professional profile of the managers of private institution of superior education. The methodology of exploratory study was adopted in this work, in order to contributes for academic literature, because it deepens a subject associated with abilities and business management. Nowadays, these subjects are highlighted because they help verifying the attributes that are perceived as important to compose the profile of the academics managers, aiming better performing their managerial functions. For the accomplishment of the present study, the data were collected by a questionnaire, which had been answered by professionals who work in a private institution of superior education located in the city of Rio de Janeiro, during the months of November of 2005 and January of 2006. The idea of competencies, more specifically centered in two of its components, the abilities and the attitudes, was evidenced according to the views of the interviews. The results observed in the present research point those attributes that had been considered as relevant. The abilities of communication, negotiation, creativity, logic and relationship; and the attitudes of responsibility, honesty, balance, ethics and disciplines are the attributes that have been most pointed out in this research.
Este trabalho realiza uma investiga??o com a finalidade de verificar as habilidades e atitudes relevantes para a composi??o do perfil profissional dos gestores de institui??o de ensino superior de car?ter privado. Empregando a metodologia do estudo explorat?rio, este trabalho contribui para a literatura acad?mica, por aprofundar um tema ligado ? compet?ncia e ? gest?o, ao verificar os atributos que s?o percebidos como importantes, por parte de diretores, coordenadores e professores, para compor o perfil dos gestores, visando o exerc?cio de suas fun??es. Para a consecu??o do presente estudo, optou-se pela confec??o de um question?rio, que foi respondido por profissionais pertencentes a uma institui??o de ensino superior de car?ter privado. A pesquisa foi levada a efeito entre os meses de novembro de 2005 e janeiro de 2006. A no??o de compet?ncia, mais especificamente centrada em dois de seus componentes, as habilidades e as atitudes, teve suas relev?ncias evidenciadas segundo a percep??o dos entrevistados. Os resultados alcan?ados na presente pesquisa apontam aqueles atributos que, de acordo com a percep??o dos entrevistados, foram considerados como relevantes. Dentre esses atributos foram evidenciadas, dentre outras, as habilidades de comunica??o, negocia??o, criatividade, l?gica e conviv?ncia, e as atitudes de responsabilidade, honestidade, equil?brio, ?tica e disciplina.
Bücher zum Thema "Private attribute"
Giornata di studi sui Fondi oro della collezione Crespi (2004 Milan, Italy). I Fondi oro della collezione Alberto Crespi al Museo diocesano di Milano: Questioni iconografiche e attributive : atti della Giornata di studi, 11 ottobre 2004. Cinisello Balsamo, Milano: Silvana, 2009.
Den vollen Inhalt der Quelle findenCensi, Martina. Rituali di segni e metamorfosi Ṭuqūs al-išārāt wa-l-taḥawwulāt. Venice: Fondazione Università Ca’ Foscari, 2020. http://dx.doi.org/10.30687/978-88-6969-475-2.
Der volle Inhalt der QuelleHotel Drouot. Ensemble de 16 œuvres par Henri Matisse, tableaux et sculptures modernes, art nouveau, art déco: C. Berard, J. Cartier, E. Cortès, A. Foächz, L. Icart, S. Lalique, H. Lebasque, Paubes, H. Plisson, H.J. Pontoy, A.G. Privat, E.M. Sandoz, O. Spielmann, P.R. Chevré, J. Coquillay, A. Gennarelli, V. Hayez, M.E. Jacquin, C. Marioton, M. Quef, A. Rodin, J. Terzi ef : objets d'art - céramiques par : Bing & Groendahl, T.J. Deck, Denbac, E. Gallé, M. Goupy, A. Heiligeinstein, R. Lallemant, E. Müller & J.A. Dampt, E. Müller & E. Bussière & Keller & Guérin, Picasso, Sèvres : verreries par Daum, E. Gallé, Jean, R. Lalique, Schneider : mobilier par ou attribué à Airborne, Courtray, A. Domin & M. Genevrière, Dominique, E. Gallé, J. & J. Kohn, G. Modigliani. Paris: Hôtel Drouot, 2001.
Den vollen Inhalt der Quelle findenWalsch, Neale Donald. Conversations with God, Book 4: Awaken the Species. Rainbow Ridge Publishing, 2019.
Den vollen Inhalt der Quelle findenMariAnna, Cara. Abortion. www. praeger. com, 2002. http://dx.doi.org/10.5040/9798216188384.
Der volle Inhalt der QuelleMiner, Jeremy T., Lynn E. Miner und Jerry Griffith. Collaborative Grantseeking. ABC-CLIO, LLC, 2011. http://dx.doi.org/10.5040/9798400628221.
Der volle Inhalt der QuellePetrisko, Thomas. The Kingdom of Our Father. St. Andrew\'s Productions, 2001.
Den vollen Inhalt der Quelle findenRANGANATHAN, VINAY, und E. ESWARA REDDY. A STUDY ON LEADERSHIP STYLES OF PRINCIPALS AND ORGANIZATIONAL COMMITMENT OF TEACHERS IN SECONDARY SCHOOLS OF BENGALURU CITY. Jupiter Publications Consortium, 2023. http://dx.doi.org/10.47715/jpc.b.978-93-91303-72-3.
Der volle Inhalt der QuelleChadwick, Anna. Law and the Political Economy of Hunger. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198823940.001.0001.
Der volle Inhalt der QuelleLi-Huang, Rebecca. The Psychology of High Net Worth Individuals. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190269999.003.0010.
Der volle Inhalt der QuelleBuchteile zum Thema "Private attribute"
Zhou, Xianlin, Hailong Ye und Jun Ye. „Attribute-Based Encryption Without Abuse of Private Keys“. In Advances in Intelligent Systems and Computing, 1475–80. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25128-4_180.
Der volle Inhalt der QuelleLin, Xi, und Yiliang Han. „Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption“. In Communications in Computer and Information Science, 220–30. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6385-5_19.
Der volle Inhalt der QuelleLiu, Bo, Baokang Zhao, Bo Liu und Chunqing Wu. „An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks“. In Security Engineering and Intelligence Informatics, 393–407. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40588-4_27.
Der volle Inhalt der QuelleLiu, Huichuan, Yong Zeng, Jiale Liu, Zhihong Liu, Jianfeng Ma und Xiaoyan Zhu. „Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization“. In Communications in Computer and Information Science, 175–90. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_13.
Der volle Inhalt der QuelleDi Crescenzo, Giovanni, Debra Cook, Allen McIntosh und Euthimios Panagos. „Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database“. In Lecture Notes in Computer Science, 339–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43936-4_22.
Der volle Inhalt der QuelleNastou, Panayotis E., Dimitra Nastouli, Panos M. Pardalos und Yannis C. Stamatiou. „A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies“. In Computation, Cryptography, and Network Security, 399–412. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18275-9_17.
Der volle Inhalt der QuelleDe Soete, Marijke. „Attribute Certificate“. In Encyclopedia of Cryptography, Security and Privacy, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_279-2.
Der volle Inhalt der QuelleRot, Peter, Peter Peer und Vitomir Štruc. „Detecting Soft-Biometric Privacy Enhancement“. In Handbook of Digital Face Manipulation and Detection, 391–411. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_18.
Der volle Inhalt der QuelleAbendroth, Joerg, Marit Hansen, Ioannis Krontiris, Ahmad Sabouri, Eva Schlehahn, Robert Seidl und Harald Zwingelberg. „Privacy-ABC Usage Scenarios“. In Attribute-based Credentials for Trust, 319–43. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14439-9_10.
Der volle Inhalt der QuelleBichsel, Patrik, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann et al. „An Architecture for Privacy-ABCs“. In Attribute-based Credentials for Trust, 11–78. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14439-9_2.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Private attribute"
Masoud Jafarpisheh, Amir, Mahtab Mirmohseni und Mohammad Ali Maddah-Ali. „Distributed Attribute-based Private Access Control“. In 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. http://dx.doi.org/10.1109/isit50566.2022.9834564.
Der volle Inhalt der QuelleChaves, Iago, und Javam Machado. „Differentially Private Group-by Data Releasing Algorithm“. In XXXIV Simpósio Brasileiro de Banco de Dados. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbbd.2019.8835.
Der volle Inhalt der QuelleBeigi, Ghazaleh, Ahmadreza Mosallanezhad, Ruocheng Guo, Hamidreza Alvari, Alexander Nou und Huan Liu. „Privacy-Aware Recommendation with Private-Attribute Protection using Adversarial Learning“. In WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3336191.3371832.
Der volle Inhalt der QuelleShan Yinan und Zhenfu Cao. „Extended attribute based encryption for private information retrieval“. In 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS). IEEE, 2009. http://dx.doi.org/10.1109/mobhoc.2009.5336932.
Der volle Inhalt der QuelleWang, Jian, und Jiajin Le. „Based on Private Matching and Min-attribute Generalization for Privacy Preserving in Cloud Computing“. In 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2010. http://dx.doi.org/10.1109/iihmsp.2010.186.
Der volle Inhalt der QuelleMosallanezhad, Ahmadreza, Ghazaleh Beigi und Huan Liu. „Deep Reinforcement Learning-based Text Anonymization against Private-Attribute Inference“. In Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). Stroudsburg, PA, USA: Association for Computational Linguistics, 2019. http://dx.doi.org/10.18653/v1/d19-1240.
Der volle Inhalt der QuellePei, Xin, Yongjian Wang, Wei Yao, Jiuchuan Lin und Ruxiang Peng. „Security Enhanced Attribute Based Signcryption for Private Data Sharing in Cloud“. In 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2016. http://dx.doi.org/10.1109/trustcom.2016.0133.
Der volle Inhalt der QuelleMon, Ei Ei, und Thinn Thu Naing. „The privacy-aware access control system using attribute-and role-based access control in private cloud“. In Multimedia Technology (IC-BNMT 2011). IEEE, 2011. http://dx.doi.org/10.1109/icbnmt.2011.6155974.
Der volle Inhalt der QuelleNadendla, Venkata Sriram Siddhardh, und Cedric Langbort. „On estimating multi-attribute choice preferences using private signals and matrix factorization“. In 2018 52nd Annual Conference on Information Sciences and Systems (CISS). IEEE, 2018. http://dx.doi.org/10.1109/ciss.2018.8362279.
Der volle Inhalt der QuelleCabot-Nadal, Miquel À., Brendan Playford, M. Magdalena Payeras-Capellà, Sebastian Gerske, Macià Mut-Puigserver und Rosa Pericàs-Gornals. „Private Identity-Related Attribute Verification Protocol Using SoulBound Tokens and Zero-Knowledge Proofs“. In 2023 7th Cyber Security in Networking Conference (CSNet). IEEE, 2023. http://dx.doi.org/10.1109/csnet59123.2023.10339754.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Private attribute"
Hausmann, Ricardo, und Eduardo Fernández-Arias. The Redesign of the International Financial Architecture from a Latin American Perspective: Who Pays the Bill? Inter-American Development Bank, Dezember 2000. http://dx.doi.org/10.18235/0010789.
Der volle Inhalt der QuelleZorn, G. RADIUS Attributes for IEEE 802.16 Privacy Key Management Version 1 (PKMv1) Protocol Support. RFC Editor, Juni 2010. http://dx.doi.org/10.17487/rfc5904.
Der volle Inhalt der QuelleElacqua, Gregory, Nicolas Figueroa, Andrés Fontaine, Juan Francisco Margitic und Carolina Méndez. COVID-19 Exodus: Parent preferences for public schools in Peru. Inter-American Development Bank, August 2023. http://dx.doi.org/10.18235/0005095.
Der volle Inhalt der QuelleMartinez-Carrasco, José, Otavio Conceição und Ana Lúcia Dezolt. More Information, Lower Price? Access Market-based Reference Prices and Gains in Public Procurement Efficiency. Inter-American Development Bank, März 2023. http://dx.doi.org/10.18235/0004794.
Der volle Inhalt der QuelleElacqua, Gregory, Nicolas Figueroa, Andrés Fontaine, Juan Francisco Margitic und Carolina Méndez. Exodus to Public School: Parent Preferences for Public Schools in Peru. Inter-American Development Bank, Dezember 2023. http://dx.doi.org/10.18235/0005497.
Der volle Inhalt der QuelleElacqua, Gregory, und Macarena Kutscher. Navigating Centralized Admissions: The Role of Parental Preferences in School Segregation in Chile. Inter-American Development Bank, Dezember 2023. http://dx.doi.org/10.18235/0005484.
Der volle Inhalt der QuelleVillacis, Alexis, Victor Barrera, Jeffrey Alwang, Carlos Caicedo und James Quiroz. Strategies to strengthen Ecuador's high-value cacao value chain. Inter-American Development Bank, Januar 2022. http://dx.doi.org/10.18235/0003960.
Der volle Inhalt der QuelleAkbari, Chirag, Ninad Gore und Srinivas Pulugurtha. Understanding the Effect of Pervasive Events on Vehicle Travel Time Patterns. Mineta Transportation Institute, Dezember 2023. http://dx.doi.org/10.31979/mti.2023.2319.
Der volle Inhalt der QuelleУдріс, Ірина Миколаївна, und Наталя Сергіївна Удріс-Бородавко. Design of the Franco-Belgian Exhibition Poster of the 1890-s in the Context of the Art Nouveau Style Formation. КНУКіМ, 2019. http://dx.doi.org/10.31812/123456789/5087.
Der volle Inhalt der QuelleChong, Alberto E., und Florencio López-de-Silanes. Privatization in Mexico. Inter-American Development Bank, August 2004. http://dx.doi.org/10.18235/0010832.
Der volle Inhalt der Quelle