Letteratura scientifica selezionata sul tema "Private attribute"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Private attribute".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Private attribute":
Lai, Jianchang, Yi Mu, Fuchun Guo, Peng Jiang e Willy Susilo. "Privacy-enhanced attribute-based private information retrieval". Information Sciences 454-455 (luglio 2018): 275–91. http://dx.doi.org/10.1016/j.ins.2018.04.084.
Zhang, Hao, Yue Zhao, Jintao Meng, Xue Wang e Kaijun Wu. "Attribute-Based Encryption Scheme with k-Out-of-n Oblivious Transfer". Electronics 12, n. 21 (1 novembre 2023): 4502. http://dx.doi.org/10.3390/electronics12214502.
Battaglia, Elena, Simone Celano e Ruggero G. Pensa. "Differentially Private Distance Learning in Categorical Data". Data Mining and Knowledge Discovery 35, n. 5 (13 luglio 2021): 2050–88. http://dx.doi.org/10.1007/s10618-021-00778-0.
Zhang, Guo Yan. "A Multi-Authority Attribute-Based Encryption System Against Malicious KGC". Advanced Engineering Forum 6-7 (settembre 2012): 38–44. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.38.
Rezaeifar, Shideh, Slava Voloshynovskiy, Meisam Asgari Asgari Jirhandeh e Vitality Kinakh. "Privacy-Preserving Image Template Sharing Using Contrastive Learning". Entropy 24, n. 5 (3 maggio 2022): 643. http://dx.doi.org/10.3390/e24050643.
Zhang, Runnan, Gang Liu, Shancang Li, Yongheng Wei e Quan Wang. "ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities". Security and Communication Networks 2021 (20 marzo 2021): 1–11. http://dx.doi.org/10.1155/2021/5531369.
Pin, Lim Wei, e Manmeet Mahinderjit Singh. "User authentication using gait and enhanced attribute-based encryption: a case of smart home". Bulletin of Electrical Engineering and Informatics 13, n. 3 (1 giugno 2024): 1839–46. http://dx.doi.org/10.11591/eei.v13i3.5347.
Han, Fei, e Jing Qin. "A Function Private Attribute-Based Encryption". International Journal of Distributed Sensor Networks 10, n. 1 (gennaio 2014): 749568. http://dx.doi.org/10.1155/2014/749568.
Mosteiro-Sanchez, Aintzane, Marc Barcelo, Jasone Astorga e Aitor Urbieta. "Trustworthy Users: Using IOTA and IPFS for Attribute Validation in CP-ABE and dCP-ABE Schemes". Smart Cities 6, n. 2 (10 marzo 2023): 913–28. http://dx.doi.org/10.3390/smartcities6020044.
Arroyo Arevalo, Caridad, Sayedeh Leila Noorbakhsh, Yun Dong, Yuan Hong e Binghui Wang. "Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks". Proceedings of the AAAI Conference on Artificial Intelligence 38, n. 10 (24 marzo 2024): 10909–17. http://dx.doi.org/10.1609/aaai.v38i10.28965.
Tesi sul tema "Private attribute":
Ahadzi, Marcus K. "Public private partnerships in infrastructure procurement : a generic multi-attribute hierarchical model for minimising pre-contract time and cost overruns (GmAHM)". Thesis, Heriot-Watt University, 2004. http://hdl.handle.net/10399/1151.
Guerreiro, Ana José. "Marcas de distribuidor no sector alimentar". Master's thesis, Universidade de Évora, 2006. http://hdl.handle.net/10174/16182.
Alipour, Pijani Bizhan. "Attaques par inférence d'attributs sur les publications des réseaux sociaux". Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0009.
Online Social Networks (OSN) are full of personal information such as gender, age, relationship status. The popularity and growth of OSN have rendered their platforms vulnerable to malicious activities and increased user privacy concerns. The privacy settings available in OSN do not prevent users from attribute inference attacks where an attacker seeks to illegitimately obtain their personal attributes (such as the gender attribute) from publicly available information. Disclosure of personal information can have serious outcomes such as personal spam, bullying, profile cloning for malicious activities, or sexual harassment. Existing inference techniques are either based on the target user behavior analysis through their liked pages and group memberships or based on the target user friend list. However, in real cases, the amount of available information to an attacker is small since users have realized the vulnerability of standard attribute inference attacks and concealed their generated information. To increase awareness of OSN users about threats to their privacy, in this thesis, we introduce a new class of attribute inference attacks against OSN users. We show the feasibility of these attacks from a very limited amount of data. They are applicable even when users hide all their profile information and their own comments. Our proposed methodology is to analyze Facebook picture metadata, namely (i) alt-text generated by Facebook to describe picture contents, and (ii) commenters’ words and emojis preferences while commenting underneath the picture, to infer sensitive attributes of the picture owner. We show how to launch these inference attacks on any Facebook user by i) handling online newly discovered vocabulary using a retrofitting process to enrich a core vocabulary that was built during offline training and ii) computing several embeddings for textual units (e.g., word, emoji), each one depending on a specific attribute value. Finally, we introduce ProPic, a protection mechanism that selects comments to be hidden in a computationally efficient way while minimizing utility loss according to a semantic measure. The proposed mechanism can help end-users to check their vulnerability to inference attacks and suggests comments to be hidden in order to mitigate the attacks. We have determined the success of the attacks and the protection mechanism by experiments on real data
Park, Sang Mork. "PRIVACY-PRESERVING ATTRIBUTE-BASED ACCESS CONTROL IN A GRID". Wright State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=wright1283121251.
THOBANI, SHAIRA. "CONTRATTO E ATTRIBUTI IMMATERIALI DELLA PERSONA". Doctoral thesis, Università degli Studi di Milano, 2016. http://hdl.handle.net/2434/351967.
ZHENG, YAO. "Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption". Digital WPI, 2011. https://digitalcommons.wpi.edu/etd-theses/902.
Seethamraju, Arun Tej. "Attribute Based Encryption of Electronic Health Records : Comparative study of existing algorithms". Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14093.
Edirisinghe, Edirisinghe Mudiyanselage Nalaka Sandeepa. "What are the perceptions and attributes that influence pupils and students in Sri Lanka regarding their selection between public and private higher education opportunities?" Thesis, Boston University, 2002. https://hdl.handle.net/2144/33464.
PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.
Today, the demand for higher education is growing at a rapid rate in many developing countries throughout the world. Unfortunately, many governments have realized that their public higher education systems are unable to satisfy this demand. Under this condition and strong encouragement from international donors, private higher education has begun to emerge. Sri Lanka is an example where private higher education surfaced in response to a need from its society. However, private higher education remains a foreign and elusive concept for many Sri Lankans. This study seeks to determine what are the perceptions and attributes that influence pupils and students in Sri Lanka regarding their selection between public and private higher education opportunities. This study, using traditional push-pull theory, utilized a research design that combined both quantitative and qualitative research methods. The design focused on the pupil, student, teacher, and administrator populations in Colombo, Sri Lanka. Questionnaire surveys and interviews were administered. The data produced consisted of quantitative data from the questionnaire surveys and qualitative data from the interviews, all of which were analyzed for common themes. The study concluded that the major themes of the responses included the cost of higher education, quality of higher education, recognition of higher education, and the environment within higher education institutions. Further, the study also discovered several minor themes that played a role for some pupils and students. These included the medium of instruction and the issue of social class in higher education. The recommendations proposed include a need to provide pupils with loans to pursue higher education, to increase awareness of private higher education, to establish smaller private community colleges in rural areas of Sri Lanka and to provide more interaction between public and private higher education.
2031-01-01
Abid, Younes. "Analyse automatisée des risques sur la vie privée dans les réseaux sociaux". Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0088/document.
In this thesis we shed the light on the danger of privacy leakage on social network. We investigate privacy breaches, design attacks, show their feasibility and study their accuracies. This approach helps us to track the origin of threats and is a first step toward designing effective countermeasures. We have first introduced a subject sensitivity measure through a questionnaire survey. Then, we have designed on-line friendship and group membership link disclosure (with certainty) attacks on the largest social network “Facebook”. These attacks successfully uncover the local network of a target using only legitimate queries. We have also designed sampling techniques to rapidly collect useful data around a target. The collected data are represented by social-attribute networks and used to perform attribute inference (with uncertainty) attacks. To increase the accuracy of attacks, we have designed cleansing algorithms. These algorithms quantify the correlation between subjects, select the most relevant ones and combat data sparsity. Finally, we have used a shallow neural network to classify the data and infer the secret values of a sensitive attribute of a given target with high accuracy measured by AUC on real datasets. The proposed algorithms in this work are included in a system called SONSAI that can help end users analyzing their local network to take the hand over their privacy
Vasconcellos, Paulo Roberto Nascimento Meira. "Habilidades e Atitudes Relevantes na Composi??o do Perfil Profissional de Gestores de Institui??o de Ensino Superior de Car?ter Privado". Universidade Federal Rural do Rio de Janeiro, 2006. https://tede.ufrrj.br/jspui/handle/tede/970.
This study is based on a research aiming to verify the most relevant skills and attitudes for the composition of the professional profile of the managers of private institution of superior education. The methodology of exploratory study was adopted in this work, in order to contributes for academic literature, because it deepens a subject associated with abilities and business management. Nowadays, these subjects are highlighted because they help verifying the attributes that are perceived as important to compose the profile of the academics managers, aiming better performing their managerial functions. For the accomplishment of the present study, the data were collected by a questionnaire, which had been answered by professionals who work in a private institution of superior education located in the city of Rio de Janeiro, during the months of November of 2005 and January of 2006. The idea of competencies, more specifically centered in two of its components, the abilities and the attitudes, was evidenced according to the views of the interviews. The results observed in the present research point those attributes that had been considered as relevant. The abilities of communication, negotiation, creativity, logic and relationship; and the attitudes of responsibility, honesty, balance, ethics and disciplines are the attributes that have been most pointed out in this research.
Este trabalho realiza uma investiga??o com a finalidade de verificar as habilidades e atitudes relevantes para a composi??o do perfil profissional dos gestores de institui??o de ensino superior de car?ter privado. Empregando a metodologia do estudo explorat?rio, este trabalho contribui para a literatura acad?mica, por aprofundar um tema ligado ? compet?ncia e ? gest?o, ao verificar os atributos que s?o percebidos como importantes, por parte de diretores, coordenadores e professores, para compor o perfil dos gestores, visando o exerc?cio de suas fun??es. Para a consecu??o do presente estudo, optou-se pela confec??o de um question?rio, que foi respondido por profissionais pertencentes a uma institui??o de ensino superior de car?ter privado. A pesquisa foi levada a efeito entre os meses de novembro de 2005 e janeiro de 2006. A no??o de compet?ncia, mais especificamente centrada em dois de seus componentes, as habilidades e as atitudes, teve suas relev?ncias evidenciadas segundo a percep??o dos entrevistados. Os resultados alcan?ados na presente pesquisa apontam aqueles atributos que, de acordo com a percep??o dos entrevistados, foram considerados como relevantes. Dentre esses atributos foram evidenciadas, dentre outras, as habilidades de comunica??o, negocia??o, criatividade, l?gica e conviv?ncia, e as atitudes de responsabilidade, honestidade, equil?brio, ?tica e disciplina.
Libri sul tema "Private attribute":
Giornata di studi sui Fondi oro della collezione Crespi (2004 Milan, Italy). I Fondi oro della collezione Alberto Crespi al Museo diocesano di Milano: Questioni iconografiche e attributive : atti della Giornata di studi, 11 ottobre 2004. Cinisello Balsamo, Milano: Silvana, 2009.
Censi, Martina. Rituali di segni e metamorfosi Ṭuqūs al-išārāt wa-l-taḥawwulāt. Venice: Fondazione Università Ca’ Foscari, 2020. http://dx.doi.org/10.30687/978-88-6969-475-2.
Hotel Drouot. Ensemble de 16 œuvres par Henri Matisse, tableaux et sculptures modernes, art nouveau, art déco: C. Berard, J. Cartier, E. Cortès, A. Foächz, L. Icart, S. Lalique, H. Lebasque, Paubes, H. Plisson, H.J. Pontoy, A.G. Privat, E.M. Sandoz, O. Spielmann, P.R. Chevré, J. Coquillay, A. Gennarelli, V. Hayez, M.E. Jacquin, C. Marioton, M. Quef, A. Rodin, J. Terzi ef : objets d'art - céramiques par : Bing & Groendahl, T.J. Deck, Denbac, E. Gallé, M. Goupy, A. Heiligeinstein, R. Lallemant, E. Müller & J.A. Dampt, E. Müller & E. Bussière & Keller & Guérin, Picasso, Sèvres : verreries par Daum, E. Gallé, Jean, R. Lalique, Schneider : mobilier par ou attribué à Airborne, Courtray, A. Domin & M. Genevrière, Dominique, E. Gallé, J. & J. Kohn, G. Modigliani. Paris: Hôtel Drouot, 2001.
Walsch, Neale Donald. Conversations with God, Book 4: Awaken the Species. Rainbow Ridge Publishing, 2019.
MariAnna, Cara. Abortion. www. praeger. com, 2002. http://dx.doi.org/10.5040/9798216188384.
Miner, Jeremy T., Lynn E. Miner e Jerry Griffith. Collaborative Grantseeking. ABC-CLIO, LLC, 2011. http://dx.doi.org/10.5040/9798400628221.
Petrisko, Thomas. The Kingdom of Our Father. St. Andrew\'s Productions, 2001.
RANGANATHAN, VINAY, e E. ESWARA REDDY. A STUDY ON LEADERSHIP STYLES OF PRINCIPALS AND ORGANIZATIONAL COMMITMENT OF TEACHERS IN SECONDARY SCHOOLS OF BENGALURU CITY. Jupiter Publications Consortium, 2023. http://dx.doi.org/10.47715/jpc.b.978-93-91303-72-3.
Chadwick, Anna. Law and the Political Economy of Hunger. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198823940.001.0001.
Li-Huang, Rebecca. The Psychology of High Net Worth Individuals. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190269999.003.0010.
Capitoli di libri sul tema "Private attribute":
Zhou, Xianlin, Hailong Ye e Jun Ye. "Attribute-Based Encryption Without Abuse of Private Keys". In Advances in Intelligent Systems and Computing, 1475–80. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25128-4_180.
Lin, Xi, e Yiliang Han. "Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption". In Communications in Computer and Information Science, 220–30. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6385-5_19.
Liu, Bo, Baokang Zhao, Bo Liu e Chunqing Wu. "An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks". In Security Engineering and Intelligence Informatics, 393–407. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40588-4_27.
Liu, Huichuan, Yong Zeng, Jiale Liu, Zhihong Liu, Jianfeng Ma e Xiaoyan Zhu. "Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization". In Communications in Computer and Information Science, 175–90. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_13.
Di Crescenzo, Giovanni, Debra Cook, Allen McIntosh e Euthimios Panagos. "Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database". In Lecture Notes in Computer Science, 339–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43936-4_22.
Nastou, Panayotis E., Dimitra Nastouli, Panos M. Pardalos e Yannis C. Stamatiou. "A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies". In Computation, Cryptography, and Network Security, 399–412. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18275-9_17.
De Soete, Marijke. "Attribute Certificate". In Encyclopedia of Cryptography, Security and Privacy, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_279-2.
Rot, Peter, Peter Peer e Vitomir Štruc. "Detecting Soft-Biometric Privacy Enhancement". In Handbook of Digital Face Manipulation and Detection, 391–411. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_18.
Abendroth, Joerg, Marit Hansen, Ioannis Krontiris, Ahmad Sabouri, Eva Schlehahn, Robert Seidl e Harald Zwingelberg. "Privacy-ABC Usage Scenarios". In Attribute-based Credentials for Trust, 319–43. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14439-9_10.
Bichsel, Patrik, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann et al. "An Architecture for Privacy-ABCs". In Attribute-based Credentials for Trust, 11–78. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14439-9_2.
Atti di convegni sul tema "Private attribute":
Masoud Jafarpisheh, Amir, Mahtab Mirmohseni e Mohammad Ali Maddah-Ali. "Distributed Attribute-based Private Access Control". In 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. http://dx.doi.org/10.1109/isit50566.2022.9834564.
Chaves, Iago, e Javam Machado. "Differentially Private Group-by Data Releasing Algorithm". In XXXIV Simpósio Brasileiro de Banco de Dados. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbbd.2019.8835.
Beigi, Ghazaleh, Ahmadreza Mosallanezhad, Ruocheng Guo, Hamidreza Alvari, Alexander Nou e Huan Liu. "Privacy-Aware Recommendation with Private-Attribute Protection using Adversarial Learning". In WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3336191.3371832.
Shan Yinan e Zhenfu Cao. "Extended attribute based encryption for private information retrieval". In 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS). IEEE, 2009. http://dx.doi.org/10.1109/mobhoc.2009.5336932.
Wang, Jian, e Jiajin Le. "Based on Private Matching and Min-attribute Generalization for Privacy Preserving in Cloud Computing". In 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2010. http://dx.doi.org/10.1109/iihmsp.2010.186.
Mosallanezhad, Ahmadreza, Ghazaleh Beigi e Huan Liu. "Deep Reinforcement Learning-based Text Anonymization against Private-Attribute Inference". In Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). Stroudsburg, PA, USA: Association for Computational Linguistics, 2019. http://dx.doi.org/10.18653/v1/d19-1240.
Pei, Xin, Yongjian Wang, Wei Yao, Jiuchuan Lin e Ruxiang Peng. "Security Enhanced Attribute Based Signcryption for Private Data Sharing in Cloud". In 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2016. http://dx.doi.org/10.1109/trustcom.2016.0133.
Mon, Ei Ei, e Thinn Thu Naing. "The privacy-aware access control system using attribute-and role-based access control in private cloud". In Multimedia Technology (IC-BNMT 2011). IEEE, 2011. http://dx.doi.org/10.1109/icbnmt.2011.6155974.
Nadendla, Venkata Sriram Siddhardh, e Cedric Langbort. "On estimating multi-attribute choice preferences using private signals and matrix factorization". In 2018 52nd Annual Conference on Information Sciences and Systems (CISS). IEEE, 2018. http://dx.doi.org/10.1109/ciss.2018.8362279.
Cabot-Nadal, Miquel À., Brendan Playford, M. Magdalena Payeras-Capellà, Sebastian Gerske, Macià Mut-Puigserver e Rosa Pericàs-Gornals. "Private Identity-Related Attribute Verification Protocol Using SoulBound Tokens and Zero-Knowledge Proofs". In 2023 7th Cyber Security in Networking Conference (CSNet). IEEE, 2023. http://dx.doi.org/10.1109/csnet59123.2023.10339754.
Rapporti di organizzazioni sul tema "Private attribute":
Hausmann, Ricardo, e Eduardo Fernández-Arias. The Redesign of the International Financial Architecture from a Latin American Perspective: Who Pays the Bill? Inter-American Development Bank, dicembre 2000. http://dx.doi.org/10.18235/0010789.
Zorn, G. RADIUS Attributes for IEEE 802.16 Privacy Key Management Version 1 (PKMv1) Protocol Support. RFC Editor, giugno 2010. http://dx.doi.org/10.17487/rfc5904.
Elacqua, Gregory, Nicolas Figueroa, Andrés Fontaine, Juan Francisco Margitic e Carolina Méndez. COVID-19 Exodus: Parent preferences for public schools in Peru. Inter-American Development Bank, agosto 2023. http://dx.doi.org/10.18235/0005095.
Martinez-Carrasco, José, Otavio Conceição e Ana Lúcia Dezolt. More Information, Lower Price? Access Market-based Reference Prices and Gains in Public Procurement Efficiency. Inter-American Development Bank, marzo 2023. http://dx.doi.org/10.18235/0004794.
Elacqua, Gregory, Nicolas Figueroa, Andrés Fontaine, Juan Francisco Margitic e Carolina Méndez. Exodus to Public School: Parent Preferences for Public Schools in Peru. Inter-American Development Bank, dicembre 2023. http://dx.doi.org/10.18235/0005497.
Elacqua, Gregory, e Macarena Kutscher. Navigating Centralized Admissions: The Role of Parental Preferences in School Segregation in Chile. Inter-American Development Bank, dicembre 2023. http://dx.doi.org/10.18235/0005484.
Villacis, Alexis, Victor Barrera, Jeffrey Alwang, Carlos Caicedo e James Quiroz. Strategies to strengthen Ecuador's high-value cacao value chain. Inter-American Development Bank, gennaio 2022. http://dx.doi.org/10.18235/0003960.
Akbari, Chirag, Ninad Gore e Srinivas Pulugurtha. Understanding the Effect of Pervasive Events on Vehicle Travel Time Patterns. Mineta Transportation Institute, dicembre 2023. http://dx.doi.org/10.31979/mti.2023.2319.
Удріс, Ірина Миколаївна, e Наталя Сергіївна Удріс-Бородавко. Design of the Franco-Belgian Exhibition Poster of the 1890-s in the Context of the Art Nouveau Style Formation. КНУКіМ, 2019. http://dx.doi.org/10.31812/123456789/5087.
Chong, Alberto E., e Florencio López-de-Silanes. Privatization in Mexico. Inter-American Development Bank, agosto 2004. http://dx.doi.org/10.18235/0010832.