{"title":"T-Closeness","authors":"Ning Li","doi":"10.1007/978-3-642-27739-9_1567-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1567-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116012763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Context in Security and Privacy","authors":"D. Burley","doi":"10.1007/978-3-642-27739-9_1587-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1587-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117209372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and Privacy Aspects in the Dedicated Short-Range Communications (DSRC) Protocol","authors":"C. Nita-Rotaru, Reza Curtmola","doi":"10.1007/978-3-642-27739-9_1449-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1449-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129404062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frictionless User Authentication","authors":"N. Clarke","doi":"10.1007/978-3-642-27739-9_1580-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1580-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129692370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI Approaches in Steganalysis Research","authors":"Jing Dong, Bo Peng","doi":"10.1007/978-3-642-27739-9_1633-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1633-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128493715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}