Suggested Topics within your search.
Suggested Topics within your search.
- Cultural property 6
- Historic preservation 5
- Protection 5
- Collection and preservation 2
- Cultural policy 2
- Management 2
- Planning 2
- Antiquities 1
- Archaeological expeditions 1
- Archeology 1
- Architecture 1
- Church buildings 1
- Citizen participation 1
- Conservation and restoration 1
- Culture policy 1
- Dinosaurs 1
- Ethnic conflict 1
- FICTION 1
- Fossils 1
- Historic sites 1
- Historical 1
- History 1
- Intangible property 1
- Museums and community 1
- Mutilation, defacement, etc 1
- Paleontologists 1
- Repatriation 1
- Thrillers 1
- Vandalism 1
-
21
Examining the Role of Preserving Medical Records at Kamuganguzi HCIV.
Published 2023Subjects: Get full text
Thesis -
22
Cloud data anonymous assured deletion approach based on blockchain
Published 2021-03-01Subjects: Get full text
Article -
23
Privacy preserving approach based on proximity privacy for numerical sensitive attributes
Published 2015-04-01Subjects: “…privacy preserving…”
Get full text
Article -
24
Provably secure social network privacy-preserving scheme
Published 2016-08-01Subjects: Get full text
Article -
25
Privacy-preserving trajectory similarity computation method
Published 2022-11-01Subjects: “…privacy-preserving…”
Get full text
Article -
26
PRESERVING AND MANAGING CHINESE SETTLEMENT HERITAGE TOURISM IN LASEM, INDONESIA
Published 2024-08-01Subjects: Get full text
Article -
27
New chameleon Hashing of secure and privacy-preserving vehicular communications
Published 2014-11-01Subjects: “…secure and privacy-preserving…”
Get full text
Article -
28
Security analysis of weighted network anonymity based on singular value decomposition
Published 2018-05-01Subjects: Get full text
Article -
29
New cross-layer reputation mechanism for mobile cloud computing
Published 2018-03-01Subjects: Get full text
Article -
30
Efficient and secure message authentication scheme for VANET
Published 2016-11-01Subjects: “…conditional privacy preserving…”
Get full text
Article -
31
Scalable and Privacy-Preserving Inter-AS Routing Through Machine-Learning-Based Graph Pruning
Published 2025-01-01Subjects: Get full text
Article -
32
Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario
Published 2020-10-01Subjects: Get full text
Article -
33
Efficient secure federated learning aggregation framework based on homomorphic encryption
Published 2023-01-01Subjects: Get full text
Article -
34
-
35
Piecewise histogram equalization based image enhancement
Published 2011-01-01Subjects: Get full text
Article -
36
Dynamic Mix-zone scheme with joint-entropy based metric for privacy-perserving in IoV
Published 2018-03-01Subjects: Get full text
Article -
37
Efficient and secure multi-user outsourced image retrieval scheme with access control
Published 2021-10-01Subjects: Get full text
Article -
38
Anonymity handover authentication protocol based on group signature for wireless Mesh network
Published 2016-10-01Subjects: Get full text
Article -
39
CLM:differential privacy protection method for trajectory publishing
Published 2017-06-01Subjects: Get full text
Article -
40
Perfect maps in compact (countably compact) spaces
Published 1995-01-01Subjects: Get full text
Article