Keywords: حریم شخصی ; Data protection; Privacy; Information security; Sensor systems; Communications monitoring; Metadata;
مقالات ISI حریم شخصی (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: حریم شخصی ; Privacy; Privacy Act 1988 (Cth); Personal information; Non-personal information; Telecommunications (Interception and Access) Act 1979; Ben Grubb and Telstra Corporation Limited [2015] AICmr 35; Canadian Privacy Act; General Data Protection Regulation;
Keywords: حریم شخصی ; Enterprise servers; Resource and energy efficiency; Privacy; Cybersecurity; Data protection; Ecodesign requirement; Reuse;
Keywords: حریم شخصی ; E41; E42; Bank reserves; Large value payment system; Interbank money market; Rate-of-return dominance puzzle; Privacy;
Keywords: حریم شخصی ; Truth-telling; Lying; Privacy; Information disclosure; Survey research;
Keywords: حریم شخصی ; Facebook; Social Network site; Student-instructor interaction; Self-disclosure; Privacy;
Keywords: حریم شخصی ; Privacy; Cloud computing; Data splitting; Scalar product; Matrix product; Honest-but-curious clouds;
Keywords: حریم شخصی ; Revenge porn; Non-consensual pornography; European Union law; Criminal law; Cybercrime; Privacy; Law reform;
Keywords: حریم شخصی ; Anonymous communications; Anonymous communication systems; Privacy; Anonymity; Systematic literature review;
Keywords: حریم شخصی ; Internet of Things; Security; Privacy; Cryptography; Blockchain; Software defined networking;
Keywords: حریم شخصی ; Smart grid; Direct load control; Admission control; Privacy;
Keywords: حریم شخصی ; Automotive; Application; Platform; Security; Privacy; Literature study;
Keywords: حریم شخصی ; Cloud-aided lightweight authentication; WBANs; Anonymity; Privacy; Insecure channel;
Keywords: حریم شخصی ; IoT; Privacy; CP-ABE; Oblivious transfer; Bloom filter;
Keywords: حریم شخصی ; Smart grid communication; Security; Privacy; Attacks and countermeasures;
Keywords: حریم شخصی ; D01; D82; D83; Privacy; Dynamic communication; Asymmetric information;
Keywords: حریم شخصی ; Personal health records; Regulation; Privacy; Security;
Keywords: حریم شخصی ; Privacy; Policy; Audit log; Accountability; Linked data; Semantic web; Ontology;
Keywords: حریم شخصی ; Multi-label learning; Cloud security; Privacy; Classification;
Keywords: حریم شخصی ; Privacy; WSN; Differential privacy; Staircase mechanism;
Keywords: حریم شخصی ; Internet of Things; Systemic and cognitive approach; Security; Privacy; Trust; Identification; Access control;
Keywords: حریم شخصی ; E-Healthcare records; Privacy; Access control; Attribute-based encryption; Online/offline encryption;
Keywords: حریم شخصی ; Privacy; Internet of Things; Smart city; Network; Sensor; Grouping; Agent; Aggregation;
Keywords: حریم شخصی ; Smart health; Security; Privacy; Aggregate authentication; Access control;
Keywords: حریم شخصی ; Name resolution; Privacy; Future Internet; Network architecture; Technology and society;
Keywords: حریم شخصی ; Cyber security; IoT; Smart Home; Cyber-Physical Attacks; Cyber crime; Privacy;
Keywords: حریم شخصی ; Social control; Surveillance; Privacy; ICTs; Biometrics;
Keywords: حریم شخصی ; Privacy; Privacy preserving data mining; Data streams; Internet of Things (IoT); Web of Things (WoT); Sensor data streams; Big data;
Keywords: حریم شخصی ; Big Data; Privacy; Public policy making;
Keywords: حریم شخصی ; Filtering; Raw genomic data; Privacy;
Keywords: حریم شخصی ; Privacy; Spatio-temporal data; Trajectory data; Data mining;
Keywords: حریم شخصی ; Online social networks; Privacy; k-Degree anonymous; Friend recommendation;
Keywords: حریم شخصی ; Secure Software Engineering; Requirements Engineering; Goal-Oriented Modelling; Trust; Privacy; Policy;
Keywords: حریم شخصی ; Personal information; Experiment; Privacy; Normative theory; Descriptive theory; Rational behavior; Inconsistent behavior; Meta-analysis; Methodological review;
Keywords: حریم شخصی ; Industrial communication; Communication system security; Data security; Power grids; Smart grid; Power system security; Privacy;
Keywords: حریم شخصی ; Privacy; Data anonymization; Social network; Composition attack; Scale-free network;
Keywords: حریم شخصی ; Mobile could; Security; Privacy; Applied cryptography;
Keywords: حریم شخصی ; Quantified self; Self-tracking; Privacy; Self-disclosure; Mobile media;
Keywords: حریم شخصی ; Auctions; Elections; Privacy; Secrecy; Verifiability;
Keywords: حریم شخصی ; Healthcare; ICTs; e-health; m-Health; Pervasive health; WBAN; Cloud computing; Internet of Things; Fog; Big data; Genomics; Health monitoring; Privacy; Security; Interoperability;
Keywords: حریم شخصی ; Open-plan office; Environmental satisfaction; Privacy; Distraction; Stress; Office design;
Keywords: حریم شخصی ; Sanitation; Open defecation; Mental well-being; Social well-being; Privacy; Safety; Qualitative synthesis; Conceptual model;
Keywords: حریم شخصی ; Facebook; Twitter; Instagram; Privacy; Disclosure; Social capital;
Keywords: حریم شخصی ; Ethics; Electronic health records; Privacy; Research; Learning health system;
Keywords: حریم شخصی ; Big Data; Data sharing; Genomics; Ethics; Law; Privacy; Consent;
Keywords: حریم شخصی ; Social media; Adolescent health; Young adult; Health information technology; Privacy;
Keywords: حریم شخصی ; Social Media; Privacy; Geotag; Pictures;
Keywords: حریم شخصی ; Surveillance; Policy; Encryption; Privacy;
Keywords: حریم شخصی ; Anxiety; Psychological stress; Information technology; Human sex differences; Cross-cultural differences; Privacy;
Keywords: حریم شخصی ; Social Media; Teens; Privacy; IUIPC; SEM;