CORC

浏览/检索结果: 共9条,第1-9条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Ethical Issues in Designing Internet-Based Research: Recommendations for Good Practice 期刊论文
Journal of Research Practice, 2017, 卷号: Vol.13 No.2
作者:  Gupta,Shikha
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/24
Blockchain Technology: Universal Structure and Requirements 期刊论文
Automatic Documentation and Mathematical Linguistics, 2017, 卷号: Vol.51 No.6, 页码: 235-238
作者:  A.V.Domashev;  M.R.Biktimirov;  P.A.Cherkashin;  A.Yu.Shcherbakov
收藏  |  浏览/下载:14/0  |  提交时间:2019/12/24
Implementing generic security requirements in e-voting using modified stegano-cryptographic approach 期刊论文
International Journal of Information and Computer Security, 2015, 卷号: Vol.7 No.1, 页码: 64-90
作者:  OladotunO.Okediran;  OlayemiM.Olaniyi;  OladiranT.Arulogun;  OluwasayoE.Omidiora
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/30
Presentation of various types of electronic business available on the Internet, Advantages, Disadvantages, Key Requirements and Security, Implementation Model of an Electronic Business 期刊论文
International Journal of Economic Practices and Theories, 2012, 卷号: Vol.2 No.3, 页码: 179-196
作者:  AndreeaA.S.Ionescu;  RaulSerban
收藏  |  浏览/下载:1/0  |  提交时间:2020/01/04
Security Requirements and Solutions in Electronic Health Records: Lessons Learned from a Comparative Study. 期刊论文
Journal of Medical Systems, 2010, 卷号: Vol.34 No.4, 页码: 629-642
作者:  Karimi,Iraj;  Sadoughi,Farahnaz;  Ahmadi,Maryam;  Farzandipour,Mehrdad
收藏  |  浏览/下载:3/0  |  提交时间:2020/01/04
Meeting EHR security requirements: SeAAS approach 期刊论文
Studies In Health Technology And Informatics, 2010, 卷号: Vol.155, 页码: 85-91
作者:  SchabetsbergerT;  KattB;  WozakF;  TrojerT;  BreuR
收藏  |  浏览/下载:3/0  |  提交时间:2020/01/13
A risk analysis of an electronic commerce system based on consumer s knowledge of security requirements 期刊论文
Journal of Chongqing University. Natural Science Edition, 2008, 卷号: Vol.31 No.7, 页码: 797-799
作者:  QianGang;  HuWeiwei
收藏  |  浏览/下载:1/0  |  提交时间:2020/01/13
Secure e-government services: Towards a framework for integrating it security services into e-government maturity models 会议论文
2011
作者:  Yngstrom,Louise;  Kowalski,Stewart;  Karokola,Geoffrey
收藏  |  浏览/下载:3/0  |  提交时间:2020/01/04
Selection of electronic health records software: Challenges, considerations, and recommendations 会议论文
2011
作者:  HoushengHuang;  PuiLamYu;  Sultana,N.;  Siddaramaiah,V.K.A.;  Piliouras,T.
收藏  |  浏览/下载:1/0  |  提交时间:2020/01/13


©版权所有 ©2017 CSpace - Powered by CSpace