skip to content
Practical privacy Preview this item
ClosePreview this item
Checking...

Practical privacy

Author: J N E Bos
Publisher: [S.l. : s.n.], 1992.
Dissertation: Proefschrift Eindhoven.
Edition/Format:   Thesis/dissertation : Thesis/dissertation : EnglishView all editions and formats
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Proefschriften (vorm)
Material Type: Thesis/dissertation
Document Type: Book
All Authors / Contributors: J N E Bos
ISBN: 9061964059 9789061964056
OCLC Number: 905474742
Description: 122 p. : fig., tab. ; 24 cm.
Responsibility: Jurjen Norbert Eelco Bos.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/905474742<\/a>> # Practical privacy<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, bgn:Thesis<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nbgn:inSupportOf<\/a> \"Proefschrift Eindhoven.<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"905474742<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Place\/s_l<\/a>> ; # S.l.<\/span>\n\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/ne<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Topic\/54_29_computer_hardware_other<\/a>> ; # 54.29 computer hardware: other<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Topic\/coding_theory<\/a>> ; # Coding theory<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Topic\/computerbeveiliging<\/a>> ; # Computerbeveiliging<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Topic\/cryptographie<\/a>> ; # Cryptographie<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Topic\/data_encryption_computer_science<\/a>> ; # Data encryption (Computer science)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Topic\/cryptografie<\/a>> ; # Cryptografie<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Topic\/cryptography<\/a>> ; # Cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Person\/bos_j_n_e_jurjen_norbert_eelco<\/a>> ; # Jurjen Norbert Eelco Bos<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"1992<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/38934598<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Proefschriften (vorm)<\/span>\" ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Practical privacy<\/span>\" ;\u00A0\u00A0\u00A0\nschema:numberOfPages<\/a> \"122<\/span>\" ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"905474742<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/905474742#PublicationEvent\/s_l_s_n_1992<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Agent\/s_n<\/a>> ; # s.n.]<\/span>\n\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9789061964056<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/905474742<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Agent\/s_n<\/a>> # s.n.]<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"s.n.]<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Person\/bos_j_n_e_jurjen_norbert_eelco<\/a>> # Jurjen Norbert Eelco Bos<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Bos<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Jurjen Norbert Eelco<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"J.N.E<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Jurjen Norbert Eelco Bos<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Place\/s_l<\/a>> # S.l.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"S.l.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Topic\/54_29_computer_hardware_other<\/a>> # 54.29 computer hardware: other<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"54.29 computer hardware: other<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Topic\/coding_theory<\/a>> # Coding theory<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Coding theory<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Topic\/computerbeveiliging<\/a>> # Computerbeveiliging<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computerbeveiliging<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Topic\/cryptografie<\/a>> # Cryptografie<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptografie<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Topic\/cryptographie<\/a>> # Cryptographie<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptographie<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Topic\/cryptography<\/a>> # Cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptography<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/38934598#Topic\/data_encryption_computer_science<\/a>> # Data encryption (Computer science)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Data encryption (Computer science)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/ne<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"ne<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9789061964056<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9061964059<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9789061964056<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/905474742<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/905474742<\/a>> ; # Practical privacy<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-02-18<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n