IP addresses and data protection

被引:0
|
作者
Sury, Ursula
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:181 / 183
相关论文
共 50 条
  • [31] DESIGNING TOURISM MARKETING TOOLS WITH GEOTARGETING OF IP ADDRESSES
    Wasino
    Dyah, Erny Herwindiati
    Ignatius, Roni Setyawan
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2024, 59 (02): : 387 - 404
  • [32] Scalable architecture for prefix preserving anonymization of IP addresses
    Blake, Anthony
    Nelson, Richard
    EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, PROCEEDINGS, 2008, 5114 : 33 - 42
  • [33] A push mechanism for GPRS supporting private IP addresses
    Lin, YB
    Lo, YC
    Rao, HCH
    IEEE COMMUNICATIONS LETTERS, 2003, 7 (01) : 24 - 26
  • [34] IP addresses distribution in Internet and its application on reduction methods for IP alias resolution
    Garcia-Jimenez, S.
    Magana, E.
    Izal, M.
    Morato, D.
    2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 1079 - 1086
  • [35] Big Data, Cloud and Bring Your Own Device: How the Data Protection Law Addresses the Impact of "Datafication"
    Zulhuda, Sonny
    Azmi, Ida Madieha Abdul Ghani
    Hakiem, Nashrul
    ADVANCED SCIENCE LETTERS, 2015, 21 (10) : 3346 - 3350
  • [36] Automatically Configuring the IP Addresses for Mobile Network in Collaborative Network
    Ou, Binke
    Dong, Ping
    PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 1020 - 1025
  • [37] Social relationship discovery of IP addresses in the managed IP networks by observing traffic at network boundary
    Jakalan, Ahmad
    Gong, Jian
    Su, Qi
    Hu, Xiaoyan
    Abdelgder, Abdeldime M. S.
    COMPUTER NETWORKS, 2016, 100 : 12 - 27
  • [38] FENet: Roles Classification of IP Addresses Using Connection Patterns
    Du, Fei
    Zhang, Yongzheng
    Bao, Xiuguo
    Liu, Boyuan
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), 2019, : 158 - 164
  • [39] Mobile IP Use of Private Addresses in an RSIP Home Network
    Tang, Jin
    Copeland, John A.
    2006 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2006), VOLS 1-4, 2006, : 562 - 567
  • [40] Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses
    Miller, Shane
    Curran, Kevin
    Lunney, Tom
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2021, 13 (06)