Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,468,276 papers from all fields of science
Search
Sign In
Create Free Account
Confidentiality
Known as:
Commercial confidence
, Strict confidence
, Professional secrecy
Expand
Confidentiality involves a set of rules or a promise that limits access or places restrictions on certain types of information.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Asset (computer security)
Aurora Generator Test
Authenticated encryption
Basic access authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2012
Review
2012
Saving Mothers’ Lives: Reviewing Maternal Deaths to Make Motherhood Safer 2006-2008 A Review
J. Mcclure
,
G. Cooper
,
T. Clutton-Brock
2012
Corpus ID: 75158051
(Br J Anaesth. 2011;107(2):127–32)
Highly Cited
2011
Highly Cited
2011
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
Chun-Ta Li
,
M. Hwang
Information Sciences
2011
Corpus ID: 11133949
Highly Cited
2010
Highly Cited
2010
Application-Aware Secure Multicast for Power Grid Communications
Jianqing Zhang
,
Carl A. Gunter
First IEEE International Conference on Smart Grid…
2010
Corpus ID: 2637788
We propose an application-aware approach to setting up secure multicast groups for power grid communications that automatically…
Expand
Highly Cited
2008
Highly Cited
2008
Feature extraction and health monitoring using image correlation for survivability of leadfree packaging under shock and vibration
P. Lall
,
D. Iyengar
,
S. Shantaram
,
P. Gupta
,
D. Panchagade
,
J. Suhling
International Conference on Thermal, Mechanial…
2008
Corpus ID: 14130328
In this paper, the feature extraction for health monitoring based on optical measurements of transient-strain from digital image…
Expand
Highly Cited
2007
Highly Cited
2007
Statistical Pattern Recognition and Built-in Reliability Test for Feature Extraction and Health Monitoring of Electronics Under Shock Loads
P. Lall
,
P. Choudhary
,
S. Gupte
,
J. Hofmeister
IEEE transactions on components and packaging…
2007
Corpus ID: 27205697
The built-in stress test (BIST) is extensively used for diagnostics or identification of failure. The current version of BIST…
Expand
Review
2005
Review
2005
Are the Causes of Bank Distress Changing? Can Researchers Keep Up?
T. King
,
Daniel A. Nuxoll
,
Timothy J. Yeager
2005
Corpus ID: 7831615
Since 1990, the banking sector has experienced enormous legislative, technological and financial changes, yet research into the…
Expand
Highly Cited
2004
Highly Cited
2004
A Security Architecture for Mobile Wireless Sensor Networks
S. Schmidt
,
Holger Krahn
,
Stefan Fischer
,
D. Wätjen
European Workshop on Security in Ad-hoc and…
2004
Corpus ID: 530631
Wireless sensor networks increasingly become viable solutions to many challenging problems and will successively be deployed in…
Expand
Highly Cited
2003
Highly Cited
2003
WebGIS for Monitoring "Sudden Oak Death" in coastal California
N. M. Kelly
,
K. Tuxen
Computers, Environment and Urban Systems
2003
Corpus ID: 36795199
Highly Cited
2002
Highly Cited
2002
Routing through the mist: privacy preserving communication in ubiquitous computing environments
J. Al-Muhtadi
,
R. Campbell
,
Apu Kapadia
,
M. D. Mickunas
,
Seung Yi
Proceedings 22nd International Conference on…
2002
Corpus ID: 2648878
Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns…
Expand
Highly Cited
1999
Highly Cited
1999
Relationship marketing in Japan: the buyer‐supplier relationships of four automakers
Jai-Beom Kim
,
P. Michell
1999
Corpus ID: 15838744
Examines the individual buyer‐supplier relationships of the four major Japanese automobile manufacturers. Building on the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required