01763oam 2200469Ia 450 991070219980332120120907133553.0(CKB)5470000002424135(OCoLC)227804536(EXLCZ)99547000000242413520080512d1993 ua 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierStorage stability of lithium hydroxide used in the submarine force[electronic resource] /P.L. Perrotta ; A. Davis ; and A. McCarrickGroton, CT :Naval Submarine Medical Research Laboratory,[1993]1 online resource (26 pages) illustrationsNaval Submarine Medical Research Laboratory report ;no. 1190Title from title screen (viewed Sept. 7, 2012)."23 October 1993."Includes bibliographical references (page 15).Lithium compoundsStorageHydroxidesStorageCarbon dioxideAbsorption and adsorptionSubmarines (Ships)Equipment and suppliesLithium compoundsStorage.HydroxidesStorage.Carbon dioxideAbsorption and adsorption.Submarines (Ships)Equipment and supplies.Perrotta Peter L1392714United States.Naval Medical Research and Development Command.Naval Submarine Medical Research Laboratory.DTICEDTICEOCLCQGPOBOOK9910702199803321Storage stability of lithium hydroxide used in the submarine force3489192UNINA03562nam 22006375 450 991101568730332120250716130245.03-031-95140-910.1007/978-3-031-95140-4(MiAaPQ)EBC32212888(Au-PeEL)EBL32212888(CKB)39659073100041(DE-He213)978-3-031-95140-4(EXLCZ)993965907310004120250716d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierPrivacy Enhancing Techniques Practices and Applications /by Xun Yi, Xuechao Yang, Xiaoning Liu, Andrei Kelarev, Kwok-Yan Lam, Mengmeng Yang, Xiangning Wang, Elisa Bertino1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (367 pages)3-031-95139-5 Chapter 1: Introduction -- Chapter 2: Homomorphic Encryption -- Chapter 3: Multiparty Computation -- Chapter 4: Differential Privacy -- Chapter 5: Privacy-Preserving Data Mining -- Chapter 6: Privacy-Preserving Machine Learning -- Chapter 7: Privacy-Preserving Social Networks -- Chapter 8: Privacy-Preserving Location-Based Services -- Chapter 9: Privacy and Digital Trust -- Chapter 10: Conclusion.This book provides a comprehensive exploration of advanced privacy-preserving methods, ensuring secure data processing across various domains. This book also delves into key technologies such as homomorphic encryption, secure multiparty computation, and differential privacy, discussing their theoretical foundations, implementation challenges, and real-world applications in cloud computing, blockchain, artificial intelligence, and healthcare. With the rapid growth of digital technologies, data privacy has become a critical concern for individuals, businesses, and governments. The chapters cover fundamental cryptographic principles and extend into applications in privacy-preserving data mining, secure machine learning, and privacy-aware social networks. By combining state-of-the-art techniques with practical case studies, this book serves as a valuable resource for those navigating the evolving landscape of data privacy and security. Designed to bridge theory and practice, this book is tailored for researchers and graduate students focused on this field. Industry professionals seeking an in-depth understanding of privacy-enhancing technologies will also want to purchase this book.Data protectionLaw and legislationData miningMachine learningPrivacyData Mining and Knowledge DiscoveryMachine LearningData protectionLaw and legislation.Data mining.Machine learning.Privacy.Data Mining and Knowledge Discovery.Machine Learning.005.8323.448Yi Xun968566Yang Xuechao1833798Liu Xiaoning1786166Kelarev Andrei150423Lam Kwok-Yan1771294Yang Mengmeng1833799Wang Xiangning1833800Bertino Elisa754415MiAaPQMiAaPQMiAaPQBOOK9911015687303321Privacy Enhancing Techniques4408743UNINA