24177 publications
- Prion Proteins
- Prions
- Prions
- Prions Prions Prions
- Prions and Brain Diseases in Animals and Humans
- Prions and Diseases
- Prions and Diseases
- Prions and Diseases
- Prior Processes and Their Applications
- Prior Processes and Their Applications
- Priorisierte Medizin
- Priorisierung in der Medizin
- Priorisierung in der Medizin
- Prioritising Business Processes
- Prioritization Theory and Defensive Foreign Policy
- Prioritization in Medicine
- Prioritizing the Environment in Urban Sustainability Planning
- Priority Nominalism
- Priority Rule Violations and Perverse Banking Behaviors
- Priority of Needs?
- Priority-Zone Mapping for Reforestation
- Prioritäten richtig setzen
- Prise en charge médicale et diététique des maladies héréditaires du métabolisme
- Prismatic Media, Transnational Circuits
- Prison Breaks
- Prison Discourse
- Prison Dog Programs
- Prison Food
- Prison Gangs Behind Bars and Beyond
- Prison Inmates Living with HIV in India
- Prison Narratives from Boethius to Zana
- Prison Officers
- Prison Riots in Britain and the USA
- Prison Shakespeare
- Prison Shakespeare and the Purpose of Performance: Repentance Rituals and the Early Modern
- Prison Tattoos
- Prison Vocational Education and Policy in the United States
- Prison in Iran
- Prison in Peru
- Prisoner Reentry
- Prisoners of England
- Prisoners of Rhodesia
- Prisoners of War
- Prisoners of War and Local Women in Europe and the United States, 1914-1956
- Prisoners of War and the German High Command
- Prisoners of the International Community
- Prisoners on Prison Films
- Prisons 2000
- Prisons Crowding: A Psychological Perspective
- Prisons and Imprisonment
- Prisons and Punishment in Texas
- Prisons, Inmates and Governance in Latin America
- Prisons, Peace and Terrorism
- Prisons, Politics and Practices in England and Wales 1945–2020
- Prisons, Punishment and the Pursuit of Security
- Prisons, State and Violence
- Pristine Perspectives on Logic, Language, and Computation
- Pristine Transfinite Graphs and Permissive Electrical Networks
- Privacy Computing
- Privacy Enhancing Technologies
- Privacy Enhancing Technologies
- Privacy Enhancing Technologies
- Privacy Enhancing Technologies
- Privacy Enhancing Technologies
- Privacy Enhancing Technologies
- Privacy Enhancing Technologies
- Privacy Enhancing Technologies
- Privacy Enhancing Technologies
- Privacy Enhancing Technologies
- Privacy Enhancing Technologies
- Privacy Enhancing Technologies
- Privacy Enhancing Technologies
- Privacy Impact Assessment
- Privacy Online
- Privacy Preservation in Distributed Systems
- Privacy Preservation in IoT: Machine Learning Approaches
- Privacy Preserving Data Mining
- Privacy Risk Analysis
- Privacy Risk Analysis of Online Social Networks
- Privacy Symposium 2022
- Privacy Symposium 2023
- Privacy Technologies and Policy
- Privacy Technologies and Policy
- Privacy Technologies and Policy
- Privacy Technologies and Policy
- Privacy Technologies and Policy
- Privacy Technologies and Policy
- Privacy Technologies and Policy
- Privacy Technologies and Policy
- Privacy Technologies and Policy
- Privacy Technologies and Policy
- Privacy Technologies and Policy
- Privacy and Anonymity in Information Management Systems
- Privacy and Criminal Justice
- Privacy and Data Protection Challenges in the Distributed Era
- Privacy and Data Protection Issues of Biometric Applications
- Privacy and Data Protection Seals
- Privacy and Data Protection in Software Services
- Privacy and Health Care
- Privacy and Identity Management
- Privacy and Identity Management
- Privacy and Identity Management for Emerging Services and Technologies
- Privacy and Identity Management for Life
- Privacy and Identity Management for Life
- Privacy and Identity Management for Life
- Privacy and Identity Management for Life
- Privacy and Identity Management for the Future Internet in the Age of Globalisation
- Privacy and Identity Management. Between Data Protection and Security
- Privacy and Identity Management. Data for Better Living: AI and Privacy
- Privacy and Identity Management. Facing up to Next Steps
- Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data
- Privacy and Identity Management. Sharing in a Digital World
- Privacy and Identity Management. The Smart Revolution
- Privacy and Identity Management. Time for a Revolution?
- Privacy and Security Issues in Big Data
- Privacy and Security Issues in Data Mining and Machine Learning
- Privacy and Security for Cloud Computing
- Privacy and Technologies of Identity
- Privacy and the American Constitution
- Privacy and the Commercial Use of Personal Information
- Privacy and the Digital State: Balancing Public Information and Personal Privacy
- Privacy at Sea
- Privacy for Location-based Services
- Privacy im Internet
- Privacy in Dynamical Systems
- Privacy in Location-Based Applications
- Privacy in Mobile and Pervasive Computing
- Privacy in Social Networks
- Privacy in Statistical Databases
- Privacy in Statistical Databases
- Privacy in Statistical Databases
- Privacy in Statistical Databases
- Privacy in Statistical Databases
- Privacy in Statistical Databases
- Privacy in Statistical Databases
- Privacy in Statistical Databases
- Privacy in Statistical Databases
- Privacy in Statistical Databases
- Privacy in a Cyber Age
- Privacy in a Digital, Networked World
- Privacy vs. Security
- Privacy, Data Protection and Cybersecurity in Europe
- Privacy, Security And Forensics in The Internet of Things (IoT)
- Privacy, Security and Trust within the Context of Pervasive Computing
- Privacy, Security, and Trust in KDD
- Privacy, Security, and Trust in KDD
- Privacy, Surveillance and Public Trust
- Privacy-Enhancing Aggregation Techniques for Smart Grid Communications
- Privacy-Enhancing Fog Computing and Its Applications
- Privacy-Invading Technologies and Privacy by Design
- Privacy-Preserving Data Mining
- Privacy-Preserving Data Publishing
- Privacy-Preserving Deep Learning
- Privacy-Preserving Machine Learning
- Privacy-Preserving Machine Learning for Speech Processing
- Privacy-Preserving in Edge Computing
- Privacy-Preserving in Mobile Crowdsensing
- Privacy-Respecting Intrusion Detection
- Privat Immobilien verkaufen
- Privat Immobilien verkaufen
- Privat – öffentlich – politisch: Gesellschaftstheorien in feministischer Perspektive
- Privat-Haftpflichtversicherung
- Privat-Haftpflichtversicherung
- Private Action for Public Purpose
- Private Actors in International Investment Law
- Private Alterssicherung über den Kapitalmarkt
- Private Altersvorsorge
- Private Bankers in the Italian 19th Century
- Private Banking
- Private Banking and Wealth Management Futures 2030
- Private Banking im Qualitätswettbewerb um den Kunden
- Private Banking im Schlaglicht internationaler Regulierungen
- Private Banking in Deutschland
- Private Banking und Wealth Management
- Private Business … Public Battleground
- Private Communities and Urban Governance
- Private Company Valuation
- Private Data and Public Value
- Private Development Aid in Europe
- Private Education Policy in China
- Private Education in China
- Private Enterprise in Eastern Europe
- Private Enterprise-Led Economic Development in Sub-Saharan Africa
- Private Environmental Regimes in Developing Countries
- Private Equity
- Private Equity Exit
- Private Equity Exits
- Private Equity Finance
- Private Equity Financing in Infrastructure and Real Estate
- Private Equity Fund Investments
- Private Equity Investing in Emerging Markets
- Private Equity Investments
- Private Equity Investments
- Private Equity Secondary Transactions
- Private Equity Targets
- Private Equity Unchained
- Private Equity als Anlageklasse für Fondsgebundene Lebensversicherungen
- Private Equity and Financial Development in Latin America
- Private Equity and Venture Capital
- Private Equity für Familienunternehmen