Search results

Jump to: navigation, search
  • infrastructure that is enabled by various kinds of networks including the Internet. - Security, privacy, trust and safety of cyber physical & social computing
    3 KB (446 words) - 13:02, 18 January 2009
  • | Title = The 2009 International Workshop on Ubiquitous Computing Security Ubiquitous Computing Security (UC-Sec 09)
    6 KB (852 words) - 13:02, 18 January 2009
  • * security in distributed computing, cryptographic protocols * distributed computing issues in the Internet and the world-wide web
    7 KB (890 words) - 15:05, 27 December 2015
  • ...temas, Wireless communications, Technologies and applications, Information security ...an overhead projector, a screen and a video projector. Unlimited access to Internet for all participants.
    8 KB (977 words) - 16:33, 27 February 2009
  • ISGIG 2009 - the Internet of the Future ...rld. The large number of devices connected to the networks has changed the Internet to a "network of things and computers". These trends, plus the rise of coll
    4 KB (557 words) - 16:33, 27 February 2009
  • ...ibilities in artificial intelligence) to the observation that increases in Internet connection speeds, modular web applications, and advances in computer graph - Web Security
    4 KB (630 words) - 16:33, 27 February 2009
  • Internet based applications • Network security
    5 KB (654 words) - 17:06, 27 February 2009
  • · Reliability, fault-tolerance, and security · Internet computing and web services
    8 KB (1,050 words) - 18:04, 5 January 2017
  • * Future Internet design * Security, trust, & privacy
    4 KB (559 words) - 17:06, 27 February 2009
  • dominant consumers of residential Internet subscribers' bandwidth, and are * Security and privacy in P2P systems
    5 KB (623 words) - 17:06, 27 February 2009
  • | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability
    8 KB (967 words) - 17:07, 27 February 2009
  • ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver Security and Privacy
    7 KB (941 words) - 17:07, 27 February 2009
  • in harmony with societal values and economic viability, with enhanced security, -Web and Internet Applications
    11 KB (1,440 words) - 17:08, 27 February 2009
  • | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability
    3 KB (480 words) - 17:08, 27 February 2009
  • - Security, reliability, biometrics - Power management, reliability, security, performance
    4 KB (589 words) - 17:08, 27 February 2009
  • | Title = Internet Measurement Conference 2009 | Field = Internet
    6 KB (774 words) - 17:08, 27 February 2009
  • |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security
    5 KB (578 words) - 10:21, 20 November 2020
  • ...in track, covering different aspects of Web Information Systems, including Internet Technology, Web Interfaces and Applications, Society, e-Communities, e-Busi 1. Internet Technology
    3 KB (440 words) - 15:25, 9 December 2009
  • * Security issues in agent-based systems for search and rescue missions, use of games, == Internet ==
    6 KB (783 words) - 17:04, 27 December 2015
  • | Title = International journal of Network Security & Its Applications (IJNSA) International journal of Network Security & Its Applications (IJNSA)
    3 KB (339 words) - 11:32, 2 August 2009

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)