Search results
Create the page "Information Security, Cryptography" on this wiki! See also the search results found.
- | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)16 KB (2,178 words) - 12:59, 18 January 2009
- ...itle = International Conference on Communications and Networking in China, Information and Coding Theory Symposium o Security in Power Line Communications14 KB (1,518 words) - 13:01, 18 January 2009
- | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability8 KB (967 words) - 17:07, 27 February 2009
- | Title = 3rd WORKSHOP ON Practice and Theory of IT Security | Field = Computer security and reliability4 KB (506 words) - 17:07, 27 February 2009
- | Title = 5th IEEE International Workshop on Wireless and Sensor Networks Security Wireless and Sensor Networks Security (WSNS'09)4 KB (485 words) - 17:07, 27 February 2009
- * Error and erasure correcting codes for information dispersal * Cryptography, Security and trust6 KB (750 words) - 16:50, 27 December 2015
- | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability6 KB (828 words) - 17:08, 27 February 2009
- ...nal Conference on the Theory and Application of Cryptology and Information Security |Field=Cryptography178 bytes (23 words) - 21:30, 10 March 2020
- |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security5 KB (578 words) - 10:21, 20 November 2020
- Security and Cryptography Information Retrieval3 KB (412 words) - 19:29, 2 August 2009
- |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security5 KB (599 words) - 10:21, 20 November 2020
- | Acronym = Security 2009 ...S International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)6 KB (746 words) - 11:35, 2 August 2009
- | Title = IEEE International Symposium on Information Theory | Field = Information theory2 KB (217 words) - 11:36, 2 August 2009
- |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security3 KB (352 words) - 12:39, 11 August 2009
- |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security5 KB (667 words) - 14:27, 13 September 2009
- |Title=International Conference on Information Society (i-Society 2010) - Geographic information systems4 KB (507 words) - 22:37, 18 November 2009
- |Field=Information Security, Cryptography3 KB (373 words) - 13:50, 19 January 2010
- |Title=3rd International Conference on Security of Information and Networks |Field=Computer security10 KB (1,270 words) - 17:12, 20 April 2010
- |Title=International Conference on Security and Cryptography |Field=Computer security and reliability4 KB (409 words) - 15:40, 5 February 2010
- ..., signal processing and multimedia applications, and wireless networks and information systems. These are the main knowledge areas that define the six component c2 KB (180 words) - 15:49, 5 February 2010