Search results

Jump to: navigation, search
  • | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)
    16 KB (2,178 words) - 12:59, 18 January 2009
  • ...itle = International Conference on Communications and Networking in China, Information and Coding Theory Symposium o Security in Power Line Communications
    14 KB (1,518 words) - 13:01, 18 January 2009
  • | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability
    8 KB (967 words) - 17:07, 27 February 2009
  • | Title = 3rd WORKSHOP ON Practice and Theory of IT Security | Field = Computer security and reliability
    4 KB (506 words) - 17:07, 27 February 2009
  • | Title = 5th IEEE International Workshop on Wireless and Sensor Networks Security Wireless and Sensor Networks Security (WSNS'09)
    4 KB (485 words) - 17:07, 27 February 2009
  • * Error and erasure correcting codes for information dispersal * Cryptography, Security and trust
    6 KB (750 words) - 16:50, 27 December 2015
  • | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability
    6 KB (828 words) - 17:08, 27 February 2009
  • ...nal Conference on the Theory and Application of Cryptology and Information Security |Field=Cryptography
    178 bytes (23 words) - 21:30, 10 March 2020
  • |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security
    5 KB (578 words) - 10:21, 20 November 2020
  • Security and Cryptography Information Retrieval
    3 KB (412 words) - 19:29, 2 August 2009
  • |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security
    5 KB (599 words) - 10:21, 20 November 2020
  • | Acronym = Security 2009 ...S International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)
    6 KB (746 words) - 11:35, 2 August 2009
  • | Title = IEEE International Symposium on Information Theory | Field = Information theory
    2 KB (217 words) - 11:36, 2 August 2009
  • |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security
    3 KB (352 words) - 12:39, 11 August 2009
  • |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security
    5 KB (667 words) - 14:27, 13 September 2009
  • |Title=International Conference on Information Society (i-Society 2010) - Geographic information systems
    4 KB (507 words) - 22:37, 18 November 2009
  • |Field=Information Security, Cryptography
    3 KB (373 words) - 13:50, 19 January 2010
  • |Title=3rd International Conference on Security of Information and Networks |Field=Computer security
    10 KB (1,270 words) - 17:12, 20 April 2010
  • |Title=International Conference on Security and Cryptography |Field=Computer security and reliability
    4 KB (409 words) - 15:40, 5 February 2010
  • ..., signal processing and multimedia applications, and wireless networks and information systems. These are the main knowledge areas that define the six component c
    2 KB (180 words) - 15:49, 5 February 2010

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)