Search results
Create the page "Privacy policy" on this wiki! See also the search results found.
- | Title = IEEE Symposium on Security and Privacy ...m for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.2 KB (262 words) - 22:20, 14 October 2008
- Review Policy: "IEEE Policy and professional ethics requires that referees treat the contents of papers18 KB (2,352 words) - 22:23, 14 October 2008
- ...us access technologies under secured (still to be improved) and guaranteed privacy. The family of the mobile devices expand dramatically, allowing a user to h ...obile learning is favoured by many national and international projects and policy synchronization boards.6 KB (765 words) - 22:26, 14 October 2008
- *Internet economics and policy *Security and privacy aspects of network applications and protocols4 KB (514 words) - 11:03, 6 April 2020
- E-democracy, e-policy, and governance Legal and social ontologies Privacy and copyright in collaborative environments and social networks8 KB (1,075 words) - 22:52, 14 October 2008
- ...e: algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, random ...r to July 2008, will not be considered for acceptance at STOC 2008. SIGACT policy does not allow simultaneous submissions of the same (or essentially the sam5 KB (766 words) - 22:37, 14 October 2008
- Issues of privacy of communication, data security, and Double Submission Policy9 KB (1,215 words) - 22:38, 14 October 2008
- * Policy driven management for RTSOAA * Security and privacy for RTSOAA based CPS7 KB (922 words) - 23:58, 8 January 2009
- ** Privacy and security ** Security and privacy11 KB (1,366 words) - 15:44, 14 January 2009
- * Security, Privacy, Encryption, and Digital Rights, including o Privacy-enhancing technologies9 KB (1,221 words) - 11:58, 18 January 2009
- - Privacy ...by ana.sofia@informatics-conf.org | Print / PDF version | Read our Privacy Policy.5 KB (633 words) - 11:58, 18 January 2009
- and Public Policy in the Age of e-Euphoria. Conference main theme will be supported by systems; information assurance, security, and public policy. Doctoral students are16 KB (2,178 words) - 11:59, 18 January 2009
- - temporal aspects of agent- and policy-based systems - privacy in temporal and spatio-temporal data6 KB (872 words) - 12:00, 18 January 2009
- * Exposition of legal, business and technology policy issues relevant to multimedia security. * Multimedia network protection, privacy and security.3 KB (303 words) - 16:06, 24 February 2016
- o Policy between primary user and secondary user * Wireless security and privacy14 KB (1,518 words) - 12:01, 18 January 2009
- 17) Security & Privacy in Pervasive Computing environments - SPPC 09 Conference policy10 KB (1,321 words) - 12:01, 18 January 2009
- * Anonymity, user privacy, and location privacy in UE * Surveillance and Privacy-enhancing technologies in UE6 KB (793 words) - 14:12, 1 October 2020
- ...llaborative technologies, virtual worlds and tele-presence raise issues of privacy, management, compliance, governance, and risk. ...s by exposing problems, and uncovering potential problems, in the areas of privacy, compliance, governance, and risk. Each of these issues creates situations4 KB (557 words) - 15:33, 27 February 2009
- managers, and policy makers interested in computer software and + Middleware solutions for Security, Privacy and Trust6 KB (800 words) - 21:11, 27 February 2009
- ...ves. In this context analysing concepts like Trust, Reliability, Security, Privacy and Risk would help the users to make informed judgements of what their lev • Security and Privacy4 KB (600 words) - 16:07, 27 February 2009