Search results
Create the page "Information Security" on this wiki! See also the search results found.
- |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)6 KB (793 words) - 15:12, 1 October 2020
- ...and network systems gradually become the fundamental infrastructure of our information society, many multidisciplinary research topics emerge to reflect the featu * Bio-inspired information and communication systems6 KB (767 words) - 13:01, 18 January 2009
- * Data mining and information extraction * Data security, privacy and trust4 KB (568 words) - 13:01, 18 January 2009
- ...ociety have formed into the world we live in, however the emergence of the information technologies that ...ital systems that support useful functionality by making socially produced information available to physical things.3 KB (446 words) - 13:02, 18 January 2009
- | Title = Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Device Use | Field = Computer security and reliability11 KB (1,539 words) - 13:02, 18 January 2009
- | Title = The 2009 International Workshop on Ubiquitous Computing Security Ubiquitous Computing Security (UC-Sec 09)6 KB (852 words) - 13:02, 18 January 2009
- | Title = The 1st International Workshop on Information Assurance in Wireless Sensor Networks ...place in conjunction with the 3rd International Conference on Information Security and Assurance, Seoul, Korea http://www.sersc.org/ISA2009.3 KB (450 words) - 13:02, 18 January 2009
- Department of Information Technologies of University of Milan in conjunction Security in Knowledge-based Multimedia Systems6 KB (693 words) - 13:03, 18 January 2009
- |Title=32nd International Convention on Information and Communication Technology, Electronics and Microelectronics With the 32nd International Convention MIPRO, devoted to information and communication technology, electronics and microelectronics, we enter th4 KB (524 words) - 17:20, 12 February 2009
- ...Service composition, Functional and Non Functional Requirements (NFR: QoS, security), and management and diagnosis, who investigate concepts, methods, techniq * NFR (quality, security, robustness, adaptability) management in choreographed and/or7 KB (960 words) - 16:33, 27 February 2009
- ...to the great needs of economic globalization and the rapid advancement of information technology, Natural Language Processing based on Knowledge Engineering has B-04 Information Retrieval4 KB (459 words) - 16:33, 27 February 2009
- | Title = The 4th International ICST Conference on Scalable Information Systems in terms of information access, storage and retrieval.4 KB (512 words) - 16:33, 27 February 2009
- o Security and privacy issues of UWB-based body-centric networking for personal health ...peer review process. A guide for authors, sample copies and other relevant information for submitting papers are available on the IJUWBCS web page (http://www.ind5 KB (664 words) - 17:20, 5 July 2020
- * security in distributed computing, cryptographic protocols (5) information whether the paper is a regular submission, or a brief7 KB (890 words) - 15:05, 27 December 2015
- * Knowledge Representation, Distributed Models and Reasoning, Information visualization ...temas, Wireless communications, Technologies and applications, Information security8 KB (977 words) - 16:33, 27 February 2009
- | Title = Second International ICST Symposium on Global Information Second International ICST Symposium on Global Information Governance (ISGIG)4 KB (557 words) - 16:33, 27 February 2009
- - Web Information Filtering and Retrieval - Web Security4 KB (630 words) - 16:33, 27 February 2009
- | Title = IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09) IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09)2 KB (229 words) - 16:33, 27 February 2009
- * Security aspects of using virtualization in a distributed environment For more information:5 KB (576 words) - 16:34, 27 February 2009
- Process Architectures), FAST (Formal Aspects in Security and Trust), information on FMweek,8 KB (1,079 words) - 17:05, 27 February 2009