Search results

Jump to: navigation, search
  • Confidentiality, Data and system integrity Privacy, contract agreements, and payment systems
    4 KB (502 words) - 23:20, 14 October 2008
  • Due to constant changing environments, limited battery life and diverse data types, Mobile - Database and Data Management Mobile Computing
    10 KB (1,262 words) - 23:20, 14 October 2008
  • - Distributed Database and Data Mining - Security, Privacy and Trust
    3 KB (357 words) - 23:23, 14 October 2008
  • * sensor design and data acquisition Biometric Security and Privacy
    3 KB (325 words) - 23:50, 14 October 2008
  • ...cation and networking, embedded systems and hardware, distributed systems, data management, and applications, so we welcome cross-disciplinary work. Data, information, and signal processing
    6 KB (771 words) - 16:09, 16 September 2019
  • * Tools and Methodologies for Large Scale Semantic Web Data - Management Trust, Provenance, Security, Privacy, Identity and the Semantic Web
    4 KB (573 words) - 23:31, 14 October 2008
  • Semantic Annotation of Data Semantic Web Trust, Privacy, Security and Intellectual Property Rights
    2 KB (266 words) - 11:46, 28 May 2016
  • * Online social networks: privacy, reputation, content sharing, search * Cloud computing and data center networks
    4 KB (577 words) - 23:31, 14 October 2008
  • ...application specific fixed function, programmable, reconfigurable, near- data and in-memory accelerators, etc. * Architectural support for security, side-channel attacks and mitigation, privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security
    5 KB (580 words) - 10:32, 12 May 2020
  • * Algorithms and data structures, * Theoretical aspects of areas such as networks, privacy, information retrieval, computational biology, and databases.
    2 KB (283 words) - 18:05, 4 March 2021
  • *Big Data platforms with applications to network management, security, measurements *Innovative uses of network data beyond communication
    4 KB (514 words) - 12:03, 6 April 2020
  • ...cation of internet technologies, multimedia, wireless communications, data privacy and security, authentification, authorization and federation.
    4 KB (504 words) - 23:33, 14 October 2008
  • | Title = The First International Conference on Security and Privacy in Mobile Information and Communication Systems ...ers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymakers.
    4 KB (451 words) - 23:37, 14 October 2008
  • ...e: algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, random
    5 KB (766 words) - 23:37, 14 October 2008
  • information system is to balance the autonomy of networked data, Agent-based distributed data mining.
    9 KB (1,215 words) - 23:38, 14 October 2008
  • ...describing significant research contributions to thefield of computer and data communication networks. We invite submissions on network architecture, desi * Security, trust, & privacy
    3 KB (380 words) - 19:34, 17 November 2008
  • ...n integrated approaches for assuring reliability, availability, integrity, privacy, confidentiality, safety, and real-time of complex systems and the methods * Policies for reliability, safety, security, integrity, privacy, and confidentiality of high assurance systems
    6 KB (748 words) - 14:43, 27 December 2015
  • - Knowledge discovery and data mining, link analysis, Web mining - Internet search, UCC management, online ...ersonal information management, data integration and federation, security, privacy
    2 KB (303 words) - 23:42, 14 October 2008
  • |title=IEEE Transactions on Big Data |Field=Big Data
    927 bytes (139 words) - 05:14, 9 September 2023
  • ...hitectures and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; ...egrity; Information flow protection; Trustworthy networks: authentication, privacy and security models; Secure service discovery; Secure location-based servic
    13 KB (1,617 words) - 19:03, 24 November 2008

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)