Search results
Create the page "Network security" on this wiki! See also the search results found.
- 3-08 Network routing and communication algorithms 4. Security and Privacy5 KB (623 words) - 23:15, 14 October 2008
- ...ng difficult social and policy issues such as those related to privacy and security The third generation of social networking technologies has hit the Web. This network serve increasingly8 KB (1,003 words) - 23:15, 14 October 2008
- | Title = 4th IEEE Workshop on Secure Network Protocols 4th workshop on Secure Network Protocols (NPSec 2008)4 KB (493 words) - 23:15, 14 October 2008
- * Giuseppe Persiano: Security of networks of low capability devices Network information management is a growing area of research at the attention4 KB (563 words) - 23:15, 14 October 2008
- * Measurement-based network management such as traffic engineering * Network applications such as WWW, multimedia streaming, and gaming3 KB (313 words) - 23:15, 14 October 2008
- ...lumes, mainly because of converged type of traffic resulted from converged network operation under converged services and applications. Moreover, wireless acc * New Teletraffic and Network Traffic Challenges and Paradigms5 KB (598 words) - 10:18, 29 May 2016
- ...act may both be mobile. Their implementation requires advances in wireless network technologies and devices, development of infrastructures supporting cogniti * Ad hoc and sensor network support for ubiquitous computing5 KB (599 words) - 23:15, 14 October 2008
- | Title = 18th International workshop on Network and Operating Systems Support for Digital Audio and Video In-network stream processing3 KB (322 words) - 23:15, 14 October 2008
- |Title=6th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability509 bytes (65 words) - 14:00, 6 November 2020
- |Title=7th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability509 bytes (62 words) - 14:01, 6 November 2020
- |Title=9th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability496 bytes (63 words) - 14:05, 6 November 2020
- |Title=15th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability506 bytes (61 words) - 14:16, 6 November 2020
- |Title=8th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability475 bytes (60 words) - 14:03, 6 November 2020
- |Title=14th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability485 bytes (60 words) - 14:15, 6 November 2020
- |Title=12th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability497 bytes (60 words) - 14:11, 6 November 2020
- |Title=13th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability516 bytes (64 words) - 14:12, 6 November 2020
- |Title=10th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability491 bytes (60 words) - 14:07, 6 November 2020
- |Title=11th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability507 bytes (62 words) - 14:09, 6 November 2020
- | Title = First ACM Conference on Wireless Network Security | Field = Computer security and reliability2 KB (197 words) - 23:15, 14 October 2008
- - Information forensics and security - Sensor network2 KB (253 words) - 23:16, 14 October 2008