Search results
Create the page "Network security" on this wiki! See also the search results found.
Page title matches
- 55 bytes (5 words) - 06:20, 26 December 2011
- |Title=IJNSA 2017 : International Journal of Network Security & Its Applications -- UGC, ERA Indexed |Field=security4 KB (628 words) - 13:34, 28 July 2017
- ...: ACM--2017 the 7th International Conference on Communication and Network Security (ICCNS 2017)--SCOPUS, Ei Compendex |Field=network security2 KB (216 words) - 13:34, 28 July 2017
- ...ICINS 2017 : 2017 5th International Conference on Information and Network Security (ICINS 2017)--Ei Compendex and Scopus |Field=network security1 KB (130 words) - 13:34, 28 July 2017
- 23 bytes (2 words) - 11:50, 3 September 2017
Page text matches
- ...mation of the various fields of science available {{SITENAME}} relies on a network of volunteer editors and associate editors. The tasks of an editor are to m ====Computer security and reliability====6 KB (714 words) - 12:19, 11 December 2020
- |Title=7th International Conference on Network and Computing Technologies 7th International Conference on Network and Computing Technologies (ICNCT 2019), will be held in Nagoya Institute5 KB (571 words) - 09:22, 19 July 2019
- |Title=1st International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability522 bytes (65 words) - 13:51, 6 November 2020
- |Title=2nd International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability535 bytes (66 words) - 14:23, 6 November 2020
- |Title=3rd International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability482 bytes (60 words) - 13:55, 6 November 2020
- |Title=4th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability470 bytes (56 words) - 13:57, 6 November 2020
- |Title=5th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability474 bytes (60 words) - 13:58, 6 November 2020
- |Title=International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability322 bytes (46 words) - 08:58, 13 February 2021
- ...cial issues of a high quality international journal and also in Journal of Security and Communication Networks published by John Wiley & Sons. * Security in Wireless and Pervasive systems5 KB (645 words) - 18:19, 15 September 2008
- * Operating system and network support for mobile devices * Security issues of data management in wireless networks5 KB (611 words) - 15:43, 16 September 2008
- ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d ...cations for a unique user or multiple users requires special platforms and network capabilities.18 KB (2,408 words) - 02:37, 16 December 2008
- * High-speed Communication and Network * Wireless Communication and Network34 KB (4,565 words) - 22:20, 10 January 2018
- * High-speed Communication and Network * Wireless Communication and Network8 KB (1,037 words) - 22:20, 10 January 2018
- * High-speed Communication and Network * Wireless Communication and Network9 KB (1,189 words) - 22:20, 10 January 2018
- * High-speed Communication and Network * Wireless Communication and Network26 KB (3,456 words) - 22:20, 10 January 2018
- * Security and Privacy * Network-based Computing Systems10 KB (1,263 words) - 22:20, 10 January 2018
- * Security and Privacy * Network-based Computing Systems12 KB (1,537 words) - 22:19, 10 January 2018
- * Security and Privacy * Network-based Computer Graphics System8 KB (1,040 words) - 22:20, 10 January 2018
- - Network management and troubleshooting - Wireless security and dependability4 KB (495 words) - 09:22, 22 August 2023
- S-CUBE - the First Conference on wireless Sensor network (WSN) Systems and Software - provides an ideal venue to address the researc ...lds such as embedded systems, distributed systems, data management, system security and applications. The conference places emphasis on layers well above the t4 KB (519 words) - 16:13, 14 October 2008
- understanding of complex network dynamics and leads to better design of * Distributed network resource allocation6 KB (722 words) - 17:32, 14 October 2008
- ...es, digital and video libraries, compression and coding, security over the network. ...e, OCR and document analysis, mobile robots and visual navigation, network security, remote sensing and environment control, video surveillance and intelligent2 KB (268 words) - 17:47, 14 October 2008
- o Applications of network coding in cross-layer design o Security aspects in cross-layer designs3 KB (424 words) - 17:47, 14 October 2008
- • Network estimation and processing techniques • Wireless network security and privacy6 KB (731 words) - 10:33, 14 August 2023
- * Wireless privacy and security * Wireless network architecture and technologies systems3 KB (456 words) - 18:10, 14 October 2008
- ...ity, the current series of events starting with INTERNET 2009 is targeting network calculi and supporting mechanisms for these challenging issues. ...ents using microeconomics, topological routing vs. table-based routing vs. network coding, power-efficient routing11 KB (1,385 words) - 17:48, 14 October 2008
- .Network Protocol and Security3 KB (375 words) - 17:48, 14 October 2008
- * Trust, security and privacy Network protocols, routing, algorithms19 KB (2,503 words) - 13:25, 28 October 2020
- * Security and privacy in vehicular networks * In-network processing and aggregation3 KB (378 words) - 14:22, 24 August 2016
- - Peer-to-Peer and overlay network support in SPSs - Security and privacy in SPSs3 KB (490 words) - 20:05, 14 October 2008
- rent out network presence, computation power, and data storage space + Security and information assurance7 KB (907 words) - 21:51, 14 October 2008
- • MAC, Network, Transport, Application Protocols and Cross-Layer Design • Network Coding, MIMO, Cooperative Communications and Other Novel Techniques2 KB (244 words) - 20:05, 14 October 2008
- * Analysis and design of network architectures and algorithms * Experimental results from operational networks or network applications3 KB (353 words) - 20:31, 14 October 2008
- * › Mobile Network Protocols and Packet Services * › Adaptive Wireless Network Protocols9 KB (1,219 words) - 20:05, 14 October 2008
- * Cryptography and Security * Network Analysis2 KB (216 words) - 20:05, 14 October 2008
- • Ethical, Social, Privacy, Security and moral Issues in an e-societ • Mobile Network Architecture5 KB (530 words) - 10:27, 24 June 2011
- Computer and Network Security3 KB (332 words) - 20:06, 14 October 2008
- o Security and Privacy o Network and Internet Support for Distributed Applications2 KB (303 words) - 20:06, 14 October 2008
- ...mic experts to present and discuss communications quality, reliability and security issues as they relate to real world issues. The output from the workshops a * Network Architecture and Design4 KB (505 words) - 22:15, 14 October 2008
- | Title = Sixth International Conference on Wireless On-demand Network Systems and Services On-demand Network Systems and Services6 KB (686 words) - 20:06, 14 October 2008
- * Security and trust management in collaborative networks, systems, and applications * Workflow technology and workflow management for collaborative network management6 KB (674 words) - 22:45, 14 October 2008
- Database Security and Transaction Support Advanced Applications of Neural Network9 KB (1,240 words) - 22:56, 14 October 2008
- ...ame studies/game design, e) graphics and interfaces and f ) networking and security. Papers that fall outside these topic areas are strongly encouraged and sho Networks and Security9 KB (1,275 words) - 14:46, 27 December 2015
- - Social network analysis - Trust, privacy, and security on the semantic web6 KB (827 words) - 23:04, 14 October 2008
- * Error tolerance, security and robustness * Network protocols and middleware for embedded systems2 KB (316 words) - 23:05, 14 October 2008
- * Cryptography and Network Security * Voice-over-IP and Security2 KB (167 words) - 23:05, 14 October 2008
- bioinformatics; Network computing; Neural computing; programs; foundations of security; term rewriting;5 KB (698 words) - 23:08, 14 October 2008
- This track is dedicated to communication and network technologies that are of specific relevance to developing countries. The tr * Innovations in femtocells, picocells and relay network technologies9 KB (1,127 words) - 17:19, 26 April 2011
- * Data Portability and Social Network Portability * Policies, authentication, security, and trust within5 KB (709 words) - 23:08, 14 October 2008
- * Security and data integrity * Telecommunications, network and systems management5 KB (634 words) - 15:36, 14 December 2008
- - Security and Access Control - Information Content Security4 KB (595 words) - 23:09, 14 October 2008
- * mobile database security * sensor network databases7 KB (875 words) - 23:09, 14 October 2008
- ...stems and networks designed using database principles (and vice versa), to network monitoring systems that depend on advanced data management and analysis cap * Network algorithms and theory applied to database systems3 KB (332 words) - 23:10, 14 October 2008
- ...systems. However, such systems constrained resources in terms of autonomy, network bandwidth or storage capacity, mobile devices (mobile phones, PDA�?�) h * Reliability, security and privacy2 KB (324 words) - 16:49, 16 December 2020
- ...he Natural Sciences and Engineering Research Council of Canada. The LORNET Network is hosting its 4th annual e-learning conference on Intelligent Interactive * Security and privacy;4 KB (503 words) - 23:11, 14 October 2008
- and military operations. Such networking is essential for safety, security and economic vitality in •Trust, security, dependability, privacy, QoS and5 KB (549 words) - 17:15, 5 July 2020
- ...special issue is to explore the development of vehicular ad hoc and sensor network technologies about communication, networking, and applications. Security issues3 KB (364 words) - 23:11, 14 October 2008
- * Network Data Mining * Network Management3 KB (339 words) - 23:11, 14 October 2008
- ...ocols, web architectures and protocols, network measurements and testbeds, network management systems, content distribution, peer to peer and overlay networks ...e, multilayer design and optimisation, MPLS and GMPLS, RFID, multicasting, network modelling and simulation, real-time voice/video over IP networks, resource7 KB (981 words) - 03:18, 6 January 2009
- 1. NGN(Next Generation Network), NGI(Next Generation Internet) and Future Internet Technologies 5. RFID/USN(Ubiquitous Sensor Network) Technologies2 KB (200 words) - 23:11, 14 October 2008
- * Network-based applications * Network Security4 KB (465 words) - 23:11, 14 October 2008
- * Wireless Mesh & Sensor Network Applications * Network Security & Reliability4 KB (559 words) - 23:11, 14 October 2008
- ...ocus on new models and methods as well as mechanisms, which can enable the network to perform adaptive behaviors. High-speed Network Protocols7 KB (990 words) - 23:11, 14 October 2008
- - Computer and Communications Network Security3 KB (375 words) - 23:37, 14 October 2008
- | Title = Third International Conference on Bio-Inspired Models of Network, Information and Computing Systems 3rd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems5 KB (694 words) - 23:11, 14 October 2008
- | Title = New Technologies, Mobility and Security ...8 is the Second International Conference on New Technologies, Mobility and Security that will be held from 5 to 7 November, 2008 in Tangier, Morocco.2 KB (209 words) - 23:12, 14 October 2008
- 6. Intelligent Communication Systems and Network Protocols 7. Security Signal Processing4 KB (496 words) - 23:12, 14 October 2008
- Papers related to wireless and mobile network Modeling, Analysis, - Wireless network algorithms and protocols4 KB (596 words) - 23:12, 14 October 2008
- Security/privacy in wireless systems Wireless network architectures2 KB (244 words) - 23:12, 14 October 2008
- 1 .5 Network Management 1 .6 Network Planning and Optimization2 KB (250 words) - 23:12, 14 October 2008
- ...and operation of Next Generation Internet networks. It is organized by the Network of Excellence (NoE) Euro-FGI (http://www.eurongi.org) that was initiated by * Network co-operation3 KB (382 words) - 23:12, 14 October 2008
- ...ield of computer and data communication networks. We invite submissions on network architecture, design, implementation, operations, analysis, measurement, pe * Analysis and design of network architectures and algorithms3 KB (352 words) - 23:12, 14 October 2008
- - Network Security - Trust, Security, and Privacy3 KB (465 words) - 23:13, 14 October 2008
- * Computer Networks and Security * Network Reliability and QoS2 KB (283 words) - 23:13, 14 October 2008
- | Title = Fifth Annual Conference on Wireless On demand Network Systems and Services effort as well as with little dependency on existing network infrastructures.3 KB (413 words) - 23:13, 14 October 2008
- architectural boundaries of large-scale network services. We solicit * Security and resilience of networked systems4 KB (528 words) - 23:13, 14 October 2008
- sub-areas of research: adaptation of system operations to the network the 90's that had an inward focus on network signaling & control today's5 KB (651 words) - 23:13, 14 October 2008
- - Wireless network security and privacy - Security Techniques and systems3 KB (343 words) - 10:31, 14 August 2023
- *Security and privacy in Web search and mining *Discovery-driven Web and social network mining2 KB (237 words) - 12:23, 11 September 2020
- | Title = International Workshop on Security in Opportunistic and SOCial Networks ...rations raise entirely new privacy concerns and require new reflections on security problems.4 KB (457 words) - 23:13, 14 October 2008
- ...nhanced business information systems, e-education specialists, Information security, and other Web related technologies. The aim of NWeSP'08 is to serve as a f Web Services Security3 KB (494 words) - 23:16, 14 October 2008
- ...os, audio recordings) in bibliometrics (publication patterns), in homeland security (terrorist networks). * Social network analysis3 KB (453 words) - 23:14, 14 October 2008
- networks, including user behavior models, security and trust, P2P, the Network Society"7 KB (813 words) - 23:14, 14 October 2008
- * Networking and network services * Security, privacy, and trust6 KB (869 words) - 23:14, 14 October 2008
- * Security of WiMAX in NGN * Network architecture infrastructure integration of WiMAX in NGN1 KB (181 words) - 23:14, 14 October 2008
- ...ant research dialog, or pushes the architectural boundaries of large-scale network services. We solicit papers describing original and previously unpublished * Security, robustness, and fault-tolerance in networked environments8 KB (1,093 words) - 23:15, 14 October 2008
- ...itionally offered predominantly passive experiences, continual advances in network and computer technologies are providing tools for implementing greater inte * QoS and Security Support for Entertainment8 KB (1,011 words) - 23:15, 14 October 2008
- | Title = IEEE 3rd International Workshop on Distributed Autonomous Network Management Systems 3rd International Workshop on Distributed Autonomous Network6 KB (663 words) - 23:15, 14 October 2008
- * Security, privacy and trust management in collaborative networks, systems, and appli * Workflow management for collaborative network/system8 KB (1,093 words) - 23:15, 14 October 2008
- | Title = The First International Workshop on Network Security & Applications The First International Workshop on Network Security & Applications (WNSA-2008)5 KB (628 words) - 23:15, 14 October 2008
- 3-08 Network routing and communication algorithms 4. Security and Privacy5 KB (623 words) - 23:15, 14 October 2008
- ...ng difficult social and policy issues such as those related to privacy and security The third generation of social networking technologies has hit the Web. This network serve increasingly8 KB (1,003 words) - 23:15, 14 October 2008
- | Title = 4th IEEE Workshop on Secure Network Protocols 4th workshop on Secure Network Protocols (NPSec 2008)4 KB (493 words) - 23:15, 14 October 2008
- * Giuseppe Persiano: Security of networks of low capability devices Network information management is a growing area of research at the attention4 KB (563 words) - 23:15, 14 October 2008
- * Measurement-based network management such as traffic engineering * Network applications such as WWW, multimedia streaming, and gaming3 KB (313 words) - 23:15, 14 October 2008
- ...lumes, mainly because of converged type of traffic resulted from converged network operation under converged services and applications. Moreover, wireless acc * New Teletraffic and Network Traffic Challenges and Paradigms5 KB (598 words) - 10:18, 29 May 2016
- ...act may both be mobile. Their implementation requires advances in wireless network technologies and devices, development of infrastructures supporting cogniti * Ad hoc and sensor network support for ubiquitous computing5 KB (599 words) - 23:15, 14 October 2008
- | Title = 18th International workshop on Network and Operating Systems Support for Digital Audio and Video In-network stream processing3 KB (322 words) - 23:15, 14 October 2008
- |Title=6th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability509 bytes (65 words) - 14:00, 6 November 2020
- |Title=7th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability509 bytes (62 words) - 14:01, 6 November 2020