Search results
Create the page "Information Security, Cryptography" on this wiki! See also the search results found.
Page title matches
- |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)4 KB (597 words) - 13:28, 28 July 2017
Page text matches
- ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...ons; Target-oriented keyword search; Filter-based profile matching; Mutual information on data streams; Stream processing; Digitized documents streams; Queries wi11 KB (1,371 words) - 12:28, 18 May 2020
- Information theory: distributed network coding, Shannon's entropy, Nash equilibrium Cryptography11 KB (1,385 words) - 17:48, 14 October 2008
- * Cryptography and Security * Information Retrieval2 KB (216 words) - 20:05, 14 October 2008
- - Databases: query processing; information integration; - Security and Privacy: cryptography; access control; security in9 KB (1,193 words) - 22:53, 14 October 2008
- �?� Security and Cryptography �?� Information Systems13 KB (1,775 words) - 23:04, 14 October 2008
- * Cryptography and Network Security * Information Assurance2 KB (167 words) - 23:05, 14 October 2008
- Cryptography; Descriptive complexity; Evolutionary and information and communication complexity.5 KB (698 words) - 23:08, 14 October 2008
- | Title = IEEE Information Theory Workshop on Networking and Information Theory | Field = Information theory3 KB (308 words) - 23:15, 14 October 2008
- 4. Security and Privacy 4-03 Distributed systems security5 KB (623 words) - 23:15, 14 October 2008
- ...e = Sixth International Conference on Cryptography, Coding and Information Security | Field = Computer security and reliability3 KB (448 words) - 23:19, 14 October 2008
- |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability4 KB (487 words) - 10:42, 21 August 2020
- | Title = New Security Paradigms Workshop | Field = Computer security and reliability8 KB (1,072 words) - 23:20, 14 October 2008
- forming, a new way to manage personal information or a new approach to model context information. There is less emphasis on the actual5 KB (663 words) - 23:20, 14 October 2008
- | Title = 23rd International Information Security Conference | Field = Computer security and reliability5 KB (637 words) - 23:20, 14 October 2008
- | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability4 KB (502 words) - 23:20, 14 October 2008
- Information Security and Cryptography Information Systems3 KB (412 words) - 19:34, 12 November 2020
- ...tle = The First International Conference on Security and Privacy in Mobile Information and Communication Systems ...edge researchers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymaker4 KB (451 words) - 23:37, 14 October 2008
- * Information Security and Cryptography * Information Systems3 KB (386 words) - 23:39, 14 October 2008
- |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols13 KB (1,617 words) - 19:03, 24 November 2008
- ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Information Management and Dissemination5 KB (526 words) - 01:02, 2 February 2009
- | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)16 KB (2,178 words) - 12:59, 18 January 2009
- ...itle = International Conference on Communications and Networking in China, Information and Coding Theory Symposium o Security in Power Line Communications14 KB (1,518 words) - 13:01, 18 January 2009
- | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability8 KB (967 words) - 17:07, 27 February 2009
- | Title = 3rd WORKSHOP ON Practice and Theory of IT Security | Field = Computer security and reliability4 KB (506 words) - 17:07, 27 February 2009
- | Title = 5th IEEE International Workshop on Wireless and Sensor Networks Security Wireless and Sensor Networks Security (WSNS'09)4 KB (485 words) - 17:07, 27 February 2009
- * Error and erasure correcting codes for information dispersal * Cryptography, Security and trust6 KB (750 words) - 16:50, 27 December 2015
- | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability6 KB (828 words) - 17:08, 27 February 2009
- ...nal Conference on the Theory and Application of Cryptology and Information Security |Field=Cryptography178 bytes (23 words) - 21:30, 10 March 2020
- |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security5 KB (578 words) - 10:21, 20 November 2020
- Security and Cryptography Information Retrieval3 KB (412 words) - 19:29, 2 August 2009
- |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security5 KB (599 words) - 10:21, 20 November 2020
- | Acronym = Security 2009 ...S International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)6 KB (746 words) - 11:35, 2 August 2009
- | Title = IEEE International Symposium on Information Theory | Field = Information theory2 KB (217 words) - 11:36, 2 August 2009
- |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security3 KB (352 words) - 12:39, 11 August 2009
- |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security5 KB (667 words) - 14:27, 13 September 2009
- |Title=International Conference on Information Society (i-Society 2010) - Geographic information systems4 KB (507 words) - 22:37, 18 November 2009
- |Field=Information Security, Cryptography3 KB (373 words) - 13:50, 19 January 2010
- |Title=3rd International Conference on Security of Information and Networks |Field=Computer security10 KB (1,270 words) - 17:12, 20 April 2010
- |Title=International Conference on Security and Cryptography |Field=Computer security and reliability4 KB (409 words) - 15:40, 5 February 2010
- ..., signal processing and multimedia applications, and wireless networks and information systems. These are the main knowledge areas that define the six component c2 KB (180 words) - 15:49, 5 February 2010
- |Title=7th International Conference on Web Information Systems and Technologies (WEBIST) Conference name: 7th International Conference on Web Information Systems and Technologies (WEBIST)5 KB (627 words) - 12:33, 16 June 2010
- ...nal Conference on the Theory and Application of Cryptology and Information Security |Field=Cryptography208 bytes (27 words) - 18:56, 29 March 2020
- |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium3 KB (343 words) - 16:31, 6 May 2020
- |Title=International Conference on Information Society ...d industry. The conference covers a wide spectrum of topics that relate to information society, which includes technical and non-technical research areas.6 KB (732 words) - 05:52, 5 December 2010
- ...nym=CALL FOR PAPER Journal: International Journal of Computer Science and Security (IJCSS) |Title=International Journal of Computer Science and Security (IJCSS)2 KB (298 words) - 16:47, 5 July 2020
- |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)5 KB (609 words) - 17:01, 5 July 2020
- |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability5 KB (597 words) - 10:45, 21 August 2020
- − Information Security and Applied Cryptography. − Intelligent Information Systems.3 KB (367 words) - 16:37, 27 December 2015
- |Title=The 2012 International Conference of Information Engineering |Field=Information Engineering8 KB (1,085 words) - 16:28, 6 February 2012
- |Title=International Conference on Information Society ...d researchers to share existing and generate new knowledge in the field of information society.5 KB (595 words) - 05:03, 15 January 2012
- |Title=International Journal of Advances in Computing and Information Technology ...ch results and fundamental advances in all aspects of computer science and Information technology. IJACIT offers wide area of scope and aim that covers almost all3 KB (434 words) - 22:46, 30 May 2012
- Security and Cryptography Web Information Systems2 KB (211 words) - 08:30, 26 October 2012
- |Title=6th International Conference on Information Security and Cryptology |Field=Cryptography3 KB (351 words) - 09:52, 28 October 2012
- |Title=International Conference on Information Society |Field=Information and communication technologies4 KB (535 words) - 14:38, 17 January 2013
- |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability2 KB (264 words) - 15:32, 7 January 2021
- *Cyber Security *Data Mining & Information Retrieval3 KB (308 words) - 17:30, 26 May 2016
- |Title=3rd International Conference on Digital Information Processing, Data Mining, and Wireless Communications *Digital Information Processing2 KB (227 words) - 11:30, 21 June 2016
- |Title=FC 2017 : Financial Cryptography and Data Security 2017 |Field=cryptography, information security364 bytes (45 words) - 16:19, 8 July 2016
- |Title=7th International Conference on Communications Security & Information Assurance |Field=security, communications, information security, cryptography370 bytes (37 words) - 06:18, 20 September 2016
- |Title=International Conference on Information Society |Field=Information Society5 KB (641 words) - 22:32, 29 July 2016
- the 22nd European Symposium on Research in Computer Security (ESORICS information that they manage (as witnessed, for example, by lawsuits7 KB (887 words) - 15:22, 15 July 2017
- |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)4 KB (597 words) - 13:28, 28 July 2017
- |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)4 KB (562 words) - 12:05, 3 September 2017
- * Information access in wireless networks * Cryptography, security and privacy of mobile & wireless networks6 KB (820 words) - 13:30, 28 July 2017
- 2017. More information about ICTCE 2017, please visit: http://www.ictce.org/ Ruidong Li (National Institute of Information and Communications Technology4 KB (524 words) - 13:30, 28 July 2017
- * Computer Science / Information Technology Education * Cryptography and Information security3 KB (347 words) - 10:20, 20 November 2020
- * Computer Science / Information Technology Education * Cryptography and Information security3 KB (346 words) - 17:32, 18 February 2021
- |Title=ICNS - Ei 2017 : 2017 The 2nd International Conference on Network Security (ICNS 2017)--ACM, Ei Compendex and Scopus |Field=security2 KB (308 words) - 11:50, 3 September 2017
- |Title=ASPMI 2018 : Advances in Security and Privacy of Multimodal Interfaces |Field=security4 KB (592 words) - 13:34, 28 July 2017
- information inference associated with identification, embedded signal processing Architectures, Wireless Information Networks, Data Manipulation, Signal5 KB (632 words) - 12:30, 3 September 2017
- in the areas of communications, computers, control, electronics, information (20) Information Security and Cryptography1 KB (157 words) - 13:19, 28 July 2017
- * Cryptography, Security and Privacy of Mobile & Wireless Networks * Information Access in Wireless Networks5 KB (616 words) - 13:19, 28 July 2017
- |Title=DIPEWC 2017 : The Second International Conference on Digital Information Processing, Electronics, and Wireless Communications ...epage=http://sdiwc.net/conferences/2nd-international-conference-on-digital-information-processing-electronics-and-wireless-communications/2 KB (242 words) - 11:35, 8 August 2017
- ...017 : 7th International Conference on Mathematical Aspects of Computer and Information Sciences |Field=information security5 KB (670 words) - 13:24, 28 July 2017
- |Acronym=Technologies for Security of EHR 2017 |Title=Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Cha5 KB (650 words) - 13:24, 28 July 2017
- |Field=security Communications Systems, Embedded Systems and Information Security , to attract a6 KB (743 words) - 11:45, 8 August 2017
- ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security5 KB (611 words) - 11:47, 8 August 2017
- |Field=security * Search Engines and Information Retrieval7 KB (946 words) - 13:28, 28 July 2017
- |Title=WorldCIS 2017 : World Congress on Internet Security theory and practical implementation of security on the Internet and Computer5 KB (571 words) - 11:53, 3 September 2017
- |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:11 KB (1,549 words) - 11:34, 17 April 2020
- |Title=The Twelfth Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict1 KB (152 words) - 10:13, 17 April 2020
- * cryptography * information theoretical foundation for artificial intelligence2 KB (192 words) - 08:38, 14 April 2020
- |Title=34th International Conference on Information Technologies === Information Technologies ===3 KB (314 words) - 11:52, 27 March 2020
- |Title=12th International Conference on Provable Security <big>General information</big>3 KB (445 words) - 11:59, 9 April 2020
- |Title=11th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict1 KB (155 words) - 10:20, 17 April 2020
- |Title=10th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict1 KB (153 words) - 10:27, 17 April 2020
- * Data and Information Quality for Big Data * High Performance Cryptography4 KB (563 words) - 15:55, 23 June 2020
- * Data and Information Quality for Big Data * High Performance Cryptography5 KB (543 words) - 21:14, 18 May 2020
- * Data and Information Quality for Big Data * High Performance Cryptography9 KB (1,187 words) - 14:18, 27 May 2020
- ...ls, architectural and design concepts; Design and implementation of mobile information systems; Wireless communications and mechanisms; Antenna and RF subsystems; ...nt and control of high speed networks; Performance in high speed networks; Security aspects in high speed networks; QoS/SLA in high speed networks; Diagnosing13 KB (1,636 words) - 11:51, 10 July 2020
- * Cryptography ...'' Foundations of networks and multi-agent systems: models, algorithms and information management:4 KB (556 words) - 06:42, 26 August 2020
- ...DN Access control; 5G Edge caching techniques; Performance in 5G networks; Security and privacy in data-centers; Identity and privacy management; QoS (Quality ...and discovery of things on the Internet; Crowd-sourcing and things; Trust, security and privacy in Internet of Things; Lightweight implementations of cryptogra13 KB (1,550 words) - 02:20, 10 July 2020
- ..."Spectrum Allocation and Management", "Wireless and mobile technologies", "Security in wireless and mobile environment" Security in wireless and mobile environment11 KB (1,335 words) - 02:28, 10 July 2020
- ...le=The Fifteenth International Multi-Conference on Computing in the Global Information Technology ...a systems","Networking and telecommunications","Knowledge virtualization","Security in network, systems, and applications","IPv6 Today - Technology and deploym18 KB (2,036 words) - 02:36, 10 July 2020
- |Title=The Fourteenth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies15 KB (1,886 words) - 16:16, 25 August 2020
- |Title=8th International Conference on Availability, Reliability, and Security The 8th International Conference on Availability, Reliability and Security (ARES) 20134 KB (468 words) - 11:39, 21 August 2020
- |Title=9th International Conference on Availability, Reliability and Security The 9th International Conference on Availability, Reliability and Security (ARES) 20144 KB (538 words) - 11:52, 21 August 2020
- |Title=14th International Conference on Availability, Reliability, and Security The 14th International Conference on Availability, Reliability, and Security (ARES) 20195 KB (627 words) - 10:49, 25 August 2020
- |Title=23rd Annual International Conference on Information Security and Cryptology Cloud Computing Security2 KB (169 words) - 10:42, 25 August 2020
- |Title=13th International Conference on Availability, Reliability and Security The 13th International Conference on Availability, Reliability and Security (ARES) 20183 KB (336 words) - 11:20, 25 August 2020