Search results

Jump to: navigation, search

Page title matches

Page text matches

  • ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...ons; Target-oriented keyword search; Filter-based profile matching; Mutual information on data streams; Stream processing; Digitized documents streams; Queries wi
    11 KB (1,371 words) - 12:28, 18 May 2020
  • Information theory: distributed network coding, Shannon's entropy, Nash equilibrium Cryptography
    11 KB (1,385 words) - 17:48, 14 October 2008
  • * Cryptography and Security * Information Retrieval
    2 KB (216 words) - 20:05, 14 October 2008
  • - Databases: query processing; information integration; - Security and Privacy: cryptography; access control; security in
    9 KB (1,193 words) - 22:53, 14 October 2008
  • �?� Security and Cryptography �?� Information Systems
    13 KB (1,775 words) - 23:04, 14 October 2008
  • * Cryptography and Network Security * Information Assurance
    2 KB (167 words) - 23:05, 14 October 2008
  • Cryptography; Descriptive complexity; Evolutionary and information and communication complexity.
    5 KB (698 words) - 23:08, 14 October 2008
  • | Title = IEEE Information Theory Workshop on Networking and Information Theory | Field = Information theory
    3 KB (308 words) - 23:15, 14 October 2008
  • 4. Security and Privacy 4-03 Distributed systems security
    5 KB (623 words) - 23:15, 14 October 2008
  • ...e = Sixth International Conference on Cryptography, Coding and Information Security | Field = Computer security and reliability
    3 KB (448 words) - 23:19, 14 October 2008
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • | Title = New Security Paradigms Workshop | Field = Computer security and reliability
    8 KB (1,072 words) - 23:20, 14 October 2008
  • forming, a new way to manage personal information or a new approach to model context information. There is less emphasis on the actual
    5 KB (663 words) - 23:20, 14 October 2008
  • | Title = 23rd International Information Security Conference | Field = Computer security and reliability
    5 KB (637 words) - 23:20, 14 October 2008
  • | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability
    4 KB (502 words) - 23:20, 14 October 2008
  • Information Security and Cryptography Information Systems
    3 KB (412 words) - 19:34, 12 November 2020
  • ...tle = The First International Conference on Security and Privacy in Mobile Information and Communication Systems ...edge researchers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymaker
    4 KB (451 words) - 23:37, 14 October 2008
  • * Information Security and Cryptography * Information Systems
    3 KB (386 words) - 23:39, 14 October 2008
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Information Management and Dissemination
    5 KB (526 words) - 01:02, 2 February 2009
  • | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)
    16 KB (2,178 words) - 12:59, 18 January 2009
  • ...itle = International Conference on Communications and Networking in China, Information and Coding Theory Symposium o Security in Power Line Communications
    14 KB (1,518 words) - 13:01, 18 January 2009
  • | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability
    8 KB (967 words) - 17:07, 27 February 2009
  • | Title = 3rd WORKSHOP ON Practice and Theory of IT Security | Field = Computer security and reliability
    4 KB (506 words) - 17:07, 27 February 2009
  • | Title = 5th IEEE International Workshop on Wireless and Sensor Networks Security Wireless and Sensor Networks Security (WSNS'09)
    4 KB (485 words) - 17:07, 27 February 2009
  • * Error and erasure correcting codes for information dispersal * Cryptography, Security and trust
    6 KB (750 words) - 16:50, 27 December 2015
  • | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability
    6 KB (828 words) - 17:08, 27 February 2009
  • ...nal Conference on the Theory and Application of Cryptology and Information Security |Field=Cryptography
    178 bytes (23 words) - 21:30, 10 March 2020
  • |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security
    5 KB (578 words) - 10:21, 20 November 2020
  • Security and Cryptography Information Retrieval
    3 KB (412 words) - 19:29, 2 August 2009
  • |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security
    5 KB (599 words) - 10:21, 20 November 2020
  • | Acronym = Security 2009 ...S International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)
    6 KB (746 words) - 11:35, 2 August 2009
  • | Title = IEEE International Symposium on Information Theory | Field = Information theory
    2 KB (217 words) - 11:36, 2 August 2009
  • |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security
    3 KB (352 words) - 12:39, 11 August 2009
  • |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security
    5 KB (667 words) - 14:27, 13 September 2009
  • |Title=International Conference on Information Society (i-Society 2010) - Geographic information systems
    4 KB (507 words) - 22:37, 18 November 2009
  • |Field=Information Security, Cryptography
    3 KB (373 words) - 13:50, 19 January 2010
  • |Title=3rd International Conference on Security of Information and Networks |Field=Computer security
    10 KB (1,270 words) - 17:12, 20 April 2010
  • |Title=International Conference on Security and Cryptography |Field=Computer security and reliability
    4 KB (409 words) - 15:40, 5 February 2010
  • ..., signal processing and multimedia applications, and wireless networks and information systems. These are the main knowledge areas that define the six component c
    2 KB (180 words) - 15:49, 5 February 2010
  • |Title=7th International Conference on Web Information Systems and Technologies (WEBIST) Conference name: 7th International Conference on Web Information Systems and Technologies (WEBIST)
    5 KB (627 words) - 12:33, 16 June 2010
  • ...nal Conference on the Theory and Application of Cryptology and Information Security |Field=Cryptography
    208 bytes (27 words) - 18:56, 29 March 2020
  • |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium
    3 KB (343 words) - 16:31, 6 May 2020
  • |Title=International Conference on Information Society ...d industry. The conference covers a wide spectrum of topics that relate to information society, which includes technical and non-technical research areas.
    6 KB (732 words) - 05:52, 5 December 2010
  • ...nym=CALL FOR PAPER Journal: International Journal of Computer Science and Security (IJCSS) |Title=International Journal of Computer Science and Security (IJCSS)
    2 KB (298 words) - 16:47, 5 July 2020
  • |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)
    5 KB (609 words) - 17:01, 5 July 2020
  • |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability
    5 KB (597 words) - 10:45, 21 August 2020
  • Information Security and Applied Cryptography. − Intelligent Information Systems.
    3 KB (367 words) - 16:37, 27 December 2015
  • |Title=The 2012 International Conference of Information Engineering |Field=Information Engineering
    8 KB (1,085 words) - 16:28, 6 February 2012
  • |Title=International Conference on Information Society ...d researchers to share existing and generate new knowledge in the field of information society.
    5 KB (595 words) - 05:03, 15 January 2012
  • |Title=International Journal of Advances in Computing and Information Technology ...ch results and fundamental advances in all aspects of computer science and Information technology. IJACIT offers wide area of scope and aim that covers almost all
    3 KB (434 words) - 22:46, 30 May 2012
  • Security and Cryptography Web Information Systems
    2 KB (211 words) - 08:30, 26 October 2012
  • |Title=6th International Conference on Information Security and Cryptology |Field=Cryptography
    3 KB (351 words) - 09:52, 28 October 2012
  • |Title=International Conference on Information Society |Field=Information and communication technologies
    4 KB (535 words) - 14:38, 17 January 2013
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (264 words) - 15:32, 7 January 2021
  • *Cyber Security *Data Mining & Information Retrieval
    3 KB (308 words) - 17:30, 26 May 2016
  • |Title=3rd International Conference on Digital Information Processing, Data Mining, and Wireless Communications *Digital Information Processing
    2 KB (227 words) - 11:30, 21 June 2016
  • |Title=FC 2017 : Financial Cryptography and Data Security 2017 |Field=cryptography, information security
    364 bytes (45 words) - 16:19, 8 July 2016
  • |Title=7th International Conference on Communications Security & Information Assurance |Field=security, communications, information security, cryptography
    370 bytes (37 words) - 06:18, 20 September 2016
  • |Title=International Conference on Information Society |Field=Information Society
    5 KB (641 words) - 22:32, 29 July 2016
  • the 22nd European Symposium on Research in Computer Security (ESORICS information that they manage (as witnessed, for example, by lawsuits
    7 KB (887 words) - 15:22, 15 July 2017
  • |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)
    4 KB (597 words) - 13:28, 28 July 2017
  • |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)
    4 KB (562 words) - 12:05, 3 September 2017
  • * Information access in wireless networks * Cryptography, security and privacy of mobile & wireless networks
    6 KB (820 words) - 13:30, 28 July 2017
  • 2017. More information about ICTCE 2017, please visit: http://www.ictce.org/ Ruidong Li (National Institute of Information and Communications Technology
    4 KB (524 words) - 13:30, 28 July 2017
  • * Computer Science / Information Technology Education * Cryptography and Information security
    3 KB (347 words) - 10:20, 20 November 2020
  • * Computer Science / Information Technology Education * Cryptography and Information security
    3 KB (346 words) - 17:32, 18 February 2021
  • |Title=ICNS - Ei 2017 : 2017 The 2nd International Conference on Network Security (ICNS 2017)--ACM, Ei Compendex and Scopus |Field=security
    2 KB (308 words) - 11:50, 3 September 2017
  • |Title=ASPMI 2018 : Advances in Security and Privacy of Multimodal Interfaces |Field=security
    4 KB (592 words) - 13:34, 28 July 2017
  • information inference associated with identification, embedded signal processing Architectures, Wireless Information Networks, Data Manipulation, Signal
    5 KB (632 words) - 12:30, 3 September 2017
  • in the areas of communications, computers, control, electronics, information (20) Information Security and Cryptography
    1 KB (157 words) - 13:19, 28 July 2017
  • * Cryptography, Security and Privacy of Mobile & Wireless Networks * Information Access in Wireless Networks
    5 KB (616 words) - 13:19, 28 July 2017
  • |Title=DIPEWC 2017 : The Second International Conference on Digital Information Processing, Electronics, and Wireless Communications ...epage=http://sdiwc.net/conferences/2nd-international-conference-on-digital-information-processing-electronics-and-wireless-communications/
    2 KB (242 words) - 11:35, 8 August 2017
  • ...017 : 7th International Conference on Mathematical Aspects of Computer and Information Sciences |Field=information security
    5 KB (670 words) - 13:24, 28 July 2017
  • |Acronym=Technologies for Security of EHR 2017 |Title=Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Cha
    5 KB (650 words) - 13:24, 28 July 2017
  • |Field=security Communications Systems, Embedded Systems and Information Security , to attract a
    6 KB (743 words) - 11:45, 8 August 2017
  • ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security
    5 KB (611 words) - 11:47, 8 August 2017
  • |Field=security * Search Engines and Information Retrieval
    7 KB (946 words) - 13:28, 28 July 2017
  • |Title=WorldCIS 2017 : World Congress on Internet Security theory and practical implementation of security on the Internet and Computer
    5 KB (571 words) - 11:53, 3 September 2017
  • |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:
    11 KB (1,549 words) - 11:34, 17 April 2020
  • |Title=The Twelfth Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (152 words) - 10:13, 17 April 2020
  • * cryptography * information theoretical foundation for artificial intelligence
    2 KB (192 words) - 08:38, 14 April 2020
  • |Title=34th International Conference on Information Technologies === Information Technologies ===
    3 KB (314 words) - 11:52, 27 March 2020
  • |Title=12th International Conference on Provable Security <big>General information</big>
    3 KB (445 words) - 11:59, 9 April 2020
  • |Title=11th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (155 words) - 10:20, 17 April 2020
  • |Title=10th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (153 words) - 10:27, 17 April 2020
  • * Data and Information Quality for Big Data * High Performance Cryptography
    4 KB (563 words) - 15:55, 23 June 2020
  • * Data and Information Quality for Big Data * High Performance Cryptography
    5 KB (543 words) - 21:14, 18 May 2020
  • * Data and Information Quality for Big Data * High Performance Cryptography
    9 KB (1,187 words) - 14:18, 27 May 2020
  • ...ls, architectural and design concepts; Design and implementation of mobile information systems; Wireless communications and mechanisms; Antenna and RF subsystems; ...nt and control of high speed networks; Performance in high speed networks; Security aspects in high speed networks; QoS/SLA in high speed networks; Diagnosing
    13 KB (1,636 words) - 11:51, 10 July 2020
  • * Cryptography ...'' Foundations of networks and multi-agent systems: models, algorithms and information management:
    4 KB (556 words) - 06:42, 26 August 2020
  • ...DN Access control; 5G Edge caching techniques; Performance in 5G networks; Security and privacy in data-centers; Identity and privacy management; QoS (Quality ...and discovery of things on the Internet; Crowd-sourcing and things; Trust, security and privacy in Internet of Things; Lightweight implementations of cryptogra
    13 KB (1,550 words) - 02:20, 10 July 2020
  • ..."Spectrum Allocation and Management", "Wireless and mobile technologies", "Security in wireless and mobile environment" Security in wireless and mobile environment
    11 KB (1,335 words) - 02:28, 10 July 2020
  • ...le=The Fifteenth International Multi-Conference on Computing in the Global Information Technology ...a systems","Networking and telecommunications","Knowledge virtualization","Security in network, systems, and applications","IPv6 Today - Technology and deploym
    18 KB (2,036 words) - 02:36, 10 July 2020
  • |Title=The Fourteenth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies
    15 KB (1,886 words) - 16:16, 25 August 2020
  • |Title=8th International Conference on Availability, Reliability, and Security The 8th International Conference on Availability, Reliability and Security (ARES) 2013
    4 KB (468 words) - 11:39, 21 August 2020
  • |Title=9th International Conference on Availability, Reliability and Security The 9th International Conference on Availability, Reliability and Security (ARES) 2014
    4 KB (538 words) - 11:52, 21 August 2020
  • |Title=14th International Conference on Availability, Reliability, and Security The 14th International Conference on Availability, Reliability, and Security (ARES) 2019
    5 KB (627 words) - 10:49, 25 August 2020
  • |Title=23rd Annual International Conference on Information Security and Cryptology Cloud Computing Security
    2 KB (169 words) - 10:42, 25 August 2020
  • |Title=13th International Conference on Availability, Reliability and Security The 13th International Conference on Availability, Reliability and Security (ARES) 2018
    3 KB (336 words) - 11:20, 25 August 2020

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)