Search results

Jump to: navigation, search
  • * Security and privacy issues for ubiquitous systems ** [[has general chair::Yu-Chee Tseng]], National Chiao Tung University, Taiwan
    13 KB (1,468 words) - 01:23, 22 August 2008
  • ** Privacy, safety and security ** Privacy, safety, and security
    6 KB (777 words) - 22:54, 14 August 2008
  • * Trust, security and privacy issues in pervasive systems ** [[has workshop chair::Hao Chu]], National Taiwan Univ.
    12 KB (1,560 words) - 15:03, 27 August 2008
  • ...uctive databases and knowledge bases; Distributed databases; Integrity and security; Logic and databases; Multimedia databases; Query optimization; Query proce ** [[has PC member::Sebastian Maneth]] (National ICT Australia)
    5 KB (753 words) - 18:59, 25 June 2012
  • * Security issues of data management in wireless networks ** [[has PC member::Alfredo Cuzzocrea]], University of Calabria / National Research Council, Italy
    5 KB (611 words) - 15:43, 16 September 2008
  • * Security issues in information systems ** [[has PC member::Stephane Bressan]], National University of Singapore
    7 KB (763 words) - 12:25, 6 October 2011
  • ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.) ** [[has program chair::Alfredo Cuzzocrea]], Italian National Research Council / University of Calabria, Italy
    11 KB (1,446 words) - 18:26, 13 October 2008
  • Software Security National University of Kaohsiung
    2 KB (293 words) - 10:35, 24 June 2011
  • * Security, Privacy and Trust * Security, Privacy and Trust
    34 KB (4,565 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust ** [[has OC member::Chung-Ming Huang]], National Cheng Kung University, Taiwan
    8 KB (1,037 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust ** [[has general chair::Richard P. Brent]], Australian National University, Australia
    9 KB (1,189 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust ** [[has OC member::Chung-Ming Huang]], National Cheng Kung University, Taiwan
    26 KB (3,456 words) - 22:20, 10 January 2018
  • * Security and Privacy ** [[has OC member::Wen-Tsuen Chen]], National Tsing Hua University (NTHU), Taiwan
    10 KB (1,263 words) - 22:20, 10 January 2018
  • * Security and Privacy ** [[has OC member::Wen-Tsuen Chen]], National Tsing Hua University (NTHU), Taiwan
    12 KB (1,537 words) - 22:19, 10 January 2018
  • * Security and Privacy ** [[has PC member::Chua Tat-Seng]], National University of Singapore
    8 KB (1,040 words) - 22:20, 10 January 2018
  • Security and Reliability Pete Beckman, Argonne National Lab, USA
    4 KB (452 words) - 17:47, 7 April 2021
  • * Trust, reputation, security, and privacy in MBC Chi-hung Chi, National Tsing Hua University, Taiwan, China
    5 KB (647 words) - 22:05, 14 October 2008
  • * Trust, security and privacy Tsung-Chuan Huang, National Sun Yat-sen University, Taiwan
    19 KB (2,503 words) - 13:25, 28 October 2020
  • * Security, Privacy, Safety and Legal Issues Ichiro Satoh, National Institute of Informatics, Japan
    7 KB (942 words) - 20:05, 14 October 2008
  • - Security and privacy in SPSs ...ote talk by Dr Tim Cornwell (from Australia's CSIRO -- Australia Telescope National Facility) on the Australian Square Kilometre Array Pathfinder (ASKAP)/Squar
    3 KB (490 words) - 20:05, 14 October 2008
  • |Field=Computer security and reliability ...(railways, airlines, road), life related (health, emergency response, and security), manufacturing (chips, computers, cars) or financial (credit cards, on-lin
    15 KB (2,175 words) - 21:03, 19 March 2013
  • - National and International Economies - Data Security Issues
    6 KB (780 words) - 20:06, 14 October 2008
  • ...ce aims to gather together technology experts, practitioners, industry and national authorities contributing towards the development and application of human-c * Security and privacy in pervasive healthcare
    6 KB (732 words) - 22:45, 14 October 2008
  • NATIONAL RESEARCH COUNCIL CANADA - Security and Privacy: cryptography; access control; security in
    9 KB (1,193 words) - 22:53, 14 October 2008
  • John Lloyd (Australian National University) * security, privacy and trust issues in multi-agent systems
    5 KB (670 words) - 23:04, 14 October 2008
  • - Security and Reputation - Privacy, safety and security
    18 KB (2,457 words) - 23:04, 14 October 2008
  • * models of concurrency, security, and mobility ** [[has PC member::Abhik Roychoudhury]] National University of Singapore, Singapore
    8 KB (1,085 words) - 18:01, 12 February 2009
  • * Network and IT security issues in developing countries Abdelfettah Belghith, National School of Computer Sciences (ENSI), Tunisia;
    9 KB (1,127 words) - 17:19, 26 April 2011
  • - Other aspects of modern information systems such as security, privacy, Kyuseok Shim Seoul National University
    7 KB (851 words) - 05:29, 15 October 2008
  • * Data privacy and security * Security and privacy in data mining
    5 KB (661 words) - 16:23, 11 December 2008
  • Security, Personalization National University of Singapore
    3 KB (437 words) - 23:20, 14 October 2008
  • integration of semi-structured and unstructured data, security/privacy * Security and privacy in data warehouses
    10 KB (1,288 words) - 11:52, 18 October 2008
  • ...stributed Applications), and IS'08 (International Symposium on Information Security). * [[has PC member::Manolis Koubarakis]], National and Kapodistrian University of Athens, Greece
    8 KB (1,081 words) - 08:21, 22 December 2011
  • * Security techniques * [[has PC member::Chee-Yong Chan]], National University of Singapore, Singapore
    29 KB (4,077 words) - 18:04, 18 August 2023
  • - Security and Access Control - Information Content Security
    4 KB (595 words) - 23:09, 14 October 2008
  • * mobile database security Mong Li Lee, National University of Singapore, Singapore
    7 KB (875 words) - 23:09, 14 October 2008
  • * Data privacy and security * Chee-Yong Chan, National University of Singapore, Singapore
    6 KB (840 words) - 23:10, 14 October 2008
  • - security and privacy Division of Computer Engineering, Seoul National University, Korea
    4 KB (539 words) - 23:10, 14 October 2008
  • Organized by National Laboratory for Parallel and Distributed Processing, China. - Database security
    10 KB (1,376 words) - 23:10, 14 October 2008
  • | Title = 25th British National Conference on Databases The British National Conference on Databases (BNCOD) was established in 1980 as a forum for rese
    4 KB (593 words) - 23:10, 14 October 2008
  • · Security control in grid workflow systems Ian Foster, Argonne National Laboratory and University of Chicago, USA.
    7 KB (886 words) - 23:10, 14 October 2008
  • Integration of Security and Privacy Privacy Implications for National Security
    2 KB (193 words) - 23:10, 14 October 2008
  • and military operations. Such networking is essential for safety, security and economic vitality in •Trust, security, dependability, privacy, QoS and
    5 KB (549 words) - 17:15, 5 July 2020
  • Security issues National Ilan University National Taipei University Platforms
    3 KB (364 words) - 23:11, 14 October 2008
  • * Network Security & Reliability National University of Science & Technology, Pakistan
    4 KB (559 words) - 23:11, 14 October 2008
  • + Security for CE Communications Security with Online Social Networking
    5 KB (584 words) - 09:43, 4 September 2023
  • - Security and privacy of mobile/wireless systems Hsiao-Hwa Chen, National Sun Yat-Sen University, Taiwan
    4 KB (596 words) - 23:12, 14 October 2008
  • Security Informatics Ting-Peng Liang, National Sun Yat-sen University
    3 KB (430 words) - 23:13, 14 October 2008
  • National Center of Sciences, Tokyo, JAPAN networks, including user behavior models, security and trust, P2P,
    7 KB (813 words) - 23:14, 14 October 2008
  • * Security and Robustness in P2P Information Search Yuh-Jzer Joung (National Taiwan University, Taiwan)
    5 KB (554 words) - 23:15, 14 October 2008
  • ...ng difficult social and policy issues such as those related to privacy and security ...l-mobile technologies, information networking, human-computer interaction, security and privacy.
    8 KB (1,003 words) - 23:15, 14 October 2008
  • * A Best Poster presentation with awards sponsored by National ICT Australia (NICTA). 5. Multimedia security (data hiding, authentication, and access control)
    4 KB (443 words) - 17:06, 24 February 2016
  • ...ense. Debates over the need for privacy protection vs. service to national security and business interests were held in newspapers, magazines, research article It is clear that privacy is a domain dependent concept: homeland security, healthcare, business secrecy, entertainment, web 2.0, and ubiquitous compu
    5 KB (721 words) - 23:19, 14 October 2008
  • | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability
    6 KB (697 words) - 23:19, 14 October 2008
  • | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability
    6 KB (736 words) - 23:20, 14 October 2008
  • | Title = Information Security South Africa (ISSA) Conference 2008 | Field = Computer security and reliability
    4 KB (465 words) - 23:20, 14 October 2008
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security | Field = Computer security and reliability
    4 KB (565 words) - 23:20, 14 October 2008
  • -Security issues on UMC Chin-Chen Chang, National Chung Cheng University, Taiwan
    4 KB (573 words) - 23:20, 14 October 2008
  • Service Security, Privacy and Trust Security, Privacy and Trust in Business Process Management
    18 KB (2,352 words) - 23:23, 14 October 2008
  • ..., computer vision, image analysis, signal processing, statistics, computer security, etc. The purpose of this conference is to provide a scientific forum for r Biometric Security and Privacy
    3 KB (325 words) - 23:50, 14 October 2008
  • ...eralization of successful practices on mobile learning is favoured by many national and international projects and policy synchronization boards. ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design
    6 KB (765 words) - 23:26, 14 October 2008
  • ...ICR is to solicit governmental support to recognize robotics as a field of national priority. The scientific program will include plenary talks that will revie * Robots in security applications
    3 KB (423 words) - 23:29, 14 October 2008
  • of real-time embedded systems, such as timeliness, safety, security, (e.g., robustness, privacy, safety, security) for real-time embedded
    6 KB (707 words) - 23:29, 14 October 2008
  • o Language features to enhance reliability and security handling, for reliability and security
    5 KB (673 words) - 23:30, 14 October 2008
  • reliability, security and survivability in RT systems; scheduling Samarjit Chakraborty, National University of Singapore, Singapore
    7 KB (870 words) - 23:30, 14 October 2008
  • ...cooperation and goal seeking through sharing policy and ontology, safety & security in systems, other QoS issues, and so on. ...es relating to architecture, implementation, coordination, service levels, security, etc. of semantic or otherwise agents.
    10 KB (1,391 words) - 23:31, 14 October 2008
  • Security in distributed systems Autonomic access control and security issues
    5 KB (702 words) - 23:31, 14 October 2008
  • ...semantics, program verification, static analysis, testing, language-based security. * Joxan Jaffar, National University of Singapore (Singapore)
    6 KB (824 words) - 23:32, 14 October 2008
  • ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc.
    5 KB (580 words) - 10:32, 12 May 2020
  • ** security in distributed systems ** [[has PC member::Eric Paquet]], National Research Council, Canada
    9 KB (1,134 words) - 01:18, 1 February 2009
  • SECURITY �?� Base station security management
    11 KB (1,533 words) - 23:38, 14 October 2008
  • tic web, service-oriented computing, security, and electronic * security and trust in multiagent systems
    8 KB (840 words) - 23:38, 14 October 2008
  • # Security challenges and solutions for interoperability/interoperation of # John-Paul Navarro (Argonne National Laboratory, USA)
    7 KB (959 words) - 23:40, 14 October 2008
  • * Security in Biomedical Data Grids * Robert L. Martino National Institutes of Health, USA (Robert.Martino@nih.gov)
    7 KB (876 words) - 23:40, 14 October 2008
  • | Field = Computer security and reliability * Integrated system reliability, availability, security, safety, and timing analysis and evaluation methods
    6 KB (748 words) - 14:43, 27 December 2015
  • - Privacy, security and trust - Irina Kondratova, National Research Council, Canada
    6 KB (763 words) - 23:42, 14 October 2008
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ...ion; All-IP versus protocol translation; IP simplified network management; Security, trust, and privacy; Network stability under topology change; Delay-toleran * [[has PC member::Ruay-Shiung Chang]], National Dong Hwa University, Taiwan
    7 KB (883 words) - 17:35, 7 January 2021
  • ...f Academic Excellence in Information Assurance Education from the National Security Agency.
    2 KB (331 words) - 05:33, 5 January 2009
  • * Security and privacy for RTSOAA based CPS ** [[has general chair::Jane Hsu National]] Taiwan University, Taiwan
    7 KB (922 words) - 00:58, 9 January 2009
  • ...bilistic analysis for RT systems; quality of service support; reliability, security and survivability in RT systems; scheduling and schedulability analysis; wo * [[has PC member::Samarjit Chakraborty]], National University of Singapore, Singapore
    5 KB (720 words) - 14:46, 17 January 2009
  • ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Computer and Network Security Systems
    5 KB (526 words) - 01:02, 2 February 2009
  • * Adaptive security for self protection of networks National Research Council (CNR)
    5 KB (650 words) - 13:43, 23 January 2009
  • | Title = 3rd International Conference on Network and System Security 3rd International Conference on Network and System Security (NSS 2009)
    12 KB (1,669 words) - 12:58, 18 January 2009
  • o Security o Network protocols and security
    5 KB (567 words) - 12:58, 18 January 2009
  • Trust, Privacy & Security in Digital Business (TrustBus'09) Security patterns have arrived to a stage where there are a significant
    6 KB (740 words) - 12:58, 18 January 2009
  • - Security Nian-Shing Chen, National Sun Yat-sen University, Taiwan
    5 KB (633 words) - 12:58, 18 January 2009
  • | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)
    16 KB (2,178 words) - 12:59, 18 January 2009
  • - Safety and security for mobile MAS deployment John Lloyd (Australian National University, Australia)
    8 KB (977 words) - 12:59, 18 January 2009
  • - Trust ? security ? privacy Nian-Shing Chen, National Sun Yat-sen University, Taiwan
    6 KB (860 words) - 13:00, 18 January 2009
  • - time-dependent security policies - temporal issues in security
    6 KB (872 words) - 13:00, 18 January 2009
  • | Title = The 1st International Workshop on Security, Reliability and Quality in Cloud Computing computing brings on security, reliability and quality? In other words, what new issues raised
    5 KB (624 words) - 13:00, 18 January 2009
  • Many aspects contribute to the functioning of e-transactions systems such as security aspects (authentication, confidentiality, ..), architecture (such as Cap, 3 Trust, privacy and security issues in e-commerce
    6 KB (772 words) - 13:00, 18 January 2009
  • tourist city has the China's first national forest park, and the World * Security, trust, and privacy
    10 KB (1,206 words) - 13:01, 18 January 2009
  • - Security in Wireless Networks Nian-Shing Chen, National Sun Yat-sen University, Taiwan
    4 KB (564 words) - 13:01, 18 January 2009
  • - Security, Privacy and Trust Nian-Shing Chen, National Sun Yat-sen University, Taiwan
    4 KB (588 words) - 13:01, 18 January 2009
  • |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)
    6 KB (793 words) - 15:12, 1 October 2020
  • * Privacy, security, ethics, culture, and anonymity issues Akira Namatame, National Defense Academy, Japan
    6 KB (767 words) - 13:01, 18 January 2009
  • | Title = 26th British National Conference on Databases 26th British National Conference on Databases
    4 KB (568 words) - 13:01, 18 January 2009
  • * Security and privacy Division of Computer Engineering, Seoul National University, Korea
    4 KB (532 words) - 15:04, 27 December 2015

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)