Search results

Jump to: navigation, search
  • * reasoning about security and privacy ...t detail to allow the program committee to assess the merits of the paper. It should begin with a succinct statement of the issues, a summary of the main
    5 KB (656 words) - 11:29, 27 August 2020
  • * Security ...ng to the ACM proceedings format. These 10 pages include everything (i.e., it is the total length of the paper). The program chair will reject papers tha
    5 KB (678 words) - 20:58, 26 November 2016
  • it several times. Please, pass the information to whom it may benefit. Thank * foundations of security
    6 KB (682 words) - 10:18, 14 April 2020
  • - security in distributed computing, cryptographic protocols ...he paper. The program committee may decline to make the award or may split it.
    6 KB (766 words) - 13:19, 28 November 2016
  • * Linkage between IT services and business services; * Web services security and privacy;
    3 KB (356 words) - 15:56, 15 February 2017
  • ...r computing; Grid computing; Pervasive and mobile computing architectures; Security in networks and distributed systems Be aware that you won't be able to delete or modify your paper once it is uploaded. Nobody but authorized members of the organisation board will b
    4 KB (490 words) - 17:05, 27 December 2015
  • |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)
    6 KB (793 words) - 15:12, 1 October 2020
  • ...uman networking with the use of wearable and implantable wireless sensors. It encompasses wireless body area network, wireless sensor network, and wirele o Security and privacy issues of UWB-based body-centric networking for personal health
    5 KB (664 words) - 17:20, 5 July 2020
  • construction of high quality computational systems. It is now a - Models of concurrency, security and mobility;
    7 KB (1,094 words) - 11:42, 29 September 2016
  • ...ns about all aspects of parallel and distributed computing and networking. It will feature session presentations, workshops, tutorials and keynote speech · Reliability, fault-tolerance, and security
    8 KB (1,050 words) - 18:04, 5 January 2017
  • ...round seems necessary for sensor networks to achieve their full potential. It is a challenge for abstract modeling, algorithmic design and analysis to ac * Cryptography, Security and trust
    6 KB (750 words) - 16:50, 27 December 2015
  • * Business, IT People and System Responsibilities * IT Governance
    4 KB (571 words) - 12:58, 9 March 2020
  • ...t has become a key concern both from a social and political point of view. It is critical to provide rescue personnel with information technology tools t * Security issues in agent-based systems for search and rescue missions, use of games,
    6 KB (783 words) - 17:04, 27 December 2015
  • * Network Security Submission of papers to COMSNETS 2010 carries with it the implied agreement that one or more of the listed authors will attend th
    7 KB (1,054 words) - 16:43, 27 December 2015
  • ...ssion instructions for details. A poster need not describe completed work; it should report on research for which at least preliminary results are availa - Security
    8 KB (1,119 words) - 09:57, 27 February 2020
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    14 KB (1,651 words) - 15:56, 15 February 2017
  • - Business-IT Alignment - Security and Privacy
    3 KB (392 words) - 13:50, 30 April 2020
  • |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    4 KB (429 words) - 08:55, 1 August 2019
  • |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    9 KB (1,092 words) - 09:35, 1 August 2019
  • ...nformation, IS effectiveness requires going beyond the syntactic nature of IT and delve into the human functions involved in the semantic, pragmatic and * Information security
    3 KB (380 words) - 15:10, 1 October 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)