Search results

Jump to: navigation, search
  • | Title = IEEE Symposium on Security and Privacy ...m for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
    2 KB (262 words) - 23:20, 14 October 2008
  • Review Policy: "IEEE Policy and professional ethics requires that referees treat the contents of papers
    18 KB (2,352 words) - 23:23, 14 October 2008
  • ...us access technologies under secured (still to be improved) and guaranteed privacy. The family of the mobile devices expand dramatically, allowing a user to h ...obile learning is favoured by many national and international projects and policy synchronization boards.
    6 KB (765 words) - 23:26, 14 October 2008
  • *Internet economics and policy *Security and privacy aspects of network applications and protocols
    4 KB (514 words) - 12:03, 6 April 2020
  • E-democracy, e-policy, and governance Legal and social ontologies Privacy and copyright in collaborative environments and social networks
    8 KB (1,075 words) - 23:52, 14 October 2008
  • ...e: algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, random ...r to July 2008, will not be considered for acceptance at STOC 2008. SIGACT policy does not allow simultaneous submissions of the same (or essentially the sam
    5 KB (766 words) - 23:37, 14 October 2008
  • Issues of privacy of communication, data security, and Double Submission Policy
    9 KB (1,215 words) - 23:38, 14 October 2008
  • * Policy driven management for RTSOAA * Security and privacy for RTSOAA based CPS
    7 KB (922 words) - 00:58, 9 January 2009
  • ** Privacy and security ** Security and privacy
    11 KB (1,366 words) - 16:44, 14 January 2009
  • * Security, Privacy, Encryption, and Digital Rights, including o Privacy-enhancing technologies
    9 KB (1,221 words) - 12:58, 18 January 2009
  • - Privacy ...by ana.sofia@informatics-conf.org | Print / PDF version | Read our Privacy Policy.
    5 KB (633 words) - 12:58, 18 January 2009
  • and Public Policy in the Age of e-Euphoria. Conference main theme will be supported by systems; information assurance, security, and public policy. Doctoral students are
    16 KB (2,178 words) - 12:59, 18 January 2009
  • - temporal aspects of agent- and policy-based systems - privacy in temporal and spatio-temporal data
    6 KB (872 words) - 13:00, 18 January 2009
  • * Exposition of legal, business and technology policy issues relevant to multimedia security. * Multimedia network protection, privacy and security.
    3 KB (303 words) - 17:06, 24 February 2016
  • o Policy between primary user and secondary user * Wireless security and privacy
    14 KB (1,518 words) - 13:01, 18 January 2009
  • 17) Security & Privacy in Pervasive Computing environments - SPPC 09 Conference policy
    10 KB (1,321 words) - 13:01, 18 January 2009
  • * Anonymity, user privacy, and location privacy in UE * Surveillance and Privacy-enhancing technologies in UE
    6 KB (793 words) - 15:12, 1 October 2020
  • ...llaborative technologies, virtual worlds and tele-presence raise issues of privacy, management, compliance, governance, and risk. ...s by exposing problems, and uncovering potential problems, in the areas of privacy, compliance, governance, and risk. Each of these issues creates situations
    4 KB (557 words) - 16:33, 27 February 2009
  • managers, and policy makers interested in computer software and + Middleware solutions for Security, Privacy and Trust
    6 KB (800 words) - 22:11, 27 February 2009
  • ...ves. In this context analysing concepts like Trust, Reliability, Security, Privacy and Risk would help the users to make informed judgements of what their lev • Security and Privacy
    4 KB (600 words) - 17:07, 27 February 2009

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)