Search results

Jump to: navigation, search

Page title matches

Page text matches

  • ** Privacy, safety and security ** Privacy, safety, and security
    6 KB (777 words) - 22:54, 14 August 2008
  • *Network Security *Internet Applications
    5 KB (571 words) - 09:22, 19 July 2019
  • The 2011 International Conference of Information Security and Internet Engineering
    3 KB (454 words) - 12:34, 8 October 2020
  • Distributed computing and communication infrastructures: Internet QoS inter-operability, security, trusted and dependable systems, fault
    5 KB (715 words) - 17:43, 11 September 2008
  • |Title=The Fourth International Conference on Internet and Web Applications and Services he Fourth International Conference on Internet and Web Applications and Services) continues a series of co-located events
    18 KB (2,408 words) - 02:37, 16 December 2008
  • ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...databases; Automated prediction of relationships; Linked data streams and Internet of things; Preferred repairs; Parallel-correctness and transferability; Gua
    11 KB (1,371 words) - 12:28, 18 May 2020
  • ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.) ** Data integration resources on the Internet
    11 KB (1,446 words) - 18:26, 13 October 2008
  • Software Security Internet and Information Systems Development
    2 KB (293 words) - 10:35, 24 June 2011
  • * Internet Technology and IP-based Applications * Security, Privacy and Trust
    34 KB (4,565 words) - 22:20, 10 January 2018
  • * Internet Technology and IP-based Applications * Security, Privacy and Trust
    8 KB (1,037 words) - 22:20, 10 January 2018
  • * Internet Technology and IP-based Applications * Security, Privacy and Trust
    9 KB (1,189 words) - 22:20, 10 January 2018
  • * Internet Technology and IP-based Applications * Security, Privacy and Trust
    26 KB (3,456 words) - 22:20, 10 January 2018
  • * Security and Privacy * Novel Applications of Internet
    10 KB (1,263 words) - 22:20, 10 January 2018
  • * Security and Privacy * Novel Applications of Internet
    12 KB (1,537 words) - 22:19, 10 January 2018
  • * Security and Privacy * Novel Applications of Internet
    8 KB (1,040 words) - 22:20, 10 January 2018
  • * Storage systems issues related to long term preservation, archival storage, internet-scale storage, and replication and consistency ...issues such as workload modeling, performance metrics, power consumption, security, usability, and experience with real systems and failures
    5 KB (777 words) - 05:50, 14 October 2008
  • ...traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. - Trust-related Security and Privacy: Trust-related secure architecture, framework, policy, intrusio
    9 KB (1,216 words) - 17:32, 14 October 2008
  • Internet pattern recognition ...multimedia databases, digital and video libraries, compression and coding, security over the network.
    2 KB (268 words) - 17:47, 14 October 2008
  • * Mobile Internet * Wireless privacy and security
    3 KB (456 words) - 18:10, 14 October 2008
  • * Security, privacy, and trustworthiness of mobile and wireless systems ...and protocols for cognitive wireless networks and their integration in the Internet
    7 KB (974 words) - 12:28, 3 August 2023
  • | Acronym = INTERNET 2009 | Title = The First International Conference on Evolving Internet
    11 KB (1,385 words) - 17:48, 14 October 2008
  • | Title = The First International Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability
    7 KB (960 words) - 17:48, 14 October 2008
  • * Web services and internet computing * Trust, security and privacy
    19 KB (2,503 words) - 13:25, 28 October 2020
  • + Security and information assurance VP of Data Solutions and Advertising Systems at the Internet
    7 KB (907 words) - 21:51, 14 October 2008
  • Internet Computing, Web applications and Web services Privacy, Trust, and Security is Distributed Systems
    2 KB (208 words) - 20:05, 14 October 2008
  • • E-learning, Multimedia conferencing, internet phones, and mail • Ethical, Social, Privacy, Security and moral Issues in an e-societ
    5 KB (530 words) - 10:27, 24 June 2011
  • |Field=Computer security and reliability ...(railways, airlines, road), life related (health, emergency response, and security), manufacturing (chips, computers, cars) or financial (credit cards, on-lin
    15 KB (2,175 words) - 21:03, 19 March 2013
  • ...r, PVR, Interconnects, Game Systems, Interactive and Directed Programming, Internet Integration, Next-Generation DVD, Displays Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability, Application Control, H
    3 KB (354 words) - 20:06, 14 October 2008
  • ...d to publish extended versions of their papers in the IADIS Journal on WWW/Internet (ISSN: 1645-7641) and other selected Journals. - Internet Cultures and new interpretations of �??Space�??
    6 KB (780 words) - 20:06, 14 October 2008
  • o Security and Privacy o Network and Internet Support for Distributed Applications
    2 KB (303 words) - 20:06, 14 October 2008
  • ...mic experts to present and discuss communications quality, reliability and security issues as they relate to real world issues. The output from the workshops a * Current and Next-generation Internet
    4 KB (505 words) - 22:15, 14 October 2008
  • Internet integration of wireless networks. * Internet integration
    6 KB (686 words) - 20:06, 14 October 2008
  • Homeland Security Systems Safety and Security
    6 KB (708 words) - 22:49, 14 October 2008
  • -Protocol and log visualization (security, trust) -Software visualization on the internet
    3 KB (355 words) - 22:53, 14 October 2008
  • �?� Internet computing, web environment for collaborative working �?� Security for CDVE
    4 KB (468 words) - 22:54, 14 October 2008
  • ...Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce and Human Factors. 4. Software Agents and Internet Computing
    9 KB (1,240 words) - 22:56, 14 October 2008
  • B10. Security and Intrusion Detection B11. Web Data and the Internet
    2 KB (295 words) - 12:03, 18 October 2008
  • * Cryptography and Network Security * Internet Technology and Applications
    2 KB (167 words) - 23:05, 14 October 2008
  • * models of concurrency, security, and mobility * parallel, distributed, and internet-based (grid) computing
    8 KB (1,085 words) - 18:01, 12 February 2009
  • Data Privacy and Security Internet and Web-Based Database Systems
    7 KB (1,006 words) - 23:08, 14 October 2008
  • ...stributed Applications), and IS'08 (International Symposium on Information Security).
    8 KB (1,081 words) - 08:21, 22 December 2011
  • - Security and Access Control - Information Content Security
    4 KB (595 words) - 23:09, 14 October 2008
  • * Internet services scalability, including locally and geographically * Security, reliability and availability in distributed storage systems,
    5 KB (644 words) - 23:10, 14 October 2008
  • Integration of Security and Privacy Privacy and Anonymity on the Internet
    2 KB (193 words) - 23:10, 14 October 2008
  • and military operations. Such networking is essential for safety, security and economic vitality in Internet to reduce cost of deployment and maintenance and to enhance reachability an
    5 KB (549 words) - 17:15, 5 July 2020
  • Quality of service, authentication and security, multimedia protocols, web architectures and protocols, network measurement Next Generation Internet
    7 KB (981 words) - 03:18, 6 January 2009
  • 1. NGN(Next Generation Network), NGI(Next Generation Internet) and Future Internet Technologies 9. Information Security Technologies
    2 KB (200 words) - 23:11, 14 October 2008
  • * Internet architecture and protocols * Network Security
    4 KB (465 words) - 23:11, 14 October 2008
  • * Optical Internet * Network Security & Reliability
    4 KB (559 words) - 23:11, 14 October 2008
  • | Title = Security and Privacy in Telecommunications and Information Systems | Field = Computer security and reliability
    4 KB (587 words) - 23:30, 14 October 2008
  • ...e physical world in multiple ways, and at multiple scales, from the global Internet scale down to micro- and nano-devices. Many of these devices are highly mob ...e physical world in multiple ways, and at multiple scales, from the global Internet scale down to micro- and nano-devices. Many of these devices are highly mob
    5 KB (694 words) - 23:11, 14 October 2008
  • Security/privacy in wireless systems Wireless / Mobile Internet
    2 KB (244 words) - 23:12, 14 October 2008
  • 1 .10 Internet and Intranet 5 .54 Network Security
    2 KB (250 words) - 23:12, 14 October 2008
  • ...Generation Internet Networks - 4th EURO-NGI Conference on Next Generation Internet Networks ...2008 focuses on the design, engineering, and operation of Next Generation Internet networks. It is organized by the Network of Excellence (NoE) Euro-FGI (http
    3 KB (382 words) - 23:12, 14 October 2008
  • Internet integration of wireless networks. * Internet integration
    3 KB (413 words) - 23:13, 14 October 2008
  • Internet routing, peer-to-peer and overlay networks, sensor networks, * Security and resilience of networked systems
    4 KB (528 words) - 23:13, 14 October 2008
  • ...t, particularly with properties such as reliability, availability, safety, security, and real time. The major areas of interest include, but are not limited to, dependability, security and/or real-time aspects within the following topics:
    2 KB (255 words) - 23:14, 14 October 2008
  • in the Services Computing discipline, Web services are Internet-based * Security Challenges for Web Services
    8 KB (1,158 words) - 23:14, 14 October 2008
  • ...on of large-scale networked and distributed systems. Systems as diverse as Internet routing, peer-to-peer and overlay networks, sensor networks, Web-based syst * Security, robustness, and fault-tolerance in networked environments
    8 KB (1,093 words) - 23:15, 14 October 2008
  • * Handoffs for Entertainment (Internet to WLAN, to 3G/BT/...) * QoS and Security Support for Entertainment
    8 KB (1,011 words) - 23:15, 14 October 2008
  • * Security aspects in network management "Design of Next Generation Internet Based on Application-Oriented Networking"
    6 KB (663 words) - 23:15, 14 October 2008
  • | Title = The First International Workshop on Network Security & Applications The First International Workshop on Network Security & Applications (WNSA-2008)
    5 KB (628 words) - 23:15, 14 October 2008
  • 2-02 Internet computing 4. Security and Privacy
    5 KB (623 words) - 23:15, 14 October 2008
  • ...ing development of new mobile technologies and the widespread usage of the Internet ...ng difficult social and policy issues such as those related to privacy and security
    8 KB (1,003 words) - 23:15, 14 October 2008
  • NPSec 2008 particularly welcomes new ideas on security in the context of future Internet design, such as architectural considerations for future
    4 KB (493 words) - 23:15, 14 October 2008
  • | Title = Internet Measurement Conference 2008 Internet Measurement Conference (IMC) 2008
    3 KB (313 words) - 23:15, 14 October 2008
  • * Future Internet Services: Teletraffic and Performance Issues * Network Security
    5 KB (598 words) - 10:18, 29 May 2016
  • * Wireless Internet access in ubiquitous systems * Security, privacy and social issues of mobile and ubiquitous systems
    5 KB (599 words) - 23:15, 14 October 2008
  • R. SP for Internet and Wireless Communications V. Signal Processing for Security
    2 KB (226 words) - 23:17, 14 October 2008
  • # security technology and systems * Integrity, Security, and Fault Tolerance
    6 KB (733 words) - 12:48, 27 October 2016
  • ...systems to mobile computing, multimedia systems, peer-to-peer networks and Internet services. All communication systems must interoperate with each other. Conn * Innovative architectures for Internet services, web services
    3 KB (358 words) - 23:18, 14 October 2008
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability
    5 KB (673 words) - 23:19, 14 October 2008
  • | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability
    6 KB (736 words) - 23:20, 14 October 2008
  • |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    6 KB (689 words) - 10:39, 21 August 2020
  • | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability
    4 KB (502 words) - 23:20, 14 October 2008
  • - Multimedia security and content protection - Multimedia analysis and social media on the Internet
    3 KB (425 words) - 23:20, 14 October 2008
  • like voice, email, short messages, Internet access, m-commerce, to mobile video conferencing, - Personalization, Privacy and Security in Mobile Computing
    10 KB (1,262 words) - 23:20, 14 October 2008
  • * Internet telephony and hypermedia technologies and systems * Multimedia security including digital watermark and encryption
    5 KB (595 words) - 23:20, 14 October 2008
  • ...in meeting the challenges of scale and complexity in datacenter-scale and Internet-scale computing systems. At the same time, the real-world challenges and op ...learning techniques to address reliability, performance, power management, security, fault diagnosis, or manageability issues in computer systems
    6 KB (837 words) - 23:21, 14 October 2008
  • - Grid, P2P, Web Services and Internet Computing - Security, Privacy and Trust
    3 KB (357 words) - 23:23, 14 October 2008
  • * Internet and Web Applications * Information Security
    3 KB (415 words) - 23:23, 14 October 2008
  • Mobile learning became a fact, due to the technical accessibility and Internet communications. Many online classes, learning systems, university curricula ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design
    6 KB (765 words) - 23:26, 14 October 2008
  • * Architecture/software issues focusing on Internet services * Studies of Internet applications and services with implications for systems design
    3 KB (406 words) - 17:39, 30 September 2016
  • As the global Internet extends its reach with both backbone and "to the edge" bandwidth increasing * Security and Trust in Distributed Systems
    6 KB (761 words) - 03:28, 6 January 2009
  • ...ns and required attributes, such as reliability, availability, safety, and security, as well as human factors. * Architecture and protocols for security.
    4 KB (528 words) - 23:27, 14 October 2008
  • ...n progress, with an emphasis on systems that actually run in the wide-area Internet. * Architectural support for improving security or availability
    4 KB (577 words) - 23:31, 14 October 2008
  • | Title = International Conference on Distributed Computing and Internet Technologies International Conference on Distributed Computing and Internet Technologies
    5 KB (702 words) - 23:31, 14 October 2008
  • ...ms, protocols, peer-to-peer computing, sensor networks, inter-operability, security, trusted and dependable systems, fault tolerance, virtual subnets for ORC. ...bility, synchronization, resource allocation, scheduling, fault tolerance, security.
    3 KB (377 words) - 23:31, 14 October 2008
  • *Big Data platforms with applications to network management, security, measurements *Internet measurement and modeling
    4 KB (514 words) - 12:03, 6 April 2020
  • ...ternet technologies, multimedia, wireless communications, data privacy and security, authentification, authorization and federation.
    4 KB (504 words) - 23:33, 14 October 2008
  • International Conference on Internet and Web Applications and Services, Trust, security, and privacy
    8 KB (1,075 words) - 23:52, 14 October 2008
  • ...n Social and Facebook APIs for socially networked applications, OpenID for security, and cloud computing offerings from Amazon, Microsoft, Google, and others w * Portal security models and solutions;
    3 KB (378 words) - 23:34, 14 October 2008
  • ...ement ?Ontology Information/Knowledge/Service Integration ?Knowledge Flow ?Internet-based Knowledge Engineering and Software Engineering ...sed Multi-agent Systems ?Nature-Inspired Computing ? Autonomous Computing ?Internet-based Intelligent Applications ?P2P Computing ?Grid Computing ?Self-Organiz
    3 KB (367 words) - 23:35, 14 October 2008
  • | Title = SANS Network Security 2007 | Field = Internet
    492 bytes (57 words) - 23:36, 14 October 2008
  • Internet and Web technologies, information systems, information retrieval, applications for the Internet and Web.
    9 KB (1,215 words) - 23:38, 14 October 2008
  • * Future Internet design * Security, trust, & privacy
    3 KB (380 words) - 19:34, 17 November 2008
  • ...e multicast/broadcast network, home network, mobile multimedia QoS, mobile security, ad hoc network - Future Internet
    2 KB (303 words) - 23:42, 14 October 2008
  • - Internet applications, social networks, recommender systems - security in distributed computing, cryptographic protocols
    6 KB (766 words) - 13:19, 28 November 2016
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ** Security, Privacy, and Trust ** Broadband Internet access
    5 KB (670 words) - 15:15, 16 February 2009
  • |Title=The First International Conference on Advances in Future Internet * Internet Mechanisms
    7 KB (883 words) - 17:35, 7 January 2021
  • ** Privacy and security ** Evolution of mobile internet technologies
    11 KB (1,366 words) - 16:44, 14 January 2009
  • |Field=Internet security
    2 KB (219 words) - 17:25, 14 January 2009
  • - Distributed applications ICTs: trade, medicine, industry, the Internet, etc.. - Technology for Internet
    6 KB (812 words) - 12:55, 18 January 2009
  • ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Internet Protocols
    5 KB (526 words) - 01:02, 2 February 2009
  • | Title = 3rd International Conference on Network and System Security 3rd International Conference on Network and System Security (NSS 2009)
    12 KB (1,669 words) - 12:58, 18 January 2009
  • o Game-theoretic aspects of network formation on the Internet * Security, Privacy, Encryption, and Digital Rights, including
    9 KB (1,221 words) - 12:58, 18 January 2009
  • | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)
    16 KB (2,178 words) - 12:59, 18 January 2009
  • ...o raises a host of ethical issues, such as those pertaining to information security, privacy, data mining, and intellectual property. Therefore, as e-business The new paradigm of business on the internet and its ethical implications
    6 KB (856 words) - 13:00, 18 January 2009
  • both on usage of mashup solutions in open Internet environments underlining in business intranet environments stressing the need for security and
    6 KB (684 words) - 13:00, 18 January 2009
  • Internet Modeling Security and Access Control
    4 KB (529 words) - 13:00, 18 January 2009
  • * Internet Services * Security Systems & Services
    9 KB (1,183 words) - 13:41, 23 January 2009
  • economies. The term Internet of Services relates to the representation Internet. Many issues around the mapping between economic services and
    6 KB (798 words) - 13:01, 18 January 2009
  • - AI in Computer Security - Intelligent Internet Agents
    4 KB (582 words) - 14:47, 2 December 2010
  • o Internet broadcasting o Security in Power Line Communications
    14 KB (1,518 words) - 13:01, 18 January 2009
  • - Intelligent Internet Systems - Security, Privacy and Trust
    4 KB (588 words) - 13:01, 18 January 2009
  • - Security Engineering 17) Security & Privacy in Pervasive Computing environments - SPPC 09
    10 KB (1,321 words) - 13:01, 18 January 2009
  • |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)
    6 KB (793 words) - 15:12, 1 October 2020
  • ...point is far away from sufficient, which has been proved by the dilemma of Internet QoS research and applications. More important, multidisciplinary perspectiv * Privacy, security, ethics, culture, and anonymity issues
    6 KB (767 words) - 13:01, 18 January 2009
  • infrastructure that is enabled by various kinds of networks including the Internet. - Security, privacy, trust and safety of cyber physical & social computing
    3 KB (446 words) - 13:02, 18 January 2009
  • | Title = The 2009 International Workshop on Ubiquitous Computing Security Ubiquitous Computing Security (UC-Sec 09)
    6 KB (852 words) - 13:02, 18 January 2009
  • * security in distributed computing, cryptographic protocols * distributed computing issues in the Internet and the world-wide web
    7 KB (890 words) - 15:05, 27 December 2015
  • ...temas, Wireless communications, Technologies and applications, Information security ...an overhead projector, a screen and a video projector. Unlimited access to Internet for all participants.
    8 KB (977 words) - 16:33, 27 February 2009
  • ISGIG 2009 - the Internet of the Future ...rld. The large number of devices connected to the networks has changed the Internet to a "network of things and computers". These trends, plus the rise of coll
    4 KB (557 words) - 16:33, 27 February 2009
  • ...ibilities in artificial intelligence) to the observation that increases in Internet connection speeds, modular web applications, and advances in computer graph - Web Security
    4 KB (630 words) - 16:33, 27 February 2009
  • Internet based applications • Network security
    5 KB (654 words) - 17:06, 27 February 2009
  • · Reliability, fault-tolerance, and security · Internet computing and web services
    8 KB (1,050 words) - 18:04, 5 January 2017
  • * Future Internet design * Security, trust, & privacy
    4 KB (559 words) - 17:06, 27 February 2009
  • dominant consumers of residential Internet subscribers' bandwidth, and are * Security and privacy in P2P systems
    5 KB (623 words) - 17:06, 27 February 2009
  • | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability
    8 KB (967 words) - 17:07, 27 February 2009
  • ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver Security and Privacy
    7 KB (941 words) - 17:07, 27 February 2009
  • in harmony with societal values and economic viability, with enhanced security, -Web and Internet Applications
    11 KB (1,440 words) - 17:08, 27 February 2009
  • | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability
    3 KB (480 words) - 17:08, 27 February 2009
  • - Security, reliability, biometrics - Power management, reliability, security, performance
    4 KB (589 words) - 17:08, 27 February 2009
  • | Title = Internet Measurement Conference 2009 | Field = Internet
    6 KB (774 words) - 17:08, 27 February 2009
  • |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security
    5 KB (578 words) - 10:21, 20 November 2020
  • ...in track, covering different aspects of Web Information Systems, including Internet Technology, Web Interfaces and Applications, Society, e-Communities, e-Busi 1. Internet Technology
    3 KB (440 words) - 15:25, 9 December 2009
  • * Security issues in agent-based systems for search and rescue missions, use of games, == Internet ==
    6 KB (783 words) - 17:04, 27 December 2015
  • | Title = International journal of Network Security & Its Applications (IJNSA) International journal of Network Security & Its Applications (IJNSA)
    3 KB (339 words) - 11:32, 2 August 2009
  • * Internet architecture and protocols * Network Security
    7 KB (1,054 words) - 16:43, 27 December 2015
  • Information security IT and network security
    2 KB (258 words) - 11:33, 2 August 2009
  • | Acronym = IJEB - Spl Issue on Internet Technology 2009 | Title = Internet Technology: Emerging Technologies & Applications - A Special Issue of the I
    4 KB (564 words) - 12:01, 6 November 2020
  • |Title=International Workshop on P2P, Parallel, Grid and Internet Computing Fourth International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC-2010)
    7 KB (912 words) - 17:36, 5 November 2020
  • |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security
    5 KB (599 words) - 10:21, 20 November 2020
  • | Acronym = Security 2009 ...S International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)
    6 KB (746 words) - 11:35, 2 August 2009
  • | Title = First Iberic Conference on Web-Applications Security (IBWAS’09) First Iberic Conference on Web-Applications Security (IBWAS’09)
    9 KB (1,261 words) - 11:35, 2 August 2009
  • ? Security and privacy ? Wireless & Mobile network Security
    5 KB (571 words) - 11:35, 2 August 2009
  • -Journal of Internet Technology (JIT) (SCI) IASM 2009 (Information Assurance and Security Management)- http://ispan2009.comm.ccu.edu.tw/IASM2009.html
    4 KB (422 words) - 11:36, 2 August 2009
  • | Title = International Workshop on the Future Internet of Things and Services - Embedded Web Services for Pervasive Devices International Workshop on the Future Internet of Things and Services - Embedded Web Services for Pervasive Devices (http:
    9 KB (1,206 words) - 11:40, 2 August 2009
  • |Title=The Fifth International Conference on Internet Monitoring and Protectio ICIMP 2010: The Fifth International Conference on Internet Monitoring and Protection
    14 KB (1,651 words) - 15:56, 15 February 2017
  • |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security
    3 KB (352 words) - 12:39, 11 August 2009
  • ...Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce and Human Factors. 4. Software Agents and Internet Computing
    5 KB (552 words) - 17:06, 12 August 2009
  • |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability
    6 KB (766 words) - 10:54, 26 April 2010
  • |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security
    5 KB (667 words) - 14:27, 13 September 2009
  • - Internet technologies - Internet security
    4 KB (507 words) - 22:37, 18 November 2009
  • |Title=The 5th International Conference for Internet Technology and Secured Transactions, Technical Co-Sponsored by IEEE UK/RI C The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010), Technical Co-Sponsored
    5 KB (607 words) - 18:01, 3 December 2009
  • |Title=7th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS |Field=Computer security and reliability
    7 KB (982 words) - 19:13, 3 January 2010
  • ...ometrics Technologies and Applications, Pattern Recognition and Biometrics Security, Bioinformatics and IT Applications in the above themes. Information retrieval and internet applications
    3 KB (382 words) - 18:27, 20 January 2010
  • |Title=3rd International Conference on Security of Information and Networks |Field=Computer security
    10 KB (1,270 words) - 17:12, 20 April 2010
  • * › Multimedia Security * › Internet QoS for Multimedia Applications
    3 KB (310 words) - 15:37, 5 February 2010
  • The 2010 International Conference of Information Security and Internet Engineering
    4 KB (559 words) - 08:31, 9 March 2010
  • ...chnology has the capacity to destroy African commodity markets. This poses security threats if plans are not developed to retrain those that will be displaced ...ation, Environment & Sustainability, Education, Currency, Energy, Risk and Security, Welfare, Poverty, Employment, Corruption, Terrorism, Economic Growth, et
    4 KB (631 words) - 06:05, 16 March 2010
  • * Internet of Services * Cloud Security
    4 KB (405 words) - 20:45, 3 November 2010
  • - Security for enabling eCommerce - Trust & Security Issues in e-Commerce
    4 KB (601 words) - 00:22, 28 March 2010
  • |Title=8th Australian Information Security Management Conference |Superevent=2010 secau Security Congress
    2 KB (217 words) - 16:50, 19 November 2020
  • |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy
    4 KB (490 words) - 14:42, 6 November 2020
  • |Title=3rd International Workshop on Internet and Distributed Computing Systems 2010 (IDCS'10) |Field=Internet, Distributed Computing
    5 KB (667 words) - 12:08, 19 May 2010
  • ...a larger and larger group of end-user applications (e.g., climate change, security, land use, weather). › Fusion and enriching of EO images with, the image product metadata, Internet tagged resources, photography, text, maps, etc…
    4 KB (582 words) - 16:22, 20 May 2010
  • ...n tracks, covering different aspects of Web Information Systems, including Internet Technology, Web Interfaces and Applications, Society, e-Communities, e-Busi 1. INTERNET TECHNOLOGY
    5 KB (627 words) - 12:33, 16 June 2010
  • ...fax services] demonstrate that everyday more and more people are utilizing internet faxing services because the offer very effective, efficiency user friendlin The benefits of [http://www.faxfromcomputer.org/ internet fax] over traditional fax machine is a lot and it provides with flexible us
    4 KB (626 words) - 14:16, 29 July 2010
  • ...orks and protocols, wireless communications, collaborative objects and the Internet of Things, machine learning, mobile and social sensing, and embedded system *Security and privacy
    3 KB (412 words) - 09:52, 27 February 2020
  • ...Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce and Human Factors. 4. SOFTWARE AGENTS AND INTERNET COMPUTING
    19 KB (2,462 words) - 19:10, 26 August 2010
  • ...happen to be new to these service providers and might be worried about the security of using these online services then, the following benefits are sure to get ...es also boast of good contact management systems they are also akin to our internet email accounts and also having good facilities to keep track of your faxes
    3 KB (610 words) - 16:33, 27 August 2010
  • The 2011 International Conference of Information Security and Internet Engineering
    3 KB (458 words) - 08:06, 31 August 2010
  • * Cyber-physical systems and Internet of Things (IoT) * Privacy, security, trust, and safety management
    3 KB (395 words) - 15:14, 24 September 2020
  • * Internet and Web applications, social networks and recommendation systems * Security in distributed computing, cryptographic protocols
    3 KB (344 words) - 11:30, 21 April 2020
  • - Internet technologies - Internet security
    6 KB (732 words) - 05:52, 5 December 2010
  • |Title=Fourth International Conference on Internet Technologies and Applications (ITA 11) |Field=Internet
    4 KB (579 words) - 15:24, 13 October 2010
  • |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)
    5 KB (609 words) - 17:01, 5 July 2020
  • security * Internet-based platforms based on AR/MR for mechatronics
    12 KB (1,378 words) - 21:13, 28 November 2010
  • Security in network, systems, and applications<br> Internet and web technologies<br>
    4 KB (554 words) - 12:34, 14 October 2020
  • Security in network, systems, and applications<br> Internet and web technologies<br>
    4 KB (556 words) - 12:33, 14 October 2020
  • Security in network, systems, and applications<br> Internet and web technologies<br>
    4 KB (552 words) - 08:13, 10 December 2010
  • Security in network, systems, and applications<br> Internet and web technologies<br>
    4 KB (554 words) - 10:24, 6 July 2020
  • Security in network, systems, and applications<br> Internet and web technologies<br>
    4 KB (554 words) - 12:33, 14 October 2020
  • |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability
    2 KB (217 words) - 16:57, 27 December 2015
  • |Field=Computer security and reliability field of Systems Security, which has been created to build on the
    5 KB (701 words) - 05:52, 14 April 2011
  • |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability
    5 KB (597 words) - 10:45, 21 August 2020
  • * Internet, Web and Security Visualization
    4 KB (461 words) - 11:48, 1 July 2011
  • Service and Systems Design and QoS Network Security Internet of Services
    5 KB (677 words) - 11:59, 1 July 2011
  • |Field=Internet, World wide web ...Applications, Society, e-Communities, e-Business, Web Intelligence and Web Security.
    5 KB (612 words) - 12:07, 1 July 2011
  • *Internet Tools *Network Security
    13 KB (1,774 words) - 18:35, 31 August 2011
  • - Security related issues of satellite communications - Voice, broadband Internet, DVB, positioning
    9 KB (1,218 words) - 16:06, 1 October 2020
  • The 2012 International Conference of Information Security and Internet Engineering
    7 KB (909 words) - 16:30, 10 September 2020
  • - Security and Data Protection - Increasing Affordability and Access to the Internet
    6 KB (784 words) - 03:09, 22 November 2011
  • ...created for user needs. This process has now reached the private life. The Internet, Web and wireless communication has fundamentally changed our daily communi *Privacy and Security
    5 KB (669 words) - 14:40, 20 December 2011
  • Information Security Internet Computing
    8 KB (1,085 words) - 16:28, 6 February 2012
  • Communications modeling; Communications security; Computer New Internet technologies
    6 KB (725 words) - 19:58, 22 November 2020
  • - Internet technologies - Internet security
    5 KB (595 words) - 05:03, 15 January 2012
  • Relationship among energy consumption, speed, security , safety, availability, fault tolerance and reliability Computer occupational diseases and INTERNET harmful information filtering
    10 KB (1,297 words) - 17:49, 24 February 2012
  • ...Telecommunications in Smart Cities; IoT virtual networks; Device-to-device Internet; Mobile clouds; Smart and sustainable cities; Public data centers; Traffic ...t; Communications networks security; Information security; IPR and network security;
    13 KB (1,580 words) - 19:35, 18 February 2021
  • |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security
    4 KB (581 words) - 18:48, 24 February 2020
  • ...ng|Computer networking]]: <span style="font-size:90%">[[:category:Internet|Internet]], [[:category:World wide web|World wide web]] <!--[[:category:Information theory|Information theory]], [[:category:Internet|Internet]], [[:category:World wide web|World wide web]], [[:category:Wireless comput
    7 KB (815 words) - 18:03, 14 April 2021
  • *Industry 4.0, Factory of the Future and Internet of Things *Cyber Security and Privacy
    5 KB (663 words) - 11:49, 18 February 2020
  • ...es (e.g., consumer devices, wearable computing, neuroinformatics, sensors, Internet-of-Things, vehicles). * Information Security (e.g., privacy, surveillance, censorship, encryption, security).
    8 KB (1,024 words) - 09:57, 13 May 2020
  • ...y being part of the Federated conferences Event "On the Move to Meaningful Internet Systems 2019 (OnTheMove'19)" that co-locates three conferences: ODBASE'19, • Semantic Web and the Internet of Things (IoT)
    6 KB (872 words) - 23:11, 24 February 2020
  • |Title=8th Asian Internet Engineering Conference 8th Asian Internet Engineering Conference
    5 KB (630 words) - 05:00, 19 April 2012
  • *Security and privacy, cryptographic protocols *Internet of things and cyber-physical systems
    2 KB (299 words) - 11:51, 8 April 2020
  • ...etworks , Network Modeling and Simulation, Computer Network : Performance, Security and Applications, Neural Networks and Applications, Remote Sensing, Self Or ...lication, Multimedia and Its applications, Information processing and data security Software Engineering, Software Testing, Testing tools, Mutation Testing and
    3 KB (434 words) - 22:46, 30 May 2012
  • * Data streams and the Internet of Things * Trust, privacy, and security on the Semantic Web
    5 KB (663 words) - 14:34, 5 December 2018
  • * Data streams and the Internet of Things * Trust, privacy, and security on the Semantic Web
    5 KB (699 words) - 14:57, 5 December 2018
  • Security & Privacy Internet, Web and Security Visualization
    4 KB (466 words) - 16:27, 19 June 2012
  • Internet of Things Security: Vulnerability and Privacy
    5 KB (600 words) - 14:41, 20 June 2012
  • Service and Systems Design and QoS Network Security Internet of Services
    5 KB (662 words) - 18:50, 20 June 2012
  • ...forget that optical fiber is crucial to telecommunications in general and internet in particular. System Reliability and Security
    8 KB (1,102 words) - 17:23, 18 July 2012
  • *Security and Information Assurance *Web and internet computing
    2 KB (274 words) - 18:15, 13 August 2012
  • - Security and Access Control<br /> - Information Content Security<br />
    3 KB (466 words) - 13:00, 16 August 2012
  • ...Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce, Human Factors and Enterprise Architecture. 3. INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION34. SOFTWARE AGENTS AND INTERNET COMPUTING
    5 KB (552 words) - 15:08, 21 August 2012
  • ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society. Security informatics
    6 KB (728 words) - 01:01, 25 August 2012
  • The 2013 International Conference of Information Security and Internet Engineering
    7 KB (903 words) - 16:27, 10 September 2020
  • The 2013 International Conference of Information Security and Internet Engineering
    6 KB (868 words) - 17:21, 29 August 2012
  • Information Security Internet and Web Applications
    2 KB (224 words) - 08:27, 26 October 2012
  • ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Big data and the Internet of Things
    3 KB (375 words) - 15:06, 24 September 2020
  • |Title=2013 International Conference on Internet Services Technology and Information Engineering (ISTIE 2013) 2013 International Conference on Internet Services Technology and Information Engineering (ISTIE 2013)
    6 KB (764 words) - 02:27, 11 December 2012
  • ...ents, logistics and networking, to complex event processing in finance and security. The DEBS conference brings together researchers and practitioners from the - Internet of Things (event-processing in M2M)
    6 KB (826 words) - 15:44, 29 January 2021
  • - Internet technologies - Internet security
    4 KB (535 words) - 14:38, 17 January 2013
  • - Internet regulation ACSET Stream 6: Technology and Society: ICT & Security: Questions of Privacy, Governance & Trust
    5 KB (702 words) - 10:02, 5 March 2013
  • Internet of Things • Security: Vulnerability and Privacy
    5 KB (647 words) - 19:06, 5 April 2013
  • - Future Internet architectures and mobile network management - Future Internet architectures with smart objects
    9 KB (1,145 words) - 16:57, 11 April 2013
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (264 words) - 15:32, 7 January 2021
  • *Cyber Security *Internet & Web Applications
    3 KB (308 words) - 17:30, 26 May 2016
  • * Future Internet Architectures and Protocols * Integration of Web and Internet‐connected Objects
    2 KB (230 words) - 00:37, 28 May 2016
  • ...y being part of the Federated conferences Event "On the Move to Meaningful Internet Systems 2016 (OnTheMove'16)" that co-locates three conferences: ODBASE'16, * Semantic Web and the Internet of Things (IoT)
    9 KB (1,131 words) - 23:18, 24 February 2020
  • ...y being part of the Federated conferences Event "On the Move to Meaningful Internet Systems 2020 (OnTheMove'20)" that co-locates three conferences: ODBASE'20, * Semantic Web and the Internet of Things (IoT)
    6 KB (877 words) - 23:06, 24 February 2020
  • |Title=CRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems |Field=computer security
    382 bytes (45 words) - 00:54, 14 July 2016
  • |Field=embedded systems, internet of things, connectivity, safety and security
    401 bytes (49 words) - 16:22, 8 July 2016
  • * Intelligent Systems: Internet, Software, Energy, Hybrid * Database Privacy and Security
    4 KB (464 words) - 11:38, 4 September 2020
  • - Security and Data Protection - Increasing Affordability and Access to the Internet
    6 KB (790 words) - 13:45, 24 July 2016
  • - Security and Data Protection - Increasing Affordability and Access to the Internet
    6 KB (777 words) - 23:29, 29 July 2016
  • |Title=4th International Doctoral Symposium on Applied Computation and Security Systems * Security for internet of things
    870 bytes (100 words) - 18:53, 2 March 2021
  • |Title=RFIDSec 2016 : 12th Workshop on RFID and IoT Security |Field=RFID, internet-of-things, IOT, security
    372 bytes (47 words) - 15:35, 27 August 2016
  • * Security and Privacy Issues * EIS and Internet of Things
    925 bytes (116 words) - 11:05, 24 August 2016
  • - Internet technologies - Internet security
    5 KB (641 words) - 22:32, 29 July 2016
  • |Field=semantic web, internet of things, big data, information security
    431 bytes (45 words) - 21:01, 26 November 2016
  • * Intelligent Systems: Internet, Software, Energy, Hybrid * Database Privacy and Security
    3 KB (340 words) - 11:27, 4 September 2020
  • * Software & System Security ** Software and system security and privacy
    18 KB (2,288 words) - 12:48, 27 October 2016
  • * security and privacy * Internet of Things
    9 KB (1,190 words) - 10:12, 5 June 2019
  • * Intelligent Systems: Internet, Software, Energy, Hybrid * Database Privacy and Security
    3 KB (361 words) - 10:38, 4 September 2020
  • Future Internet and networking architectures Communication Security, Trust, Protocols and Applications
    5 KB (588 words) - 18:00, 21 January 2017

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)