Search results

Jump to: navigation, search
  • * Security and privacy issues for ubiquitous systems ** [[has general chair::Yu-Chee Tseng]], National Chiao Tung University, Taiwan
    13 KB (1,468 words) - 01:23, 22 August 2008
  • ** Privacy, safety and security ** Privacy, safety, and security
    6 KB (777 words) - 22:54, 14 August 2008
  • * Trust, security and privacy issues in pervasive systems ** [[has workshop chair::Hao Chu]], National Taiwan Univ.
    12 KB (1,560 words) - 15:03, 27 August 2008
  • ...uctive databases and knowledge bases; Distributed databases; Integrity and security; Logic and databases; Multimedia databases; Query optimization; Query proce ** [[has PC member::Sebastian Maneth]] (National ICT Australia)
    5 KB (753 words) - 18:59, 25 June 2012
  • * Security issues of data management in wireless networks ** [[has PC member::Alfredo Cuzzocrea]], University of Calabria / National Research Council, Italy
    5 KB (611 words) - 15:43, 16 September 2008
  • * Security issues in information systems ** [[has PC member::Stephane Bressan]], National University of Singapore
    7 KB (763 words) - 12:25, 6 October 2011
  • ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.) ** [[has program chair::Alfredo Cuzzocrea]], Italian National Research Council / University of Calabria, Italy
    11 KB (1,446 words) - 18:26, 13 October 2008
  • Software Security National University of Kaohsiung
    2 KB (293 words) - 10:35, 24 June 2011
  • * Security, Privacy and Trust * Security, Privacy and Trust
    34 KB (4,565 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust ** [[has OC member::Chung-Ming Huang]], National Cheng Kung University, Taiwan
    8 KB (1,037 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust ** [[has general chair::Richard P. Brent]], Australian National University, Australia
    9 KB (1,189 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust ** [[has OC member::Chung-Ming Huang]], National Cheng Kung University, Taiwan
    26 KB (3,456 words) - 22:20, 10 January 2018
  • * Security and Privacy ** [[has OC member::Wen-Tsuen Chen]], National Tsing Hua University (NTHU), Taiwan
    10 KB (1,263 words) - 22:20, 10 January 2018
  • * Security and Privacy ** [[has OC member::Wen-Tsuen Chen]], National Tsing Hua University (NTHU), Taiwan
    12 KB (1,537 words) - 22:19, 10 January 2018
  • * Security and Privacy ** [[has PC member::Chua Tat-Seng]], National University of Singapore
    8 KB (1,040 words) - 22:20, 10 January 2018
  • Security and Reliability Pete Beckman, Argonne National Lab, USA
    4 KB (452 words) - 17:47, 7 April 2021
  • * Trust, reputation, security, and privacy in MBC Chi-hung Chi, National Tsing Hua University, Taiwan, China
    5 KB (647 words) - 22:05, 14 October 2008
  • * Trust, security and privacy Tsung-Chuan Huang, National Sun Yat-sen University, Taiwan
    19 KB (2,503 words) - 13:25, 28 October 2020
  • * Security, Privacy, Safety and Legal Issues Ichiro Satoh, National Institute of Informatics, Japan
    7 KB (942 words) - 20:05, 14 October 2008
  • - Security and privacy in SPSs ...ote talk by Dr Tim Cornwell (from Australia's CSIRO -- Australia Telescope National Facility) on the Australian Square Kilometre Array Pathfinder (ASKAP)/Squar
    3 KB (490 words) - 20:05, 14 October 2008
  • |Field=Computer security and reliability ...(railways, airlines, road), life related (health, emergency response, and security), manufacturing (chips, computers, cars) or financial (credit cards, on-lin
    15 KB (2,175 words) - 21:03, 19 March 2013
  • - National and International Economies - Data Security Issues
    6 KB (780 words) - 20:06, 14 October 2008
  • ...ce aims to gather together technology experts, practitioners, industry and national authorities contributing towards the development and application of human-c * Security and privacy in pervasive healthcare
    6 KB (732 words) - 22:45, 14 October 2008
  • NATIONAL RESEARCH COUNCIL CANADA - Security and Privacy: cryptography; access control; security in
    9 KB (1,193 words) - 22:53, 14 October 2008
  • John Lloyd (Australian National University) * security, privacy and trust issues in multi-agent systems
    5 KB (670 words) - 23:04, 14 October 2008
  • - Security and Reputation - Privacy, safety and security
    18 KB (2,457 words) - 23:04, 14 October 2008
  • * models of concurrency, security, and mobility ** [[has PC member::Abhik Roychoudhury]] National University of Singapore, Singapore
    8 KB (1,085 words) - 18:01, 12 February 2009
  • * Network and IT security issues in developing countries Abdelfettah Belghith, National School of Computer Sciences (ENSI), Tunisia;
    9 KB (1,127 words) - 17:19, 26 April 2011
  • - Other aspects of modern information systems such as security, privacy, Kyuseok Shim Seoul National University
    7 KB (851 words) - 05:29, 15 October 2008
  • * Data privacy and security * Security and privacy in data mining
    5 KB (661 words) - 16:23, 11 December 2008
  • Security, Personalization National University of Singapore
    3 KB (437 words) - 23:20, 14 October 2008
  • integration of semi-structured and unstructured data, security/privacy * Security and privacy in data warehouses
    10 KB (1,288 words) - 11:52, 18 October 2008
  • ...stributed Applications), and IS'08 (International Symposium on Information Security). * [[has PC member::Manolis Koubarakis]], National and Kapodistrian University of Athens, Greece
    8 KB (1,081 words) - 08:21, 22 December 2011
  • * Security techniques * [[has PC member::Chee-Yong Chan]], National University of Singapore, Singapore
    29 KB (4,077 words) - 18:04, 18 August 2023
  • - Security and Access Control - Information Content Security
    4 KB (595 words) - 23:09, 14 October 2008
  • * mobile database security Mong Li Lee, National University of Singapore, Singapore
    7 KB (875 words) - 23:09, 14 October 2008
  • * Data privacy and security * Chee-Yong Chan, National University of Singapore, Singapore
    6 KB (840 words) - 23:10, 14 October 2008
  • - security and privacy Division of Computer Engineering, Seoul National University, Korea
    4 KB (539 words) - 23:10, 14 October 2008
  • Organized by National Laboratory for Parallel and Distributed Processing, China. - Database security
    10 KB (1,376 words) - 23:10, 14 October 2008
  • | Title = 25th British National Conference on Databases The British National Conference on Databases (BNCOD) was established in 1980 as a forum for rese
    4 KB (593 words) - 23:10, 14 October 2008
  • · Security control in grid workflow systems Ian Foster, Argonne National Laboratory and University of Chicago, USA.
    7 KB (886 words) - 23:10, 14 October 2008
  • Integration of Security and Privacy Privacy Implications for National Security
    2 KB (193 words) - 23:10, 14 October 2008
  • and military operations. Such networking is essential for safety, security and economic vitality in •Trust, security, dependability, privacy, QoS and
    5 KB (549 words) - 17:15, 5 July 2020
  • Security issues National Ilan University National Taipei University Platforms
    3 KB (364 words) - 23:11, 14 October 2008
  • * Network Security & Reliability National University of Science & Technology, Pakistan
    4 KB (559 words) - 23:11, 14 October 2008
  • + Security for CE Communications Security with Online Social Networking
    5 KB (584 words) - 09:43, 4 September 2023
  • - Security and privacy of mobile/wireless systems Hsiao-Hwa Chen, National Sun Yat-Sen University, Taiwan
    4 KB (596 words) - 23:12, 14 October 2008
  • Security Informatics Ting-Peng Liang, National Sun Yat-sen University
    3 KB (430 words) - 23:13, 14 October 2008
  • National Center of Sciences, Tokyo, JAPAN networks, including user behavior models, security and trust, P2P,
    7 KB (813 words) - 23:14, 14 October 2008
  • * Security and Robustness in P2P Information Search Yuh-Jzer Joung (National Taiwan University, Taiwan)
    5 KB (554 words) - 23:15, 14 October 2008
  • ...ng difficult social and policy issues such as those related to privacy and security ...l-mobile technologies, information networking, human-computer interaction, security and privacy.
    8 KB (1,003 words) - 23:15, 14 October 2008
  • * A Best Poster presentation with awards sponsored by National ICT Australia (NICTA). 5. Multimedia security (data hiding, authentication, and access control)
    4 KB (443 words) - 17:06, 24 February 2016
  • ...ense. Debates over the need for privacy protection vs. service to national security and business interests were held in newspapers, magazines, research article It is clear that privacy is a domain dependent concept: homeland security, healthcare, business secrecy, entertainment, web 2.0, and ubiquitous compu
    5 KB (721 words) - 23:19, 14 October 2008
  • | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability
    6 KB (697 words) - 23:19, 14 October 2008
  • | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability
    6 KB (736 words) - 23:20, 14 October 2008
  • | Title = Information Security South Africa (ISSA) Conference 2008 | Field = Computer security and reliability
    4 KB (465 words) - 23:20, 14 October 2008
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security | Field = Computer security and reliability
    4 KB (565 words) - 23:20, 14 October 2008
  • -Security issues on UMC Chin-Chen Chang, National Chung Cheng University, Taiwan
    4 KB (573 words) - 23:20, 14 October 2008
  • Service Security, Privacy and Trust Security, Privacy and Trust in Business Process Management
    18 KB (2,352 words) - 23:23, 14 October 2008
  • ..., computer vision, image analysis, signal processing, statistics, computer security, etc. The purpose of this conference is to provide a scientific forum for r Biometric Security and Privacy
    3 KB (325 words) - 23:50, 14 October 2008
  • ...eralization of successful practices on mobile learning is favoured by many national and international projects and policy synchronization boards. ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design
    6 KB (765 words) - 23:26, 14 October 2008
  • ...ICR is to solicit governmental support to recognize robotics as a field of national priority. The scientific program will include plenary talks that will revie * Robots in security applications
    3 KB (423 words) - 23:29, 14 October 2008
  • of real-time embedded systems, such as timeliness, safety, security, (e.g., robustness, privacy, safety, security) for real-time embedded
    6 KB (707 words) - 23:29, 14 October 2008
  • o Language features to enhance reliability and security handling, for reliability and security
    5 KB (673 words) - 23:30, 14 October 2008
  • reliability, security and survivability in RT systems; scheduling Samarjit Chakraborty, National University of Singapore, Singapore
    7 KB (870 words) - 23:30, 14 October 2008
  • ...cooperation and goal seeking through sharing policy and ontology, safety & security in systems, other QoS issues, and so on. ...es relating to architecture, implementation, coordination, service levels, security, etc. of semantic or otherwise agents.
    10 KB (1,391 words) - 23:31, 14 October 2008
  • Security in distributed systems Autonomic access control and security issues
    5 KB (702 words) - 23:31, 14 October 2008
  • ...semantics, program verification, static analysis, testing, language-based security. * Joxan Jaffar, National University of Singapore (Singapore)
    6 KB (824 words) - 23:32, 14 October 2008
  • ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc.
    5 KB (580 words) - 10:32, 12 May 2020
  • ** security in distributed systems ** [[has PC member::Eric Paquet]], National Research Council, Canada
    9 KB (1,134 words) - 01:18, 1 February 2009
  • SECURITY �?� Base station security management
    11 KB (1,533 words) - 23:38, 14 October 2008
  • tic web, service-oriented computing, security, and electronic * security and trust in multiagent systems
    8 KB (840 words) - 23:38, 14 October 2008
  • # Security challenges and solutions for interoperability/interoperation of # John-Paul Navarro (Argonne National Laboratory, USA)
    7 KB (959 words) - 23:40, 14 October 2008
  • * Security in Biomedical Data Grids * Robert L. Martino National Institutes of Health, USA (Robert.Martino@nih.gov)
    7 KB (876 words) - 23:40, 14 October 2008
  • | Field = Computer security and reliability * Integrated system reliability, availability, security, safety, and timing analysis and evaluation methods
    6 KB (748 words) - 14:43, 27 December 2015
  • - Privacy, security and trust - Irina Kondratova, National Research Council, Canada
    6 KB (763 words) - 23:42, 14 October 2008
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ...ion; All-IP versus protocol translation; IP simplified network management; Security, trust, and privacy; Network stability under topology change; Delay-toleran * [[has PC member::Ruay-Shiung Chang]], National Dong Hwa University, Taiwan
    7 KB (883 words) - 17:35, 7 January 2021
  • ...f Academic Excellence in Information Assurance Education from the National Security Agency.
    2 KB (331 words) - 05:33, 5 January 2009
  • * Security and privacy for RTSOAA based CPS ** [[has general chair::Jane Hsu National]] Taiwan University, Taiwan
    7 KB (922 words) - 00:58, 9 January 2009
  • ...bilistic analysis for RT systems; quality of service support; reliability, security and survivability in RT systems; scheduling and schedulability analysis; wo * [[has PC member::Samarjit Chakraborty]], National University of Singapore, Singapore
    5 KB (720 words) - 14:46, 17 January 2009
  • ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Computer and Network Security Systems
    5 KB (526 words) - 01:02, 2 February 2009
  • * Adaptive security for self protection of networks National Research Council (CNR)
    5 KB (650 words) - 13:43, 23 January 2009
  • | Title = 3rd International Conference on Network and System Security 3rd International Conference on Network and System Security (NSS 2009)
    12 KB (1,669 words) - 12:58, 18 January 2009
  • o Security o Network protocols and security
    5 KB (567 words) - 12:58, 18 January 2009
  • Trust, Privacy & Security in Digital Business (TrustBus'09) Security patterns have arrived to a stage where there are a significant
    6 KB (740 words) - 12:58, 18 January 2009
  • - Security Nian-Shing Chen, National Sun Yat-sen University, Taiwan
    5 KB (633 words) - 12:58, 18 January 2009
  • | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)
    16 KB (2,178 words) - 12:59, 18 January 2009
  • - Safety and security for mobile MAS deployment John Lloyd (Australian National University, Australia)
    8 KB (977 words) - 12:59, 18 January 2009
  • - Trust ? security ? privacy Nian-Shing Chen, National Sun Yat-sen University, Taiwan
    6 KB (860 words) - 13:00, 18 January 2009
  • - time-dependent security policies - temporal issues in security
    6 KB (872 words) - 13:00, 18 January 2009
  • | Title = The 1st International Workshop on Security, Reliability and Quality in Cloud Computing computing brings on security, reliability and quality? In other words, what new issues raised
    5 KB (624 words) - 13:00, 18 January 2009
  • Many aspects contribute to the functioning of e-transactions systems such as security aspects (authentication, confidentiality, ..), architecture (such as Cap, 3 Trust, privacy and security issues in e-commerce
    6 KB (772 words) - 13:00, 18 January 2009
  • tourist city has the China's first national forest park, and the World * Security, trust, and privacy
    10 KB (1,206 words) - 13:01, 18 January 2009
  • - Security in Wireless Networks Nian-Shing Chen, National Sun Yat-sen University, Taiwan
    4 KB (564 words) - 13:01, 18 January 2009
  • - Security, Privacy and Trust Nian-Shing Chen, National Sun Yat-sen University, Taiwan
    4 KB (588 words) - 13:01, 18 January 2009
  • |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)
    6 KB (793 words) - 15:12, 1 October 2020
  • * Privacy, security, ethics, culture, and anonymity issues Akira Namatame, National Defense Academy, Japan
    6 KB (767 words) - 13:01, 18 January 2009
  • | Title = 26th British National Conference on Databases 26th British National Conference on Databases
    4 KB (568 words) - 13:01, 18 January 2009
  • * Security and privacy Division of Computer Engineering, Seoul National University, Korea
    4 KB (532 words) - 15:04, 27 December 2015
  • | Title = The 2009 International Workshop on Ubiquitous Computing Security Ubiquitous Computing Security (UC-Sec 09)
    6 KB (852 words) - 13:02, 18 January 2009
  • ...place in conjunction with the 3rd International Conference on Information Security and Assurance, Seoul, Korea http://www.sersc.org/ISA2009. ? MAC and link layer security protocol
    3 KB (450 words) - 13:02, 18 January 2009
  • - Security and privacy issues ** Prof. [[has PC member::Ruzena Bajcsy]], Member, National Academy of Engineering; IEEE Fellow; ACM Fellow; Director, CITRIS; Universi
    7 KB (976 words) - 23:35, 28 January 2009
  • o National and regional frameworks for IT governance o Compliance with government regulations for multi-national corporations and networks;
    4 KB (557 words) - 16:33, 27 February 2009
  • * Security aspects of using virtualization in a distributed environment o Kate Keahey, University of Chicago, Argonne National Laboratory
    5 KB (576 words) - 16:34, 27 February 2009
  • Dang Van Hung (Vietnam National University, Process Architectures), FAST (Formal Aspects in Security and Trust),
    8 KB (1,079 words) - 17:05, 27 February 2009
  • 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.
    7 KB (897 words) - 17:05, 27 February 2009
  • well-established event, with a very good national and international qualified as one of the high quality national events by Brazilian
    7 KB (1,094 words) - 11:42, 29 September 2016
  • * Security and trustworthy in multi-tenancy service hosting environment Ian Gorton, Computational and Information Sciences at Pacific Northwest National Laboratory, US
    6 KB (855 words) - 17:06, 27 February 2009
  • National communication infrastructures • Network security
    5 KB (654 words) - 17:06, 27 February 2009
  • · Reliability, fault-tolerance, and security Alistair Rendell, Australian National University, Australia
    8 KB (1,050 words) - 18:04, 5 January 2017
  • + Middleware solutions for Security, Privacy and Trust Filip Blagojevic, Lawrence Berkeley National Lab, USA
    6 KB (800 words) - 22:11, 27 February 2009
  • • Safety, Security and Risk Management National University of Singapore, Singapore
    3 KB (399 words) - 17:06, 27 February 2009
  • | Title = 6th Swedish National Computer Networking Workshop (SNCNW 2009) 6th Swedish National Computer Networking Workshop (SNCNW 2009)
    3 KB (456 words) - 17:06, 27 February 2009
  • | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability
    8 KB (967 words) - 17:07, 27 February 2009
  • ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver Security and Privacy
    7 KB (941 words) - 17:07, 27 February 2009
  • ...s, simulation models, human-computer interaction, artificial intelligence, security, scalability, fault tolerance, smart devices, and pervasive services" national space centre (www.findmeaconference.com/nationalspacecentre)
    38 KB (4,832 words) - 17:07, 27 February 2009
  • in harmony with societal values and economic viability, with enhanced security, -Network Security and Privacy
    11 KB (1,440 words) - 17:08, 27 February 2009
  • | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability
    12 KB (1,690 words) - 17:08, 27 February 2009
  • * Information assurance and security ** [[has PC member::Kian-Lee Tan]] (National University of Singapore)
    8 KB (1,144 words) - 20:59, 27 February 2009
  • -Trust and security issues in P2P systems -Security and cheat-prevention mechanisms for P2P games
    5 KB (738 words) - 16:48, 10 August 2009
  • ...cusing on the total systems effectiveness of complex integrated systems of national and global significance. ...ddresses system-of-systems, systems engineering and systems of significant national and global impact, it will provide an informative, highly interactive and e
    6 KB (706 words) - 11:33, 2 August 2009
  • * Trust Integration and Security in Grid and P2P Systems * Bharadwaj Veeravalli, The National University of Singapore
    7 KB (912 words) - 17:36, 5 November 2020
  • Trust, security, and privacy aspects of service ecosystem Renato Iannella, National ICT Australia, Brisbane, Australia
    4 KB (586 words) - 11:35, 2 August 2009
  • Wen-Tsuen Chen, Fellow of IEEE and CSMT, National Tsing Hua University, Taiwan IASM 2009 (Information Assurance and Security Management)- http://ispan2009.comm.ccu.edu.tw/IASM2009.html
    4 KB (422 words) - 11:36, 2 August 2009
  • National and Regional Systems of Innovation Risk and Security Management
    4 KB (462 words) - 11:36, 2 August 2009
  • ...onse time, resource consumption, throughput, availability, reliability and security. ...Marie Curie, Paris. Since then, he has been managing research projects at national and European levels (FP5, FP6 IST programmes, ITEA Eureka cluster and Frenc
    9 KB (1,206 words) - 11:40, 2 August 2009
  • - contribution of HLTs to the Homeland Security problems (technology applications and legal aspects), Pavel S. Pankov (National Academy of Sciences, Kyrgyzstan)
    14 KB (1,872 words) - 19:26, 2 August 2009
  • ...benchmarking, review, inspection and walkthrough, reliability, safety and security ** Ji Wang, National Laboratory for Parallel and Distributed Processing, China
    4 KB (583 words) - 12:17, 25 November 2009
  • |Title=6th Annual Conference on Peace and Security |Field=Security
    3 KB (359 words) - 00:15, 17 November 2009
  • - Internet security - Data Security Issues
    4 KB (507 words) - 22:37, 18 November 2009
  • Berndt Brehmer (SWE), Swedish National Defence College; Mink Spaans (NED), TNO Defence, Security and Safety;
    2 KB (233 words) - 23:39, 18 November 2009
  • |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust
    4 KB (484 words) - 14:20, 14 December 2009
  • |Title=3rd International Workshop on Wireless Multimedia Computing and Security Services ...ward for a deeper understanding in wireless multimedia computing (WMC) and security services.
    3 KB (497 words) - 03:43, 28 February 2010
  • |Title=3rd International Conference on Security of Information and Networks |Field=Computer security
    10 KB (1,270 words) - 17:12, 20 April 2010
  • |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    4 KB (429 words) - 08:55, 1 August 2019
  • |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    9 KB (1,092 words) - 09:35, 1 August 2019
  • |Title=Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments |Field=Computer security and reliability
    3 KB (498 words) - 02:52, 22 December 2012
  • |Field=Computer security and reliability |Superevent=2010 secau Security Congress
    2 KB (200 words) - 16:55, 27 December 2015
  • |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy
    4 KB (490 words) - 14:42, 6 November 2020
  • ...a larger and larger group of end-user applications (e.g., climate change, security, land use, weather).
    4 KB (582 words) - 16:22, 20 May 2010
  • - Trust and security issues in P2P systems - Security and cheat-prevention mechanisms for P2P games
    6 KB (858 words) - 09:18, 19 August 2010
  • ...from the diverse angles of systems/network performance, availability, and security. For example, real-time streaming analytics algorithms and methods need to Alex Sim, Lawrence Berkeley National Laboratory, USA
    4 KB (584 words) - 17:42, 13 March 2020
  • * Storage security ** [[has general chair::Sam H. Noh]], UNIST, Ulsan National Institute of Science and Technology
    5 KB (599 words) - 13:41, 26 February 2020
  • **Storage security **Sam H. Noh, UNIST (Ulsan National Institute of Science and Technology)
    5 KB (597 words) - 13:44, 26 February 2020
  • **Storage security **Sam H. Noh, UNIST (Ulsan National Institute of Science and Technology)
    4 KB (553 words) - 13:45, 26 February 2020
  • * › Database Security and Transaction Support * › Security, Freedom and Privacy
    19 KB (2,462 words) - 19:10, 26 August 2010
  • - Internet security - Data Security Issues
    6 KB (732 words) - 05:52, 5 December 2010
  • - Security and Trusted Computing ** Yookun Cho, Seoul National University, Korea
    4 KB (505 words) - 08:07, 14 April 2011
  • ...been successfully carried out since 2006 by Student Science Association of National Technical University of Ukraine “Kyiv Polytechnic Institute”. ...Computer Science (Cloud Computing, Informational Retrieval, Informational Security, Mobile Platforms and others);
    2 KB (306 words) - 14:54, 12 November 2020
  • ...re aspects related to node behaviour, node nature, node interactions, node security, node privacy, network lifecycle, network performance, network security, network privacy, etc.
    7 KB (1,019 words) - 18:29, 8 April 2011
  • *Network Security *Security and Reliability
    13 KB (1,774 words) - 18:35, 31 August 2011
  • ...ow is the state of conflicts and encounters among religious beliefs at the national level and the different civilizations of the world? ...tion but potentially one tied to questions of greater human well-being and security. How do we begin to reevaluate the beautiful in terms of psychic well-being
    10 KB (1,552 words) - 17:04, 24 February 2016
  • - Quality processes at National and International level - Security and Data Protection
    6 KB (784 words) - 03:09, 22 November 2011
  • - Internet security - Data Security Issues
    5 KB (595 words) - 05:03, 15 January 2012
  • ...ssing and Vision, Director of Studies for the MSc programme in Information Security and Biometrics, Department of Electronics, University of Kent, UK Mokpo National University, South Korea
    11 KB (1,490 words) - 11:59, 27 January 2012
  • |Field=Computer security and reliability Resilience in systems is crucial to protect national critical infrastructures from failing catastrophically in the event of sust
    2 KB (304 words) - 10:54, 5 March 2012
  • Relationship among energy consumption, speed, security , safety, availability, fault tolerance and reliability Prof. Po-Tsun Liu, National Chiao Tung University
    10 KB (1,297 words) - 17:49, 24 February 2012
  • ...t; Communications networks security; Information security; IPR and network security; ...mmunications, applications, and performance; Applications in telemedicine; Security and trust in future services applications;
    13 KB (1,580 words) - 19:35, 18 February 2021
  • *Security, privacy, and trust *Xiaokui Xiao National University of Singapore, Singapore<br>
    4 KB (535 words) - 21:32, 11 February 2020
  • Computer & Network Security Systems Professor, Abdelmalek Essaädi University, National school of applied sciences of Tangier, Morocco
    10 KB (1,363 words) - 09:26, 7 May 2012
  • |Field=terrorism, national security, crime, politics, law |Superevent=secau Security Congress
    4 KB (575 words) - 05:16, 28 June 2012
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • |Title=6th International Conference on Information Security and Cryptology 6th International Conference on Information Security and Cryptology
    3 KB (351 words) - 09:52, 28 October 2012
  • ...ind, biofuels); food and water security; lobbying efforts by oil and multi-national companies to counter climate science; alternatives to (neoliberal) capitali
    3 KB (404 words) - 15:10, 10 December 2020
  • * Information/Cyber Security * Information Security
    3 KB (408 words) - 11:39, 5 January 2013
  • - Internet security - Data Security Issues
    4 KB (535 words) - 14:38, 17 January 2013
  • ...rsity of London (UK), The National Institute of Education (Singapore), The National University of Tainan (Taiwan), Lincoln University (UK), the Hong Kong Insti ACSET Stream 6: Technology and Society: ICT & Security: Questions of Privacy, Governance & Trust
    5 KB (702 words) - 10:02, 5 March 2013
  • Privacy, Security and Neuroethics National Spinal Cord Injury Hospital - SESCAM
    5 KB (571 words) - 11:33, 26 March 2013
  • ** Representing and reasoning about trust, privacy, and security * [[has general chair::Jin Song Dong]], National University of Singapore, Singapore
    5 KB (711 words) - 19:02, 7 March 2020
  • * Semantics for IT Safety & Security * Safety & Security
    10 KB (1,347 words) - 15:01, 26 September 2016
  • * Information Assurance and Security * Manolis Koubarakis, National and Kapodistrian University of Athens, Greece
    9 KB (1,131 words) - 23:18, 24 February 2020
  • - Security and Privacy Milan Petkovic, Eindhoven University of Technology (Security and Privacy)
    12 KB (1,565 words) - 04:15, 5 August 2023
  • - Quality processes at National and International level - Security and Data Protection
    6 KB (790 words) - 13:45, 24 July 2016
  • - Quality processes at National and International level - Security and Data Protection
    6 KB (777 words) - 23:29, 29 July 2016
  • |Title=SMGSSP 2017: Smart Micro-Grid Systems Security and Privacy |Field=privacy, security, smart micro-grids, cyber-physical systems
    2 KB (246 words) - 09:12, 3 September 2017
  • * security and privacy ** [[has program chair::Giovanni Pilato]], Italian National Research Council, Italy
    5 KB (580 words) - 20:22, 28 January 2017
  • - Internet security - Data Security Issues
    5 KB (641 words) - 22:32, 29 July 2016
  • * Software & System Security ** Software and system security and privacy
    18 KB (2,288 words) - 12:48, 27 October 2016
  • * security and privacy ** Vadim Ermolayev, Zaporizhzhya National Univ., Ukraine
    9 KB (1,190 words) - 10:12, 5 June 2019
  • Security and Access Control Information Content Security
    4 KB (528 words) - 18:46, 29 August 2017
  • *security and privacy ** [[has PC member::Vadim Ermolayev]], Zaporizhzhya National Univ.
    10 KB (1,309 words) - 10:29, 5 June 2019
  • *Security, privacy, and identity on the Web ** [[has tutorial chair::Gustavo Rossi]], National University of La Plata, Argentina
    5 KB (671 words) - 11:07, 12 July 2019
  • *Web Security, Integrity, Privacy, and Trust ** [[has PC member::Maxim Davidovsky]], Zaporozhye National University, Ukraine
    18 KB (2,394 words) - 16:28, 29 January 2018
  • the 22nd European Symposium on Research in Computer Security (ESORICS information-oriented security.
    7 KB (887 words) - 15:22, 15 July 2017
  • * Security and Information Assurance [http://scholar.google.com/scholar?q=Chih-Lin+Hu%2C+National+Central+University%2C+R.O.C.&btnG=&hl=en&as_sdt=0%2C5]
    10 KB (1,396 words) - 13:30, 28 July 2017
  • |Title=CODASPY 2018 : Conference on Data and Application Security and Privacy 8th ACM Conference on Data and Application Security and Privacy will be held on
    6 KB (807 words) - 13:40, 3 September 2017
  • - Security and privacy, cryptographic protocols Haifeng Yu, National University of Singapore, Singapore
    7 KB (1,009 words) - 15:54, 3 September 2019
  • * Mobile communication security issues and requirements * Privacy and Security in Mobile Computing and Wireless Systems
    6 KB (751 words) - 13:28, 28 July 2017
  • |Field=security National Institute of Technology Hamirpur, India
    4 KB (472 words) - 14:34, 10 December 2020
  • * Cryptography, security and privacy of mobile & wireless networks , National University of Science and Technology, Pakistan
    6 KB (820 words) - 13:30, 28 July 2017
  • Ruidong Li (National Institute of Information and Communications Technology Cryptography and network security
    4 KB (524 words) - 13:30, 28 July 2017
  • informatics to solve privacy, security, healthcare, education, poverty, and * Security and Assurance
    4 KB (570 words) - 13:30, 28 July 2017
  • |Acronym=Smart-City-IoT-Security 2017 |Title=Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
    5 KB (722 words) - 10:00, 21 August 2017
  • JournalSeek, CERN Documents Server (CDS), NEBIS, ICAAP, German National Library Industrial Electronics, Information Security, Information Theory,
    4 KB (554 words) - 13:19, 28 July 2017
  • questions of peace, security and human security abound. In this period of great intersection of security and sustainability, as well as of the continued legacy
    7 KB (1,000 words) - 12:07, 3 September 2017
  • - Trust, privacy, and security on the Semantic Web - Thepchai Supnithi, National Electronics and Computer Technology Center,
    7 KB (903 words) - 13:23, 28 July 2017
  • information systems, embedded systems, circuits, security, etc. Fuyuki Ishikawa (National Institute of Infomatics)
    4 KB (593 words) - 13:24, 28 July 2017
  • ...e=WICS 2017 : 4th International Workshop on Information and Communication Security |Field=security
    3 KB (347 words) - 19:48, 22 November 2017
  • ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security
    5 KB (611 words) - 11:47, 8 August 2017
  • *security, access control, and licensing issues of Linked Data ** [[has PC member::Armin Haller]], Australian National University, Australia
    6 KB (926 words) - 17:55, 9 January 2018
  • - Access control and security Mong Li Lee, National University of Singapore (Singapore)
    4 KB (484 words) - 10:36, 26 November 2017
  • ...obile computing, search engine, question answering, robotics, web service, security and privacy ** [[has workshop chair::Giovanni Pilato]], Italian National Research Council, Italy
    12 KB (1,578 words) - 14:54, 24 September 2020
  • '''December 6-7, 2018 - National University of Singapore (Singapore)''' ...ins: Aeronautic & Aerospace, Transport constructors & operators, Defense & security, Electronics & robotics, Energy & environment, Health care & welfare servic
    3 KB (368 words) - 16:10, 14 February 2018
  • *Security, reliability, availability, and sustainability *Verification and testing, and their impact on design and security
    4 KB (547 words) - 12:27, 30 September 2019
  • |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:
    11 KB (1,549 words) - 11:34, 17 April 2020
  • ...and web-based applications, embedded and resource-limited computation, and security. * Hsiang-Shang Ko (co-chair) (National Institute of Informatics)
    8 KB (1,080 words) - 10:43, 17 April 2020
  • ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking; ...in CLOUD/GRID; User profiles and priorities in CLOUD/GRID; Performance and security in CLOUD/GRID systems; Fault tolerance, resilience, survivability, robustne
    14 KB (1,770 words) - 14:56, 19 April 2020
  • ...full integration of UAS/RPAS with manned aviation and into the respective national airspace. * Control Architectures - Security
    3 KB (454 words) - 14:16, 27 April 2020
  • ...wards full integration of UAS with manned aviation and into the respective national airspace. * Security
    3 KB (385 words) - 15:55, 29 April 2020
  • ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more. * Sam H. Noh, UNIST (Ulsan National Institute of Science and Technology)
    8 KB (1,078 words) - 09:27, 12 May 2020
  • * Visualizing Large Scale Security Data * HCI Challenges for Big Data Security & Privacy
    9 KB (1,187 words) - 14:18, 27 May 2020
  • * - Multimedia Privacy, Security and Content Protection TAT-SENG CHUA (National University of Singapore, Singapore)
    5 KB (552 words) - 21:42, 10 June 2020
  • ...urrencies; Threat categorization and threat detection; Threats on critical national infrastructures; Gift card hacking techniques; Medical IoT Device-to-Device RTSEC: Security for Internet-based real-time systems
    17 KB (2,088 words) - 12:49, 14 June 2020
  • * security and privacy * Giovanni Pilato, Italian National Research Council, Italy
    4 KB (529 words) - 11:04, 17 June 2020
  • ...) through the competent official authority (Ministry of Foreign Affairs or National Atomic Energy Authority) to the IAEA. A participant will be accepted only i '''Nuclear safety and security'''
    3 KB (399 words) - 13:48, 24 June 2020
  • ...a systems","Networking and telecommunications","Knowledge virtualization","Security in network, systems, and applications","IPv6 Today - Technology and deploym ...ivate organizations; Cybersecurity risks; Smart home security and privacy; Security awareness; Digital forensics; Large e-Commerce; Digital crowdfunding platfo
    18 KB (2,036 words) - 02:36, 10 July 2020
  • |Field=Networking,Internet,Security,Sensor,Hardware,Technologies ...nts; Evolving software ecosystems; Component semantic similarity analysis; Security variability; Industrial lessons; Customer considerations on post-integratio
    6 KB (769 words) - 14:09, 24 August 2020
  • * Communications and Information Security ** [[has workshop chair::Joel Rodrigues]], National Institute of Telecommunications (Inatel), Brazil
    4 KB (604 words) - 09:59, 21 August 2020
  • ...d Smart Health; eHealth and education via visual analytics; Experiences in national eHealth systems; eHealth and medication-related services; TeleCare trials; ...ty of health data to benefit patient and public health safety, privacy and security; Integrating heterogeneous clinical data into central data warehouses; Pati
    16 KB (2,024 words) - 13:33, 24 August 2020
  • |Title=23rd Annual International Conference on Information Security and Cryptology Cloud Computing Security
    2 KB (169 words) - 10:42, 25 August 2020
  • |Title=22nd Annual International Conference on Information Security and Cryptology Hyun sook Cho (National Security Research Institute, Korea)
    993 bytes (115 words) - 11:12, 25 August 2020
  • ...urrencies; Threat categorization and threat detection; Threats on critical national infrastructures; Gift card hacking techniques; Medical IoT Device-to-Device RTSEC: Security for Internet-based real-time systems
    17 KB (2,035 words) - 14:45, 18 February 2021
  • * Trust, Security, Privacy, Policy management Maulana Azad National Institute of Technology, India
    4 KB (464 words) - 17:42, 18 February 2021
  • ...d management; Denial of service mitigation and prevention; System and data security; Communication visualization ...on technology; Digital rights; Patents; Toll access; Accounting; billing; National and international legal regulations
    11 KB (1,325 words) - 15:01, 18 February 2021
  • | {{OR|ACNS}} || International Conference on Applied Cryptography and Network Security || http://www.wikidata.org/entity/Q4781524 | AFIPS NCC || AFIPS National Computer Conferences || https://www.wikidata.org/entity/Q6269156
    19 KB (2,518 words) - 09:03, 21 February 2021
  • ...Edwin CHENG The Hong Kong Polytechnic University, Prof. Kun-Huang Huarng National Taipei University of Business Internet-of-Things for Security and Safety
    2 KB (243 words) - 04:39, 11 March 2021
  • National and International Economies Data Security Issues
    2 KB (244 words) - 11:06, 11 March 2021
  • ...aratnam Suganthan, Nanyang Technological University, Prof. Shyi-Ming Chen, National Taiwan University of Science and Technology Software & System Security
    1 KB (185 words) - 10:37, 19 March 2021
  • ...Masakatsu Fujiwara NTT Network Technology Laboratories, Prof. Chih-Yu Wen National Chung Hsing University, Prof. Takayuki Ito Kyoto University - Streaming, security and privacy for healthcare
    2 KB (246 words) - 10:59, 19 March 2021
  • ...n University of Economics and Business, Prof. Dimiter Velev, University of National and World Economy Security and privacy for smart IoT
    2 KB (217 words) - 11:21, 9 April 2021
  • National/Global Energy Interconnection ► Smart Grid Security and Reliability Management
    2 KB (296 words) - 10:40, 13 April 2021
  • Prof. Chen-Fu Chien from National Tsing Hua University (NTHU) in Taiwan, XU Yang from Beijing University and Safety, Security and Risk Management
    2 KB (319 words) - 05:05, 9 June 2021
  • 3. Prof. Chen-Fu Chien from National Tsing Hua University (NTHU) in Taiwan, Prof. Maged M. Dessouky from Univers Safety, Security and Risk Management
    2 KB (237 words) - 08:24, 29 September 2021
  • Information Privacy and Security, ...tute of Communications Engineering & Department of Electrical Engineering, National Tsing-Hua University, Hsinchu, Taiwan, China;
    4 KB (494 words) - 10:28, 27 September 2022
  • ...ital Electronics, Signals and Systems, Wireless Networks, Network and Data Security, Virtual Reality and Simulation, MIS Management Information System& Network ...Information analysis and infrastructure, Net information Security & System Security Technology, Information Warfare Technology, Digital Media Technology & Radi
    4 KB (470 words) - 11:06, 27 September 2022
  • Hyunbum Kim, Incheon National University, South Korea ● Network and System Security
    4 KB (504 words) - 08:27, 22 September 2023
  • ...es from various sources such as sensors, computing systems, networking and security devices, and other emerging computing elements speaking with different synt ...from the diverse angles of systems/network performance, availability, and security. For example, real-time streaming analytics algorithms and methods need to
    4 KB (612 words) - 16:54, 7 March 2023
  • ...the models, built from data, and the legal requirements imposed by various national and international parliaments. This has echoed in the research literature a Safety & security approaches for XAI
    8 KB (993 words) - 12:08, 23 November 2023