Search results
Create the page "Information Security" on this wiki! See also the search results found.
Page title matches
- |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security5 KB (667 words) - 14:27, 13 September 2009
- 55 bytes (5 words) - 05:20, 14 September 2009
- 0 bytes (0 words) - 15:23, 15 February 2017
- |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)4 KB (597 words) - 13:28, 28 July 2017
- ...ICINS 2017 : 2017 5th International Conference on Information and Network Security (ICINS 2017)--Ei Compendex and Scopus |Field=network security1 KB (130 words) - 13:34, 28 July 2017
- 23 bytes (2 words) - 11:55, 8 August 2017
- 25 bytes (2 words) - 12:30, 3 September 2017
- 24 bytes (2 words) - 11:59, 3 September 2017
Page text matches
- All these technological developments are expected to bring us a next wave of information * Security and privacy issues for ubiquitous systems13 KB (1,468 words) - 01:23, 22 August 2008
- ** Privacy, safety and security ** Privacy, safety, and security6 KB (777 words) - 22:54, 14 August 2008
- In order to make information of the various fields of science available {{SITENAME}} relies on a network ====Computer security and reliability====6 KB (714 words) - 12:19, 11 December 2020
- | title = Transactions on Information and System Security | Field = Computer security and reliability272 bytes (32 words) - 16:33, 18 August 2008
- *Communication and Information Theory *Network Security5 KB (571 words) - 09:22, 19 July 2019
- * Quality of information (QoI) in sensor-enabled pervasive environments * Trust, security and privacy issues in pervasive systems12 KB (1,560 words) - 15:03, 27 August 2008
- The 2011 International Conference of Information Engineering The 2011 International Conference of Information Security and Internet Engineering3 KB (454 words) - 12:34, 8 October 2020
- are challenged by applications aimed at personal information The new information paradigms and requirements will move our research9 KB (1,189 words) - 14:53, 28 August 2008
- ...uctive databases and knowledge bases; Distributed databases; Integrity and security; Logic and databases; Multimedia databases; Query optimization; Query proce5 KB (753 words) - 18:59, 25 June 2012
- inter-operability, security, trusted and dependable systems, fault resource allocation, scheduling, fault tolerance, security.5 KB (715 words) - 17:43, 11 September 2008
- systems. See http://www.ifaamas.org for more information. INFORMATION FOR AUTHORS10 KB (1,371 words) - 16:14, 12 November 2020
- Local information can be found at http://www.cs.york.ac.uk/vstte08/ Unguessable Atoms: A Logical Foundation for Security5 KB (686 words) - 12:27, 12 September 2008
- number of wireless terminals and information generated by such could call the "Information-Explosion Era."5 KB (611 words) - 15:43, 16 September 2008
- ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d Additionally, P2P systems require special attention from the security point of view. Trust, reputation, copyrights, and intellectual property are18 KB (2,408 words) - 02:37, 16 December 2008
- |Title=8th International Conference on Information Systems Technology |Field=Information systems7 KB (763 words) - 12:25, 6 October 2011
- ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...ons; Target-oriented keyword search; Filter-based profile matching; Mutual information on data streams; Stream processing; Digitized documents streams; Queries wi11 KB (1,371 words) - 12:28, 18 May 2020
- ...ed to databases triggered substantial improvements for content processing, information indexing, and data, process and knowledge mining. The push came from Web se ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.)11 KB (1,446 words) - 18:26, 13 October 2008
- ...ucators and researchers as well as an important aspect of e-government and information society initiatives. F/OSS is a complex phenomenon that requires an interdi ...indings and practical experiences. The conference is also meant to provide information and education to practitioners, identify directions for further research an10 KB (1,349 words) - 16:42, 24 September 2008
- Software Security Internet and Information Systems Development2 KB (293 words) - 10:35, 24 June 2011
- |Title=The IEEE 23rd International Conference on Advanced Information Networking and Applications (AINA-09) ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA-09) will be held in Bradford, May 26-29,34 KB (4,565 words) - 22:20, 10 January 2018
- |Title=The IEEE 22nd International Conference on Advanced Information Networking and Applications ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA-08) will be held in Ginowan City , Okinaw8 KB (1,037 words) - 22:20, 10 January 2018
- |Title=The IEEE 21st International Conference on Advanced Information Networking and Applications (AINA-07) ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA-07) will be held in Niagara Falls, Canada9 KB (1,189 words) - 22:20, 10 January 2018
- |Title=The IEEE 20th International Conference on Advanced Information Networking and Applications on Advanced Information Networking and Applications (AINA2006) will26 KB (3,456 words) - 22:20, 10 January 2018
- |Title=The IEEE 19th International Conference on Advanced Information Networking and Applications ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA 2005) will be held in Tamkang University,10 KB (1,263 words) - 22:20, 10 January 2018
- |Title=The 18th International Conference on Advanced Information Networking and Applications (AINA 2004) The International Conference on Advanced Information Networking and Applications (AINA 2004) will be held in Fukuoka, Kyushu, Ja12 KB (1,537 words) - 22:19, 10 January 2018
- |Title=The International Conference on Advanced Information Networking and Applications The International Conference on Advanced Information Networking and Application will be held in Xi'an, China in March 27-29, 2008 KB (1,040 words) - 22:20, 10 January 2018
- Users will be able to retrieve, publish, and manage information, - Wireless security and dependability4 KB (495 words) - 09:22, 22 August 2023
- ...traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. - Trust-related Security and Privacy: Trust-related secure architecture, framework, policy, intrusio9 KB (1,216 words) - 17:32, 14 October 2008
- * Security assessment and enhancement * Games of imperfect or asymmetric information6 KB (722 words) - 17:32, 14 October 2008
- ...raction and representation, shape and motion primitives, texture and color information, statistical, structural and syntactic pattern recognition, neural networks ...multimedia databases, digital and video libraries, compression and coding, security over the network.2 KB (268 words) - 17:47, 14 October 2008
- Persuasive Technology is all about using Information and Communications Technology to change what we think and do. We are just e * Security and privacy8 KB (989 words) - 20:13, 22 February 2009
- Geographical Information Systems/ Global Navigation Satellite Systems Security and Information Assurance4 KB (503 words) - 11:36, 18 October 2008
- - System management and security; For more information visit the conference web site at http://www.computingfrontiers.org4 KB (591 words) - 17:48, 14 October 2008
- ...n the areas of RFID technologies, their supporting large-scale distributed information systems and their applications. * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques3 KB (431 words) - 17:48, 14 October 2008
- • Information-theoretic aspects of wireless communications • Wireless network security and privacy6 KB (731 words) - 10:33, 14 August 2023
- ...ireless communications and networking employed to support the needs of the Information Society. This sixth symposium, intends to bring together various wireless c * Wireless privacy and security3 KB (456 words) - 18:10, 14 October 2008
- session that includes the ACM Student Research Competition. More information on these activities, including submission * Security, privacy, and trustworthiness of mobile and wireless systems7 KB (974 words) - 12:28, 3 August 2023
- ...uming but also error-prone. The systematic and timely capture of the above information may accurately keep track of the various stages that data go through and he ...ware engineering, workflow system, information retrieval, web service, and security research. At the same time, it also requires understanding of problems from3 KB (416 words) - 17:48, 14 October 2008
- Information theory: distributed network coding, Shannon's entropy, Nash equilibrium Internet security enforcement and validation11 KB (1,385 words) - 17:48, 14 October 2008
- * legal and quasi-legal applications of AI and other advanced information technologies * Conceptual or model-based legal information retrieval7 KB (998 words) - 17:48, 14 October 2008
- ...nal Conference on the Theory and Application of Cryptology and Information Security556 bytes (69 words) - 15:16, 10 March 2020
- ...ternational Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability7 KB (960 words) - 17:48, 14 October 2008
- The 8th ACM/IEEE Conference on Information Processing in ...cations o real-time resource management and scheduling o embedded system security o programming languages and software engineering for real-time or8 KB (939 words) - 17:48, 14 October 2008
- * Trust, security and privacy Trust, security and privacy19 KB (2,503 words) - 13:25, 28 October 2020
- Ubiquitous sensors, devices, networks and information are paving the way * Security, Privacy, Safety and Legal Issues7 KB (942 words) - 20:05, 14 October 2008
- | Title = The 3rd International Symposium on Security and Multimodality in Pervasive Environments ...er hand, while enlarging and easing the ways to access to the environment, security threads arise and the environment must be properly equipped in order to pro3 KB (393 words) - 21:18, 14 October 2008
- | Field = Computer security and reliability ...the “tour guide” and save you time by collecting and summarizing this information to bring you up to date in a particular area as efficiently as possible.3 KB (467 words) - 21:39, 16 October 2008
- - Information dissemination and publish/subscribe functionality in SPSs - Information integration and data source wrapping in SPSs3 KB (490 words) - 20:05, 14 October 2008
- |Title=First IEEE Workshop on Information and Software as Services First IEEE Workshop on Information & Software as Services (WISS'09)7 KB (907 words) - 21:51, 14 October 2008
- # Semantic Information Retrieval # Semantic Web Trust, Privacy, Security and Intellectual Property Rights4 KB (450 words) - 20:05, 14 October 2008