Search results
Create the page "Privacy" on this wiki! See also the search results found.
Page title matches
- 22 bytes (3 words) - 14:41, 6 November 2020
- 22 bytes (3 words) - 14:37, 6 November 2020
- |Title=SPDF-Mobile 2017 : Special Issue on “The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” ...-communications-and-networks/call-for-papers/special-issue-on-the-security-privacy-and-digital-forensics4 KB (536 words) - 09:59, 21 August 2017
- |Title=ASPMI 2018 : Advances in Security and Privacy of Multimodal Interfaces Advances in Security and Privacy of Multimodal Interfaces4 KB (592 words) - 13:34, 28 July 2017
- |Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)5 KB (640 words) - 13:34, 28 July 2017
- |Title=IEEE PAC 2017 : The 1st IEEE Symposium on Privacy-Aware Computing |Field=privacy4 KB (532 words) - 13:24, 28 July 2017
- 26 bytes (2 words) - 11:46, 8 August 2017
- 25 bytes (2 words) - 12:30, 3 September 2017
- 24 bytes (2 words) - 12:01, 3 September 2017
- ...2018 : 2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus 2018 the 2nd International Conference on Cryptography, Security and Privacy1 KB (171 words) - 09:58, 21 August 2017
- 24 bytes (2 words) - 13:23, 3 September 2017
- 26 bytes (2 words) - 13:40, 3 September 2017
Page text matches
- ...t modeling, broadcast and multicast delivery, data availability, trust and privacy * Security and privacy issues for ubiquitous systems13 KB (1,468 words) - 01:23, 22 August 2008
- ** Privacy, safety and security ** Privacy, safety, and security6 KB (777 words) - 22:54, 14 August 2008
- * Trust, security and privacy issues in pervasive systems12 KB (1,560 words) - 15:03, 27 August 2008
- * Privacy and Security in trustworthy databases9 KB (1,189 words) - 14:53, 28 August 2008
- - privacy and security10 KB (1,371 words) - 16:14, 12 November 2020
- ...networks to exist; within groups and between groups there are problems of privacy, identity, anonymity, trust, and confidentiality. Additionally, conflict, d ...utomation of contracting and contract monitoring on the web, protection of privacy in location-based computing, etc.18 KB (2,408 words) - 02:37, 16 December 2008
- ...gn features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data quality, data s Data privacy11 KB (1,371 words) - 12:28, 18 May 2020
- ...de facto’ methods to support new requirements in terms of scalability, privacy, performance, indexing, and heterogeneity of both content and technology. ...gn features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.)11 KB (1,446 words) - 18:26, 13 October 2008
- Legal Issues on Open Knowledge (e.g. intellectual property, licensing, privacy)5 KB (624 words) - 10:32, 9 May 2019
- * Trust and privacy in Web and mobile services5 KB (746 words) - 18:19, 13 October 2008
- * Security, Privacy and Trust * Security, Privacy and Trust34 KB (4,565 words) - 22:20, 10 January 2018
- * Security, Privacy and Trust ** Security, Privacy and Trust8 KB (1,037 words) - 22:20, 10 January 2018
- * Security, Privacy and Trust ** Security, Privacy and Trust9 KB (1,189 words) - 22:20, 10 January 2018
- * Security, Privacy and Trust ** Security, Privacy and Trust26 KB (3,456 words) - 22:20, 10 January 2018
- * Security and Privacy10 KB (1,263 words) - 22:20, 10 January 2018
- * Security and Privacy12 KB (1,537 words) - 22:19, 10 January 2018
- * Security and Privacy8 KB (1,040 words) - 22:20, 10 January 2018
- * Security, Privacy & Trust4 KB (519 words) - 16:13, 14 October 2008
- ..., controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. - Trust-related Security and Privacy: Trust-related secure architecture, framework, policy, intrusion detection/9 KB (1,216 words) - 17:32, 14 October 2008
- * Security and privacy8 KB (989 words) - 20:13, 22 February 2009
- * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques * Policy & Regulatory Issues: Spectral management, privacy issues, co-existence of RFID systems, social implications of RFID technolog3 KB (431 words) - 17:48, 14 October 2008
- • Wireless network security and privacy6 KB (731 words) - 10:33, 14 August 2023
- * Wireless privacy and security3 KB (456 words) - 18:10, 14 October 2008
- * Security, privacy, and trustworthiness of mobile and wireless systems7 KB (974 words) - 12:28, 3 August 2023
- * Trust, reputation, security, and privacy in MBC5 KB (647 words) - 22:05, 14 October 2008
- * Security and privacy for provenance information3 KB (416 words) - 17:48, 14 October 2008
- Privacy Enhancing Technologies - PETs11 KB (1,385 words) - 17:48, 14 October 2008
- ...e: algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, random6 KB (869 words) - 20:22, 22 February 2009
- sharing, privacy issues, and interface design issues. The goal is to create5 KB (753 words) - 22:01, 14 October 2008
- * Trust, security and privacy Trust, security and privacy19 KB (2,503 words) - 13:25, 28 October 2020
- * Security and privacy in vehicular networks3 KB (378 words) - 14:22, 24 August 2016
- * Security, Privacy, Safety and Legal Issues7 KB (942 words) - 20:05, 14 October 2008
- - Security and privacy in SPSs3 KB (490 words) - 20:05, 14 October 2008
- # Semantic Web Trust, Privacy, Security and Intellectual Property Rights4 KB (450 words) - 20:05, 14 October 2008
- * › Wireless Location Privacy Law and Policies9 KB (1,219 words) - 20:05, 14 October 2008
- ...momentum towards research in finding viable solutions to the security and privacy challenges faced by the current and future collaborative systems and infras ...l issues and practical implementations/experiences related to security and privacy solutions for collaborative systems. Topics of interest include, but are no4 KB (520 words) - 20:05, 14 October 2008
- Privacy, Trust, and Security is Distributed Systems2 KB (208 words) - 20:05, 14 October 2008
- • Ethical, Social, Privacy, Security and moral Issues in an e-societ • Security & Privacy5 KB (530 words) - 10:27, 24 June 2011
- ...rental Controls, Legal and Regulatory Issues, Data Collection, Biometrics, Privacy, Encryption3 KB (354 words) - 20:06, 14 October 2008
- - Patient Privacy and Confidentiality - Privacy Issues6 KB (780 words) - 20:06, 14 October 2008
- o Security and Privacy2 KB (303 words) - 20:06, 14 October 2008
- * Security and privacy in pervasive healthcare6 KB (732 words) - 22:45, 14 October 2008
- Risks such as privacy or safety3 KB (379 words) - 22:42, 4 February 2009
- * Security an privacy in collaboration6 KB (674 words) - 22:45, 14 October 2008
- - Privacy and security issues6 KB (890 words) - 22:53, 14 October 2008
- - Security and Privacy: cryptography; access control; security in domain-specific applications; privacy and trust9 KB (1,193 words) - 22:53, 14 October 2008
- Security, Freedom and Privacy9 KB (1,240 words) - 22:56, 14 October 2008
- Risks such as privacy or safety2 KB (353 words) - 22:42, 4 February 2009
- A8. Privacy Preserving Data Minig2 KB (295 words) - 12:03, 18 October 2008
- * security, privacy and trust issues in multi-agent systems5 KB (670 words) - 23:04, 14 October 2008