Search results

Jump to: navigation, search
  • 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.
    7 KB (897 words) - 17:05, 27 February 2009
  • * Security and trustworthy in multi-tenancy service hosting environment Ian Gorton, Computational and Information Sciences at Pacific Northwest National Laboratory, US
    6 KB (855 words) - 17:06, 27 February 2009
  • Official publication of the Information Resources Management Association - Security issues and technologies
    5 KB (646 words) - 17:06, 27 February 2009
  • | Title = The 2009 International Conference on Web Information Systems and Mining (WISM’09) and the 2009 International Conference on Art ...orum for scientists and researchers to present the state of the art of web information systems, web mining, artificial intelligence, computational intelligence, w
    5 KB (604 words) - 17:06, 27 February 2009
  • · Reliability, fault-tolerance, and security Jongsuk Ruth Lee, Korea Institute of Science and Technology Information, Korea
    8 KB (1,050 words) - 18:04, 5 January 2017
  • ...cent developments and research issues on e-commerce, enterprise computing, security and developments in the area of social networks. ADDITIONAL INFORMATION
    4 KB (528 words) - 17:06, 27 February 2009
  • + Middleware solutions for Security, Privacy and Trust (Elsevier's Engineering Information Index), and automatically included
    6 KB (800 words) - 22:11, 27 February 2009
  • * Security and privacy in P2P systems Detailed information on electronic submission are provided on the web site
    5 KB (623 words) - 17:06, 27 February 2009
  • ...erence aims to provide a forum to disseminate, to all branches industries, information on the most recent and relevant innovations, theories and applications in I • Information Processing and Engineering
    3 KB (399 words) - 17:06, 27 February 2009
  • VoIP, NGN and IMS Security * Security models of voice, video and text over IP services
    4 KB (621 words) - 17:06, 27 February 2009
  • transform, and integrate information in a platform-independent manner. * Rule languages for exchanging and processing information through the
    7 KB (883 words) - 17:06, 27 February 2009
  • * Geographic Information Retrieval * Security and Integrity
    4 KB (534 words) - 17:07, 27 February 2009
  • | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability
    8 KB (967 words) - 17:07, 27 February 2009
  • | Title = 14th International Conference on Information Quality 14th International Conference on Information Quality (ICIQ)
    5 KB (690 words) - 17:07, 27 February 2009
  • | Title = 3rd WORKSHOP ON Practice and Theory of IT Security | Field = Computer security and reliability
    4 KB (506 words) - 17:07, 27 February 2009
  • | Title = Workshop on Trust, Risk and Security Assessments for Network Dependability in Digital Ecosystems (TRSDE) | Field = Computer security and reliability
    4 KB (600 words) - 17:07, 27 February 2009
  • | Title = 5th IEEE International Workshop on Wireless and Sensor Networks Security Wireless and Sensor Networks Security (WSNS'09)
    4 KB (485 words) - 17:07, 27 February 2009
  • ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver Web Spam - Adversarial Information Retrieval in Digital Ecosystems
    7 KB (941 words) - 17:07, 27 February 2009
  • * Error and erasure correcting codes for information dispersal * Cryptography, Security and trust
    6 KB (750 words) - 16:50, 27 December 2015
  • * Authorization, Privacy and Security * Geographical Information Systems
    9 KB (1,249 words) - 08:42, 7 October 2011

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)