Search results

Jump to: navigation, search
  • Computer System, Information Security and Networks • Security and Privacy in E-Commerce
    3 KB (319 words) - 17:07, 27 February 2009
  • For latest information see: ...ning, Device and Equipment Technology, Production processes and Sequences, Information Technology
    38 KB (4,832 words) - 17:07, 27 February 2009
  • IEEE Computer Society Task Force on Information Assurance by the special interest group Security - Intrusion Detection and
    8 KB (1,020 words) - 17:07, 27 February 2009
  • * Security, data handling, and privacy ...peer review process. A guide for authors, sample copies and other relevant information for submitting papers are available on the Author Guidelines page
    5 KB (670 words) - 17:08, 27 February 2009
  • | Title = The 12th International Conference on Network-Based Information Systems The 12th International Conference on Network-Based Information Systems
    11 KB (1,440 words) - 17:08, 27 February 2009
  • | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability
    12 KB (1,690 words) - 17:08, 27 February 2009
  • | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability
    3 KB (480 words) - 17:08, 27 February 2009
  • | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability
    6 KB (828 words) - 17:08, 27 February 2009
  • * Network security threats and countermeasures ...xson, IMC '07). If applicable, authors are also urged to notify parties of security flaws in their products or services in advance of publication. Adherence to
    6 KB (774 words) - 17:08, 27 February 2009
  • * Information assurance and security of the Springer LNCS Style (please check the Information for Authors
    8 KB (1,144 words) - 20:59, 27 February 2009
  • ...nal Conference on the Theory and Application of Cryptology and Information Security
    602 bytes (67 words) - 15:25, 10 March 2020
  • ...nal Conference on the Theory and Application of Cryptology and Information Security
    433 bytes (48 words) - 15:34, 10 March 2020
  • * Business Information Technology Alignment * Project, risk and security management
    4 KB (571 words) - 12:58, 9 March 2020
  • ...nal Conference on the Theory and Application of Cryptology and Information Security
    178 bytes (23 words) - 21:30, 10 March 2020
  • |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security
    5 KB (578 words) - 10:21, 20 November 2020
  • 1. Information Technologies Supporting Learning AREA 1: INFORMATION TECHNOLOGIES SUPPORTING LEARNING
    5 KB (661 words) - 15:49, 8 December 2009
  • |Title=International Conference on Web Information Systems and Technologies (WEBIST) |Field=Web Information Systems
    3 KB (440 words) - 15:25, 9 December 2009
  • |Title=International Workshop on Wireless Multimedia Computing and Security Services - Security, privacy, and cryptographic protocols for WMC
    3 KB (477 words) - 16:54, 8 August 2009
  • ...tion Retrieval, HCI) interested in topics like trust, provenance, privacy, security, reputation and spam, in order to address current challenges of their adapt - Privacy and Security in self-organizing and adaptive systems
    5 KB (642 words) - 20:34, 9 June 2009
  • ...d political point of view. It is critical to provide rescue personnel with information technology tools that enable more effective and efficient mitigation during ...arge-scale multi-agent systems that deals with uncertainty and conflicting information during crisis management,
    6 KB (783 words) - 17:04, 27 December 2015

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)