Search results
Create the page "Secured Technologies" on this wiki! See also the search results found.
- | Title = International Conference & Symposium on Storage Technologies Sponsored by EMC Corporation ...earch illustrate that the volume of data that needs to be stored, managed, secured, maintained, and available is reaching new heights. Additionally, the compl1 KB (170 words) - 19:53, 14 October 2008
- ...w any user to timely use resources using various access technologies under secured (still to be improved) and guaranteed privacy. The family of the mobile dev6 KB (765 words) - 22:26, 14 October 2008
- ...new methods and techniques, which offer users a transparent, efficient and secured access to resources, efficient allocation of resources, decentralization an7 KB (912 words) - 16:36, 5 November 2020
- ...d services, mobile data management, ubiquitous computing applications, secured data sharing and processing in sensor networks, environmental monitor5 KB (530 words) - 10:34, 2 August 2009
- |Title=The 5th International Conference for Internet Technology and Secured Transactions, Technical Co-Sponsored by IEEE UK/RI Communicatins Chapter The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010), Technical Co-Sponsored5 KB (607 words) - 17:01, 3 December 2009
- ...e-Learning, e-Governance, e-Business, e-Science, Green Computing, Secured Technologies, Intelligent Data Management *New enabling technologies5 KB (595 words) - 04:03, 15 January 2012
- information technologies, information systems and global security applications. Broadband access technologies5 KB (571 words) - 10:53, 3 September 2017
- ...nth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies15 KB (1,886 words) - 15:16, 25 August 2020