Search results
Create the page "Information security" on this wiki! See also the search results found.
Page title matches
- |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security5 KB (667 words) - 13:27, 13 September 2009
- 55 bytes (5 words) - 04:20, 14 September 2009
- 0 bytes (0 words) - 14:23, 15 February 2017
- |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)4 KB (597 words) - 12:28, 28 July 2017
- ...ICINS 2017 : 2017 5th International Conference on Information and Network Security (ICINS 2017)--Ei Compendex and Scopus |Field=network security1 KB (130 words) - 12:34, 28 July 2017
- 23 bytes (2 words) - 10:55, 8 August 2017
- 25 bytes (2 words) - 11:30, 3 September 2017
- 24 bytes (2 words) - 10:59, 3 September 2017
Page text matches
- All these technological developments are expected to bring us a next wave of information * Security and privacy issues for ubiquitous systems13 KB (1,468 words) - 00:23, 22 August 2008
- ** Privacy, safety and security ** Privacy, safety, and security6 KB (777 words) - 21:54, 14 August 2008
- In order to make information of the various fields of science available {{SITENAME}} relies on a network ====Computer security and reliability====6 KB (714 words) - 11:19, 11 December 2020
- | title = Transactions on Information and System Security | Field = Computer security and reliability272 bytes (32 words) - 15:33, 18 August 2008
- *Communication and Information Theory *Network Security5 KB (571 words) - 08:22, 19 July 2019
- * Quality of information (QoI) in sensor-enabled pervasive environments * Trust, security and privacy issues in pervasive systems12 KB (1,560 words) - 14:03, 27 August 2008
- The 2011 International Conference of Information Engineering The 2011 International Conference of Information Security and Internet Engineering3 KB (454 words) - 11:34, 8 October 2020
- are challenged by applications aimed at personal information The new information paradigms and requirements will move our research9 KB (1,189 words) - 13:53, 28 August 2008
- ...uctive databases and knowledge bases; Distributed databases; Integrity and security; Logic and databases; Multimedia databases; Query optimization; Query proce5 KB (753 words) - 17:59, 25 June 2012
- inter-operability, security, trusted and dependable systems, fault resource allocation, scheduling, fault tolerance, security.5 KB (715 words) - 16:43, 11 September 2008
- systems. See http://www.ifaamas.org for more information. INFORMATION FOR AUTHORS10 KB (1,371 words) - 15:14, 12 November 2020
- Local information can be found at http://www.cs.york.ac.uk/vstte08/ Unguessable Atoms: A Logical Foundation for Security5 KB (686 words) - 11:27, 12 September 2008
- number of wireless terminals and information generated by such could call the "Information-Explosion Era."5 KB (611 words) - 14:43, 16 September 2008
- ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d Additionally, P2P systems require special attention from the security point of view. Trust, reputation, copyrights, and intellectual property are18 KB (2,408 words) - 01:37, 16 December 2008
- |Title=8th International Conference on Information Systems Technology |Field=Information systems7 KB (763 words) - 11:25, 6 October 2011
- ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...ons; Target-oriented keyword search; Filter-based profile matching; Mutual information on data streams; Stream processing; Digitized documents streams; Queries wi11 KB (1,371 words) - 11:28, 18 May 2020
- ...ed to databases triggered substantial improvements for content processing, information indexing, and data, process and knowledge mining. The push came from Web se ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.)11 KB (1,446 words) - 17:26, 13 October 2008
- ...ucators and researchers as well as an important aspect of e-government and information society initiatives. F/OSS is a complex phenomenon that requires an interdi ...indings and practical experiences. The conference is also meant to provide information and education to practitioners, identify directions for further research an10 KB (1,349 words) - 15:42, 24 September 2008
- Software Security Internet and Information Systems Development2 KB (293 words) - 09:35, 24 June 2011
- |Title=The IEEE 23rd International Conference on Advanced Information Networking and Applications (AINA-09) ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA-09) will be held in Bradford, May 26-29,34 KB (4,565 words) - 21:20, 10 January 2018