Search results

From ConfIDent
Results 481 – 500 of 1,023
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  • City Quito Country Ecuador (EC) Academic Field Computer Science, Information Systems, Data Mining, Security Official Website http://ingenieria.ute.edu.ec/inciscos/index
    635 bytes (148 words) - 15:20, 19 October 2022
  • 14:Event IPTComm 2009 (category Computer networking)
    systems * Content security and protection of media flows * Security of VoIP supporting systems such as AAA and ENUM * End-to-end security schemes * Inter-provider
    5 KB (690 words) - 15:21, 19 October 2022
  • International Conference on Provable Security Event Series ProvSec - International Conference on Provable Security Start Date 2018-10-25 End Date 2018-10-28
    4 KB (487 words) - 14:19, 19 October 2022
  • Conference on ICT Systems Security and Privacy Protection Ordinal 35 Event Series IFIP SEC - IFIP International Information Security and Privacy Conference
    1 KB (212 words) - 09:11, 22 December 2023
  • interpretation. Event Acronym Smart-City-IoT-Security 2017 Title Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart
    5 KB (902 words) - 14:23, 19 October 2022
  • data provenance, data linkage, data fusion, data warehousing, privacy and security, modelling) Infrastructures (e.g., cloud computing, data intensive computing
    4 KB (608 words) - 12:37, 4 August 2023
  • 14:Event Policy 2008 (category Computer networking)
    adaptation, security * Application of policies for identity and privacy management * Policy based networking, including collaborative security, pervasive
    5 KB (786 words) - 15:28, 19 October 2022
  • 14:Event SNPD 2008 (category Computer networking)
    Networks * Component-Based Software Engineering * Cryptography and Network Security * Data Mining and Knownledge Discovery * E-Commerce and its Applications
    2 KB (242 words) - 15:30, 19 October 2022
  • Ad Hoc Network Security • Software Security • Secure Data Streams • Security Testing • Smartphone Security • Usable Security • Web Security • Vulnerability
    5 KB (738 words) - 14:05, 19 October 2022
  • 14:Event HotMobile 2009 (category Computer networking)
    Country United States of America (US) Academic Field Mobile Computing, Computer Science Official Website http://www.hotmobile.org/2009 Deadlines 2009-01-06
    2 KB (391 words) - 08:30, 20 September 2023
  • City Vösendorf Region Lower Austria Country Austria (AT) Academic Field Computer Science, Programming Language Official Website http://cgo.org/cgo2018/
    4 KB (534 words) - 13:44, 2 May 2023
  • online Academic Field Theoretical Computer Science, Theory Of Computation, Programming Language, Programming, Computer Science Official Website https://easyconferences
    4 KB (584 words) - 08:02, 27 September 2023
  • City Perth Region Western Australia Country Australia (AU) Academic Field Computer Science Education Official Website http://conferences.secau.org Deadlines
    2 KB (326 words) - 14:44, 19 October 2022
  • cryptographic systems Metrics for the security of embedded systems Secure programming techniques FPGA design security Interactions between cryptographic theory
    3 KB (422 words) - 10:22, 14 June 2023
  • Secure authentication of IoT devices. - MAC layer security protocols for the IoT applications. - IoT security mechanisms targeting application layer protocols
    3 KB (476 words) - 14:23, 19 October 2022
  • States of America (US) Academic Field Applications, Artificial Intelligence, Computer Science, Machine Learning Official Website https://www.icmla-conference
    4 KB (525 words) - 12:17, 11 October 2023
  • situation is not so clear for security patterns because no accepted methodology exists for their use. Catalogs of security patterns are a good step, but
    6 KB (836 words) - 15:30, 19 October 2022
  • Region Quebec Country Canada (CA) Academic Field Human Computer Interaction, Information Security Official Website https://chi2018.acm.org/ DOI https://doi
    2 KB (240 words) - 06:31, 7 August 2023
  • Warsaw, Poland), Guenael Renault (ANSSI, France) Topics: security models; formal methods for security and privacy; design and analysis of algebraic, elliptic
    5 KB (787 words) - 14:12, 19 October 2022
  • Event Series Events List ACISP 2022 2022-11-28 → 2022-11-30 Computer Science Information Security
    89 bytes (23 words) - 09:22, 6 June 2023

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)

Cookies help us deliver our services. By using our services, you agree to our use of cookies.