- algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, randomness5 KB (876 words) - 15:30, 19 October 2022
- Proxies and middleware for wireless networks • Wireless network security and privacy • Performance of E2E protocols over wireless networks • Interworking heterogeneous6 KB (831 words) - 15:30, 19 October 2022
- Issues - eHealth Policy and Practice - eHealthcare Strategies and Provision - Legal Issues - Medical Research Ethics - Patient Privacy and Confidentiality6 KB (808 words) - 14:55, 19 October 2022
- of Network Governance o Privacy - a pervading issue o Attribution and identify management; anonymity and ID * Physical and policy infrastructure of the Internet4 KB (660 words) - 15:21, 19 October 2022
- large-scale and complex, involving difficult social and policy issues such as those related to privacy and security access. Mobile technologies are devoted8 KB (1,107 words) - 15:28, 19 October 2022
- data warehousing - Security and Privacy: cryptography; access control; security in domain-specific applications; privacy and trust - Services Science: service-oriented9 KB (1,297 words) - 14:46, 19 October 2022
- networked systems Internet measurement and modeling Internet economics and policy Innovative uses of network data beyond communication Mobile and Wireless4 KB (661 words) - 12:31, 6 June 2023
- Scalable Computing * Intelligent Information & Database Systems * Security and Privacy * Social Computing * Soft Computing * Software Design Patterns & Engineering5 KB (608 words) - 14:03, 19 October 2022
- ‘information security’ and ‘user privacy’ can be ensured. In answer to these concerns, the 7th International Conference on Trust, Privacy and Security in Digital8 KB (1,074 words) - 15:29, 19 October 2022
- devices * Support for mobile social networking and mobile Web * Security and privacy in mobile systems * Systems for location and context sensing and awareness7 KB (1,090 words) - 09:23, 29 August 2023
- Detection and Analysis · Privacy and Anonymity · Secure Localization and Synchronization · Security and Performance tradeoff · Security Policy and Enforcement Issues4 KB (580 words) - 15:20, 19 October 2022
- must be designed with privacy considerations. To address these issues, we invite original research papers on the security and/or privacy of Cyber-Physical4 KB (688 words) - 13:06, 19 October 2022
- Security and Privacy • Network Security • Peer-to-Peer Security & Privacy • Cryptographic Algorithms and Primitives • Security and Privacy for Big Data2 KB (304 words) - 11:47, 8 December 2023
- and Analysis of Algorithms Foundations of Machine Learning Foundations of Privacy, Trust and Reputation in Network Network Models for Distributed Computing5 KB (672 words) - 08:41, 27 September 2023
- counter-terrorism or security protection • Information sharing policy and governance • Privacy, security, and civil liberties issues • Emergency response and4 KB (525 words) - 12:04, 29 January 2024
- counter-terrorism or security protection Information sharing policy and governance Privacy, security, and civil liberties issues Emergency response and5 KB (630 words) - 12:01, 29 January 2024
- pervasive software Model-driven software engineering Patterns and frameworks Policy and ethics Processes and workflows Program analysis Program comprehension4 KB (486 words) - 09:41, 7 August 2023
- data. * Data integrity, matching and sharing. * Privacy and protection standards and policies. * Privacy preserving big data access/analytics. * Fairness3 KB (386 words) - 13:08, 19 October 2022
- Versioning and Data Quality Management Semantics for Safety, Security & Privacy Web Semantics, Linked (Open) Data & schema.org Corporate Knowledge Graphs6 KB (883 words) - 14:20, 19 October 2022
- devices * Support for mobile social networking and mobile Web * Security and privacy in mobile systems * Resource-efficient machine learning for mobile platforms6 KB (855 words) - 09:21, 29 August 2023