- software engineers, and graduate students who need to become acquaintedwith new theories and technologies related to security and privacy challenges in2 KB (271 words) - 15:30, 19 October 2022
- Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals2 KB (294 words) - 15:27, 19 October 2022
- protection, privacy and security. * Secure multimedia system design, trusted computing, and protocol security. * Security evaluation and benchmarks. * Emerging3 KB (388 words) - 15:28, 19 October 2022
- location. THEME AND TOPICS OF INTEREST The WiP session is devoted to the presentation of new and on-going research in real-time systems, theory, and applications3 KB (405 words) - 15:27, 19 October 2022
- concerns and require new reflections on security problems. The aim of this workshop is to encompass research advances in all areas of security, trust and privacy4 KB (538 words) - 15:30, 19 October 2022
- to: · Attacks and Countermeasures · Authentication and Access Control · Computer-Aided Tool for Security · Cross-layer Design for Security · Cryptographic4 KB (580 words) - 15:20, 19 October 2022
- related technologies 1-05 Reliability, and fault-tolerance 1-06 Ubiquitous computing systems 1-07 Computer networks 1-08 Communication and telecommunication 1-095 KB (769 words) - 15:28, 19 October 2022
- * Middleware * Seamless connectivity * User-Centric security * Feasible security solution * Security Management * Ambient Intelligence * Pervasive/Ubiquitous5 KB (761 words) - 15:30, 19 October 2022
- technical, economic and legal perspectives. It will create a unique opportunity for data mining researchers, security and privacy specialists, and industry experts5 KB (819 words) - 15:28, 19 October 2022
- Authentication and identity management in UE * Authorization and access-control in UE * Risk assessment, and management in UE * Redundancy, reliability models6 KB (858 words) - 15:27, 19 October 2022
- use of smart cards and RFID systems - Role of RFID, sensors and biometrics to enable security - Security in U-commerce and U-business and other applications6 KB (955 words) - 15:30, 19 October 2022
- Event Acronym CSF 2008 Title IEEE 21st Computer Security Foundations Symposium Start Date 2008-06-23 End Date 2008-06-25 Status as scheduled Mode on site666 bytes (148 words) - 14:46, 19 October 2022
- Acronym ISECS 2008 Title International Symposium on Electronic Commerce and Security Start Date 2008-08-03 End Date 2008-08-05 Status as scheduled Mode on716 bytes (139 words) - 15:21, 19 October 2022
- 2009-04-26 → 2009-04-30 Computer Security Computer Reliability Physics IRPS 2008 2008-04-27 → 2008-05-01 Computer Security Computer Reliability620 bytes (182 words) - 13:34, 20 March 2024
- Networks Network Security DSN - IEEE/IFIP International Conference on Dependable Systems and Networks Computer Security Computer Reliability Networks Dependable104 bytes (790 words) - 12:39, 20 October 2022
- 2020-10-19 → 2020-10-22 Computer Security Computer Reliability MIS4TEL 2020 2020-06-17 → 2020-06-19 ACNS 2019 2019-06-05 → 2019-06-07 Computer Security Computer Reliability88 bytes (83 words) - 06:07, 31 January 2023
- Network Security WiSec 2009 2009-03-16 → 2009-03-18 Computer Security Computer Reliability Network Security WiSec 2008 2008-03-31 → 2008-04-02 Computer Security495 bytes (239 words) - 13:09, 30 June 2023
- International Conference on Dependable Systems and Networks Academic Field Computer Reliability, Computer Security, Dependable Systems, Networks Official Website722 bytes (352 words) - 10:40, 25 July 2023
- 2009-06-03 → 2009-06-05 Access Control SACMAT 2008 2008-06-11 → 2008-06-13 Computer Security Computer Reliability Access Control SACMAT 2007 2007-06-20 → 2007-06-22 Access39 bytes (242 words) - 11:49, 15 December 2022
- Engineering And Technology Event Series List DSN - IEEE/IFIP International Conference on Dependable Systems and Networks Computer Security Computer Reliability97 bytes (294 words) - 07:29, 20 October 2022