Listing 1 - 2 of 2 |
Sort by
|
Choose an application
This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2022, held in Cagliari, Italy, in June – July 2021. The 10 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 39 submissions. .
Computer networks. --- Computer engineering. --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Design and construction --- Distributed processing --- Computers. --- Data and Information Security. --- Computer Engineering and Networks. --- Computing Milieux. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Seguretat informàtica
Choose an application
This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013. The 9 revised full papers presented together with two keynote speeches were carefully reviewed and selected from 19 submissions. The scope of the workshop spans the theoretical aspects of cryptography and cryptanalysis, mobile security, smart cards and embedded devices.
Computer science. --- Computer Communication Networks. --- Software engineering. --- Computer network architectures. --- Data protection. --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer System Implementation. --- Special Purpose and Application-Based Systems. --- Computer Science, general. --- Engineering & Applied Sciences --- Computer Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Architectures, Computer network --- Network architectures, Computer --- Computer software engineering --- Informatics --- Computer communication systems. --- Special purpose computers. --- Architecture, Computer. --- Computer security. --- Computer security --- Ubiquitous computing --- Cryptology. --- Science --- Engineering --- Computer architecture --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Special purpose computers --- Architecture, Computer --- Distributed processing
Listing 1 - 2 of 2 |
Sort by
|