Listing 1 - 1 of 1 |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 5th International Conference on Autonomic and Trusted Computing, ATC 2008, held in Oslo, Norway, in June 2008, co-located with UIC 2008, the 5th International Conference on Ubiquitous Intelligence and Computing. The 25 revised full papers presented together with 26 special session papers and 1 keynote talk were carefully reviewed and selected from 75 submissions. The regular papers are organized in topical sections on intrusion detection, trust, trusted systems and crypto, autonomic computing, organic computing, knowledge and patterns, and pervasive systems. The special session papers cover issues such as organic computing, trust, trust and dependable systems, routing and reliable systems, sensor networks, VoIP, and watermarking. .
Autonomic computing --- Computer security --- Computer networks --- Informatique autonome --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Software engineering. --- Computer security. --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Software Engineering. --- Computer Communication Networks. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Distributed processing --- Information Systems. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Listing 1 - 1 of 1 |
Sort by
|