Conference on Security

Results: 2278



#Item
151

CyFy: The India Conference on Cyber Security and Internet Governance Common Futures, Uncommon Terrains Agenda October 14 18:00 – 18:15

Add to Reading List

Source URL: cyfy.org

Language: English - Date: 2015-10-09 02:38:06
    152Software / Digital media / Computing / Social networking services / Social media / Social networks / Facebook / New media / Social media marketing / Social search / Social computing / Target audience

    2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing The Effect of Post Type, Category and Posting Day on User Interaction Level on Facebook Ire

    Add to Reading List

    Source URL: cocoa.ethz.ch

    Language: English - Date: 2013-05-10 05:23:10
    153

    Call for papers ICISC 2004 The 7th Annual International Conference on Information Security and Cryptology December 2-3, 2004 Novotel Ambassador Gangnam, Seoul, Korea http://www.icisc.org/

    Add to Reading List

    Source URL: www.icisc.org

    Language: English - Date: 2016-01-16 13:27:08
      154

      Tenth International Conference on Information Systems Security (ICISS 2014), 16-20 December 2014, IDRBT, Hyderabad, India ICISS 2014 REGISTRATION FORM Personal Details Name

      Add to Reading List

      Source URL: www.idrbt.ac.in

      Language: English - Date: 2015-08-10 00:57:00
        155Arms control / United Nations Office for Disarmament Affairs / United Nations Secretariat / Disarmament / International relations / International security / Global politics

        Youth events lead up to September DPI/NGO conference Posted: Friday, 17 July 2009, New York | Author: UNODA/DPI UN-affiliated nongovernmental organizations are seizing on the new momentum that has arisen across the disar

        Add to Reading List

        Source URL: outreach.un.org

        Language: English - Date: 2012-07-02 15:46:14
        156

        2009 International Conference on Availability, Reliability and Security Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones Collin Mulliner Fraunhofer Institute for Secure Information Technology (SIT) collin

        Add to Reading List

        Source URL: www.mulliner.org

        Language: English - Date: 2009-03-25 09:35:35
          157

          2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation Michael B

          Add to Reading List

          Source URL: www.dcsec.uni-hannover.de

          Language: English - Date: 2012-06-26 09:23:14
            158

            DESERTIFICATION AND FOOD SECURITY CONFERENCE ORGANIZED BY GLOBAL DRYLAND ALLIANCE By Xi Fang On 14 September 2015, the conference Desertification and Food Security: risks and opportunities organized

            Add to Reading List

            Source URL: www.kipschool.org

            Language: English - Date: 2015-09-18 04:43:45
              159

              ASIACRYPT 2012 The 18th Annual International Conference on the Theory and Application of Cryptology and Information Security December 2 - 6, 2012, Beijing, China Call for Papers

              Add to Reading List

              Source URL: cis.sjtu.edu.cn

              Language: English - Date: 2012-06-01 04:39:17
                160

                APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY ATISInternational Conference on Applications and Techniques in Information Security

                Add to Reading List

                Source URL: www.atis2015.conferences.academy

                Language: English - Date: 2015-10-07 22:16:09
                  UPDATE