Search results
Jump to navigation
Jump to search
- |Title=21st European Conference on Knowledge Management * The fundamentals of Knowledge Management1 KB (143 words) - 19:56, 1 April 2022
- ...sources and Evaluation for Identity Matching, Entity Resolution and Entity Management ...sources and Evaluation for Identity Matching, Entity Resolution and Entity Management3 KB (372 words) - 20:59, 1 April 2022
- Identity-Based Cryptography Identity Management2 KB (176 words) - 20:04, 1 April 2022
- |Field=technology, biometrics, identity management, security522 bytes (64 words) - 19:20, 1 April 2022
- Identity management Key management1 KB (190 words) - 11:54, 6 April 2022
- ...including traditional database management, as well new challenges for data management in any possible domain. Prospective authors are encouraged to consider nove § Transactions and Workflow Management3 KB (308 words) - 21:00, 1 April 2022
- | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security ...ual meeting and conference of the newly formed IFIP Working Group on Trust Management (IFIP WG 11.11). IFIPTM 2007 provided a truly global platform for the repor4 KB (568 words) - 20:48, 1 April 2022
- Special Theme: "Connectedness, Identity and Alienation in the Arts and Humanities" The conference theme is "Connectedness, Identity and Alienation in the Arts and Humanities", and the organizers encourage su2 KB (291 words) - 19:07, 1 April 2022
- |Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)5 KB (647 words) - 19:33, 1 April 2022
- * • Identity Management * • Trust Management2 KB (206 words) - 20:16, 1 April 2022
- * Enterprise Security Management * Identity Management2 KB (280 words) - 20:31, 1 April 2022
- Special Theme: "Connectedness, Identity and Alienation in the Arts and Humanities" ...suggestion of an optional themes to concentrate the mind; "Connectedness, Identity and Alienation in the Arts and Humanities", and the organizers encourage su3 KB (357 words) - 20:03, 1 April 2022
- ...uting, we encourage contributions on policy-based techniques in support of management and security of all types of wireless networks: cellular, Wi-Fi, Mobile Ad ...008 invites unpublished novel contributions on all aspects of policy-based management. This year, as part of the technical program we also plan a special session5 KB (670 words) - 20:58, 1 April 2022
- -Implementation, deployment and management of network security policies ...ection: protocols, implementations, metering, watermarking, digital rights management6 KB (771 words) - 19:03, 1 April 2022
- |Title=International Workshop on Visualization and Information Security Management |Field=Security Management3 KB (470 words) - 19:04, 1 April 2022
- Identity Management Key Distribution and Management2 KB (315 words) - 19:35, 1 April 2022
- - Enterprise management and consumer protection - Intellectual property and digital rights management5 KB (697 words) - 19:55, 1 April 2022
- ...onse planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance ...e protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillance; Database security6 KB (749 words) - 21:03, 1 April 2022
- * Digital Rights Management * Identity and Trust management4 KB (486 words) - 19:03, 1 April 2022
- Mobility management and Handover Resource allocation management4 KB (505 words) - 21:05, 1 April 2022