搜索结果: 1-15 共查到“信息与通信工程 security”相关记录15条 . 查询时间(0.203 秒)
2017“质量管理、运输、信息安全、信息技术”国际会议(2017 International Conference "Quality Management,Transport and Information Security, Information Technologies" (IT&QM&IS))
2017 质量管理 运输 信息安全 信息技术 国际会议
2017/8/30
We invite you to participate in the International conference «Quality Management, Transport and Information Security, Information Technologies» (IT&QM&IS-2016). The conference will take plac...
第四届国际安全图形模型研讨会(The Fourth International Workshop on Graphical Models for Security)
第四届 国际安全图形模型 研讨会
2017/3/30
Graphical security models provide an intuitive but systematic approach to analyze security weaknesses of systems and to evaluate potential protection measures. Cyber security researchers, as well as s...
第三届IEEE国际无线传感器网络信任与安全研讨会(The 3rd IEEE International Workshop on Trust and Security in Wireless Sensor Networks)
第三届 IEEE 国际无线传感器网络 全研讨会
2017/3/30
The third IEEE International Workshop on Trust and Security in Wireless Sensor Networks (TrustWSN 2017), in conjunction with "The 16th IEEE International Conference on Trust, Security and Privacy in C...
第16届IEEE计算和通信信任,安全和隐私国际会议(16th IEEE International Conference on Trust, Security And Privacy In Computing And Communications)(TrustCom2017)
第16届 IEEE计算和通信 信任 国际会议
2017/3/30
With the rapid development and increasing complexity of computer systems and communication networks, user requirements for trust, security and privacy are becoming more and more demanding. Therefore, ...
第5届IEEE通信与网络安全会议(5th IEEE Conference on Communications and Network Security)
第5届 IEEE通信与网络安全 会议
2017/3/30
IEEE Conference on Communications and Network Security (CNS) is a premier forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise a...
IEEE Conference on Communications and Network Security (CNS) is a premier forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise a...
第五次复杂网络物理系统安全和服务国际研讨会(The 5th International Workshop on Security Intricacies in Cyber-Physical Systems and Services) (INTRICATE-SEC 2017)
第五次 复杂网络物理系统安全和服务 国际研讨会
2017/3/27
Cyber-physical systems (CPS) are ubiquitous in critical infrastructures such as electrical power generation, transmission, and distribution networks, water management, medical systems management, and ...
2016 13th International Conference on Security and Cryptography (SECRYPT)
information communication security
2016/7/19
SECRYPT is an annual international conference covering research in information and communication security. The 13th International Conference on Security and Cryptography (SECRYPT 2016) will be held in...
Federal Geographic Data Committee Homeland Security Working Group
Federal Geographic Data Committee Homeland Security Working Group
2015/12/18
The Federal Geographic Data Committee (FGDC) Homeland Security Working Group (HSWG) ensures that the National Spatial Data Infrastructure (NSDI) supports the preparation for, prevention of, protection...
Cross-Case Analysis of Data Security Measures Before and After the 1996 HIPAA Enactment
healthcare information technology
2015/5/26
The protection of sensitive healthcare information has been a concern since the Common Law of Confidentiality and its protection of the doctor-patient relationship. Although there was no legislation s...
Wireless Physical-Layer Security Performance of UWB systems
UWB security wireless physical layer
2014/12/8
Traditionally, spread-spectrum systems have been employed to provide low probability-of-intercept (LPI) and low probability-of-detection (LPD) performances at the physical layer, but the messages tran...
Dynamic Secrets in Communication Security
Applied sciences Communication security Dynamic secrets Key management Wireless security
2014/11/7
This dissertation focuses on both theoretic and practical aspects of using a new approach, dynamic secrets, to provide secrecy to cryptographic keys in secure communications. In the conventional parad...
Leading researchers to discuss privacy and security in a connected age
Internet era banks electrical grids
2014/10/30
As we increasingly rely on the Internet to connect to everything from banks and electrical grids to medical devices and autonomous vehicles, we are exposed to new vulnerabilities that threaten our sec...
Enforcing Private Policy via Security-by-Contract
Enforcing Private Policy via Security-by-Contract
2010/9/25
This work aims to investigate how the Security-by-Contract (SxC)paradigm, developed for providing security assurances to mobileapplications, can be used for guaranteeing the security ofcommunicating s...
RFID and Application Security
RFID application security privacy availability integrity non-repudiation
2014/3/11
The question of how well radio-frequency identification (RFID) technology can maintain security in business applications continues to plague both information system developers and endconsumers. Today’...