12th TrustCom / 11th ISPA / 12th IUCC 2013: Melbourne, Australia

Refine list

showing all ?? records

The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13)

Session 1: Privacy in Cloud Computing

Session 2: Security and Trust in Network Routing

Session 3: Trust in Mobile and Wireless Networks

Session 4: Privacy in Mobile and Wireless Networks

Session 5: Security in Mobile and Wireless Networks

Session 6: Trust and Security in Social Networks

Session 7: Network Security

Session 8: Attack and Defense

Session 9: Trusted Computing Algorithms

Session 10: Privacy and Trust

Session 11: Security Models and Frameworks

Session 12: Trust and Security in Cloud Computing

Session 13: Cloud Application Security

Session 14: Trust Management

Session 15: Data Security and Privacy

Session 16: Cyber Security and Privacy

Session 17: Communication Security and Trust

Session 18: Security Algorithms

Session 19: Identity Management and Access Control

Session 20: Data Protection

Trusted 21: Trusted Computing Applications

The 11th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA-13)

Session 1: Networking and Modeling

Session 2: Parallel and Distributed Applications

Session 3: Parallel and Distributed Systems

Session 4: Parallel and Distributed Algorithms

Session 5: High-Performance Computing

Session 6: Data Management

Session 7: Scheduling Algorithms

Session 8: Resource Management

Session 9: Multithreaded Computing

Session 10: Multicore Algorithms

Session 11: Reliability and Performance

The 12th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2013)

Session 1: Ubiquitous Computing

Session 2: Ubiquitous Communications

Session 3: Ubiquitous Systems

Session 4: Ubiquitous Services

Session 5: Ubiquitous Applications

The Third IEEE International Symposium on Trust and Identity in Mobile Internet, Computing and Communications TrustID 2013)

Session 1: Trust Management

Session 2: Identity Management Systems and Applications

The Third IEEE International Symposium on Trust and Security in Cloud Computing (IEEE TSCloud 2013)

The Fifth IEEE International Workshop on Security in e-Science and e-Research (ISSR 2013)

TThe Fifth IEEE International Symposium on UbiSafe Computing (IEEE UbiSafe-13)

The Third IEEE International Symposium on Security and Privacy in Internet of Things (IEEE SPIoT-13)

The Third IEEE International Symposium on Anonymity and Communication Systems (IEEE ACS-13)

The Fourth International Workshop on Wireless Networks and Multimedia (WNM-2013)

The Fist International Workshop on Cloud Data Mining (IWCDM-2013)

Session 1: Data Mining in Cloud Systems

Session 2: Data Mining in Security and Privacy Applications

The Fifth IEEE International Workshop on Multicore and Multithreaded Architectures and Algorithms (M2A2 2013)

Session 1: Multithreaded Algorithms

Session 2: Multicore and Multithreaded Applications

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy