Search

Your search keyword '"Data protection--Congresses"' showing total 82 results

Search Constraints

Start Over You searched for: Descriptor "Data protection--Congresses" Remove constraint Descriptor: "Data protection--Congresses"
82 results on '"Data protection--Congresses"'

Search Results

1. Multifaceted Approaches for Data Acquisition, Processing & Communication

2. Emerging Technologies for Authorization and Authentication : 5th International Workshop, ETAA 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers

3. Cybersecurity in the Age of Smart Societies : Proceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022

4. Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers

5. Science of Cyber Security - SciSec 2022 Workshops : AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers

6. Computer Security – ESORICS 2021 : 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part I

7. Mining Data for Financial Applications : 5th ECML PKDD Workshop, MIDAS 2020, Ghent, Belgium, September 18, 2020, Revised Selected Papers

8. Information Systems Security and Privacy : 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers

9. Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, Revised Selected Papers

10. Information Security Applications : 19th International Conference, WISA 2018, Jeju Island, Korea, August 23–25, 2018, Revised Selected Papers

11. Advances in Information and Communication Networks : Proceedings of the 2018 Future of Information and Communication Conference (FICC), Vol. 2

12. Frontiers of Engineering : Reports on Leading-Edge Engineering From the 2015 Symposium

13. Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses

14. ISSE 2014 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe 2014 Conference

15. Information Security and Privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings

16. Privacy Enhancing Technologies : 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013, Proceedings

17. Data and Applications Security and Privacy XXVII : 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, Proceedings

18. Data Management and Security

19. Security and Privacy Protection in Information Processing Systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013, Proceedings

20. Les entreprises et l'État face aux cybermenaces

21. Information Security for Global Information Infrastructures : IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China

22. Data Privacy Management and Autonomous Spontaneus Security : 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers

23. Information Security : 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012, Proceedings

24. Secure Data Management : 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012, Proceedings

25. Data Security and Security Data : 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

26. Computer Security -- ESORICS 2012 : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings

27. Provable Security : 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings

28. Information Technology Convergence, Secure and Trust Computing, and Data Management : ITCS 2012 & STA 2012

29. Privacy and Identity Management for Life : 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers

30. Achieving Systems Safety : Proceedings of the Twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012

31. Financial Cryptography and Data Security : FC 2011 Workshops, RLCPS and WECSR, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers

32. Privacy in Statistical Databases : UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012, Proceedings

33. Information Security Applications : 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers

34. Secure Data Managment : 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings

35. Information Theoretic Security : 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011, Proceedings

36. Use of Risk Analysis in Computer-Aided Persuasion

37. Computer Security – ESORICS 2011 : 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings

38. Privacy and Identity Management for Life : 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers

39. Information Hiding : 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers

40. Security Technology, Disaster Recovery and Business Continuity : International Conferences, SecTech and DRBC 2010, Held As Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

41. Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings

42. Data Privacy Management and Autonomous Spontaneous Security : 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers

43. Digital Watermarking : 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings

44. Digital Watermarking : 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers

45. Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks : Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings

46. Information Security Applications : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers

47. Advances in Information Security and Its Application : Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

48. Privacy, Security, and Trust in KDD : Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papers

49. Information Security Applications : 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers

50. Global Security, Safety, and Sustainability : 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009, Proceedings

Catalog

Books, media, physical & digital resources