Computer Security

Estudo e Análise de Vulnerabilidades Web

Information Security / Network Security / Computer Security / Cyber Security

HIV AIDS DIAGNOSTIC SYSTEM

Computer Science / Human Computer Interaction / Computer Vision / Computer Security

Secure transcoding for compressive multimedia sensing

Data Compression / Compressed Sensing / Computer Security / Cryptography / Multimedia Communication / Image coding / Image Reconstruction / Transcoding / Sparse representation / Multimedia Data / Image coding / Image Reconstruction / Transcoding / Sparse representation / Multimedia Data

SPARQL-RW: transparent query access over mapped RDF data sources

Bioinformatics / Artificial Intelligence / Semantic Web Technologies / Enterprise Architecture / Natural Language Processing / Machine Learning / Data Mining / Signal Processing / Semantics / Database Systems / Network Security / XML / Policy / Text Mining / Web Technologies / E Government / Linked Data / Numerical Analysis / Information Integration / Computer Security / Web of Data / Semantic Web technology - Ontologies / Semantic Web / E Health / Mobile Computing / Computational Mathematics / Databases / Querying the Web of Data / Standardization / Simulation / Data Integration / Web / Interoperability / SPARQL query processing and optimization / Database Management Systems and Querry Processing / Rules / Ontology Mapping / RDF / OWL / Linked Open Data / Big Data / RDF Databases / Semantic Heterogeneity / Web Services Composition / Web service discovery / Workflow QoS / Big Data Analytics / Syntactic and Semantic Knowledge / Dynamic Systems and Control / Rif / Big Data / Analytics / Data Mining / SPARQL / Information Technology and System Integration / Optimization Technology / System Modeling and Simulation / Integration Technology of Automation Systems / Triple Stores / Content Extraction / SWRL / Identity and Access Management / Intermediation / E Workflows / Ontology based Systems / Semantic Web Process / Web Services Interoperability / Machine Learning / Data Mining / Signal Processing / Semantics / Database Systems / Network Security / XML / Policy / Text Mining / Web Technologies / E Government / Linked Data / Numerical Analysis / Information Integration / Computer Security / Web of Data / Semantic Web technology - Ontologies / Semantic Web / E Health / Mobile Computing / Computational Mathematics / Databases / Querying the Web of Data / Standardization / Simulation / Data Integration / Web / Interoperability / SPARQL query processing and optimization / Database Management Systems and Querry Processing / Rules / Ontology Mapping / RDF / OWL / Linked Open Data / Big Data / RDF Databases / Semantic Heterogeneity / Web Services Composition / Web service discovery / Workflow QoS / Big Data Analytics / Syntactic and Semantic Knowledge / Dynamic Systems and Control / Rif / Big Data / Analytics / Data Mining / SPARQL / Information Technology and System Integration / Optimization Technology / System Modeling and Simulation / Integration Technology of Automation Systems / Triple Stores / Content Extraction / SWRL / Identity and Access Management / Intermediation / E Workflows / Ontology based Systems / Semantic Web Process / Web Services Interoperability

Captcha as Graphical Passwords—A New Security (1)

Information Security / Computer Security / Carp / Password / Hotspots / CAPTCHA

Sophos Enduser Data Suite

Computer Science / Information Security / Computer Engineering / Computer Security

A smart-card-enabled privacy preserving E-prescription system

Engineering / Microbiology / Algorithms / Information Technology / Information Management / Health Care / Computer Security / Food Chemistry / Database Management Systems / Smart Cards / Data Privacy / Privacy Protection / Insurance / Confidentiality / Data Access / Information Storage and Retrieval / Smart Card / Proxy Signature / Inspection / Medical Records / Information Privacy / Internet / Privacy Preservation / Health Care / Computer Security / Food Chemistry / Database Management Systems / Smart Cards / Data Privacy / Privacy Protection / Insurance / Confidentiality / Data Access / Information Storage and Retrieval / Smart Card / Proxy Signature / Inspection / Medical Records / Information Privacy / Internet / Privacy Preservation

A Privacy Preserving Rental System

Randomization / Computer Security / Anonymity / Authentication / Data Privacy / Location / Rental / Service Provider / Group Signature / Location / Rental / Service Provider / Group Signature

Bitcoin: A Peer-to-Peer Electronic Cash System

Computer Science / Information Technology / Information Security / Computer Security / Cryptography

Credential Based Access Control for Semantic Web Services

Computer Science / Information Security / Computer Security

Tcommunicator : Economical wireless traffic System

Computer Science / Communication / Computer Engineering / Wireless Communications / Computer Networks / GPS Applications / Wireless Sensor Networks / Computer Security / Geo-spatial analysis with GIS and GPS / GPS and civil engineering / Bluetooth low energy transmitter / Receiver Operating Characteristics (ROC) curve / Process Automation Transmitter / Geodesy and Global Positioning System (GPS) and Their Applications In Earth Sciences / Receiver / Khái niệm Encoder . / Cấu tạo cơ bản của 1 encoder quay quang / GPS Applications / Wireless Sensor Networks / Computer Security / Geo-spatial analysis with GIS and GPS / GPS and civil engineering / Bluetooth low energy transmitter / Receiver Operating Characteristics (ROC) curve / Process Automation Transmitter / Geodesy and Global Positioning System (GPS) and Their Applications In Earth Sciences / Receiver / Khái niệm Encoder . / Cấu tạo cơ bản của 1 encoder quay quang

Bitcoin: A Peer-to-Peer Electronic Cash System

Computer Science / Information Technology / Information Security / Computer Security / Cryptography

A Comparative Study of Data Perturbation Using Fuzzy Logic to Preserve Privacy

Information Security / Machine Learning / Data Mining / Computer Security

Segurança em Redes 2013/2014

Internet Studies / Network Security / Internet Security / Computer Security / Internet and web security / Seguranca de redes / 4G Network Security / Seguranca de redes / 4G Network Security

A conceptual framework for assessing password quality

Computer Security / Conceptual Framework / Computer Program / Graphical Password Authentication / Theoretical Framework / Edit Distance
Copyright © 2017 DADOSPDF Inc.