Research Papers Related Computer Security

Feature articles should be no longer than 6,000 words (tables and figures count as 250 words each).

Be sure to include all author names, professional affiliations, mailing addresses, daytime telephone numbers, and email addresses.

More information can be found at the conference web page at

IICIS'2003 Sixth IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems, Lausanne, Switzerland, November 13-14, 2003.

Information and communication security is a challenging topic at the best of times.

This conference series brings together researchers and scholars to examine important issues in this area.

More information can be found on the conference web page at

The objective of this workshop is to bring together researchers from research communities in wireless networking, security, applied cryptography, and dependability; with the goal of fostering interaction.

Wiley Online Library requires cookies for authentication and use of other site features; therefore, cookies must be enabled to browse the site.

Detailed information on how Wiley uses cookies can be found in our Privacy Policy.

SHOW COMMENTS

Comments Research Papers Related Computer Security

The Latest from hot-com.ru ©