Systems and Data Security
Resource Information
The concept Systems and Data Security represents the subject, aboutness, idea or notion of resources found in Boston University Libraries.
The Resource
Systems and Data Security
Resource Information
The concept Systems and Data Security represents the subject, aboutness, idea or notion of resources found in Boston University Libraries.
- Label
- Systems and Data Security
170 Items that share the Concept Systems and Data Security
Context
Context of Systems and Data SecuritySubject of
No resources found
No enriched resources found
- Wired/Wireless Internet Communications : 9th IFIP TC 6 International Conference, WWIC 2011, Vilanova i la Geltrú, Spain, June 15-17, 2011. Proceedings
- Active and Programmable Networks : IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005. Revised Papers
- Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues : 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers
- Advances in Computer Science - ASIAN 2009. Information Security and Privacy : 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings
- Advances in Computer Science – ASIAN 2007. Computer and Network Security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings
- Advances in Cryptology - ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings
- Advances in Cryptology - ASIACRYPT 2010 : 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings
- Advances in Cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings
- Advances in Cryptology - CRYPTO 2009 : 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings
- Advances in Cryptology - EUROCRYPT 2007 : 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings
- Advances in Cryptology - EUROCRYPT 2009 : 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings
- Advances in Cryptology – ASIACRYPT 2006 : 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings
- Advances in Cryptology – ASIACRYPT 2007 : 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings
- Advances in Cryptology – ASIACRYPT 2009 : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
- Advances in Cryptology – ASIACRYPT 2011 : 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings
- Advances in Cryptology – CRYPTO 2008 : 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings
- Advances in Cryptology – CRYPTO 2010 : 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings
- Advances in Cryptology – CRYPTO 2011 : 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings
- Advances in Cryptology – EUROCRYPT 2008 : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings
- Advances in Cryptology – EUROCRYPT 2010 : 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010. Proceedings
- Advances in Cryptology – EUROCRYPT 2011 : 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings
- Advances in Information and Computer Security : 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings
- Advances in Information and Computer Security : 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings
- Advances in Information and Computer Security : 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings
- Advances in Information and Computer Security : Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings
- Advances in Information and Computer Security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings
- Ambient Intelligence : European Conference, AmI 2008, Nuremberg, Germany, November 19-22, 2008. Proceedings
- Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings
- Applied Cryptography and Network Security : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
- Applied Cryptography and Network Security : 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings
- Applied Cryptography and Network Security : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings
- Autonomic and Trusted Computing : 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007. Proceedings
- Autonomic and Trusted Computing : 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings
- Autonomic and Trusted Computing : 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings
- Computational Intelligence in Security for Information Systems : 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings
- Computer Safety, Reliability, and Security : 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings
- Computer Safety, Reliability, and Security : 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings
- Computer Security – ESORICS 2009 : 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings
- Critical Information Infrastructures Security : First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers
- Critical Information Infrastructures Security : Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers
- Cryptographic Hardware and Embedded Systems - CHES 2009 : 11th International Workshop Lausanne, Switzerland, September 6-9, 2009 Proceedings
- Cryptographic Hardware and Embedded Systems – CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings
- Cryptographic hardware and embedded systems--CHES 2011 : 13th international workshop, Nara, Japan, September 28-October 1, 2011 : proceedings
- Cryptography and Coding : 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings
- Cryptography and coding : 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011 : proceedings
- Cryptology and Network Security : 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedings
- Cryptology and Network Security : 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedings
- Cryptology and Network Security : 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings
- Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings
- Data and Applications Security XXI : 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings
- Data and Applications Security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings
- Decision and game theory for security : second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, proceedings
- Dependability Metrics : Advanced Lectures
- Dependable Computing : Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedings
- Dependable and Historic Computing : Essays Dedicated to Brian Randell on the Occasion of His 75th Birthday
- Detection of Intrusions and Malware, and Vulnerability Assessment : 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings
- Detection of Intrusions and Malware, and Vulnerability Assessment : 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings
- Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings
- Distributed Computing and Networking : 10th International Conference, ICDCN 2009, Hyderabad, India, January 3-6, 2009. Proceedings
- Distributed Computing and Networking : 8th International Conference, ICDCN 2006, Guwahati, India, December 27-30, 2006. Proceedings
- Distributed Computing and Networking : 9th International Conference, ICDCN 2008, Kolkata, India, January 5-8, 2008. Proceedings
- E-Voting and Identity : First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers
- E-Voting and Identity : Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009. Proceedings
- Engineering Secure Software and Systems : First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings
- Fast Software Encryption : 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers
- Fast Software Encryption : 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers
- Financial Cryptography and Data Security : 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers
- Financial Cryptography and Data Security : 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers
- Formal Aspects in Security and Trust : 5th International Workshop, FAST 2008 Malaga, Spain, October 9-10, 2008 Revised Selected Papers
- Foundations of Security Analysis and Design V : FOSAD 2007/2008/2009 Tutorial Lectures
- IP Operations and Management : 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings
- Identity and Privacy in the Internet Age : 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings
- Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers
- Information Hiding : 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers
- Information Hiding : 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers
- Information Networking. Towards Ubiquitous Networking and Services : International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papers
- Information Security : 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings
- Information Security : 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings
- Information Security : 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings
- Information Security Applications : 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
- Information Security Applications : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers
- Information Security Applications : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers
- Information Security Practice and Experience : 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings
- Information Security Practice and Experience : 5th International Conference, ISPEC 2009 Xi’an, China, April 13-15, 2009 Proceedings
- Information Security Practice and Experience : 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings
- Information Security Practice and Experience : Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings
- Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks : Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings
- Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems : First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings
- Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks : Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings
- Information Security and Cryptology - ICISC 2007 : 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings
- Information Security and Cryptology : 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers
- Information Security and Cryptology : Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedings
- Information Security and Cryptology : Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
- Information Security and Cryptology – ICISC 2006 : 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedings
- Information Security and Cryptology – ICISC 2008 : 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers
- Information Security and Privacy : 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings
- Information Security and Privacy : 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings
- Information Systems Security : 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings
- Information Systems Security : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, proceedings
- Information Systems Security : Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedings
- Information Systems Security : Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings
- Information Theoretic Security : 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings
- Information Theoretic Security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings
- Information and Communications Security : 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings
- Information and Communications Security : 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings
- Information and Communications Security : 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings
- Information and Communications Security : 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings
- Information and communications security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings
- Information, Security and Cryptology – ICISC 2009 : 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers
- Integrated Management of Systems, Services, Processes and People in IT : 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2009, Venice, Italy, October 27-28, 2009. Proceedings
- Managing Virtualization of Networks and Services : 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San José, CA, USA, October 29-31, 2007. Proceedings
- Mobile Ad-Hoc and Sensor Networks : Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings
- Network-Based Information Systems : First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007. Proceedings
- Networked Services and Applications - Engineering, Control and Management : 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. Proceedings
- On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS : OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part I
- On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS : OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II
- On the Move to Meaningful Internet Systems: OTM 2008 : OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part I
- Pervasive Computing : 5th International Conference, PERVASIVE 2007, Toronto, Canada, May 13-16, 2007. Proceedings
- Pervasive Computing : 6th International Conference, Pervasive 2008 Sydney, Australia, May 19-22, 2008 Proceedings
- Pervasive Computing : 7th International Conference, Pervasive 2009, Nara, Japan, May 11-14, 2009. Proceedings
- Post-Quantum Cryptography : Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings
- Post-Quantum Cryptography : Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings
- Privacy Enhancing Technologies : 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers
- Privacy Enhancing Technologies : 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers
- Privacy Enhancing Technologies : 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings
- Programming languages and systems : 9th Asian Symposium, APLAS 2011, Kenting, Taiwan, December 5-7, 2011, Proceedings
- Progress in Cryptology - INDOCRYPT 2006 : 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings
- Progress in Cryptology - VIETCRYPT 2006 : First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006. Revised Selected Papers
- Progress in Cryptology – AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings
- Progress in Cryptology – AFRICACRYPT 2009 : Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings
- Progress in Cryptology – INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings
- Progress in cryptology - INDOCRYPT 2011 : 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011 : proceedings
- Provable Security : Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings
- Recent Advances in Intrusion Detection : 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings
- Research in Cryptology : Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers
- Safety and Security in Multiagent Systems : Research Results from 2004-2006
- Security Aspects in Information Technology : First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings
- Security Protocols : 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers
- Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings
- Security and Privacy in Ad-Hoc and Sensor Networks : Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers
- Security and Privacy in Ad-hoc and Sensor Networks : 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedings
- Selected Areas in Cryptography : 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers
- Selected Areas in Cryptography : 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers
- Selected Areas in Cryptography : 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers
- Smart Card Research and Advanced Applications : 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings
- Smart card research and advanced applications : 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011 : revised selected papers
- Stabilization, Safety, and Security of Distributed Systems : 13th International Symposium, SSS 2011, Grenoble, France, October 10-12, 2011. Proceedings
- The Internet of Things : First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedings
- Theory of Cryptography : 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings
- Theory of Cryptography : Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings
- Topics in Cryptology – CT-RSA 2007 : The Cryptographers’ Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedings
- Topics in Cryptology – CT-RSA 2008 : The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings
- Topics in Cryptology – CT-RSA 2009 : The Cryptographers’ Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings
- Transactions on Computational Science IV : Special Issue on Security in Computing
- Transactions on Data Hiding and Multimedia Security V
- Transactions on data hiding and multimedia security VI
- Trust, Privacy and Security in Digital Business : 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedings
- Trust, Privacy and Security in Digital Business : 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings
- Trust, Privacy and Security in Digital Business : 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings
- Trusted Computing - Challenges and Applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings
- Trusted Computing : Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings.
- Trustworthy Global Computing : 4th International Symposium, TGC 2008, Barcelona, Spain, November 3-4, 2008, Revised Selected Papers
- Trustworthy Global Computing : Second Symposium, TGC 2006, Lucca, Italy, November 7-9, 2006, Revised Selected Papers
- Trustworthy Global Computing : Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers
- UbiComp 2007: Ubiquitous Computing : 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007. Proceedings
- Ubiquitous Intelligence and Computing : 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007. Proceedings
- Ubiquitous Intelligence and Computing : 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings
- Wired/Wireless Internet Communications : 5th International Conference, WWIC 2007, Coimbra, Portugal, May 23-25, 2007. Proceedings
- Wired/Wireless Internet Communications : 6th International Conference, WWIC 2008 Tampere, Finland, May 28-30, 2008 Proceedings
- Wired/Wireless Internet Communications : 7th International Conference, WWIC 2009, Enschede, The Netherlands, May 27-29, 2009. Proceedings
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/resource/GGL7YjHS2lE/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/resource/GGL7YjHS2lE/">Systems and Data Security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Systems and Data Security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/resource/GGL7YjHS2lE/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/resource/GGL7YjHS2lE/">Systems and Data Security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>