Cryptographic Algorithms.- Authentication and Identity Management.- Authorization and Access Control.- Biometrics and Computer Forensics.- Cryptographic Protocols.- Data Integrity and Privacy.- Key Management and Recovery.- Mobile and RFID Network Security.- Firewall, IDS, Anti-virus, and Other Security Products.- Internet and Web Services Security.- Cyber-attack and Cyber-terrorism.- Other Security Research.- MoWiN 2009.- NASSUE 2009.- IAWSN 2009.- WNGS 2009 and CGMS 2009.- SHCI-ISA 2009.
Ask a Question About this Product More... |