Languages
Zhu, Liehuang.
Overview
| Works: | 27 works in 7 publications in 1 languages | |
|---|---|---|
Titles
Edge computing resilience = overcoming resource constraints in unstable computing environments /
by:
Zhu, Liehuang.; SpringerLink (Online service); Mudassar, Muhammad.; Zhai, Yanlong.
(Electronic resources)
Trusted systems = 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers /
by:
Yung, Moti.; Zhu, Liehuang.; SpringerLink (Online service); Yang, Yanjiang.
(Electronic resources)
Trusted systems = third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011 : revised selected papers /
by:
Chen, Liqun.; Yung, Moti.; Zhu, Liehuang.; SpringerLink (Online service)
(Electronic resources)
Trusted computing and information security = 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019 : revised selected papers /
by:
Zhu, Liehuang.; SpringerLink (Online service); Chinese Conference on Trusted Computing and Information Security (2019 :); Han, Weili.; Yan, Fei.
(Electronic resources)
Mobile ad-hoc and sensor networks = 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017 : revised selected papers /
by:
Zhu, Liehuang.; SpringerLink (Online service); International Conference on Mobile Ad-Hoc and Sensor Networks (2017 :); Zhong, Sheng.
(Electronic resources)
Blockchain = empowering secure data sharing /
by:
Zhu, Liehuang.; SpringerLink (Online service); Shen, Meng.; Xu, Ke.
(Electronic resources)
Secure and privacy-preserving data communication in Internet of Things
by:
Zhu, Liehuang.; SpringerLink (Online service); Zhang, Zijian.; Xu, Chang.
(Electronic resources)
Subjects
Communications Engineering, Networks.
Ad hoc networks (Computer networks)
Mobile and Network Security.
Mobile Computing.
Sensor networks
Cryptology.
Computer and Information Systems Applications.
Management of Computing and Information Systems.
Operating Systems.
Internet of things- Security measures.
Security Science and Technology.
Mobile communication systems
Information Systems Applications (incl. Internet)
Data encryption (Computer science)
Computer Appl. in Administrative Data Processing.
Wireless sensor networks- Security measures.
Information Storage and Retrieval.
Edge computing.
Computer networks- Security measures
Cyber-Physical Systems.
Computer security
Data Encryption.
Big data.
Computer Science.
Systems and Data Security.
Computer Communication Networks.
Computers and Society.
Discrete Mathematics in Computer Science.
Engineering.
Blockchains (Databases)
Security Services.
Internet of Things.