Languages
Covers
Jump To : Overview | Titles | Subjects

Yung, Moti.

Overview
Works: 1 works in 27 publications in 1 languages
Titles
Information security applications = 9th international workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, revised selected papers / by: Yung, Moti.; SpringerLink (Online service); Chung, Kyo-Il.; Sohn, Kiwook.; WISA 2008 ((2008 :) (Language materials, printed)
Applied cryptography and network security = second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings / by: Jakobsson, Markus.; Yung, Moti.; Zhou, Jianying.; SpringerLink (Online service); ACNS 2004 ((2004 :) (Language materials, printed)
Information security and cryptology = 17th International Conference, Inscrypt 2021, virtual event, August 12-14, 2021 : revised selected papers / by: Yung, Moti.; SpringerLink (Online service); Inscrypt (Conference) (2021 :); Yu, Yu. (Electronic resources)
Information security and cryptology = 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024 : revised selected papers.. Part II / by: Lin, Dongdai.; Yung, Moti.; SpringerLink (Online service); Inscrypt (Conference) (2024 :); Wang, Meiqin. (Electronic resources)
Information security and cryptology = 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017 : revised selected papers / by: Lin, Dongdai.; Yung, Moti.; SpringerLink (Online service); Inscrypt (Conference) (2017 :); Chen, Xiaofeng. (Electronic resources)
Information security and cryptology = 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024 : revised selected papers.. Part I / by: Lin, Dongdai.; Yung, Moti.; SpringerLink (Online service); Wang, Meiqin.; Inscrypt (Conference) (2024 :) (Electronic resources)
Trusted systems = First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009 : revised selected papers / by: Yung, Moti.; SpringerLink (Online service); Chen, Liqun.; INTRUST 2009 ((2009 :) (Language materials, printed)
Information Security Applications = 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers / by: Yung, Moti.; SpringerLink (Online service); Lim, Chae Hoon.; WISA 2004 ((2004 :) (Language materials, printed)
Trusted systems = 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers / by: Yung, Moti.; SpringerLink (Online service); Zhu, Liehuang.; Yang, Yanjiang. (Electronic resources)
Show more
Subjects
Telecommunication- Security measures Cryptographie Electronic funds transfers- Security measures Software Engineering. Mathematical Logic and Formal Languages. Mobile and Network Security. Data Structures and Information Theory. Data protection Combinatorics. Cryptology. Data and Information Security. Computer and Information Systems Applications. Programming Language. Cryptography T歋l歋communications- S歋curit歋 Algorithm Analysis and Problem Complexity. Management of Computing and Information Systems. Operating Systems. Information Systems Applications (incl. Internet) Data Structures. Database Management. Internet of things- Security measures Computing Milieux. Data encryption (Computer science) Special Purpose and Application-Based Systems. Information Storage and Retrieval. Computer Appl. in Administrative Data Processing. Principles and Models of Security. Computer networks- Security measures Coding and Information Theory. Database security Legal Aspects of Computing. Data Mining and Knowledge Discovery. Cyber-Physical Systems. Chiffrement (Informatique) Data Encryption. Information Systems Applications (incl.Internet) Internet- Security measures Computer security Computer networks- Access control Computers- Access control Computer Imaging, Vision, Pattern Recognition and Graphics. Machine Learning. Privacy. Data protection- International cooperation Computer Science. Computer Communication Networks. Electronic commerce- Security measures Computers and Society. Data protection- Congresses. Systems and Data Security. Discrete Mathematics in Computer Science. Computer System Implementation. Computer security- International cooperation e-Commerce/e-business. Computational Biology/Bioinformatics. Security Services.
 
 
Change password
Login