Conti, Mauro.
Overview
Works: | 2 works in 4 publications in 1 languages |
---|
Titles
Applied Cryptography and Network Security = 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I /
by:
Casalicchio, Emiliano.; Conti, Mauro.; Spognardi, Angelo.; Zhou, Jianying.; SpringerLink (Online service)
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Cryptology and Network Security = 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings /
by:
Conti, Mauro.; Krenn, Stephan.; Stevens, Marc.; SpringerLink (Online service)
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Cyberspace Safety and Security = 13th International Symposium, CSS 2021, Virtual Event, November 9–11, 2021, Proceedings /
by:
SpringerLink (Online service); Conti, Mauro.; Meng, Weizhi.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Applied Cryptography and Network Security = 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II /
by:
SpringerLink (Online service); Casalicchio, Emiliano.; Spognardi, Angelo.; Zhou, Jianying.; Conti, Mauro.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Information Systems Security = 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings /
by:
Kamakoti, V.; Gaur, Manoj Singh.; Ray, Indrajit.; SpringerLink (Online service); Sanghi, Dheeraj.; Conti, Mauro.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Trust and Trustworthy Computing = 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings /
by:
Schunter, Matthias.; Askoxylakis, Ioannis.; SpringerLink (Online service); Conti, Mauro.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Trust and trustworthy computing = 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015 : proceedings /
by:
Conti, Mauro.; Workshop on the Preservation of Stability under Discretization ((2001 :); SpringerLink (Online service); Askoxylakis, Ioannis.; Schunter, Matthias.
(Language materials, printed)
Versatile Cybersecurity
by:
Somani, Gaurav.; Conti, Mauro.; SpringerLink (Online service); Poovendran, Radha.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Cyber threat intelligence
by:
Dehghantanha, Ali.; SpringerLink (Online service); Conti, Mauro.; Dargahi, Tooska.
(Language materials, printed)
Secure Wireless Sensor Networks = Threats and Solutions /
by:
Conti, Mauro.; SpringerLink (Online service)
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/aut]
Security and Trust Management = 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings /
by:
SpringerLink (Online service); Mauw, Sjouke.; Conti, Mauro.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Secure wireless sensor networks = threats and solutions /
by:
Conti, Mauro.; SpringerLink (Online service)
(Language materials, printed)
Cyber Threat Intelligence
by:
SpringerLink (Online service); Dehghantanha, Ali.; Conti, Mauro.; Dargahi, Tooska.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Applied Cryptography and Network Security Workshops = ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings /
by:
Ahmed, Chuadhry Mujeeb.; Losiouk, Eleonora.; Portokalidis, Georgios.; Ochoa, Martín.; Zhou, Jianying.; Conti, Mauro.; Lin, Jingqiang.; Au, Man Ho.; Li, Zhou.; Meng, Weizhi.; Zhang, Kehuan.; SpringerLink (Online service); Batina, Lejla.; Luo, Bo.; Majumdar, Suryadipta.; Picek, Stjepan.; Wang, Cong.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Versatile cybersecurity
by:
Somani, Gaurav.; Conti, Mauro.; Poovendran, Radha.; SpringerLink (Online service)
(Language materials, printed)
Show more
Fewer
Subjects
Image Processing and Computer Vision.
Data protection.
Artificial intelligence.
Computer Communication Networks.
Software engineering.
Electrical engineering.
Algorithms.
Computer and Information Systems Applications.
Application software.
e-Commerce/e-business.
Coding theory.
Computers.
Mobile and Network Security.
Data Structures and Information Theory.
Wireless sensor networks
Algorithm Analysis and Problem Complexity.
Computer networks .
Coding and Information Theory.
Information Systems Applications (incl. Internet).
Data structures (Computer science).
Computer Science.
Management of Computing and Information Systems.
Computer communication systems.
Security.
Computer networks—Security measures.
Computing Milieux.
Computer science.
Management information systems.
Data encryption (Computer science)
E-commerce.
Computer security.
Computer organization.
Systems and Data Security.
Computer Systems Organization and Communication Networks.
Artificial Intelligence (incl. Robotics)
Artificial Intelligence.
Data encryption (Computer science).
Software Engineering/Programming and Operating Systems.
Data Encryption.
Information theory.
Communications Engineering, Networks.
Computer networks
Computers and civilization.
Computer security
Information Systems and Communication Service.
Internet
Data mining.
Computers and Society.
Cryptology.
Optical data processing.
Data and Information Security.
Cryptography.
Data Mining and Knowledge Discovery.