Huang, Xinyi.
Overview
            | Works: | 2 works in 4 publications in 1 languages | |
|---|---|---|
Titles
          
                  
                    Cryptology and Network Security = 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings /
                  
                  by: 
                  Deng, Robert H.; Huang, Xinyi.; Mu, Yi.; SpringerLink (Online service)
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/edt]
                  
                
                  
                    Network and system security = 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013 : proceedings /
                  
                  by: 
                  Workshop on the Preservation of Stability under Discretization ((2001 :); Lopez, Javier.; Huang, Xinyi.; Sandhu, Ravi.; SpringerLink (Online service)
                  (Language materials, printed)
                  
                  
                
                  
                    Network and System Security = 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings /
                  
                  by: 
                  Huang, Xinyi.; SpringerLink (Online service); Liu, Joseph K.
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/edt]
                  
                
                  
                    Green, Pervasive, and Cloud Computing = 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings /
                  
                  by: 
                  Xiang, Yang.; Huang, Xinyi.; Li, Kuan-Ching.; SpringerLink (Online service)
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/edt]
                  
                
                  
                    Green, pervasive, and cloud computing = 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016 : proceedings /
                  
                  by: 
                  Workshop on the Preservation of Stability under Discretization ((2001 :); Li, Kuan-Ching.; Xiang, Yang.; Huang, Xinyi.; SpringerLink (Online service)
                  (Language materials, printed)
                  
                  
                
                  
                    Data security and privacy protection = second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024 : proceedings.. Part II /
                  
                  by: 
                  SpringerLink (Online service); Yung, Moti.; Huang, Xinyi.; Chen, Xiaofeng.; Workshop on the Preservation of Stability under Discretization ((2001 :)
                  (Language materials, printed)
                  
                  
                
                  
                    Security and Privacy in Social Networks and Big Data = 8th International Symposium, SocialSec 2022, Xi'an, China, October 16–18, 2022, Proceedings /
                  
                  by: 
                  Huang, Xinyi.; Chen, Xiaofeng.; SpringerLink (Online service); Kutyłowski, Mirosław.
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/edt]
                  
                
                  
                    Applied Cryptography in Computer and Communications = First EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings /
                  
                  by: 
                  Huang, Xinyi.; Chen, Bo.; SpringerLink (Online service)
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/edt]
                  
                
                  
                    Data security and privacy protection = second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024 : proceedings.. Part I /
                  
                  by: 
                  Huang, Xinyi.; Chen, Xiaofeng.; Workshop on the Preservation of Stability under Discretization ((2001 :); SpringerLink (Online service); Yung, Moti.
                  (Language materials, printed)
                  
                  
                
                  
                    Machine Learning for Cyber Security = Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings /
                  
                  by: 
                  SpringerLink (Online service); Zhang, Jun.; Chen, Xiaofeng.; Huang, Xinyi.
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/edt]
                  
                
                
                  
                    
                      
                         Information Security and Cryptology = 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers /
                      
                      by: 
                      Huang, Xinyi.; Yung, Moti.; Guo, Fuchun.; SpringerLink (Online service)
                      (Language materials, printed)
                      , [http://id.loc.gov/vocabulary/relators/edt]
                      
                    
                      
                        Security and Privacy for Next-Generation Wireless Networks
                      
                      by: 
                      Shi, Jin.; Zhong, Hong.; Zhong, Sheng.; SpringerLink (Online service); Wang, Kun.; Xie, Lei.; Huang, Xinyi.; Yang, Panlong.
                      (Language materials, printed)
                      , [http://id.loc.gov/vocabulary/relators/aut]
                      
                    
                  
                  
                      Show more
                    
                    
                      Fewer
                    
                  Subjects
          
            
              
                Computer organization.
              
            
              
                Systems and Data Security.
              
            
              
                Data protection.
              
            
              
                Artificial intelligence.
              
            
              
                Computer Communication Networks.
              
            
              
                Software engineering.
              
            
              
                Wireless and Mobile Communication.
              
            
              
                Electrical engineering.
              
            
              
                Mobile communication systems.
              
            
              
                Computer Systems Organization and Communication Networks.
              
            
              
                Information Systems Applications (incl. Internet)
              
            
              
                Algorithms.
              
            
              
                Computer and Information Systems Applications.
              
            
              
                Application software.
              
            
              
                e-Commerce/e-business.
              
            
              
                Information storage and retrieval.
              
            
              
                Artificial Intelligence.
              
            
              
                Data encryption (Computer science).
              
            
              
                Coding theory.
              
            
              
                Computer Applications.
              
            
              
                Wireless communication systems.
              
            
              
                Information Storage and Retrieval.
              
            
              
                Computers.
              
            
              
                Ubiquitous computing
              
            
              
                Principles and Models of Security.
              
            
              
                Data and Information Security.
              
            
              
                Computer security.
              
            
              
                Cryptography.
              
            
              
                Data Mining and Knowledge Discovery.
              
            
              
                Software Engineering.
              
            
              
                Mobile and Network Security.
              
            
              
                Security Services.
              
            
              
                Software Engineering/Programming and Operating Systems.
              
            
              
                Algorithm Analysis and Problem Complexity.
              
            
              
                Computer networks .
              
            
              
                Data Encryption.
              
            
              
                Information theory.
              
            
              
                Coding and Information Theory.
              
            
              
                Law and legislation.
              
            
              
                Privacy.
              
            
              
                Communications Engineering, Networks.
              
            
              
                Computer networks
              
            
              
                Information Systems Applications (incl. Internet).
              
            
              
                Computer Science.
              
            
              
                Computers and civilization.
              
            
              
                Special purpose computers.
              
            
              
                Management of Computing and Information Systems.
              
            
              
                Computer communication systems.
              
            
              
                Computer security
              
            
              
                Security.
              
            
              
                Legal Aspects of Computing.
              
            
              
                Data mining.
              
            
              
                Cryptology.
              
            
              
                Computers and Society.
              
            
              
                Special Purpose and Application-Based Systems.
              
            
              
                Cloud computing
              
            
              
                Computer networks—Security measures.
              
            
              
                Computing Milieux.