Languages
Jump To : Overview | Titles | Subjects

Huang, Xinyi.

Overview
Works: 2 works in 2 publications in 1 languages
Titles
Cryptology and Network Security = 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings / by: Deng, Robert H.; Huang, Xinyi.; Mu, Yi.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Network and system security = 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013 : proceedings / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Lopez, Javier.; Huang, Xinyi.; Sandhu, Ravi.; SpringerLink (Online service) (Language materials, printed)
Network and System Security = 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings / by: Huang, Xinyi.; SpringerLink (Online service); Liu, Joseph K. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Green, Pervasive, and Cloud Computing = 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings / by: Xiang, Yang.; Huang, Xinyi.; Li, Kuan-Ching.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Green, pervasive, and cloud computing = 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016 : proceedings / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Li, Kuan-Ching.; Xiang, Yang.; Huang, Xinyi.; SpringerLink (Online service) (Language materials, printed)
Applied Cryptography in Computer and Communications = First EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings / by: Huang, Xinyi.; Chen, Bo.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Security and Privacy in Social Networks and Big Data = 8th International Symposium, SocialSec 2022, Xi'an, China, October 16–18, 2022, Proceedings / by: Huang, Xinyi.; Chen, Xiaofeng.; SpringerLink (Online service); Kutyłowski, Mirosław. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Machine Learning for Cyber Security = Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings / by: SpringerLink (Online service); Zhang, Jun.; Chen, Xiaofeng.; Huang, Xinyi. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Information Security and Cryptology = 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers / by: Huang, Xinyi.; Yung, Moti.; Guo, Fuchun.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Security and Privacy for Next-Generation Wireless Networks by: Shi, Jin.; Zhong, Hong.; Zhong, Sheng.; SpringerLink (Online service); Wang, Kun.; Xie, Lei.; Huang, Xinyi.; Yang, Panlong. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/aut]
Subjects
Computer organization. Systems and Data Security. Data protection. Artificial intelligence. Computer Communication Networks. Software engineering. Wireless and Mobile Communication. Electrical engineering. Mobile communication systems. Computer Systems Organization and Communication Networks. Information Systems Applications (incl. Internet) Algorithms. Computer and Information Systems Applications. Application software. e-Commerce/e-business. Information storage and retrieval. Artificial Intelligence. Data encryption (Computer science). Coding theory. Computer Applications. Wireless communication systems. Information Storage and Retrieval. Computers. Ubiquitous computing Software Engineering. Mobile and Network Security. Software Engineering/Programming and Operating Systems. Algorithm Analysis and Problem Complexity. Computer networks . Data Encryption. Information theory. Coding and Information Theory. Law and legislation. Communications Engineering, Networks. Computer networks Information Systems Applications (incl. Internet). Computer Science. Computers and civilization. Special purpose computers. Management of Computing and Information Systems. Computer communication systems. Computer security Security. Legal Aspects of Computing. Data mining. Cryptology. Computers and Society. Special Purpose and Application-Based Systems. Cloud computing Computer networks—Security measures. Computing Milieux. Data and Information Security. Computer security. Cryptography. Data Mining and Knowledge Discovery.
 
 
Change password
Login