Picek, Stjepan.
Overview
Works: | 0 works in 1 publications in 1 languages |
---|
Titles
Applied Cryptography and Network Security Workshops = ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21–24, 2021, Proceedings /
by:
Gadyatskaya, Olga.; Maniatakos, Mihalis.; Chattopadhyay, Sudipta.; Su, Chunhua.; Majumdar, Suryadipta.; Meng, Weizhi.; Picek, Stjepan.; Shimaoka, Masaki.; Jin, Chenglu.; Wang, Cong.; Losiouk, Eleonora.; Ahmed, Chuadhry Mujeeb.; Batina, Lejla.; Zhou, Jianying.; SpringerLink (Online service); Luo, Bo.; Lin, Jingqiang.; Mashima, Daisuke.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Security, Privacy, and Applied Cryptography Engineering = 10th International Conference, SPACE 2020, Kolkata, India, December 17–21, 2020, Proceedings /
by:
Picek, Stjepan.; Mondal, Mainack.; Batina, Lejla.; SpringerLink (Online service)
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Security, Privacy, and Applied Cryptography Engineering = 11th International Conference, SPACE 2021, Kolkata, India, December 10–13, 2021, Proceedings /
by:
SpringerLink (Online service); Mondal, Mainack.; Batina, Lejla.; Picek, Stjepan.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Applied Cryptography and Network Security Workshops = ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings /
by:
Ahmed, Chuadhry Mujeeb.; Losiouk, Eleonora.; Portokalidis, Georgios.; Ochoa, Martín.; Zhang, Kehuan.; Zhou, Jianying.; SpringerLink (Online service); Batina, Lejla.; Conti, Mauro.; Lin, Jingqiang.; Luo, Bo.; Au, Man Ho.; Li, Zhou.; Meng, Weizhi.; Majumdar, Suryadipta.; Picek, Stjepan.; Wang, Cong.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Security, Privacy, and Applied Cryptography Engineering = 12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings /
by:
Picek, Stjepan.; SpringerLink (Online service); Mondal, Mainack.; Batina, Lejla.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Applied Cryptography and Network Security Workshops = ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20–23, 2022, Proceedings /
by:
Shao, Jun.; Su, Chunhua.; Chattopadhyay, Sudipta.; Majumdar, Suryadipta.; Meng, Weizhi.; Zhauniarovich, Yury.; Picek, Stjepan.; Casalicchio, Emiliano.; Alcaraz, Cristina.; Wang, Cong.; Jin, Chenglu.; Losiouk, Eleonora.; SpringerLink (Online service); Zhou, Jianying.; Adepu, Sridhar.; Batina, Lejla.; Lin, Jingqiang.; Zonouz, Saman.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Security, privacy, and applied cryptography engineering = 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022 : proceedings /
by:
Workshop on the Preservation of Stability under Discretization ((2001 :); Picek, Stjepan.; SpringerLink (Online service); Mondal, Mainack.; Batina, Lejla.
(Language materials, printed)
Security and Artificial Intelligence = A Crossdisciplinary Approach /
by:
Batina, Lejla.; SpringerLink (Online service); Buhan, Ileana.; Picek, Stjepan.; Bäck, Thomas.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Subjects
Computer organization.
Computer engineering.
Computer Application in Social and Behavioral Sciences.
Systems and Data Security.
Artificial intelligence.
Data protection.
Computer Communication Networks.
Computer Systems Organization and Communication Networks.
Computer and Information Systems Applications.
Application software.
Artificial Intelligence.
Data encryption (Computer science).
Coding theory.
Social sciences—Data processing.
Computers.
Image processing—Digital techniques.
Security Services.
Mobile and Network Security.
Data Structures and Information Theory.
Computer networks .
Coding and Information Theory.
Information theory.
Data structures (Computer science).
Computer Engineering and Networks.
Computer vision.
Computer security
Information Systems and Communication Service.
Cryptology.
Computer networks—Security measures.
Computing Milieux.
Data and Information Security.
Data encryption (Computer science)
Computer security.
Cryptography.
Computer Imaging, Vision, Pattern Recognition and Graphics.