Languages
Covers
Jump To : Overview | Titles | Subjects

Zhou, Jianying.

Overview
Works: 1 works in 9 publications in 1 languages
Titles
Information security = 14th international conference, ISC 2011, Xi'an, China, October 26-29, 2011 : proceedings / by: Lai, Xuejia.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :); Zhou, Jianying.; Li, Hui. (Language materials, printed)
Applied Cryptography and Network Security = 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I / by: Casalicchio, Emiliano.; Conti, Mauro.; Zhou, Jianying.; Spognardi, Angelo.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Secure multi-party non-repudiation protocols and applications by: Lopez, Javier.; Zhou, Jianying.; Onieva, Jose A.; SpringerLink (Online service) (Language materials, printed)
Security and Trust Management = 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings / by: Roman, Rodrigo.; SpringerLink (Online service); Zhou, Jianying. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Wireless sensor network security by: Zhou, Jianying.; L�opez, Javier. (Language materials, printed)
Public key cryptography - PKC 2004 = 7th International Workshop on Practice and Theory in Public Key Cryptography, Singapore, March 1-4, 2004 : proceedings / by: Deng, Robert.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :); Bao, Feng.; Zhou, Jianying. (Language materials, printed)
Security and Privacy in Communication Networks = 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009 : revised selected papers / by: Dimitriou, Tassos D.; Zhou, Jianying.; Chen, Yan.; Workshop on the Preservation of Stability under Discretization ((2001 :); SpringerLink (Online service) (Language materials, printed)
Applied Cryptography and Network Security Workshops = ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21–24, 2021, Proceedings / by: Shimaoka, Masaki.; Jin, Chenglu.; Losiouk, Eleonora.; Ahmed, Chuadhry Mujeeb.; Zhou, Jianying.; Gadyatskaya, Olga.; Maniatakos, Mihalis.; Su, Chunhua.; Majumdar, Suryadipta.; Wang, Cong.; SpringerLink (Online service); Luo, Bo.; Chattopadhyay, Sudipta.; Meng, Weizhi.; Lin, Jingqiang.; Mashima, Daisuke.; Picek, Stjepan.; Batina, Lejla. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Information and Communications Security = 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers / by: Shen, Qingni.; Xu, Zhen.; Zhou, Jianying.; Luo, Xiapu.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Applied cryptography and network security workshops = ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023 : proceedings / by: SpringerLink (Online service); Zhou, Jianying.; Workshop on the Preservation of Stability under Discretization ((2001 :) (Language materials, printed)
Show more
Subjects
Math Applications in Computer Science. Data protection. Artificial intelligence. Computer Communication Networks. Software engineering. Information networks Machine learning. Data protection Computer Systems Organization and Communication Networks. Information Systems Applications (incl.Internet) Information Systems Applications (incl. Internet) Algorithms. Application software. Electronic commerce Artificial Intelligence. Data Structures, Cryptology and Information Theory. Data encryption (Computer science). Coding theory. Mobile communication systems Computers. Public key cryptography Sensor networks Telecommunication systems Mobile and Network Security. Data Structures and Information Theory. Software Engineering/Programming and Operating Systems. Algorithm Analysis and Problem Complexity. Computer networks . Data Encryption. Operating Systems. Radio frequency identification systems Computers Coding and Information Theory. Cryptography Information theory. Law and legislation. Computer networks Data Structures. Information Systems Applications (incl. Internet). Data structures (Computer science). Computer Science. Computers and civilization. Computer Engineering and Networks. Management of Computing and Information Systems. Computer communication systems. Computer security Security. Information Systems and Communication Service. Legal Aspects of Computing. Computers and Society. Special Purpose and Application-Based Systems. Cryptology. Machine Learning. Computer networks—Security measures. Business enterprises Computing Milieux. Discrete Mathematics in Computer Science. Data encryption (Computer science) Telecommunication Data and Information Security. Computer security. Cryptography. Computer science—Mathematics. Computer organization. Computer engineering. Systems and Data Security.
 
 
Change password
Login