Languages
Covers
Jump To : Overview | Titles | Subjects

Yung, Moti.

Overview
Works: 1 works in 19 publications in 1 languages
Titles
Information security and cryptology = 6th international conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010 : revised selected papers / by: Lin, Dongdai.; Yung, Moti.; Lai, Xuejia.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :) (Language materials, printed)
Information security and cryptology = 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024 : revised selected papers.. Part II / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Yung, Moti.; Wang, Meiqin.; SpringerLink (Online service); Lin, Dongdai. (Language materials, printed)
Science of Cyber Security = First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers / by: SpringerLink (Online service); Yung, Moti.; Xu, Shouhuai.; Liu, Feng. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Information security applications = 11th international workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010 : revised selected papers / by: SpringerLink (Online service); Chung, Yongwha.; Yung, Moti.; Workshop on the Preservation of Stability under Discretization ((2001 :) (Language materials, printed)
Information Security and Cryptology = 4th international conference, Inscrypt 2008, Beijing, China, December 14-17, 2008 ; revised selected papers / by: Lin, Dongdai.; Yung, Moti.; Liu, Peng.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :) (Language materials, printed)
Trusted systems = second international conference, INTRUST 2010, Beijing, China, December 13-15, 2010 : revised selected papers / by: Chen, Liqun.; SpringerLink (Online service); Yung, Moti.; Workshop on the Preservation of Stability under Discretization ((2001 :) (Language materials, printed)
Information security applications = 13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012 : revised selected papers / by: Lee, Dong Hoon.; Workshop on the Preservation of Stability under Discretization ((2001 :); SpringerLink (Online service); Yung, Moti. (Language materials, printed)
Information security applications = 10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Yung, Moti.; SpringerLink (Online service); Youm, Heung Youl. (Language materials, printed)
Encyclopedia of Cryptography, Security and Privacy by: Jajodia, Sushil.; Yung, Moti.; SpringerLink (Online service); Samarati, Pierangela. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Trusted systems = 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Yung, Moti.; SpringerLink (Online service); Zhu, Liehuang.; Yang, Yanjiang. (Language materials, printed)
Show more
Subjects
Bioinformatics. Computer System Implementation. Computer Communication Networks. Software engineering. Internet of things Complexity. Information Systems Applications (incl.Internet) Information Systems Applications (incl. Internet) Algorithms. Combinatorics. Computer and Information Systems Applications. Application software. e-Commerce/e-business. Electronic commerce Coding theory. Computer Appl. in Social and Behavioral Sciences. Computational complexity. Electronic funds transfers Information Storage and Retrieval. Operating systems (Computers). Computers. Database Management. Applied mathematics. Mathematical and Computational Engineering. Software Engineering. Mobile and Network Security. Security Services. Data Structures and Information Theory. Software Engineering/Programming and Operating Systems. Algorithm Analysis and Problem Complexity. Data Encryption. Operating Systems. Cryptography Computers Coding and Information Theory. Information theory. Law and legislation. Privacy. Database security Applications of Mathematics. Programming Language. Computer networks Data Structures. Information Systems Applications (incl. Internet). Data structures (Computer science). Architecture, Computer. Computer Science. Computers and civilization. Management of Computing and Information Systems. Computer communication systems. Computer security Internet Information Systems and Communication Service. Legal Aspects of Computing. Data mining. Database management. Computer crimes. Special Purpose and Application-Based Systems. Computers and Society. Cryptology. Machine Learning. Cyber-Physical Systems. Engineering mathematics. Computer Crime. Computing Milieux. Computer science. Management information systems. Discrete Mathematics in Computer Science. Principles and Models of Security. Telecommunication Data encryption (Computer science) Computational Biology/Bioinformatics. Data and Information Security. Computer security. Computer Imaging, Vision, Pattern Recognition and Graphics. Data Mining and Knowledge Discovery. Mathematical logic. Computer science—Mathematics. Computer organization. Systems and Data Security. Math Applications in Computer Science. Data protection Computer Appl. in Administrative Data Processing. Computer Systems Organization and Communication Networks. Mathematical Logic and Formal Languages. Data encryption (Computer science).
 
 
Change password
Login