Languages
Jump To : Overview | Titles | Subjects

Yung, Moti.

Overview
Works: 1 works in 13 publications in 1 languages
Titles
Information security and cryptology = 6th international conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010 : revised selected papers / by: Lin, Dongdai.; Yung, Moti.; Lai, Xuejia.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :) (Language materials, printed)
Science of Cyber Security = First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers / by: SpringerLink (Online service); Yung, Moti.; Xu, Shouhuai.; Liu, Feng. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Information security applications = 11th international workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010 : revised selected papers / by: SpringerLink (Online service); Chung, Yongwha.; Yung, Moti.; Workshop on the Preservation of Stability under Discretization ((2001 :) (Language materials, printed)
Information Security and Cryptology = 4th international conference, Inscrypt 2008, Beijing, China, December 14-17, 2008 ; revised selected papers / by: Lin, Dongdai.; Yung, Moti.; Liu, Peng.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :) (Language materials, printed)
Trusted systems = second international conference, INTRUST 2010, Beijing, China, December 13-15, 2010 : revised selected papers / by: Chen, Liqun.; SpringerLink (Online service); Yung, Moti.; Workshop on the Preservation of Stability under Discretization ((2001 :) (Language materials, printed)
Information security applications = 13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012 : revised selected papers / by: Lee, Dong Hoon.; Workshop on the Preservation of Stability under Discretization ((2001 :); SpringerLink (Online service); Yung, Moti. (Language materials, printed)
Information security applications = 10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Yung, Moti.; SpringerLink (Online service); Youm, Heung Youl. (Language materials, printed)
Encyclopedia of Cryptography, Security and Privacy by: Jajodia, Sushil.; Yung, Moti.; SpringerLink (Online service); Samarati, Pierangela. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Trusted systems = 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Yung, Moti.; SpringerLink (Online service); Zhu, Liehuang.; Yang, Yanjiang. (Language materials, printed)
Cyber Security Cryptography and Machine Learning = Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings / by: Hendler, Danny.; SpringerLink (Online service); Yung, Moti.; Dolev, Shlomi.; Lodha, Sachin. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Show more
Subjects
Computer Communication Networks. Software engineering. Information Systems Applications (incl.Internet) Information Systems Applications (incl. Internet) Combinatorics. Application software. e-Commerce/e-business. Electronic commerce Computational complexity. Computers. Mobile and Network Security. Data Structures and Information Theory. Algorithm Analysis and Problem Complexity. Operating Systems. Data Structures. Information Systems Applications (incl. Internet). Data structures (Computer science). Management of Computing and Information Systems. Computer communication systems. Special Purpose and Application-Based Systems. Computer Crime. Data encryption (Computer science) Computer science—Mathematics. Computer organization. Data protection Computer Appl. in Administrative Data Processing. Mathematical Logic and Formal Languages. Data encryption (Computer science). Operating systems (Computers). Mathematical and Computational Engineering. Software Engineering. Software Engineering/Programming and Operating Systems. Information theory. Data mining. Telecommunication Computational Biology/Bioinformatics. Data Mining and Knowledge Discovery. Bioinformatics. Computer System Implementation. Complexity. Algorithms. Computer and Information Systems Applications. Coding theory. Computer Appl. in Social and Behavioral Sciences. Electronic funds transfers Database Management. Cryptography Computers Coding and Information Theory. Database security Applications of Mathematics. Architecture, Computer. Computer Science. Database management. Computer crimes. Engineering mathematics. Computing Milieux. Computer science. Management information systems. Discrete Mathematics in Computer Science. Computer security. Mathematical logic. Systems and Data Security. Math Applications in Computer Science. Computer Systems Organization and Communication Networks. Information Storage and Retrieval. Applied mathematics. Data Encryption. Law and legislation. Computer networks Computers and civilization. Computer security Internet Information Systems and Communication Service. Legal Aspects of Computing. Computers and Society. Cryptology. Machine Learning.
 
 
Change password
Login