Languages
Jump To : Overview | Titles | Subjects

Yung, Moti.

Overview
Works: 1 works in 13 publications in 1 languages
Titles
Information security and cryptology = 6th international conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010 : revised selected papers / by: Lin, Dongdai.; Yung, Moti.; Lai, Xuejia.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :) (Language materials, printed)
Science of Cyber Security = First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers / by: SpringerLink (Online service); Yung, Moti.; Xu, Shouhuai.; Liu, Feng. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Information security applications = 11th international workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010 : revised selected papers / by: SpringerLink (Online service); Chung, Yongwha.; Yung, Moti.; Workshop on the Preservation of Stability under Discretization ((2001 :) (Language materials, printed)
Information Security and Cryptology = 4th international conference, Inscrypt 2008, Beijing, China, December 14-17, 2008 ; revised selected papers / by: Lin, Dongdai.; Yung, Moti.; Liu, Peng.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :) (Language materials, printed)
Information security applications = 13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012 : revised selected papers / by: Lee, Dong Hoon.; Workshop on the Preservation of Stability under Discretization ((2001 :); SpringerLink (Online service); Yung, Moti. (Language materials, printed)
Trusted systems = second international conference, INTRUST 2010, Beijing, China, December 13-15, 2010 : revised selected papers / by: Chen, Liqun.; SpringerLink (Online service); Yung, Moti.; Workshop on the Preservation of Stability under Discretization ((2001 :) (Language materials, printed)
Information security applications = 10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Yung, Moti.; SpringerLink (Online service); Youm, Heung Youl. (Language materials, printed)
Encyclopedia of Cryptography, Security and Privacy by: Jajodia, Sushil.; Yung, Moti.; SpringerLink (Online service); Samarati, Pierangela. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Trusted systems = 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Yung, Moti.; SpringerLink (Online service); Zhu, Liehuang.; Yang, Yanjiang. (Language materials, printed)
Cyber Security Cryptography and Machine Learning = Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings / by: Hendler, Danny.; SpringerLink (Online service); Yung, Moti.; Dolev, Shlomi.; Lodha, Sachin. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Show more
Subjects
Bioinformatics. Computer System Implementation. Computer Communication Networks. Software engineering. Complexity. Information Systems Applications (incl.Internet) Information Systems Applications (incl. Internet) Mathematical Logic and Formal Languages. Algorithms. Combinatorics. Computer and Information Systems Applications. Application software. e-Commerce/e-business. Electronic commerce Data encryption (Computer science). Coding theory. Computer Appl. in Social and Behavioral Sciences. Computational complexity. Electronic funds transfers Information Storage and Retrieval. Operating systems (Computers). Computers. Database Management. Applied mathematics. Mathematical and Computational Engineering. Software Engineering. Mobile and Network Security. Data Structures and Information Theory. Software Engineering/Programming and Operating Systems. Algorithm Analysis and Problem Complexity. Data Encryption. Operating Systems. Cryptography Computers Coding and Information Theory. Information theory. Law and legislation. Database security Applications of Mathematics. Computer networks Data Structures. Information Systems Applications (incl. Internet). Data structures (Computer science). Architecture, Computer. Computer Science. Computers and civilization. Management of Computing and Information Systems. Computer communication systems. Computer security Internet Information Systems and Communication Service. Legal Aspects of Computing. Data mining. Database management. Computer crimes. Special Purpose and Application-Based Systems. Computers and Society. Cryptology. Machine Learning. Engineering mathematics. Computer Crime. Computing Milieux. Computer science. Management information systems. Discrete Mathematics in Computer Science. Telecommunication Data encryption (Computer science) Computational Biology/Bioinformatics. Computer security. Data Mining and Knowledge Discovery. Mathematical logic. Computer science—Mathematics. Computer organization. Systems and Data Security. Math Applications in Computer Science. Data protection Computer Appl. in Administrative Data Processing. Computer Systems Organization and Communication Networks.
 
 
Change password
Login