Languages
Jump To : Overview | Titles | Subjects

Chen, Liqun.

Overview
Works: 1 works in 7 publications in 1 languages
Titles
Information Security = 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings / by: Schneider, Steve.; Chen, Liqun.; SpringerLink (Online service); Manulis, Mark. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Computer Security – ESORICS 2020 = 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II / by: Chen, Liqun.; SpringerLink (Online service); Li, Ninghui.; Liang, Kaitai.; Schneider, Steve. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Trusted computing = second international conference, Trust 2009, Oxford, UK, April 6-8, 2009 ; Proceedings / by: Chen, Liqun.; SpringerLink (Online service); Mitchell, Chris.; Workshop on the Preservation of Stability under Discretization ((2001 :); Martin, Andrew. (Language materials, printed)
Trusted systems = second international conference, INTRUST 2010, Beijing, China, December 13-15, 2010 : revised selected papers / by: Chen, Liqun.; SpringerLink (Online service); Yung, Moti.; Workshop on the Preservation of Stability under Discretization ((2001 :) (Language materials, printed)
Information security = 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018 : proceedings / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Schneider, Steve.; Manulis, Mark.; Chen, Liqun.; SpringerLink (Online service) (Language materials, printed)
Provable Security = 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings / by: Chen, Liqun.; SpringerLink (Online service); Han, Jinguang. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Security Standardisation Research = Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings / by: Matsuo, Shin'ichiro.; Chen, Liqun.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Information and communications security = 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008 : proceedings / by: Chen, Liqun.; SpringerLink (Online service); Wang, Guilin.; Ryan, Mark D.; Workshop on the Preservation of Stability under Discretization ((2001 :) (Language materials, printed)
Computer Security – ESORICS 2020 = 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I / by: Schneider, Steve.; Liang, Kaitai.; Li, Ninghui.; Chen, Liqun.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Information and Communications Security = 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings / by: Qing, Sihan.; Chen, Liqun.; SpringerLink (Online service); Mitchell, Chris.; Liu, Dongmei. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Show more
Subjects
Computer Communication Networks. Software engineering. Applications of Nonlinear Dynamics and Chaos Theory. Computer Systems Organization and Communication Networks. Logics and Meanings of Programs. Algorithms. Computer and Information Systems Applications. Vibration, Dynamical Systems, Control. Application software. Civil engineering. Automotive Engineering. Data Structures, Cryptology and Information Theory. Data encryption (Computer science). Engineering. Information Storage and Retrieval. Space vehicles Computers. Dynamical systems. Image processing—Digital techniques. Information Systems Applications (incl.Internet). Database Management. Telecommunication systems Software Engineering. Mobile and Network Security. Data Structures and Information Theory. Algorithm Analysis and Problem Complexity. Aerospace Technology and Astronautics. Computer logic. Data Encryption. Coding and Information Theory. Vibration. Information theory. Public key infrastructure (Computer security) Statistical physics. Law and legislation. Computer networks Data Structures. Information Systems Applications (incl. Internet). Data structures (Computer science). Computer Science. Automotive engineering. Computers and civilization. Special purpose computers. Computer vision. Management of Computing and Information Systems. Computer communication systems. Computer security Information Systems and Communication Service. Legal Aspects of Computing. Database management. Data mining. Computers and Society. Cryptology. Special Purpose and Application-Based Systems. Theoretical and Applied Mechanics. Computing Milieux. Computer science. Management information systems. User Interfaces and Human Computer Interaction. Discrete Mathematics in Computer Science. Data encryption (Computer science) Computer security. Cryptography. Computer Imaging, Vision, Pattern Recognition and Graphics. Dynamics. Data Mining and Knowledge Discovery. Computer science—Mathematics. Computer organization. Systems and Data Security. Math Applications in Computer Science. Astrodynamics. Civil Engineering. Data protection Computer Appl. in Administrative Data Processing.
 
 
Change password
Login