Jump To : Overview | Titles | Subjects

Yung, Moti.

Overview
Works: 0 works in 30 publications in 1 languages
Titles
Information security applications10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers / by: (1998 :); SpringerLink (Online service); Youm, Heung Youl.; Yung, Moti. (Electronic resources)
Applied Cryptography and Network Security (vol. # 3989)4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings / by: (1998 :); Bao, Feng.; SpringerLink (Online service); Yung, Moti.; Zhou, Jianying. (Electronic resources)
Information security and cryptology13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017 : revised selected papers / by: (1998 :); Chen, Xiaofeng.; Lin, Dongdai.; SpringerLink (Online service); Yung, Moti. (Electronic resources)
Information security and cryptology20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024 : revised selected papers.Part II / by: (1998 :); Lin, Dongdai.; SpringerLink (Online service); Wang, Meiqin.; Yung, Moti. (Electronic resources)
Security and Cryptography for Networks5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings / by: (1998 :); De Prisco, Roberto.; SpringerLink (Online service); Yung, Moti. (Electronic resources)
Information security and cryptology20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024 : revised selected papers.Part I / by: (1998 :); Lin, Dongdai.; SpringerLink (Online service); Wang, Meiqin.; Yung, Moti. (Electronic resources)
Trusted systemssecond international conference, INTRUST 2010, Beijing, China, December 13-15, 2010 : revised selected papers / by: (1998 :); Chen, Liqun.; SpringerLink (Online service); Yung, Moti. (Electronic resources)
Trusted systems6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers / by: (1998 :); SpringerLink (Online service); Yang, Yanjiang.; Yung, Moti.; Zhu, Liehuang. (Electronic resources)
Show more
Subjects
Computer security. Public key cryptography Software Engineering. Mathematical Logic and Formal Languages. Mobile and Network Security. Data Structures and Information Theory. Copyright and electronic data processing Data protection Combinatorics. Cryptology. Data and Information Security. Computer and Information Systems Applications. Programming Language. Data protection. Algorithm Analysis and Problem Complexity. Management of Computing and Information Systems. Cryptography Operating Systems. Information Systems Applications (incl. Internet) Data Structures. Database Management. Computing Milieux. Data encryption (Computer science) Digital watermarking Special Purpose and Application-Based Systems. Information Storage and Retrieval. Computer Appl. in Administrative Data Processing. Principles and Models of Security. Telecommunication Legal Aspects of Computing. Electronic commerce Internet Coding and Information Theory. Database security Data Mining and Knowledge Discovery. Cyber-Physical Systems. Computer viruses Computer security Data Encryption. Information Systems Applications (incl.Internet) Privacy, Right of Computer Imaging, Vision, Pattern Recognition and Graphics. Machine Learning. Privacy. Cryptography. Computers Computer Science. Computer Communication Networks. Computers and Society. Computer networks Systems and Data Security. Electronic funds transfers Discrete Mathematics in Computer Science. Math Applications in Computer Science. Computer System Implementation. Internet of things e-Commerce/e-business. Computational Biology/Bioinformatics. Security Services.
 
 
Change password
Login