Lin, Dongdai.
Overview
Works: | 4 works in 13 publications in 1 languages |
---|
Titles
Information security and cryptology10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014 : revised selected papers /
by:
(1998 :); Lin, Dongdai.; SpringerLink (Online service); Yung, Moti.; Zhou, Jianying.
(Electronic resources)
Information security and cryptology13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017 : revised selected papers /
by:
(1998 :); Chen, Xiaofeng.; Lin, Dongdai.; SpringerLink (Online service); Yung, Moti.
(Electronic resources)
Advances in cryptology - ASIACRYPT 202228th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022 : proceedings.Part IV /
by:
(1998 :); Agrawal, Shweta.; Lin, Dongdai.; SpringerLink (Online service)
(Electronic resources)
Information security and cryptology6th international conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010 : revised selected papers /
by:
(1998 :); Lai, Xuejia.; Lin, Dongdai.; SpringerLink (Online service); Yung, Moti.
(Electronic resources)
Advances in cryptology - ASIACRYPT 202228th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022 : proceedings.Part III /
by:
(1998 :); Agrawal, Shweta.; Lin, Dongdai.; SpringerLink (Online service)
(Electronic resources)
Public-key cryptography - PKC 201922nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019 : proceedings.Part II /
by:
(1998 :); Lin, Dongdai.; Sako, Kazue.; SpringerLink (Online service)
(Electronic resources)
Public-key cryptography - PKC 201922nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019 : proceedings.Part I /
by:
(1998 :); Lin, Dongdai.; Sako, Kazue.; SpringerLink (Online service)
(Electronic resources)
Information security and cryptology12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016 : revised selected papers /
by:
(1998 :); Chen, Kefei.; Lin, Dongdai.; SpringerLink (Online service); Yung, Moti.
(Electronic resources)
Information security and cryptology7th international conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011 : revised selected papers /
by:
(1998 :); Lin, Dongdai.; SpringerLink (Online service); Wu, Chuan-Kun.; Yung, Moti.
(Electronic resources)
Information Security and Cryptology4th international conference, Inscrypt 2008, Beijing, China, December 14-17, 2008 ; revised selected papers /
by:
(1998 :); Lin, Dongdai.; Liu, Peng.; SpringerLink (Online service); Yung, Moti.
(Electronic resources)
Advances in cryptology - ASIACRYPT 202228th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022 : proceedings.Part I /
by:
(1998 :); Agrawal, Shweta.; Lin, Dongdai.; SpringerLink (Online service)
(Electronic resources)
Information security and cryptology11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015 : revised selected papers /
by:
(1998 :); Lin, Dongdai.; SpringerLink (Online service); Wang, XiaoFeng.; Yung, Moti.
(Electronic resources)
Cryptology and network security10th international conference, CANS 2011, Sanya, China, December 10-12, 2011 : proceedings /
by:
(1998 :); Lin, Dongdai.; SpringerLink (Online service); Tsudik, Gene.; Wang, Xiaoyun.
(Electronic resources)
Information security and cryptology9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013 : revised selected papers /
by:
(1998 :); Lin, Dongdai.; SpringerLink (Online service); Xu, Shouhuai.; Yung, Moti.
(Electronic resources)
Show more
Fewer
Subjects
Data Structures, Cryptology and Information Theory.
Software Engineering.
Public key cryptography
Mobile and Network Security.
Cryptology.
Computer and Information Systems Applications.
Numerical Analysis.
Cryptography
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Information Systems Applications (incl. Internet)
Data encryption (Computer science)
Computer Appl. in Administrative Data Processing.
Special Purpose and Application-Based Systems.
Coding and Information Theory.
Legal Aspects of Computing.
Data Mining and Knowledge Discovery.
Computer Engineering and Networks.
Computer security
Data Encryption.
Computers and Society.
Computer Science.
Computer Communication Networks.
Systems and Data Security.
Computer networks
Discrete Mathematics in Computer Science.
Computer Systems Organization and Communication Networks.
Computer System Implementation.
e-Commerce/e-business.
Security Services.