Moti Yung

John Wiley & Sons · Springer

Titel ISBN-13Erschei-
nungsjahr
andere Autoren
Advances in Cryptology - CRYPTO 2002: 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings ... Notes in Computer Science , Band 2442) 978-3-540-44050-52008
Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings 978-3-540-34703-32008Feng Bao · Jianying Zhou
Applied Cryptography and Network Security: 5th International Conference, ACNS 2007 Zhuhai, China, June 5-8, 2007 Proceedings 978-3-540-72737-82009Jonathan Katz
Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings 978-3-642-13707-52010Jianying Zhou
Applied Cryptography and Network Security: First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings 978-3-540-20208-02008Yongfei Han · Jianying Zhou
Applied Cryptography and Network Security: Second International Conference, ACNS 2004 Yellow Mountain, China, June 8-11, 2004 Proceedings 978-3-540-22217-02009Markus Jakobsson · Jianying Zhou
Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings 978-3-540-26223-72008Angelos Keromytis · John Ioannidis
Automata, Languages and Programming: 32nd International Colloquim, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings 978-3-540-27580-02005Luis Caires · Guiseppe F. Italiano · Luis Monteiro · Catuscia Palamidessi
Computer Security -- ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings 978-3-642-33166-42012Sara Foresti · Fabio Martinelli
Digital Rights Management: Technologies, Issues, Challenges and Systems 978-3-540-35998-22008Reihaneh Safavi-Naini
Financial Cryptography and Data Security: 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 - March 3, 2005, ... Notes in Computer Science, Band 3570) 978-3-540-26656-32008Andrew S. Patrick
Information Security: 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings 978-3-642-04473-12010Pierangela Samarati · Fabio Martinelli · Claudio A. Ardagna
Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers 978-3-642-01439-02010Peng Liu · Dongdai Lin
Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers 978-3-642-16341-82010Feng Bao · Dongdai Lin · Jiwu Jing
Information Security and Cryptology: 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers 978-3-642-21517-92011Xuejia Lai · Dongdai Lin
Information Security and Cryptology: 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected ... Notes in Computer Science, Band 7537) 978-3-642-34703-02012Chuan-Kun Wu · Dongdai Lin
Information Security and Cryptology: 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers 978-3-642-38518-62013Miroslaw Kutylowski
Information Security and Cryptology: 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers 978-3-319-12086-72014Dongdai Lin · Shouhuai Xu
Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers 978-3-319-16744-22015Dongdai Lin · Jianying Zhou
Information Security and Cryptology: 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers 978-3-319-38897-72016Dongdai Lin · XiaoFeng Wang
Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers 978-3-319-54704-62017Kefei Chen · Dongdai Lin
Information Security and Cryptology: 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers 978-3-319-75159-72018Xiaofeng Chen · Dongdai Lin
Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings 978-3-540-30855-32008Dongdai Lin · Dengguo Feng
Information Security and Cryptology: Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings 978-3-540-49608-32006Helger Lipmaa · Donghai Lin
Information Security Applications: 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers 978-3-540-20827-32009Kijoon Chae
Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers 978-3-540-24015-02005Chae Hoon Lim
Information Security Applications: 6th International Workshop, WISA 2005 Jeju Island, Korea, August 2005 Revised Selected Papers: 6th International ... Notes in Computer Science , Band 3786) 978-3-540-31012-92009Jooseok Song · Taekyoung Kwon
Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers 978-3-540-77534-82010Kim Sehun · Hyung-Woo Lee
Information Security Applications: 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers 978-3-642-00305-92009Kiwook Sohn
Information Security Applications: 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers 978-3-642-10837-22010Heung Youl Youm
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers 978-3-642-17954-92011Yongwha Chung
Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers 978-3-642-27889-12012Souhwan Jung
Information Security Applications: 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers 978-3-642-35415-12012Dong Hoon Lee
Malicious Cryptography: Exposing Cryptovirology
978-0-7645-4975-52004Adam Young
Network and System Security: 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings 978-3-319-25644-32015Meikang Qiu · Shouhuai Xu · Haibo Zhang
Network and System Security: 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings 978-3-319-46297-42016Jiageng Chen · Vincenzo Piuri · Chunhua Su
Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology: Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, ... Notes in Computer Science, Band 10311) 978-3-319-61272-02017Raphaël C.-W. Phan
Practical Signcryption 978-3-540-89409-42010Alexander W. Dent · Yuliang Zheng
Progress in Cryptology - INDOCRYPT 2007: 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings ... Computer Science / Security and Cryptology) 978-3-540-77025-12007K. Srinathan · C. Pandu Rangan
Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, ... Notes in Computer Science, Band 3958) 978-3-540-33851-22010Yevgeniy Dodis · Aggelos Kiayias · Tal Malkin
Science of Cyber Security: Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers 978-3-030-34636-22019Feng Liu · Jia Xu · Shouhuai Xu
Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings 978-3-540-38080-12008Roberto De Prisco
Stabilization, Safety, and Security of Distributed Systems: 12th International Symposium, SSS 2010, New York, NY, USA, September 20-22, 2010, Proceedings 978-3-642-16022-62010Shlomi Dolev · Jorge Cobb · Michael Fischer
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers 978-3-319-27997-82016Liehuang Zhu · Yanjiang Yang
Trusted Systems: 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers 978-3-319-31549-22016Jianbiao Zhang · Zhen Yang
Trusted Systems: First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings 978-3-642-14596-42010Liqun Chen
Trusted Systems: Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers 978-3-642-25282-22011  "
Trusted Systems: Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers 978-3-642-32297-62012Liqun Chen · Liehuang Zhu

Matt Young · Matthew Young · M.D. Young · Moti Young · Moti Yung Jianying Zhou · Moti Yung Liqun Chen

 

Moti Yung Jianying Zhou