Showing 1 - 20 results of 22 for search 'Zhou, Jianying', query time: 0.07s
Refine Results
-
1
Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings / edited by Jianying Zhou, Javier Lopez, Robert H. Deng, Feng Bao. by Zhou, Jianying
Published 2005Call Number: Loading…Full text (Wentworth users only).
Located: Loading…
Electronic eBook -
2
Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings / edited by Jianying Zhou, Moti Yung, Feng Bao. by Zhou, Jianying
Published 2006Call Number: Loading…Full text (Wentworth users only).
Located: Loading…
Electronic eBook -
3
Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings / edited by Jianying Zhou, Moti Yung. by Zhou, Jianying
Published 2010Call Number: Loading…Full text (Wentworth users only).
Located: Loading…
Electronic eBook -
4
Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014. Proceedings / edited by Jianying Zhou, Nurit Gal-Oz, Jie Zhang, Ehud Gude... by Zhou, Jianying
Published 2014Call Number: Loading…Full text (Wentworth users only)
Located: Loading…
Electronic eBook -
5
Applied public key infrastructure : 4th International Workshop : IWAP 2005 / edited by Jianying Zhou [and others].
Published 2005Other Authors: “…Zhou, Jianying…”
Call Number: Loading…Full text (Wentworth users only)
Located: Loading…
Electronic Conference Proceeding eBook -
6
Security and Privacy in Communication Networks 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings / edited by Sushil Jajodia, Jianying Z... by Jajodia, Sushil
Published 2010Other Authors: “…Zhou, Jianying…”
Call Number: Loading…Full text (Wentworth users only).
Located: Loading…
Electronic eBook -
7
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Gr... by Ardagna, Claudio Agostino
Published 2011Other Authors: “…Zhou, Jianying…”
Call Number: Loading…Full text (Wentworth users only).
Located: Loading…
Electronic eBook -
8
Radio frequency identification system security : RFIDsec'10 Asia Workshop proceedings / edited by Yingjiu Li and Jianying Zhou.
Published 2010Other Authors:Call Number: Loading…Full text (Wentworth users only)
Located: Loading…
Electronic eBook -
9
Wireless sensor network security / edited by Javier Lopez and Jianying Zhou.
Published 2008Other Authors:Call Number: Loading…Full text (Wentworth users only)
Located: Loading…
Electronic eBook -
10
Secure Multi-Party Non-Repudiation Protocols and Applications by José A. Onieva, Javier Lopez, Jianying Zhou. by Onieva, Jose A.
Published 2009Other Authors:Call Number: Loading…Full text (Wentworth users only).
Located: Loading…
Electronic eBook -
11
Information Security 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings / edited by Xuejia Lai, Jianying Zhou, Hui Li. by Lai, Xuejia
Published 2011Other Authors: “…Zhou, Jianying…”
Call Number: Loading…Full text (Wentworth users only).
Located: Loading…
Electronic eBook -
12
Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings / edited by Feng Bao, Pierangela Samarati, Jianying Zho... by Bao, Feng
Published 2012Other Authors:Call Number: Loading…Full text (Wentworth users only).
Located: Loading…
Electronic eBook -
13
Security and Trust Management 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings / edited by Rodrigo Roman, Jianying Zhou.
Published 2021Other Authors:Call Number: Loading…Full text (Wentworth users only)
Located: Loading…
Electronic eBook -
14
Security and Privacy in Communication Networks 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers / edited by Yan Ch... by Chen, Yan
Published 2009Other Authors:Call Number: Loading…Full text (Wentworth users only).
Located: Loading…
Electronic eBook -
15
Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings / edited by Robert H. Deng, Feng Bao, HweeHwa Pan... by Deng, Robert H.
Published 2005Other Authors:Call Number: Loading…Full text (Wentworth users only).
Located: Loading…
Electronic eBook -
16
Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedings / edited by Kefei Chen, Robert Deng, Xueji... by Chen, Kefei, 1959-
Published 2006Other Authors:Call Number: Loading…Full text (Wentworth users only).
Located: Loading…
Electronic eBook -
17
Information and Communications Security 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings / edited by Weizhi Meng, Dieter Gollmann, Ch...
Published 2020Other Authors:Call Number: Loading…Full text (Wentworth users only)
Located: Loading…
Electronic eBook -
18
Protecting mobile networks and devices : challenges and solutions / edited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou.
Published 2017Other Authors:Call Number: Loading…Full text (WIT users only)
Located: Loading…
Electronic eBook -
19
Applied Cryptography and Network Security Workshops ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Procee...
Published 2020Other Authors: “…Zhou, Jianying…”
Call Number: Loading…Full text (Wentworth users only)
Located: Loading…
Electronic eBook -
20
Applied Cryptography and Network Security Workshops ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20–23, 2022, Procee...
Published 2022Other Authors: “…Zhou, Jianying…”
Call Number: Loading…Full text (Wentworth users only)
Located: Loading…
Electronic eBook
Search Tools:
Related Subjects
Data encryption (Computer science)
Computer networks
Computer science
Information storage and retrieval systems
Data protection
Computer software
Computers
Data structures (Computer science)
Operating systems (Computers)
Computer security
Security measures
Computer organization
Artificial intelligence
Computer engineering
Cryptography
Software engineering
Application software
Coding theory
Computational complexity
Computer network architectures
Computer networks—Security measures
Detectors
Law and legislation
Mobile communication systems
Public key cryptography
Public key infrastructure (Computer security)
Radio frequency identification systems
Sensor networks
Smartphones