Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher von Jianying Zhou

Filter
Filter
Ordnen nachSortieren Beliebt
  • - Acns 2023 Satellite Workshops, Adsc, Aiblock, Aihws, Aiots, Cimss, Cloud S&p, Sci, Secmt, Simla, Kyoto, Japan, June 19-22, 2023, Proceedings
    von Jianying Zhou
    86,00 €

    This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023.The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops: - 1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023) - 5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023) - 4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023) - 5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023) - 3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023) - 5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023) - 4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023) - 4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023) - 5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023)

  • von Jun Shao, Cong Wang, Jianying Zhou, usw.
    50,00 €

  • von Jie Zhang, Jianying Zhou, Ehud Gudes & usw.
    50,00 €

  • - First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings
    von Robert H. Deng
    50,00 €

    The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.

  • - 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004
    von Feng Bao
    75,00 €

  • von Petra Perner, Jianying Zhou & Dieter Gollmann
    71,00 - 79,00 €

  • von Moti Yung, Markus Jakobsson & Jianying Zhou
    50,00 - 95,00 €

  • von José A. Onieva, Javier Lopez & Jianying Zhou
    94,00 - 100,00 €

    The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.