Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: ("protection" or "protections")
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
author_facet:"Chen, Liqun"
Search alternatives
:
"protections" »
"projections"
,
"protecting"
Showing
1
-
15
of
15
Search:
'("protection" or "protections")'
,
query time: 0.39s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Information Security Practice and Experience : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings
Published 2016
Springer International Publishing
Subjects:
“
...Data
protection
...
”
Read Now
2
Trusted Systems : Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers
Published 2011
Springer Berlin Heidelberg
Subjects:
“
...Data
protection
...
”
Read Now
3
Security Standardisation Research : First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings
Published 2014
Springer International Publishing
Subjects:
“
...Data
protection
...
”
Read Now
4
Provable Security : 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings
Published 2016
Springer International Publishing
Subjects:
“
...Data
protection
...
”
Read Now
5
Information and Communications Security : 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008. Proceedings
Published 2008
Springer Berlin Heidelberg
Table of Contents:
“
...-to-End Integrity
Protection
in Signed PGP Mail -- Unclonable Lightweight Authentication Scheme -- Threat...
”
Read Now
6
Information Security Practice and Experience : 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings
Published 2008
Springer Berlin Heidelberg
Table of Contents:
“
... Protocols -- A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy
Protection
...
”
Read Now
7
Security Standardisation Research : Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings
Published 2015
Springer International Publishing
Subjects:
“
...Data
protection
...
”
Read Now
8
Trusted Systems : Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers
Published 2012
Springer Berlin Heidelberg
Subjects:
“
...Data
protection
...
”
Read Now
9
Information Security : 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings
Published 2018
Springer International Publishing
Table of Contents:
“
...-Variant Ciphers -- Data Privacy and Anonymization -- Practical Attacks on Relational Databases
Protected
...
”
Read Now
10
Computer Security – ESORICS 2020 : 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I
Published 2020
Springer International Publishing
Subjects:
“
...Data
protection
...
”
Read Now
11
Computer Security – ESORICS 2020 : 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II
Published 2020
Springer International Publishing
Subjects:
“
...Data
protection
...
”
Read Now
12
Cryptography and Coding : 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings
Published 2011
Springer Berlin Heidelberg
Subjects:
“
...Data
protection
...
”
Read Now
13
Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings
Published 2018
Springer International Publishing
Table of Contents:
“
... Security -- Privacy
Protection
-- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security...
”
Read Now
14
Trusted Computing : Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedings
Published 2009
Springer Berlin Heidelberg
Table of Contents:
“
... Support in a
Protection
Profile for High Assurance Security Kernels -- Attestation -- Remote Attestation...
”
Read Now
15
Trusted Systems : First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings
Published 2010
Springer Berlin Heidelberg
Table of Contents:
“
... -- External Authenticated Non-volatile Memory with Lifecycle Management for State
Protection
in Trusted...
”
Back
Narrow Search
Remove Filters
Clear Filter
Author: Chen, Liqun
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
13
003 - Systems
1
004 - Data processing & computer science
1
040 - [Unassigned]
1
Language
English
15
Collection
Springer eBooks 2005-
15
Author
Chen, Liqun
Schneider, Steve
3
Yung, Moti
3
Li, Ninghui
2
Liang, Kaitai
2
Mitchell, Chris
2
more ...
Bao, Feng
1
Deng, Robert H.
1
Han, Jinguang
1
Liu, Dongmei
1
Manulis, Mark
1
Martin, Andrew
1
Matsuo, Shin'ichiro
1
Mitchell, Chris J.
1
Mu, Yi
1
Qing, Sihan
1
Ryan, Mark
1
Susilo, Willy
1
Wang, Guilin
1
Wang, Guojun
1
Zhu, Liehuang
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=author_facet%3A%22Chen%2C+Liqun%22&lookfor=%28%22protection%22+or+%22protections%22%29&type=AllFields
Send by Email
×
Loading...