Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: (("post" OR "port") OR "poets")
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
author_facet:"Yung, Moti"
Search alternatives
:
"poets" »
"poems"
Showing
1
-
20
of
27
Search:
'(("post" OR "port") OR "poets")'
,
query time: 0.20s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Information Security and Cryptology : 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers
Published 2017
Springer International Publishing
Table of Contents:
“
... encryption.-Leakage-resilient --
Post
-quantum cryptography -- Commitment and protocol -- Elliptic curves...
”
Read Now
2
Information Security and Cryptology : 15th International Conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019, Revised Selected Papers
Published 2020
Springer International Publishing
Table of Contents:
“
...Invited Papers --
Post
-Quantum Cryptography -- AI Security -- Systems Security -- Side Channel...
”
Read Now
3
Information Security and Cryptology : 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020, Revised Selected Papers
Published 2021
Springer International Publishing
Table of Contents:
“
...AI Security -- Asymmetric Cipher --
Post
-quantum Crypto -- System Security -- Privacy Protection...
”
Read Now
4
Applied Cryptography and Network Security : 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings
Published 2019
Springer International Publishing
Table of Contents:
“
... -- Blockchain and Cryptocurrency --
Post
Quantum Cryptography -- Public Key and Commitment -- Theory...
”
Read Now
5
Information Security and Cryptology : 17th International Conference, Inscrypt 2021, Virtual Event, August 12–14, 2021, Revised Selected Papers
Published 2021
Springer International Publishing
“
...This book constitutes the
post
-conference proceedings of the 17th International Conference...
”
Read Now
6
Trusted Systems : Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers
Published 2011
Springer Berlin Heidelberg
“
...This book constitutes the thoroughly refereed
post
-conference proceedings of the International...
”
Read Now
7
Information Security and Cryptology : 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers
Published 2013
Springer Berlin Heidelberg
“
...This book constitutes the thoroughly refereed
post
-conference proceedings of the 8th International...
”
Read Now
8
Information Security Applications : 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers
Published 2012
Springer Berlin Heidelberg
“
...This book constitutes the thoroughly refereed
post
-workshop proceedings of the 12th International...
”
Read Now
9
Information Security and Cryptology : 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers
Published 2018
Springer International Publishing
“
...This book constitutes the thoroughly refereed
post
-conference proceedings of the 13th International...
”
Read Now
10
Information Security and Cryptology : 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers
Published 2011
Springer Berlin Heidelberg
“
...This book constitutes the thoroughly refereed
post
-conference proceedings of the 6th International...
”
Read Now
11
Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology : Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Se...
Published 2017
Springer International Publishing
“
...This book constitutes the refereed
post
-conference proceedings of the Second International...
”
Read Now
12
Information Security and Cryptology : 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part I
Published 2024
Springer Nature Singapore
Table of Contents:
“
... Communication -- CCA-secure Identity-Based Matchmaking Encryption from Standard Assumptions.-
Post
-Quantum Public...
”
Read Now
13
Information Security and Cryptology : 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers
Published 2014
Springer International Publishing
“
...This book constitutes the thoroughly refereed
post
-conference proceedings of the 9th International...
”
Read Now
14
Trusted Systems : 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers
Published 2016
Springer International Publishing
“
...This book constitutes the thoroughly refereed
post
-conference proceedings of the 7th International...
”
Read Now
15
Information Security and Cryptology : 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers
Published 2019
Springer International Publishing
“
...This book constitutes the
post
-conference proceedings of the 14th International Conference...
”
Read Now
16
Information Security and Cryptology : 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers
Published 2016
Springer International Publishing
“
...This book constitutes the thoroughly refereed
post
-conference proceedings of the 11th International...
”
Read Now
17
Trusted Systems : Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers
Published 2012
Springer Berlin Heidelberg
“
...This book constitutes the thoroughly refereed
post
-conference proceedings of the International...
”
Read Now
18
Information Security and Cryptology : Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
Published 2008
Springer Berlin Heidelberg
Table of Contents:
“
... Deception and Traceback -- On Modeling
Post
Decryption Error Processes in UMTS Air Interface -- A Simple...
”
Read Now
19
Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers
Published 2004
Springer Berlin Heidelberg
Table of Contents:
“
... VPN with
Port
Protection Function by Mobile Codes -- A Role of DEVS Simulation for Information...
”
Read Now
20
Trusted Systems : 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers
Published 2015
Springer International Publishing
“
...Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed
post
...
”
1
2
Back
Narrow Search
Remove Filters
Clear Filter
Author: Yung, Moti
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
21
004 - Data processing & computer science
5
025 - Library operations
1
Language
English
27
Collection
Springer eBooks 2005-
26
Springer Book Archives -2004
1
Author
Yung, Moti
Lin, Dongdai
9
Chen, Liqun
2
Zhu, Liehuang
2
Chae, Kijoon
1
Chen, Chao
1
more ...
Chen, Kefei
1
Chen, Xiaofeng
1
Deng, Robert H.
1
Gauthier-Umaña, Valérie
1
Ge, Chunpeng
1
Guo, Fuchun
1
Huang, Xinyi
1
Jung, Souhwan
1
Kutylowski, Miroslaw
1
Lai, Xuejia
1
Lee, Dong Hoon
1
Liu, Peng
1
Liu, Zhe
1
Meng, Weizhi
1
Ochoa, Martín
1
Pei, Dingyi
1
Phan, Raphaël C.-W.
1
Sohn, Kiwook
1
Wang, XiaoFeng
1
Wu, Chuan-Kun
1
Wu, Chuankun
1
Wu, Yongdong
1
Xu, Shouhuai
1
Yang, Yanjiang
1
Yang, Zhen
1
Youm, Heung Youl
1
Yu, Yu
1
Zhang, Jianbiao
1
Zhou, Jianying
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=author_facet%3A%22Yung%2C+Moti%22&lookfor=%28%28%22post%22+OR+%22port%22%29+OR+%22poets%22%29&type=AllFields
Send by Email
×
Loading...