Showing
1 - 11
results of
11
for search '
Conti, Mauro
'
Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Author
Conti, Mauro
Showing
1 - 11
results of
11
for search '
Conti, Mauro
'
, query time: 0.06s
Narrow Search
Sort
Relevance
Newest
Oldest
Call Number
Author
Title
Select all entries on the page
Email
Export
Print
Save
Select result number 1
1
Secure Wireless Sensor Networks Threats and Solutions by Mauro Conti.
by
Conti, Mauro
Published 2015
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 2
2
Security and Trust Management 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings edited by Sjouke Mauw, Mauro Conti.
Published 2019
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 3
3
Versatile Cybersecurity edited by Mauro Conti, Gaurav Somani, Radha Poovendran.
Published 2018
Other Authors:
“…
Conti, Mauro
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 4
4
Cyber Threat Intelligence edited by Ali Dehghantanha, Mauro Conti, Tooska Dargahi.
Published 2018
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 5
5
Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings edited by Mauro Conti, Matthias Schunter, Ioannis Askoxylakis.
Published 2015
Other Authors:
“…
Conti, Mauro
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 6
6
Cyberspace safety and security : 13th International Symposium, CSS 2021, Virtual event, November 9-11, 2021, proceedings Weizhi Meng, Mauro Conti (eds.).
Published 2022
Other Authors:
Click for online access
eBook
Save to List
Saved in:
Select result number 7
7
Cryptology and network security : 20th international conference, CANS 2021, Vienna, Austria, December 13-15, 2021 : proceedings Mauro Conti, Marc Stevens, Stephan Krenn (eds.).
Published 2021
Other Authors:
“…
Conti, Mauro
(Associate professor)…”
Click for online access
eBook
Save to List
Saved in:
Select result number 8
8
Applied Cryptography and Network Security : 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings. Part II edited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi.
Published 2020
Other Authors:
“…
Conti, Mauro
(Associate professor)…”
Click for online access
eBook
Save to List
Saved in:
Select result number 9
9
Applied Cryptography and Network Security : 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings. Part I edited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi (Eds.)
Published 2020
Other Authors:
“…
Conti, Mauro
(Associate professor)…”
Click for online access
eBook
Save to List
Saved in:
Select result number 10
10
Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti.
Published 2016
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 11
11
Applied cryptography and network security workshops : ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proc... Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang (eds.).
Published 2020
Other Authors:
Click for online access
eBook
Save to List
Saved in:
Select all entries on the page
Email
Export
Print
Save
Search Tools:
Get RSS Feed
Email this Search
Related Subjects
Computer security
Data encryption (Computer science)
Electronic resources (E-books)
Computers
Security measures
Computer communication systems
Computer networks
Data protection
Algorithms & data structures
Artificial intelligence
Computer networking & communications
Computer science
Computers and civilization
General
Human-Computer Interaction
Information Theory
Information technology: general issues
Management information systems
Networking
Security
Social Aspects
Algorithms
Application software
Computer organization
Data structures (Computer science)
E-commerce
Electrical engineering
Internet
Seguretat informàtica
Xifratge (Informàtica)