Showing
1 - 10
results of
10
for search '
Huang, Xinyi
'
Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Author
Huang, Xinyi
Showing
1 - 10
results of
10
for search '
Huang, Xinyi
'
, query time: 0.03s
Narrow Search
Sort
Relevance
Newest
Oldest
Call Number
Author
Title
Select all entries on the page
Email
Export
Print
Save
Select result number 1
1
Security and Privacy for Next-Generation Wireless Networks by Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, Lei Xie, Kun Wang.
by
Zhong, Sheng
,
Zhong, Hong
,
Huang, Xinyi
,
Yang, Panlong
,
Shi, Jin
,
Xie, Lei
,
Wang, Kun
Published 2019
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 2
2
Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings edited by Xinyi Huang, Jianying Zhou.
Published 2014
Other Authors:
“…
Huang, Xinyi
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 3
3
Network and System Security 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings edited by Joseph K. Liu, Xinyi Huang.
Published 2019
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 4
4
Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings edited by Javier Lopez, Xinyi Huang, Ravi Sandhu.
Published 2013
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 5
5
Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers edited by Fuchun Guo, Xinyi Huang, Moti Yung.
Published 2019
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 6
6
Machine Learning for Cyber Security Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings edited by Xiaofeng Chen, Xinyi Huang, Jun Zhang.
Published 2019
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 7
7
Applied cryptography in computer and communications : first EAI International Conference, AC3 2021, virtual event, May 15-16, 2021, Proceedings Bo Chen, Xinyi Huang (eds.).
Published 2021
Other Authors:
Click for online access
eBook
Save to List
Saved in:
Select result number 8
8
Cryptology and Network Security 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings edited by Yi Mu, Robert H. Deng, Xinyi Huang.
Published 2019
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 9
9
Green, Pervasive, and Cloud Computing 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings edited by Xinyi Huang, Yang Xiang, Kuan-Ching Li.
Published 2016
Other Authors:
“…
Huang, Xinyi
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 10
10
Security and privacy in social networks and big data : 8th international symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, proceedings Xiaofeng Chen, Xinyi Huang, Mirosław Kutyłowski (eds.).
Published 2022
Other Authors:
Click for online access
eBook
Save to List
Saved in:
Select all entries on the page
Email
Export
Print
Save
Search Tools:
Get RSS Feed
Email this Search
Related Subjects
Electronic resources (E-books)
Data encryption (Computer science)
Computer security
Computer communication systems
Artificial intelligence
Application software
Computer organization
Computer science
Computers
Management information systems
Security measures
Software engineering
Algorithms
Big data
Coding theory
Computers and civilization
Data mining
Data protection
E-commerce
Electrical engineering
Information storage and retrieval
Information theory
Internet of things
Law and legislation
Mobile communication systems
Online social networks
Privacy, Right of
Special purpose computers
Telecommunication systems
Wireless communication systems