Showing
1 - 15
results of
15
for search '
Mu, Yi
'
Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Author
Mu, Yi
Showing
1 - 15
results of
15
for search '
Mu, Yi
'
, query time: 0.05s
Narrow Search
Sort
Relevance
Newest
Oldest
Call Number
Author
Title
Select all entries on the page
Email
Export
Print
Save
Select result number 1
1
Introduction to Security Reduction by Fuchun Guo, Willy Susilo, Yi Mu.
by
Guo, Fuchun
,
Susilo, Willy
,
Mu, Yi
Published 2018
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 2
2
Information and Communication Security Second International Conference, ICICS'99 Sydney, Australia, November 9-11, 1999 Proceedings edited by Vijay Varadharajan, Yi Mu.
Published 1999
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 3
3
Information Security and Privacy 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings edited by Vijay Varadharajan, Yi Mu.
Published 2001
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 4
4
Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings edited by Willy Susilo, Yi Mu.
Published 2014
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 5
5
Advances in web-based learning -- ICWL 2021 : 20th International Conference, ICWL 2021, Macau, China, November 13-14, 2021, Proceedings Wanlei Zhou, Yi Mu (eds.).
Published 2021
Other Authors:
Click for online access
eBook
Save to List
Saved in:
Select result number 6
6
Information Security and Privacy Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings edited by Vijav Varadharajan, Josef Pieprzyk, Yi Mu.
Published 1997
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 7
7
Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings edited by Yi Mu, Willy Susilo, Jennifer Seberry.
Published 2008
Other Authors:
“…
Mu, Yi
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 8
8
Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings edited by Liqun Chen, Yi Mu, Willy Susilo.
Published 2008
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 9
9
Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings edited by Willy Susilo, Yi Mu, Jennifer Seberry.
Published 2012
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 10
10
Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings edited by David Pointcheval, Yi Mu, Kefei Chen.
Published 2006
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 11
11
Network and System Security 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings edited by Li Xu, Elisa Bertino, Yi Mu.
Published 2012
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 12
12
Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings edited by Willy Susilo, Joseph K. Liu, Yi Mu.
Published 2007
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 13
13
Cryptology and Network Security 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings edited by Yi Mu, Robert H. Deng, Xinyi Huang.
Published 2019
Other Authors:
“…
Mu, Yi
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 14
14
Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings edited by Yvo G. Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li.
Published 2005
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 15
15
Emerging Directions in Embedded and Ubiquitous Computing EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings edited by Xiaobo Zhou, Oleg Sokolsky, Lu Yan, Eun-Sun Jung, Zili Shao, Yi Mu, Dong-Chun Lee, Daeyoung Kim, Young-Sik Jeong, Cheng-Zhong Xu.
Published 2006
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select all entries on the page
Email
Export
Print
Save
Search Tools:
Get RSS Feed
Email this Search
Related Subjects
Electronic resources (E-books)
Data encryption (Computer science)
Computer communication systems
Computer science
Computer security
Management information systems
Algorithms
Computers and civilization
E-commerce
Application software
Coding theory
Data structures (Computer science)
Information theory
Operating systems (Computers)
Special purpose computers
Artificial intelligence
Computer engineering
Computer science—Mathematics
Computers
Data mining
Data protection
Database management
Educational innovations
Educational technology
Electrical engineering
Information storage and retrieval
Law and legislation
Software engineering
User interfaces (Computer systems)