Showing
1 - 20
results of
37
for search '
Zhou, Jianying
'
Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Author
Zhou, Jianying
Showing
1 - 20
results of
37
for search '
Zhou, Jianying
'
, query time: 0.05s
Narrow Search
Sort
Relevance
Newest
Oldest
Call Number
Author
Title
Select all entries on the page
Email
Export
Print
Save
Select result number 1
1
Secure Multi-Party Non-Repudiation Protocols and Applications by José A. Onieva, Jianying Zhou.
by
Onieva, José A.
,
Zhou, Jianying
Published 2009
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 2
2
Applied public key infrastructure : 4th International Workshop : IWAP 2005 edited by Jianying Zhou [and others].
Published 2005
Other Authors:
“…
Zhou, Jianying
…”
Click for online access
eBook
Save to List
Saved in:
Select result number 3
3
Security and Privacy in Communication Networks 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings edited by Sushil Jajodia, Jianying Zhou.
Published 2010
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 4
4
Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings edited by Jianying Zhou, Moti Yung.
Published 2010
Other Authors:
“…
Zhou, Jianying
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 5
5
Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings edited by Xinyi Huang, Jianying Zhou.
Published 2014
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 6
6
Information and Communications Security Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings edited by Tatsuaki Okamoto, Jianying Zhou.
Published 2001
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 7
7
Wireless sensor network security edited by Javier Lopez and Jianying Zhou.
Published 2008
Other Authors:
Click for online access
eBook
Save to List
Saved in:
Select result number 8
8
Radio frequency identification system security : RFIDsec'10 Asia Workshop proceedings edited by Yingjiu Li and Jianying Zhou.
Published 2010
Other Authors:
Click for online access
eBook
Save to List
Saved in:
Select result number 9
9
Security and trust management : 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings Rodrigo Roman, Jianying Zhou (eds.).
Published 2021
Other Authors:
Click for online access
eBook
Save to List
Saved in:
Select result number 10
10
Information Security 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings edited by Phong Q. Nguyen, Jianying Zhou.
Published 2017
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 11
11
Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Gr... edited by Claudio Agostino Ardagna, Jianying Zhou.
Published 2011
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 12
12
Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers edited by Dongdai Lin, Moti Yung, Jianying Zhou.
Published 2015
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 13
13
Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedings edited by Sihan Qing, Jianying Zhou, Dongmei Liu.
Published 2013
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 14
14
Information Security 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings edited by Xuejia Lai, Jianying Zhou, Hui Li.
Published 2011
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 15
15
Public Key Cryptography -- PKC 2004 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 edited by Feng Bao, Robert Deng, Jianying Zhou.
Published 2004
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 16
16
Applied Cryptography and Network Security Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings edited by Markus Jakobsson, Moti Yung, Jianying Zhou.
Published 2004
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 17
17
Applied Cryptography and Network Security First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings edited by Jianying Zhou, Moti Yung, Yongfei Han.
Published 2003
Other Authors:
“…
Zhou, Jianying
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 18
18
Information and Communications Security 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings edited by Petra Perner, Dieter Gollmann, Jianying Zhou.
Published 2003
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 19
19
Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II edited by Javier Lopez, Jianying Zhou, Miguel Soriano.
Published 2018
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 20
20
Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings edited by Feng Bao, Pierangela Samarati, Jianying Zhou.
Published 2012
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select all entries on the page
Email
Export
Print
Save
1
2
Next
[2]
Search Tools:
Get RSS Feed
Email this Search
Related Subjects
Data encryption (Computer science)
Electronic resources (E-books)
Computer security
Computer communication systems
Computer science
Management information systems
Security measures
Algorithms
Computer networks
Computers
Computers and civilization
Operating systems (Computers)
Application software
Data structures (Computer science)
Computer organization
Computer science—Mathematics
Cryptography
Coding theory
Information storage and retrieval
Information theory
Security
Algorithms & data structures
Artificial intelligence
Computer networking & communications
General
Human-Computer Interaction
Information Theory
Information technology: general issues
Law and legislation
Networking