9 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
Huang, Xinyi (Computer scientist)
Showing
1
-
9
of
9
for search:
'Huang, Xinyi (Computer scientist)'
, query time: 0.14s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
1
Information security practice and experience : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings
Published: Springer, 2014
Description: 1 online resource (xiv, 578 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
2
Information security and cryptology : 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised selected papers
Published: Springer, 2019
Description: 1 online resource (xiv, 674 pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
3
Security and privacy in social networks and big data : 8th international symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, proceedings
Published: Springer, 2022
Description: 1 online resource (xiii, 366 pages) : illustrations (chiefly color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
4
Network and System Security : 13th International Conference, NSS 2019, Sapporo, Japan, December 15-18, 2019, Proceedings
Published: Springer, 2019
Description: 1 online resource (740 pages).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
5
Green, pervasive, and cloud computing : 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings
Published: Springer, 2016
Description: 1 online resource (xii, 317 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
6
Machine learning for cyber security : second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019, Proceedings
Published: Springer, 2019
Description: 1 online resource (xiii, 398 pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
7
Cryptology and network security : 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings
Published: Springer, 2019
Description: 1 online resource (xiii, 540 pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
8
Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings
Published: Springer, 2013
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
9
Applied cryptography in computer and communications : first EAI International Conference, AC3 2021, virtual event, May 15-16, 2021, Proceedings
Published: Springer, 2021
Description: 1 online resource (216 pages).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
Select Page | with selected:
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Computer security
Data encryption (Computer science)
Computer networks Security measures
Big data Security measures
Cloud computing
Computer networks
Internet Security measures
Internet of things Security measures
Machine learning
Online social networks Security measures
Privacy, Right of
Telecommunication systems Security measures
Ubiquitous computing
×
Loading...