Languages
Zhou, Jianying.
Overview
Works: | 4 works in 11 publications in 1 languages |
---|
Titles
Applied public key infrastructure = 4th International Workshop : IWAP 2005 /
by:
Zhou, Jianying.; International Workshop for Applied PKI (2005 :)
(Language materials, printed)
Applied cryptography and network security = second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings /
by:
Jakobsson, Markus.; Yung, Moti.; Zhou, Jianying.; SpringerLink (Online service); ACNS 2004 ((2004 :)
(Language materials, printed)
Information and communications security = Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings /
by:
Okamoto, Tatsuaki.; Qing, Sihan.; Zhou, Jianying.; SpringerLink (Online service); International Conference on Information and CommunicationsSecurity (2001 :)
(Language materials, printed)
Information Security : = 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings
by:
Zhou, Jianying.; SpringerLink (Online service); ISC 2005 ((2005 :)
(Language materials, printed)
Information security practice and experience = 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014 : proceedings /
by:
Huang, Xinyi.; Zhou, Jianying.; SpringerLink (Online service)
(Electronic resources)
Security and trust management = 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021 : proceedings /
by:
STM (Conference) (2021 :); Roman, Rodrigo.; Zhou, Jianying.; SpringerLink (Online service)
(Electronic resources)
Information and communications security = 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019 : revised selected papers /
by:
ICICS (Conference) (2019 :); Zhou, Jianying.; SpringerLink (Online service)
(Electronic resources)
Wireless sensor network security /
by:
Lopez, Javier.; Zhou, Jianying.
(Language materials, printed)
Information security and cryptology = 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014 : revised selected papers /
by:
Lin, Dongdai.; Yung, Moti.; Zhou, Jianying.; SpringerLink (Online service)
(Electronic resources)
Information security = 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017 : proceedings /
by:
ISC (Conference : Information security) (2017 :); Nguyen, Phong Q.; Zhou, Jianying.; SpringerLink (Online service)
(Electronic resources)
Information and communications security = 5th international conference, ICICS 2003, Huhehaote, China, October 10-13, 2003 proceedings /
by:
Gollmann, Dieter.; Qing, Sihan.; Zhou, Jianying.; SpringerLink (Online service); International Conference on Information and Communications Security (2003 :)
(Language materials, printed)
Secure multi-party non-repudiation protocols and applications
by:
Lopez, Javier.; Zhou, Jianying.; SpringerLink (Online service); Onieva, Jose A.
(Language materials, printed)
Trust Management VIII = 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014 : proceedings /
by:
Zhou, Jianying.; SpringerLink (Online service)
(Electronic resources)
Public key cryptography - PKC 2004 = 7th International Workshop on Practice and Theory in Public Key Cryptography, Singapore, March 1-4, 2004 : proceedings /
by:
Bao, Feng.; Deng, Robert.; Zhou, Jianying.; SpringerLink (Online service); International Workshop on Practice and Theory in Public Key Cryptography (2004 :)
(Language materials, printed)
Applied cryptography and network security workshops = ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019 : proceedings /
by:
Zhou, Jianying.; SpringerLink (Online service); ACNS (Conference) (2019 :); SiMLA (Workshop) ((2019 :); Cloud S&P (Workshop) ((2019 :); AIBlock (Workshop) ((2019 :); AIoTS (Workshop) ((2019 :)
(Electronic resources)
Applied cryptography and network security = 8th international conference, ACNS 2010, Beijing, China, June 22-25, 2010 : proceedings /
by:
Yung, Moti.; Zhou, Jianying.; SpringerLink (Online service); ACNS 2010 ((2010 :)
(Language materials, printed)
Applied cryptography and network security workshops = ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021 : proceedings /
by:
ACNS (Conference) (2021 :); Zhou, Jianying.; SpringerLink (Online service); AIBlock (Workshop) (2021 :); AIHWS (Workshop) (2021 :); AIoTS (Workshop) (2021 :); CIMSS (Workshop) (2021 :); Cloud S&P (Workshop) (2021 :); SCI (Workshop) (2021 :); SecMT (Workshop) (2021 :); SiMLA (Workshop) (2021 :)
(Electronic resources)
Applied cryptography and network security workshops = ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023 : proceedings /
by:
Zhou, Jianying.; SpringerLink (Online service); ADSC (Workshop) ((2023 :); ACNS (Conference) (2023 :); SiMLA (Workshop) ((2023 :); Cloud S & P (Workshop) ((2023 :); AIBlock (Workshop) ((2023 :); AIoTS (Workshop) ((2023 :); AIHWS (Workshop) ((2023 :); CIMSS (Workshop) ((2023 :); SCI (Workshop) ((2023 :); SecMT ((2023 :)
(Electronic resources)
Applied cryptography and network security = second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings /
by:
Jakobsson, Markus.; Yung, Moti.; Zhou, Jianying.; NetLibrary, Inc.; ACNS 2004 ((2004 :)
(Language materials, printed)
Applied cryptography and network security = first international conference, ACNS 2003, Kunming, China, October 16-19, 2003 : proceedings /
by:
Han, Yongfei.; Yung, Moti.; Zhou, Jianying.; SpringerLink (Online service); ACNS 2003 ((2003 :)
(Language materials, printed)
Applied cryptography and network security workshops = ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S & P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022 : proceedings /
by:
Zhou, Jianying.; SpringerLink (Online service); Cloud S & P (Workshop) ((2022 :); ACNS (Conference) (2022 :); AIBlock (Workshop) ((2022 :); AIHWS (Workshop) ((2022 :); AIoTS (Workshop) ((2022 :); CIMSS (Workshop) ((2022 :); SCI (Workshop) ((2022 :); SecMT (Workshop) ((2022 :); SiMLA (Workshop) ((2022 :)
(Electronic resources)
Security and privacy in communication networks = 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, proceedings /
by:
Jajodia, Sushil.; Zhou, Jianying.; SpringerLink (Online service)
(Language materials, printed)
Applied cryptography and network security workshops = ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020 : proceedings /
by:
Zhou, Jianying.; SpringerLink (Online service); Cloud S&P (Workshop) (2020 :); ACNS (Conference) (2020 :); AIBlock (Workshop) (2020 :); AIHWS (Workshop) (2020 :); AIoTS (Workshop) (2020 :); SCI (Workshop) (2020 :); SecMT (Workshop) (2020 :); SiMLA (Workshop) (2020 :)
(Electronic resources)
Public key cryptography--PKC 2004 = 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 : proceedings /
by:
Bao, Feng.; Deng, Robert.; Zhou, Jianying.; NetLibrary, Inc.; International Workshop on Practice and Theory in Public Key Cryptography (2004 :)
(Language materials, printed)
Radio frequency identification system security = RFIDsec'10 Asia Workshop proceedings /
by:
Zhou, Jianying.; Li, Yingjiu.
(Language materials, printed)
Show more
Fewer
Subjects
Telecommunication- Security measures
Cryptographie
Public key cryptography
Electronic commerce- Security measures.
Software Engineering.
Data Structures and Information Theory.
Mobile and Network Security.
Information Systems and Communication Service.
Cryptology.
Software Engineering/Programming and Operating Systems.
Data and Information Security.
Cryptography
T歋l歋communications- S歋curit歋
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Operating Systems.
Sensor networks- Security measures.
Wireless communication systems- Security measures
Computing Milieux.
Information Systems Applications (incl. Internet)
Data encryption (Computer science)
Public-key cryptography
Business enterprises- Computer networks
Telecommunication systems- Security measures
Computer networks- Security measures
Coding and Information Theory.
Legal Aspects of Computing.
Computer Engineering and Networks.
Chiffrement (Informatique)
Computer security
Computers- Access control
Data Encryption.
Computer networks- Access control
Radio frequency identification systems- Security measures
Artificial Intelligence.
Security.
Machine Learning.
Computer Science.
Computer Communication Networks.
Computers and Society.
Discrete Mathematics in Computer Science.
Systems and Data Security.
Public key infrastructure (Computer security)
Computer Systems Organization and Communication Networks.