Languages
Askoxylakis, Ioannis.
Overview
Works: | 0 works in 6 publications in 1 languages |
---|
Titles
Trust and trustworthy computing = 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015 : proceedings /
by:
Askoxylakis, Ioannis.; SpringerLink (Online service); Schunter, Matthias.; Conti, Mauro.
(Electronic resources)
Cryptology and network security = 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014 : proceedings /
by:
Gritzalis, Dimitris.; Kiayias, Aggelos.; Askoxylakis, Ioannis.; SpringerLink (Online service)
(Electronic resources)
Computer security - ESORICS 2016 = 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016 : proceedings.. Part I /
by:
European Symposium on Research in Computer Security (2016 :); Askoxylakis, Ioannis.; SpringerLink (Online service)
(Electronic resources)
Computer security - ESORICS 2016 = 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016 : proceedings.. Part II /
by:
Askoxylakis, Ioannis.; European Symposium on Research in Computer Security (2016 :); SpringerLink (Online service)
(Electronic resources)
Human aspects of information security, privacy, and trust = third International Conference, HAS 2015, held as part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015 : proceedings /
by:
Tryfonas, Theo.; Askoxylakis, Ioannis.; SpringerLink (Online service)
(Electronic resources)
Human aspects of information security, privacy, and trust = second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings /
by:
Tryfonas, Theo.; Askoxylakis, Ioannis.; SpringerLink (Online service)
(Electronic resources)
Subjects
Software Engineering.
Information Systems and Communication Service.
Data protection
Management of Computing and Information Systems.
Information Systems Applications (incl. Internet)
Artificial Intelligence (incl. Robotics)
Algorithm Analysis and Problem Complexity.
User Interfaces and Human Computer Interaction.
Information Storage and Retrieval.
Data encryption (Computer science)
Models and Principles.
Computer networks- Security measures
Coding and Information Theory.
Computer security
Computer networks- Access control
Data Encryption.
IT in Business.
Computer Science.
Systems and Data Security.
Computer Communication Networks.
Computers and Society.
Human-computer interaction