Udvidet returret til d. 31. januar 2024

Bøger af Jianying Zhou

Filter
Filter
Sorter efterSorter Populære
  • - 8th International Conference, Acns 2010, Beijing, China, June 22-25, 2010, Proceedings
    af Jianying Zhou
    1.090,95 kr.

    ACNS 2010, the 8th International Conference on Applied Cryptography and Network Security, was held in Beijing, China, during June 22-25, 2010. ACNS 2010 brought together individuals from academia and industry involved in m- tiple research disciplines of cryptography and security to foster the exchange of ideas. ACNS was initiated in 2003, and there has been a steady improvement in the quality of its program over the past 8 years: ACNS 2003 (Kunming, China), ACNS 2004 (Yellow Mountain, China), ACNS 2005 (New York, USA), ACNS 2006 (Singapore), ACNS 2007 (Zhuhai, China), ACNS 2008 (New York, USA), ACNS2009(Paris, France). Theaverageacceptanceratehasbeenkeptataround 17%, and the average number of participants has been kept at around 100. The conference received a total of 178 submissions from all over the world. Each submission was assigned to at least three committee members. Subm- sions co-authored by members of the Program Committee were assigned to at least four committee members. Due to the large number of high-quality s- missions, the review process was challenging and we are deeply grateful to the committee members and the external reviewers for their outstanding work. - ter extensive discussions, the Program Committee selected 32 submissions for presentation in the academic track, and these are the articles that are included in this volume (LNCS 6123). Additionally, a few other submissionswereselected for presentation in the non-archival industrial track

  • - Acns 2023 Satellite Workshops, Adsc, Aiblock, Aihws, Aiots, Cimss, Cloud S&p, Sci, Secmt, Simla, Kyoto, Japan, June 19-22, 2023, Proceedings
    af Jianying Zhou
    998,95 kr.

    This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023.The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops: - 1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023) - 5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023) - 4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023) - 5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023) - 3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023) - 5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023) - 4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023) - 4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023) - 5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023)

  • af Jun Shao, Cong Wang, Jianying Zhou, mfl.
    578,95 kr.

  • af Jie Zhang, Jianying Zhou, Ehud Gudes & mfl.
    484,95 kr.

  • - First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings
    af Robert H. Deng
    558,95 - 561,95 kr.

    The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.

  • - 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004
    af Feng Bao
    564,95 kr.

  • af Petra Perner, Jianying Zhou & Dieter Gollmann
    561,95 - 567,95 kr.

  • af Moti Yung, Markus Jakobsson & Jianying Zhou
    562,95 - 1.079,95 kr.

  • af Hui Li, Jianying Zhou & Xuejia Lai
    559,95 kr.

    This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.

  • af Kefei Chen, Jianying Zhou, Robert Deng & mfl.
    560,95 kr.

  • af Robert H. Deng, Javier Lopez, Jianying Zhou & mfl.
    569,95 kr.

    This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005. ISC 2005 brought together individuals from academia and - dustry involvedin manyresearchdisciplines of information security to foster the exchange of ideas. During recent years this conference has tried to place special emphasis on the practical aspects of information security, and since it passed from being an international workshop to being an international conference in 2001, it has become one of the most relevant forums at which researchers meet and discuss emerging security challenges and solutions. Advised by the ISC Steering Committee, and in order to provide students with more opportunities for publication, ISC 2005 accepted extra student papers - sides the regular papers. The initiative was very well accepted by the young sector of the scienti?c community, and we hope that the success of this idea will remainfornextISCevents. AnotherimportantfactorforthesuccessofISC2005 was that selected papers in the proceedings will be invited for submission to a special issue of the InternationalJournalof InformationSecurity. The result was an incredible response to the call for papers; we received 271 submissions, the highest since ISC events started. It goes without saying that the paper selection process was more competitive and di?cult than ever before - only 33 regular papers were accepted, plus 5 student papers for a special student session.

  • af José A. Onieva, Javier Lopez & Jianying Zhou
    1.029,95 - 1.366,95 kr.

    The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.