Showing
1 - 14
results of
14
for search '
Mu, Yi
'
Skip to content
VuFind
Language
English
Ελληνικά
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Mu, Yi
Showing
1 - 14
results of
14
for search '
Mu, Yi
'
, query time: 0.04s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Introduction to Security Reduction
by
Guo, Fuchun
,
Guo, Fuchun
,
Susilo, Willy
,
Mu
,
Yi
Published 2018
Other Authors:
“…
Mu
,
Yi
…”
Call Number:
Loading…
Located:
Loading…
Full Text via HEAL-Link
Electronic
eBook
2
Information and Communication Security Second International Conference, ICICS'99 Sydney, Australia, November 9-11, 1999 Proceedings /
Published 1999
Other Authors:
“…
Mu
,
Yi
…”
Call Number:
Loading…
Located:
Loading…
Full Text via HEAL-Link
Electronic
eBook
3
Information Security and Privacy 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings /
Published 2001
Other Authors:
“…
Mu
,
Yi
…”
Call Number:
Loading…
Located:
Loading…
Full Text via HEAL-Link
Electronic
eBook
4
Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings /
Published 2014
Other Authors:
“…
Mu
,
Yi
…”
Call Number:
Loading…
Located:
Loading…
Full Text via HEAL-Link
Electronic
eBook
5
Information Security and Privacy Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings /
Published 1997
Other Authors:
“…
Mu
,
Yi
…”
Call Number:
Loading…
Located:
Loading…
Full Text via HEAL-Link
Electronic
eBook
6
Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings /
Published 2008
Other Authors:
“…
Mu
,
Yi
…”
Call Number:
Loading…
Located:
Loading…
Full Text via HEAL-Link
Electronic
eBook
7
Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedings /
Published 2006
Other Authors:
“…
Mu
,
Yi
…”
Call Number:
Loading…
Located:
Loading…
Full Text via HEAL-Link
Electronic
eBook
8
Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings /
Published 2008
Other Authors:
“…
Mu
,
Yi
…”
Call Number:
Loading…
Located:
Loading…
Full Text via HEAL-Link
Electronic
eBook
9
Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings /
Published 2012
Other Authors:
“…
Mu
,
Yi
…”
Call Number:
Loading…
Located:
Loading…
Full Text via HEAL-Link
Electronic
eBook
10
Network and System Security 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings /
Published 2012
Other Authors:
“…
Mu
,
Yi
…”
Call Number:
Loading…
Located:
Loading…
Full Text via HEAL-Link
Electronic
eBook
11
Cryptology and Network Security 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings /
Published 2019
Other Authors:
“…
Mu
,
Yi
…”
Call Number:
Loading…
Located:
Loading…
Full Text via HEAL-Link
Electronic
eBook
12
Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings /
Published 2007
Other Authors:
“…
Mu
,
Yi
…”
Call Number:
Loading…
Located:
Loading…
Full Text via HEAL-Link
Electronic
eBook
13
Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedings /
Published 2005
Other Authors:
“…
Mu
,
Yi
…”
Call Number:
Loading…
Located:
Loading…
Full Text via HEAL-Link
Electronic
eBook
14
Emerging Directions in Embedded and Ubiquitous Computing EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006. Proceedings /
Published 2006
Other Authors:
“…
Mu
,
Yi
…”
Call Number:
Loading…
Located:
Loading…
Full Text via HEAL-Link
Electronic
eBook
Search Tools:
RSS Feed
–
Email Search
Related Subjects
Data encryption (Computer science)
Computer science
Computer Communication Networks
Computer communication systems
Computer security
Management information systems
Management of Computing and Information Systems
Systems and Data Security
Computer Science
Data Encryption
Algorithm Analysis and Problem Complexity
Algorithms
Computers and Society
Computers and civilization
Cryptology
E-commerce
e-Commerce/e-business
Coding and Information Theory
Coding theory
Data structures (Computer science)
Operating Systems
Operating systems (Computers)
Special Purpose and Application-Based Systems
Special purpose computers
Application software
Artificial Intelligence
Artificial intelligence
Communications Engineering, Networks
Computer Appl. in Administrative Data Processing
Computer Engineering
Βιβλιοθήκη & Κέντρο Πληροφόρησης
|
Πανεπιστήμιο Πατρών