Applied Cryptography and Network Security Workshops More Books by Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Zhang & Yury Zhauniarovich

Computer Security Computer Security
2018
Applied Cryptography and Network Security Workshops Applied Cryptography and Network Security Workshops
2022
Security and Trust Management Security and Trust Management
2021
Applied Cryptography and Network Security Workshops Applied Cryptography and Network Security Workshops
2021
Information and Communications Security Information and Communications Security
2020
Applied Cryptography and Network Security Workshops Applied Cryptography and Network Security Workshops
2020
Applied Cryptography and Network Security Applied Cryptography and Network Security
2020
Applied Cryptography and Network Security Applied Cryptography and Network Security
2020
Information and Communications Security Information and Communications Security
2020
Applied Cryptography and Network Security Workshops Applied Cryptography and Network Security Workshops
2019
Computer Security Computer Security
2018
Information Security Information Security
2017
Protecting Mobile Networks and Devices Protecting Mobile Networks and Devices
2016
Information Security and Cryptology Information Security and Cryptology
2015
Secure Multi-Party Non-Repudiation Protocols and Applications Secure Multi-Party Non-Repudiation Protocols and Applications
2008
Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication
2011
Applied Cryptography and Network Security Applied Cryptography and Network Security
2010