Search Results - Yung, Moti
Moti Yung
Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography. Provided by Wikipedia- Showing 1 - 20 results of 75
- Go to Next Page
-
1
Digital signatures by Yung, Moti
Published 2006Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic eBook -
2
Malicious cryptography : exposing cryptovirology / by Young, Adam, 1972-, Yung, Moti
Published 2004Call Number: Loading…Full Text (via O'Reilly/Safari)
Located: Loading…
eBook -
3
Malicious cryptography : exposing cryptovirology / by Young, Adam, 1972-
Published 2004Other Authors: “…Yung, Moti…”
Call Number: Loading…
Located: Loading…Book Loading… -
4
Public key cryptography-- PKC 2006 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006 : proceedings /
Published 2006Other Authors: “…Yung, Moti…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
5
Information security and cryptology : 19th international conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023 : revised selected papers.
Published 2024Other Authors: “…Yung, Moti…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook -
6
Information security and cryptology : 19th international conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023 : revised selected papers.
Published 2024Other Authors: “…Yung, Moti…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook -
7
Information security applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003 : revised papers /
Published 2004Other Authors: “…Yung, Moti…”
Call Number: Loading…
Located: Loading…Conference Proceeding Book Loading… -
8
Information security applications 11th international workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010 : revised selected papers /
Published 2011Other Authors: “…Yung, Moti…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
9
Trusted systems first international conference, INTRUST 2009, Beijing, China, December 17-19, 2009 : revised selected papers /
Published 2010Other Authors: “…Yung, Moti…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
10
Trusted systems second international conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised selected papers /
Published 2011Other Authors: “…Yung, Moti…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
11
Information security and cryptology : 17th International Conference, Inscrypt 2021, Virtual event, August 12-14, 2021, Revised selected papers /
Published 2021Other Authors: “…Yung, Moti…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook -
12
Information security applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised selected papers /
Published 2012Other Authors: “…Yung, Moti…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
13
Applied cryptography and network security 8th international conference, ACNS 2010, Beijing, China, June 22-25, 2010 ; proceedings /
Published 2010Other Authors: “…Yung, Moti…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
14
Information security and cryptology : 16th international conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020 : revised selected papers /
Published 2021Other Authors: “…Yung, Moti…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook -
15
Information security and cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012 : revised selected papers /
Published 2013Other Authors: “…Yung, Moti…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
16
Information security and cryptology 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers /
Published 2020Other Authors: “…Yung, Moti…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
17
Digital rights management technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised sele...
Published 2006Other Authors: “…Yung, Moti…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
18
Information security applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers /
Published 2005Other Authors: “…Yung, Moti…”
Call Number: Loading…
Located: Loading…Conference Proceeding Book Loading… -
19
Information security applications : 13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised selected papers /
Published 2012Other Authors: “…Yung, Moti…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook -
20
Digital rights management technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised sele...
Published 2006Other Authors: “…Yung, Moti…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook
Search Tools:
RSS Feed
–
Save Search
Related Subjects
Computer security
Data encryption (Computer science)
Cryptography
Security measures
Data protection
Computer networks
Telecommunication
International cooperation
Access control
Computers
Copyright and electronic data processing
Digital watermarking
Privacy, Right of
Computer science
Computer viruses
Computers and civilization
Internet
Prevention
Coding theory
Data mining
Database security
Digital signatures
Electronic commerce
Electronic funds transfers
Machine learning
Management information systems
Public key cryptography
Telecommunication systems