Search Results for Lai, Xuejia. - Narrowed by: Computer science. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dLai$00252C$002bXuejia.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026ic$003dtrue$0026ps$003d300?dt=list 2024-12-21T07:15:53Z Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194726 2024-12-21T07:15:53Z 2024-12-21T07:15:53Z Author&#160;Lai, Xuejia. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21518-6">http://dx.doi.org/10.1007/978-3-642-21518-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 14th International Conference, ISC 2011, Xi&rsquo;an, China, October 26-29, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195771 2024-12-21T07:15:53Z 2024-12-21T07:15:53Z Author&#160;Lai, Xuejia. editor.&#160;Zhou, Jianying. editor.&#160;Li, Hui. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24861-0">http://dx.doi.org/10.1007/978-3-642-24861-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Forensics in Telecommunications, Information, and Multimedia Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195389 2024-12-21T07:15:53Z 2024-12-21T07:15:53Z Author&#160;Lai, Xuejia. editor.&#160;Gu, Dawu. editor.&#160;Jin, Bo. editor.&#160;Wang, Yongquan. editor.&#160;Li, Hui. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23602-0">http://dx.doi.org/10.1007/978-3-642-23602-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185214 2024-12-21T07:15:53Z 2024-12-21T07:15:53Z Author&#160;Lai, Xuejia. editor.&#160;Chen, Kefei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189113 2024-12-21T07:15:53Z 2024-12-21T07:15:53Z Author&#160;Baek, Joonsang. editor.&#160;Bao, Feng. editor.&#160;Chen, Kefei. editor.&#160;Lai, Xuejia. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88733-1">http://dx.doi.org/10.1007/978-3-540-88733-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedings ent://SD_ILS/0/SD_ILS:183605 2024-12-21T07:15:53Z 2024-12-21T07:15:53Z Author&#160;Chen, Kefei. editor.&#160;Deng, Robert. editor.&#160;Lai, Xuejia. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>