نتایج جستجو

Intelligent systems: modeling, optimization, and control
Yung C. Shin, Chengying Xu, 2009
Intelligent Systems: Modeling, Optimization, and Control
Yung C. Shin, Chengying Xu, 2008
Advances in Cryptology — CRYPTO 2002: 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18–22, 2002 Proceedings
Sean Murphy, Matthew J.B. Robshaw (auth.), Moti Yung (eds.), 2002
Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings
Serge Vaudenay (auth.), Dengguo Feng, Dongdai Lin, Moti Yung (eds.), 2005
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern (auth.), Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu (eds.), 2008
Malicious Cryptography: Exposing Cryptovirology
Adam Young, Moti Yung, 2004
Malicious Cryptography: Exposing Cryptovirology
Adam Young, Moti Yung, 2004
Progress in Cryptology – INDOCRYPT 2007: 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings
Markku-Juhani O. Saarinen (auth.), K. Srinathan, C. Pandu Rangan, Moti Yung (eds.), 2007
Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings
Daniel Bleichenbacher, Alexander May (auth.), Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin (eds.), 2006
Public Key Cryptography: First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98 Pacifico Yokohama, Japan, February 5–6, 1998 Proceedings
Yair Frankel, Moti Yung (auth.), Hideki Imai, Yuliang Zheng (eds.), 1998
Advances in Multimedia Information Processing — PCM 2002: Third IEEE Pacific Rim Conference on Multimedia Hsinchu, Taiwan, December 16–18, 2002 Proceedings
Toshihiko Yamakami (auth.), Yung-Chang Chen, Long-Wen Chang, Chiou-Ting Hsu (eds.), 2002
Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings
Ahren Studer, Chenxi Wang (auth.), Jianying Zhou, Moti Yung, Feng Bao (eds.), 2006
Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings
Qiong Huang, Duncan S. Wong, Yiming Zhao (auth.), Jonathan Katz, Moti Yung (eds.), 2007
Applied Cryptography and Network Security: First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings
Ventzislav Nikov, Svetla Nikova, Bart Preneel (auth.), Jianying Zhou, Moti Yung, Yongfei Han (eds.), 2003
Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings
Michael E. Locasto, Angelos D. Keromytis (auth.), Markus Jakobsson, Moti Yung, Jianying Zhou (eds.), 2004
Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings
Jonathan Katz, Philip MacKenzie, Gelareh Taban (auth.), John Ioannidis, Angelos Keromytis, Moti Yung (eds.), 2005
H-infinity Control for Nonlinear Descriptor Systems (Lecture Notes in Control and Information Sciences)
He-Sheng Wang, Chee-Fai Yung, Fan-Ren Chang, 2006
Atmospheric Radiation: Theoretical Basis
R. M. Goody, Y. L. Yung, 1995
Photochemistry of Planetary Atmospheres
Yuk L. Yung, William B. DeMore, 1998
Problems and Solutions on Quantum Mechanics: Major American Universities Ph. D. Qualifying Questions and Solutions
Yung-Kuo Lim, Chung-Kuo K'O Hsueh Chi Shu Ta Hsueh Physics Coaching Class, 1998
Bioseparation
Yung-Huoy Truei, Tingyue Gu, Gow-Jen Tsai, George T. Tsao (auth.), Prof. Dr. G. T. Tsao (eds.), 1992
Advances in Hazardous Industrial Waste Treatment
Lawrence K. Wang, Nazih K. Shammas, Yung-Tse Hung, 2008
Chinese Political Thought: Mao Tse-Tung and Liu Shao-chi
Yung Ping Chen (auth.), 1966