Search results for: Hossein Ghodosi
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2010 > Cryptographic Protocols > 338-354
Journal of Cryptology > 2013 > 26 > 1 > 75-79
Information Processing Letters > 2007 > 104 > 5 > 179-182