Search results for: Huaqun Wang
Annals of Telecommunications > 2019 > 74 > 7-8 > 389-400
Computers & Electrical Engineering > 2018 > 69 > C > 521-533
Future Generation Computer Systems > 2018 > 79 > P1 > 262-270
Future Generation Computer Systems > 2018 > 78 > P2 > 712-719
Computer Networks > 2017 > 128 > C > 154-163
Applied Mathematics and Computation > 2017 > 314 > C > 31-43
Computer Standards & Interfaces > 2017 > 54 > P1 > 10-19
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 8 > 1931 - 1940
IET Information Security > 2017 > 11 > 3 > 131 - 138
IEEE Access > 2017 > 5 > 393 - 405
Information Sciences > 2017 > 375 > C > 48-53
Security and Communication Networks > 9 > 17 > 4138 - 4150
IET Communications > 2016 > 10 > 14 > 1795 - 1802
Soft Computing > 2017 > 21 > 22 > 6801-6810
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 6 > 1165 - 1176
Lecture Notes in Computer Science > Information Security and Cryptology > Digital Signature and Signcryption Schemes > 41-46
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 11 > 2340 - 2351
IEEE Transactions on Services Computing > 2015 > 8 > 2 > 328 - 340
IET Information Security > 2015 > 9 > 2 > 108 - 118