Search results for: Rongxing Lu
Lecture Notes in Computer Science > Computer Security – ESORICS 2007 > Applied Cryptography II > 299-310
Lecture Notes in Computer Science > Autonomic and Trusted Computing > Track 3: Cryptography, Security and Privacy > 418-427
Lecture Notes in Computer Science > Wireless Algorithms, Systems, and Applications > Session 6B: Security > 467-477
Lecture Notes in Computer Science > Networking and Mobile Computing > Session 17: Security II > 845-852
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Forensics in Telecommunications, Information, and Multimedia > 66-78