Search results for: Yanjiang Yang
Information Sciences > 2017 > 420 > C > 345-363
Pervasive and Mobile Computing > 2017 > 41 > C > 259-269
Computers & Security > 2017 > 69 > C > 65-83
International Journal of Surgery > 2017 > 38 > C > 123-129
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Security and Privacy in Communication Networks > Wireless Network Security II, Sensor Networks > 285-295
Pervasive and Mobile Computing > 2016 > 28 > C > 122-134
Lecture Notes in Computer Science > Information Security > Algebraic Attacks and Proxy Re-Encryption > 151-166
Lecture Notes in Computer Science > Information Security Practice and Experience > Authentication and Key Management > 284-300
Lecture Notes in Computer Science > Privacy in Statistical Databases > Tabular Data Protection > 1-16
IFIP — The International Federation for Information Processing > Security and Privacy in the Age of Ubiquitous Computing > Regular Papers > 95-111
Lecture Notes in Computer Science > Data and Applications Security XXI > System Security Issues > 243-258
Lecture Notes in Computer Science > Information Security Practice and Experience > Security Applications > 384-395
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2010 > Public-Key Encryption > 316-332
Lecture Notes in Computer Science > Information Security and Cryptology > Private Computations > 164-178