Search results for: Shaoquan Jiang
IEEE Transactions on Dependable and Secure Computing > 2016 > 13 > 3 > 326 - 339
Lecture Notes in Computer Science > Topics in Cryptology - CT-RSA 2010 > Public-Key Cryptography > 57-72
Lecture Notes in Computer Science > Information Security and Privacy > Broadcast Encryption and Traitor Tracing > 1-11
Lecture Notes in Computer Science > Information Security and Cryptology > Privacy and Deniability > 298-312
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2006 > Multi-party Computation > 350-364
Lecture Notes in Computer Science > Selected Areas in Cryptography > Cryptographic Protocols > 267-279
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2005 > Authentication and Biometrics > 81-91
Lecture Notes in Computer Science > Information Security and Cryptology > Hashing and Authentication > 443-454
Information Processing Letters > 2016 > 116 > 4 > 289-293
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 9 > 2007 - 2015
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 6 > 1250 - 1261
Science China Information Sciences > 2015 > 58 > 1 > 1-13
IEEE Transactions on Electron Devices > 2014 > 61 > 8 > 2628 - 2632
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 6 > 1024 - 1033
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 9 > 1406 - 1415
Theoretical Computer Science > 2012 > 461 > Complete > 106-114