Search results for: Feng Bao
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Cryptosystems: Design and Analysis > 303-309
Lecture Notes in Computer Science > Information and Communications Security > Wireless Network Security > 306-318
Mycological Progress > 2016 > 15 > 10-11 > 1145-1155
Rare Metals > 2017 > 36 > 8 > 640-644
Journal of Computational Physics > 2016 > 315 > C > 39-51
Materials Today Communications > 2016 > 7 > Complete > 149-154
IFIP — The International Federation for Information Processing > Security and Privacy in the Age of Ubiquitous Computing > Regular Papers > 205-221
Lecture Notes in Computer Science > Information Security and Privacy > Cryptographic Implementation Issues > 97-111
Lecture Notes in Computer Science > Information Security > Algebraic Attacks and Proxy Re-Encryption > 151-166
Lecture Notes in Computer Science > Information Security and Privacy > Digital Signatures I > 278-288
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2003 > Digital Signatures II > 305-319
Lecture Notes in Computer Science > Automata, Languages and Programming > Signature and Message Authentication > 459-471
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Key Management > 343-356