Search results for: Feng Bao
Lecture Notes in Computer Science > Information and Communications Security > Network Security > 467-479
Lecture Notes in Computer Science > Information and Communications Security > Security Applications > 135-149
Lecture Notes in Computer Science > Public Key Infrastructures, Services and Applications > Encryption and Auctions > 179-194
Lecture Notes in Computer Science > Information Security and Privacy > Security Applications > 313-323
Lecture Notes in Computer Science > Information Security Practice and Experience > Privacy and Applications > 177-192
Lecture Notes in Computer Science > Trust, Privacy, and Security in Digital Business > E-Auctions > 266-273
Lecture Notes in Computer Science > Information Security and Cryptology > Trusted Computing and Applications > 425-437
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2004 > Stream Ciphers > 73-83
Lecture Notes in Computer Science
Lecture Notes in Computer Science