Search results for: Qiong Huang
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2008 > Fairness in Secure Computation > 106-120
Lecture Notes in Computer Science > Topics in Cryptology - CT-RSA 2010 > Public-Key Cryptography > 119-131
Lecture Notes in Computer Science > Advances in Information and Computer Security > Public-Key Cryptography (2) > 278-291
Lecture Notes in Computer Science > Pairing-Based Cryptography - Pairing 2010 > Cryptographic Protocols > 96-115
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Signature Schemes I > 1-17
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2008 > Cryptographic Protocols I > 74-89
Lecture Notes in Computer Science > Pairing-Based Cryptography - Pairing 2010 > Digital Signatures > 41-61
Lecture Notes in Computer Science > Information Security Practice and Experience > Signature, Secrete Sharing and Traitor Tracing > 257-272
Lecture Notes in Computer Science > Information and Communications Security > Digital Signatures > 57-68
Lecture Notes in Computer Science > Computing and Combinatorics > Cryptography and Security > 138-147
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 215-229