Search results for: Junzuo Lai
Designs, Codes and Cryptography > 2019 > 87 > 6 > 1345-1371
Security and Communication Networks > 9 > 18 > 4897 - 4913
Security and Communication Networks > 9 > 16 > 3658 - 3669
Lecture Notes in Computer Science > Information Security Practice and Experience > Public Key Encryption > 24-39
Lecture Notes in Computer Science > Information Security Practice and Experience > Public Key Encryption > 24-34
IEEE Transactions on Dependable and Secure Computing > 2016 > 13 > 5 > 533 - 546
Soft Computing > 2017 > 21 > 20 > 6191-6200
Lecture Notes in Computer Science > Topics in Cryptology - CT-RSA 2010 > Public-Key Cryptography > 132-147
Lecture Notes in Computer Science > Public Key Cryptography – PKC 2007 > Public-Key Infrastructure > 476-489
Lecture Notes in Computer Science > Applied Cryptography and Network Security > RFID Security and Privacy > 475-492
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 4: Signatures and Friends > 201-219
Lecture Notes in Computer Science > Public Key Cryptography – PKC 2011 > Chosen-Ciphertext Security > 228-245
Soft Computing > 2017 > 21 > 10 > 2599-2607
Security and Communication Networks > 8 > 18 > 3511 - 3522
Chinese Journal of Electronics > 2015 > 24 > 2 > 338 - 342
Information Sciences > 2014 > 267 > Complete > 267-286
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 8 > 1343 - 1354
Information Sciences > 2011 > 181 > 11 > 2422-2435