Search results for: Lihua Wang
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptographic Protocols > 198-203
Lecture Notes in Computer Science > Computer Analysis of Images and Patterns > Object and Scene Recognition > 766-773
Lecture Notes in Computer Science > Pairing-Based Cryptography - Pairing 2010 > ID-Based Encryption Schemes > 327-346
Lecture Notes in Computer Science > Public Key Cryptography – PKC 2010 > Discrete Logarithm > 351-367
Lecture Notes in Computer Science > Progress in Cryptology – INDOCRYPT 2007 > Asymmetric Cryptosystem > 297-311
Lecture Notes in Computer Science > Information and Communications Security > Short Papers II > 493-502
Lecture Notes in Computer Science > Multi-Agent and Multi-Agent-Based Simulation > Simulation of Multi-agent Systems > 11-24
Lecture Notes in Computer Science > Information and Communications Security > Session 3A. Proxy Cryptosystems > 383-400
Current Cancer Research > Chemical Carcinogenesis > 181-207
Advances in Intelligent and Soft Computing > The Sixth International Symposium on Neural Networks (ISNN 2009) > Sesson 8: Applications > 893-899
2013 25th Chinese Control and Decision Conference (CCDC) > 2913 - 2918