Search results for: Jianying Zhou
Lecture Notes in Computer Science > Trust, Privacy, and Security in Digital Business > E-Auctions > 274-287
Lecture Notes in Computer Science > Information and Communications Security > Network Security > 467-479
Lecture Notes in Computer Science > Information and Communications Security > Security Applications > 135-149
Lecture Notes in Computer Science > Information and Communications Security > Public Key Cryptography > 80-90
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 327-342
IFIP — The International Federation for Information Processing > Security and Privacy in the Age of Ubiquitous Computing > Regular Papers > 281-293
Lecture Notes in Computer Science > Public Key Infrastructures, Services and Applications > Session 2: Privacy Preserving Techniques > 45-60
Lecture Notes in Computer Science > Parallel and Distributed Processing and Applications > Session 3D: Security Algorithms and Systems II > 553-563
Lecture Notes in Computer Science
Lecture Notes in Computer Science
Lecture Notes in Computer Science
Lecture Notes in Computer Science
Lecture Notes in Computer Science
Lecture Notes in Computer Science
Lecture Notes in Computer Science
Lecture Notes in Computer Science
Lecture Notes in Computer Science