Search results for: Xiaofeng Chen
2017 36th Chinese Control Conference (CCC) > 11521 - 11526
Lecture Notes in Computer Science > Information Security Applications > Applied Cryptography > 133-147
Lecture Notes in Computer Science > Advances in Neural Networks - ISNN 2010 > Neurodynamics > 603-610
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptography > 545-555
Lecture Notes in Computer Science > Computational Intelligence and Security > Systems and Security > 894-902
Lecture Notes in Computer Science > Parallel and Distributed Processing and Applications > Session 3C: Network Routing and Communication Algorithms II > 530-540
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Payment Systems > 251-265
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 200-215
Lecture Notes in Computer Science > Progress in Cryptology - VIETCRYPT 2006 > Pairing-Based Cryptography > 67-80
Lecture Notes in Computer Science > Information Security and Cryptology > Hashing and Authentication > 415-426
Lecture Notes in Computer Science > Advances in Neural Networks – ISNN 2011 > Stability and Convergence Analysis > 260-269
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Signature Schemes I > 18-30
Lecture Notes in Computer Science > Information Security Practice and Experience > Cryptographic Techniques II > 410-421
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2003 > Voting/Auction Protocols > 259-273