Search results for: Yi Mu
Wireless Personal Communications > 2017 > 96 > 3 > 4819-4845
Wireless Personal Communications > 2017 > 95 > 4 > 3509-3537
Lecture Notes in Computer Science > Embedded and Ubiquitous Computing – EUC 2005 Workshops > The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005) > 835-844
Lecture Notes in Computer Science > Embedded and Ubiquitous Computing – EUC 2005 Workshops > The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005) > 854-863
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 3 > 658 - 659
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Security and Privacy in Communication Networks > Systems Security – I > 181-198
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 12 > 2502 - 2514
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 6 > 615 - 625
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 1 > 5 - 13
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 12 > 2302 - 2313
IEEE Systems Journal > 2013 > 7 > 2 > 249 - 261
Concurrency and Computation: Practice and Experience > 23 > 12 > 1348 - 1366
Computer Communications > 2011 > 34 > 3 > 436-446