Search results for: Yi Mu
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2007 > General Track > 1096-1105
Lecture Notes in Computer Science > Information and Communications Security > Authentication and Key Exchange > 16-30
Lecture Notes in Computer Science > Ubiquitous Intelligence and Computing > Track 7: Security, Safety and Privacy > 874-882
Lecture Notes in Computer Science > Information Security Applications > Public Key Crypto Applications > 99-114
Lecture Notes in Computer Science > Autonomic and Trusted Computing > Cryptography and Signatures > 22-31
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Digital Signing Methods > 45-56
Lecture Notes in Computer Science > Ubiquitous Intelligence and Computing > Security, Safety and Privacy > 1191-1200
Lecture Notes in Computer Science > Information Security and Cryptology > Hardware and Software Issues > 455-470
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Digital Signature and Voting > 184-201
Lecture Notes in Computer Science > Information Security and Cryptology > Public Key Cryptosystems > 384-398