Search results for: Yingjiu LI
Cybersecurity > 2018 > 1 > 1 > 1-13
Future Generation Computer Systems > 2018 > 79 > P2 > 461-472
Computers & Security > 2018 > 72 > C > 163-174
IEEE Transactions on Services Computing > 2017 > 10 > 5 > 756 - 770
Computers & Security > 2017 > 70 > C > 179-198
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 4 > 350 - 362
Security and Communication Networks > 9 > 18 > 4897 - 4913
Lecture Notes in Computer Science > Information Security Practice and Experience > Public Key Encryption > 24-39
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 6 > 1252 - 1264
IFIP — The International Federation for Information Processing > Research Directions in Data and Applications Security XVIII > Data Protection Techniques > 81-94
Lecture Notes in Computer Science > Privacy in Statistical Databases > Tabular Data Protection > 1-16
Lecture Notes in Computer Science > Information Security Practice and Experience > Security Applications > 372-383
Lecture Notes in Computer Science > Data and Applications Security XXI > System Security Issues > 243-258