Search results for: Dawu Gu
Lecture Notes in Computer Science > Provable Security > Authentication and Symmetric Encryption (Short Papers) > 178-187
Lecture Notes in Computer Science > Information and Communications Security > Cryptanalysis > 242-254
Lecture Notes in Computer Science > Advances in Neural Networks – ISNN 2009 > Theoretical Analysis > 60-67
Lecture Notes in Computer Science > Information Security Practice and Experience > Security Protocols > 401-416
Lecture Notes in Computer Science > Information Security and Cryptology > Zero Knowledge and Secure Computation Protocols > 153-166
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2008 > Public-Key Cryptography – I > 104-115
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2010 > Implementation > 169-176
Lecture Notes in Computer Science > Information Security and Cryptology > Hardware and Software Issues > 487-502
Lecture Notes in Computer Science > Advances in Neural Networks - ISNN 2010 > Applications > 576-585
IET Information Security > 2016 > 10 > 2 > 95 - 103
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Forensics in Telecommunications, Information, and Multimedia > 99-109
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Forensics in Telecommunications, Information, and Multimedia > 168-178
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Forensics in Telecommunications, Information, and Multimedia > 241-255
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering