Search results for: Futai Zhang
Wireless Personal Communications > 2019 > 106 > 3 > 1161-1182
International Journal of Information Security > 2019 > 18 > 3 > 321-331
Lecture Notes in Computer Science > Ubiquitous Intelligence and Computing > Track 7: Security, Safety and Privacy > 874-882
Information Sciences > 2016 > 355-356 > C > 1-14
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > Extended Abstracts > 235-238
Lecture Notes in Computer Science > Cryptology and Network Security > Public Key Encryption > 194-208
Lecture Notes in Computer Science > Embedded and Ubiquitous Computing – EUC 2005 Workshops > The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005) > 835-844
Lecture Notes in Computer Science > Information Security Practice and Experience > Signature and Key Agreement > 214-225
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > Security in Ubiquitous Computing > 692-703
Lecture Notes in Computer Science > Provable Security > Signature > 103-121
Information Sciences > 2016 > 329 > C > 524-539
Future Generation Computer Systems > 2015 > 52 > Complete > 109-115
IET Information Security > 2015 > 9 > 3 > 158 - 166
Information Sciences > 2014 > 287 > Complete > 32-37
Information Sciences > 2013 > 232 > Complete > 475-481