Search results for: Ninghui Li
Journal of Bionic Engineering > 2019 > 16 > 5 > 806-813
International Journal of Human-Computer Studies > 2018 > 119 > C > 35-47
The VLDB Journal > 2018 > 27 > 2 > 201-223
2017 IEEE Symposium on Security and Privacy (SP) > 503 - 520
Lecture Notes in Computer Science > Foundations of Security Analysis and Design III > FOSAD 2005 (19-24 September 2005) > 178-206
Lecture Notes in Computer Science > Information and Communications Security > Access Control and Systems Security > 159-173
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Financial Transactions and Web Services > 208-223
Lecture Notes in Computer Science > Computer Security - ESORICS 2008 > Session 4: Data and Applications Security > 177-191
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Fraud Detection > 238-255
Lecture Notes in Computer Science > Computer Security - ESORICS 2008 > Session 7: Access Control and Trust Negotiation > 317-332
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Anonymous Authentication > 253-269
Lecture Notes in Computer Science > Information and Communications Security > Access Control and Systems Security > 122-138
Lecture Notes in Computer Science > Financial Cryptography > Certificates and Authentication > 166-177
Lecture Notes in Computer Science
IFIP — The International Federation for Information Processing