Search results for: Xiangxue Li
Computer Standards & Interfaces > 2017 > 54 > P1 > 20-28
Security and Communication Networks > 9 > 18 > 5789 - 5802
Lecture Notes in Computer Science > Algorithms and Architectures for Parallel Processing > Track 1: Parallel Algorithms > 95-106
Lecture Notes in Computer Science > Information Security and Cryptology > Digital Signature Schemes > 13-26
Lecture Notes in Computer Science > Networking and Mobile Computing > Session 17: Security II > 845-852
Lecture Notes in Computer Science > Parallel and Distributed Processing and Applications > Session 7A: Security I > 705-714
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > Security in Ubiquitous Computing > 716-727
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptographic Protocols > 104-109
Lecture Notes in Computer Science > Parallel and Distributed Processing and Applications > Session 3D: Security Algorithms and Systems II > 553-563
IET Information Security > 2016 > 10 > 2 > 53 - 59
Theoretical Computer Science > 2015 > 569 > Complete > 58-69
Information Sciences > 2014 > 276 > Complete > 290-294
Journal of Mathematical Analysis and Applications > 2013 > 403 > 1 > 63-71
Mathematical and Computer Modelling > 2013 > 57 > 3-4 > 503-511
Applied Mathematics Letters > 2012 > 25 > 8 > 1111-1113