Search results for: Robert H. Deng
Journal of Computer Science and Technology > 2019 > 34 > 2 > 403-415
Cybersecurity > 2018 > 1 > 1 > 1-13
International Journal of Information Security > 2018 > 17 > 3 > 347-363
Progress in Computer Science and Applied Logic > Coding, Cryptography and Combinatorics > Contributed Papers > 385-396
Lecture Notes in Computer Science > Information and Communications Security > Digital Signatures II > 207-219
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Security and Privacy in Communication Networks > Wireless Network Security II, Sensor Networks > 285-295
Lecture Notes in Computer Science > Grid and Cooperative Computing - GCC 2004 > Session 4: Grid Security > 317-324
Lecture Notes in Computer Science > Information Security Practice and Experience > Public Key Encryption > 24-39
Lecture Notes in Computer Science > Information and Communications Security > Wireless Network Security > 306-318
Lecture Notes in Computer Science > Information Security Practice and Experience > Public Key Encryption > 24-34
Soft Computing > 2017 > 21 > 20 > 6191-6200
IFIP — The International Federation for Information Processing > Security and Privacy in the Age of Ubiquitous Computing > Regular Papers > 205-221
Lecture Notes in Computer Science > Information Security and Privacy > Cryptographic Implementation Issues > 97-111
Lecture Notes in Computer Science > Information Security > Algebraic Attacks and Proxy Re-Encryption > 151-166
Lecture Notes in Computer Science > Information Security and Privacy > Digital Signatures I > 278-288
Lecture Notes in Computer Science > Information Security Practice and Experience > Authentication and Key Management > 284-300