Search results for: Yupu Hu
Security and Communication Networks > 9 > 18 > 5252 - 5261
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks > 373-384
Lecture Notes in Computer Science > Information Computing and Applications > Trusted and Pervasive Computing > 111-118
Lecture Notes in Computer Science > Provable Security > Signature > 127-140
Computer Communications > 2011 > 34 > 3 > 494-501
Procedia Engineering > 2011 > 15 > Complete > 3445-3449
Information Sciences > 2010 > 180 > 3 > 452-464
Wuhan University Journal of Natural Sciences > 2010 > 15 > 3 > 222-226
Wuhan University Journal of Natural Sciences > 2007 > 12 > 1 > 17-20