Search results for: Yupu Hu
Lecture Notes in Computer Science > Information Security Practice and Experience > Block Ciphers and MACs > 222-232
Lecture Notes in Computer Science > Information Security and Cryptology > Public Key and Identity Based Cryptography > 305-313
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks > 373-384
Lecture Notes in Computer Science > Sequences and Their Applications – SETA 2006 > Topics in Complexities of Sequences > 190-198
Lecture Notes in Computer Science > Information Computing and Applications > Trusted and Pervasive Computing > 111-118
Lecture Notes in Computer Science > Provable Security > Signature > 127-140
Lecture Notes in Computer Science > Information Security and Cryptology > Threshold Cryptography > 242-253
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptography and Coding > 68-73
Lecture Notes in Computer Science > Ubiquitous Intelligence and Computing > Track 7: Security, Safety and Privacy > 956-965
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptography > 406-416