Search results for: Huaxiong Wang
Designs, Codes and Cryptography > 2019 > 87 > 5 > 1137-1160
Cryptography and Communications > 2018 > 10 > 6 > 1183-1202
Cryptography and Communications > 2018 > 10 > 2 > 251-275
IEEE Access > 2017 > 5 > 26973 - 26989
Information Sciences > 2016 > 373 > C > 419-440
Progress in Computer Science and Applied Logic > Coding, Cryptography and Combinatorics > Contributed Papers > 277-288
Lecture Notes in Computer Science > Content Computing > Session 5: Content Aware Security (II) > 194-207
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems, CHES 2010 > Efficient Implementations II > 219-233
Lecture Notes in Computer Science > Information, Security and Cryptology – ICISC 2009 > Privacy Enhanced Technology > 211-228
Theoretical Computer Science > 2016 > 640 > C > 104-114
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2003 > Digital Signature > 523-542
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2008 > Multi-Party Computation > 19-36
Lecture Notes in Computer Science > Selected Areas in Cryptography > Security Protocols and Applications > 88-100
Lecture Notes in Computer Science > Information Security and Cryptology — ICISC 2002 > Cryptographic Protocols II > 478-496