Search results for: Chi-Jen Lu
Artificial Intelligence > 2016 > 241 > C > 217-243
Operations Research Letters > 2016 > 44 > 6 > 808-811
Lecture Notes in Computer Science > Algorithms and Computation > Automata, Cryptography, and Complexity Theory > 302-312
Lecture Notes in Computer Science > STACS 98 > 73-83
Lecture Notes in Computer Science > Computing and Combinatorics > Complexity and Inapproximability > 13-22
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2001 > Two-Party Protocols > 369-384
Lecture Notes in Computer Science > Computing and Combinatorics > Computational Complexity > 167-173
Lecture Notes in Computer Science > Advances in Cryptology - EUROCRYPT 2009 > Security, Proofs and Models (1) > 72-87
Lecture Notes in Computer Science > Theory of Cryptography > One-Way Functions and Friends > 462-481
Lecture Notes in Computer Science > Randomization and Approximation Techniques in Computer Science > Regular Papers > 35-46
Lecture Notes in Computer Science > Algorithms and Computation > Algorithms and Data Structures > 768-778
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2002 > Information Theory and Secret Sharing > 257-271