Search results for: DengGuo Feng
Lecture Notes in Computer Science > Theory and Applications of Models of Computation > Models of Computation > 675-683
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Cryptosystems: Design and Analysis > 303-309
2016 IEEE Symposium on Security and Privacy (SP) > 486 - 505
Lecture Notes in Computer Science > Sequences and Their Applications – SETA 2006 > Topics in Complexities of Sequences > 199-208
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2005 > Block/Stream Ciphers (II) > 270-283
Lecture Notes in Computer Science > Information Security Applications > Anonymous Communication > 388-399
Lecture Notes in Computer Science > Parallel and Distributed Processing and Applications - ISPA 2005 Workshops > Workshop 5: International Workshop on Information Assurance in Distributed Systems (IADS 2005) > 378-386
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Key Management > 343-356
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Privacy I > 81-92
Lecture Notes in Computer Science > Information Security Practice and Experience > Post-quantum Cryptography and Side-Channel Attack > 196-207
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > Provable Security and Primitives > 352-361
Lecture Notes in Computer Science > Information Security, Practice and Experience > Trust Management > 251-263
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2005 > Block/Stream Ciphers (I) > 229-241