Search results for: Hoon Wei Lim
Lecture Notes in Computer Science > Security Protocols > 257-260
Lecture Notes in Computer Science > Security Protocols > 139-156
Lecture Notes in Computer Science > Public Key Infrastructures, Services and Applications > Cryptographic Protocols > 99-113
Lecture Notes in Computer Science > Security Protocols > 237-256
Lecture Notes in Computer Science > Security Protocols > 157-161
Lecture Notes in Computer Science > Data Warehousing and Knowledge Discovery > Data Mining and Knowledge Discovery Techniques > 354-366
IEEE Transactions on Parallel and Distributed Systems > 2016 > 27 > 1 > 92 - 105
Designs, Codes and Cryptography > 2014 > 73 > 3 > 911-947
Designs, Codes and Cryptography > 2014 > 73 > 3 > 731-746
Designs, Codes and Cryptography > 2014 > 71 > 2 > 347-364
2013 Proceedings IEEE INFOCOM > 1052 - 1060
IEEE Transactions on Dependable and Secure Computing > 2012 > 9 > 5 > 756 - 769
International Journal of Information Security > 2011 > 10 > 1 > 15-32
International Journal of Information Security > 2011 > 10 > 3 > 137-153