Search results for: TieYan Li
Lecture Notes in Computer Science > Grid and Cooperative Computing - GCC 2004 > Session 4: Grid Security > 317-324
Lecture Notes in Computer Science > Information Security and Cryptology > Hardware Security > 383-392
Lecture Notes in Computer Science > Information Security and Cryptology > Hashing and Authentication > 427-442
Lecture Notes in Computer Science > Information Security Practice and Experience > Security Applications > 372-383
IFIP — The International Federation for Information Processing > Security and Privacy in the Age of Ubiquitous Computing > Regular Papers > 459-475
Lecture Notes in Computer Science > Information Security Practice and Experience > Security Protocol > 142-152
Lecture Notes in Computer Science > Information Security Practice and Experience > Network Security II > 112-122
Lecture Notes in Computer Science > Design and Applications of Intelligent Agents > Architecture, Specification, and Allocation > 101-114
Lecture Notes in Computer Science > Communications and Multimedia Security > Network Security > 200-209
Lecture Notes in Computer Science > Information and Communications Security > Applications > 389-401
Lecture Notes in Computer Science > Information Security and Cryptology > Trusted Computing and Applications > 406-424
Lecture Notes in Computer Science > Information and Communications Security > Security Applications > 150-164
RFID Security > Security Protocols and Techniques > 131-146