Search results for: Xinyi Huang
Lecture Notes in Computer Science > Embedded and Ubiquitous Computing – EUC 2005 Workshops > The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005) > 835-844
Lecture Notes in Computer Science > Information Security Practice and Experience > Signature and Key Agreement > 214-225
Lecture Notes in Computer Science > Pairing-Based Cryptography – Pairing 2007 > Protocol II > 367-391
The Journal of Systems & Software > 2012 > 85 > 6 > 1409-1417
The Journal of Systems & Software > 2012 > 85 > 2 > 314-322
The Journal of Supercomputing > 2011 > 55 > 2 > 173-191