Search results for: H. Deng
Progress in Computer Science and Applied Logic > Coding, Cryptography and Combinatorics > Contributed Papers > 385-396
Lecture Notes in Computer Science > Information and Communications Security > Digital Signatures II > 207-219
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Security and Privacy in Communication Networks > Wireless Network Security II, Sensor Networks > 285-295
Lecture Notes in Computer Science > Grid and Cooperative Computing - GCC 2004 > Session 4: Grid Security > 317-324
Lecture Notes in Computer Science > Information Security Practice and Experience > Public Key Encryption > 24-39
Lecture Notes in Computer Science > Telecommunications and Networking - ICT 2004 > Ad Hoc Networks (II) > 381-387
Lecture Notes in Computer Science > Information and Communications Security > Wireless Network Security > 306-318
Lecture Notes in Computer Science > Information Security Practice and Experience > Public Key Encryption > 24-34
IFIP — The International Federation for Information Processing > Security and Privacy in the Age of Ubiquitous Computing > Regular Papers > 205-221
Lecture Notes in Computer Science > Information Security and Privacy > Cryptographic Implementation Issues > 97-111
Lecture Notes in Computer Science > Information Security > Algebraic Attacks and Proxy Re-Encryption > 151-166
Lecture Notes in Computer Science > Information Security and Privacy > Digital Signatures I > 278-288
Lecture Notes in Computer Science > Information Security Practice and Experience > Authentication and Key Management > 284-300