Search results for: Yupu Hu
International Journal of Intelligent Systems > 37 > 1 > 568 - 595
Frontiers of Computer Science > 2019 > 13 > 4 > 879-906
Designs, Codes and Cryptography > 2019 > 87 > 11 > 2553-2570
International Journal of Information Security > 2019 > 18 > 3 > 355-370
IET Information Security > 2017 > 11 > 5 > 261 - 266
Wuhan University Journal of Natural Sciences > 2017 > 22 > 4 > 355-360
Journal of Shanghai Jiaotong University (Science) > 2017 > 22 > 3 > 313-321
Security and Communication Networks > 9 > 18 > 5252 - 5261
Lecture Notes in Computer Science > Information Security Practice and Experience > Block Ciphers and MACs > 222-232
Designs, Codes and Cryptography > 2017 > 84 > 3 > 311-324
Lecture Notes in Computer Science > Information Security and Cryptology > Public Key and Identity Based Cryptography > 305-313
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks > 373-384
Lecture Notes in Computer Science > Sequences and Their Applications – SETA 2006 > Topics in Complexities of Sequences > 190-198
Lecture Notes in Computer Science > Information Computing and Applications > Trusted and Pervasive Computing > 111-118
Lecture Notes in Computer Science > Provable Security > Signature > 127-140
Lecture Notes in Computer Science > Information Security and Cryptology > Threshold Cryptography > 242-253
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptography and Coding > 68-73
Lecture Notes in Computer Science > Ubiquitous Intelligence and Computing > Track 7: Security, Safety and Privacy > 956-965
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptography > 406-416
Applicable Algebra in Engineering, Communication and Computing > 2016 > 27 > 5 > 413-434