Search results for: Wenchang Shi
Bautechnik > 99 > S1 > 2 - 12
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 4 > 940 - 952
Wuhan University Journal of Natural Sciences > 2017 > 22 > 2 > 141-148
Lecture Notes in Electrical Engineering > Proceedings of the International Conference on Human-centric Computing 2011 and Embedded and Multimedia Computing 2011 > HumanCom 2011 Session 4: Privacy, Security and Trust Management > 245-257
International Journal of Information Security > 2017 > 16 > 5 > 559-576
Concurrency and Computation: Practice and Experience > 28 > 10 > 2920 - 2939
Lecture Notes in Computer Science > Information Security Practice and Experience > Secure Architecture I > 121-131
Lecture Notes in Computer Science > Information Security Practice and Experience > Secure Architecture I > 109-120
Lecture Notes in Computer Science > Computer Network Security > Security Policy and Operating System Security > 286-297
Wuhan University Journal of Natural Sciences > 2016 > 21 > 1 > 56-62
Information Sciences > 2014 > 275 > Complete > 370-384
China Communications > 2014 > 11 > 9 > 31 - 46