Wyniki wyszukiwania dla: Jian Weng
IEEE Photonics Journal > 2016 > 8 > 3 > 1 - 6
Pervasive and Mobile Computing > 2016 > 28 > C > 122-134
IEEE Transactions on Multimedia > 2016 > 18 > 5 > 929 - 939
Lecture Notes in Computer Science > Information Security > Algebraic Attacks and Proxy Re-Encryption > 151-166
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2006 > ID-Based Cryptography > 409-423
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2010 > Public-Key Encryption > 316-332
Lecture Notes in Computer Science > Information Security and Cryptology > Private Computations > 164-178
Lecture Notes in Computer Science > Information Security and Cryptology > Digital Signature Schemes > 13-26
Lecture Notes in Computer Science > Computing and Combinatorics > Cryptography, Security, Coding and Game Theory > 520-529
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2008 > Public Key Encryption with Special Properties > 203-220
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptography > 470-480
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 327-342
Lecture Notes in Computer Science
Journal of Power Sources > 2016 > 307 > C > 138-145
Toxicology Letters > 2016 > 240 > 1 > 68-80