Search results for: Jian Weng
Theoretical Computer Science > 2016 > 652 > C > 18-27
Pervasive and Mobile Computing > 2016 > 28 > C > 122-134
Lecture Notes in Computer Science > Information Security > Algebraic Attacks and Proxy Re-Encryption > 151-166
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 327-342