Search results for: Shouhuai Xu
EURASIP Journal on Information Security > 2019 > 2019 > 1 > 1-11
Concurrency and Computation: Practice and Experience > 30 > 5 > n/a - n/a
International Journal of Parallel Programming > 2018 > 46 > 4 > 788-805
Physica A: Statistical Mechanics and its Applications > 2017 > 482 > C > 713-727
Journal of Computer Virology and Hacking Techniques > 2018 > 14 > 2 > 181-193
Reliability Engineering & System Safety > 2017 > 159 > C > 119-133
China Communications > 2016 > 13 > 11 > 119 - 128
IFIP — The International Federation for Information Processing > Smart Card Research and Advanced Applications VI > Cryptographic Protocols > 271-286
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2003 > Group Signatures > 269-286
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2003 > Threshold Cryptography > 355-373
Lecture Notes in Computer Science > Privacy Enhancing Technologies > 6th Workshop on Privacy Enhancing Technologies > 295-315
Lecture Notes in Computer Science > Privacy, Security, and Trust in KDD > Contributed Papers > 97-115
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Internet Security > 511-528
Lecture Notes in Computer Science > Emerging Trends in Information and Communication Security > Enterprise Privacy > 145-159
Lecture Notes in Computer Science > Computer Network Security > Intrusion and Malware Detection > 229-241