Search results for: Feng Bao
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Cryptographic Protocols > 369-382
Lecture Notes in Computer Science > Communications and Multimedia Security > Network Security > 200-209
Lecture Notes in Computer Science > Information Security and Cryptology > Web and Media Security > 264-278
Lecture Notes in Computer Science > Information Security Applications > Applied Cryptography > 118-132
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2009 > Cryptographic Protocols > 323-333
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT’98 > Cryptanalysis 1 > 126-132
Lecture Notes in Computer Science > Information and Communications Security > Cryptanalysis > 399-409
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 4: Signatures and Friends > 201-219
Lecture Notes in Computer Science > Information Security and Privacy > Electronic Commerce > 258-269
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2009 > Multiparty Computation > 418-429
Lecture Notes in Computer Science > Information and Communications Security > Applications > 402-413
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Security for Dynamic Collaborations > 238-249
Lecture Notes in Computer Science > Smart Card Research and Applications > Session 6: Cryptography and Applications > 213-220