Search results for: Xinyi Huang
Neurochemical Research > 2019 > 44 > 2 > 472-484
Theoretical and Applied Genetics > 2018 > 131 > 9 > 1967-1986
Personal and Ubiquitous Computing > 2017 > 21 > 5 > 777-777
Peer-to-Peer Networking and Applications > 2018 > 11 > 2 > 235-251
Lecture Notes in Computer Science > Autonomic and Trusted Computing > Cryptography and Signatures > 13-21
Lecture Notes in Computer Science > Ubiquitous Intelligence and Computing > Track 7: Security, Safety and Privacy > 874-882
Wireless Personal Communications > 2017 > 96 > 4 > 4947-4972
Lecture Notes in Computer Science > Information Security Applications > Public Key Crypto Applications > 99-114
Lecture Notes in Computer Science > Autonomic and Trusted Computing > Cryptography and Signatures > 22-31
Lecture Notes in Computer Science > Provable Security > Signature > 141-155
Lecture Notes in Computer Science > Embedded and Ubiquitous Computing – EUC 2005 Workshops > The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005) > 835-844
Lecture Notes in Computer Science > Information Security and Cryptology > Certificateless Cryptography > 217-239
Lecture Notes in Computer Science > Information Security Practice and Experience > Signature and Key Agreement > 214-225
Lecture Notes in Computer Science > Information and Communications Security > Digital Signatures > 57-68