Search results for: Xinyi Huang
Lecture Notes in Computer Science > Information Security and Cryptology > Digital Signature Schemes > 25-39
Lecture Notes in Computer Science > Information Security Applications > Public Key Crypto Applications > 16-29
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 3 > 484 - 497
Science China Life Sciences > 2016 > 59 > 3 > 312-324
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 3 > 237 - 248
Soft Computing > 2017 > 21 > 10 > 2599-2607
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 12 > 2681 - 2691
IEEE Transactions on Computers > 2015 > 64 > 12 > 3569 - 3579
Ad Hoc Networks > 2015 > 35 > C > 51-64
IEEE Transactions on Computers > 2015 > 64 > 11 > 3293 - 3303
Future Generation Computer Systems > 2015 > 52 > Complete > 67-76
Cell Reports > 2015 > 13 > 4 > 723-732
Information Sciences > 2015 > 318 > Complete > 144-156
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 5 > 546 - 556
IEEE Transactions on Computers > 2015 > 64 > 9 > 2595 - 2608
Carbohydrate Research > 2015 > 412 > Complete > 1-6
Soft Computing > 2017 > 21 > 4 > 907-921
Journal of Applied Polymer Science > 132 > 37 > n/a - n/a