Search results for: Qiang Tang
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptographic Protocols > 149-154
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptographic Protocols > 192-197
Lecture Notes in Computer Science > Information Security > Algebraic Attacks and Proxy Re-Encryption > 151-166
Lecture Notes in Computer Science > Information and Communications Security > Key Management > 304-314
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 389-406
Lecture Notes in Computer Science > Public Key Infrastructures, Services and Applications > Encryption and Auctions > 195-208
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Key Management > 162-177
Lecture Notes in Computer Science > Information Security > Cryptographic Protocols and Schemes > 158-174
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2008 > Public-Key Cryptography – I > 130-144
Lecture Notes in Computer Science > Cryptology and Network Security > Secure Keyword Search and Private Information Retrieval > 175-193
Lecture Notes in Computer Science > Public Key Infrastructures, Services and Applications > Encryption and Auctions > 163-178
Lecture Notes in Computer Science > Data and Applications Security XXIII > Database Security II > 240-251
Lecture Notes in Computer Science > Advances in Neural Networks – ISNN 2009 > Telecommunication, Sensor Network and Transportation Systems > 890-898
Lecture Notes in Computer Science > Information and Communications Security > System Security > 294-310
Lecture Notes in Computer Science > Secure Data Management > Security and Privacy in Healthcare > 185-198
Lecture Notes in Computer Science > Information Security Practice and Experience > Signature and Key Agreement > 202-213
Lecture Notes in Computer Science > Information Security and Cryptology > Public Key and Identity Based Cryptography > 332-347