Search results for: Swee-Huay Heng
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Applied Cryptography and Information Security (ACIS 2006) > 416-425
Communications in Computer and Information Science > U- and E-Service, Science and Technology > 123-130
Lecture Notes in Computer Science > Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems > Cryptography Scheme > 80-89
Journal of Visual Communication and Image Representation > 2016 > 40 > PA > 51-57
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2004 > Aymmetric Encryption > 67-80
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > SecUbiq 2006 Workshop > 322-331
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2010 > Workshop on Information Retrieval, Security and Innovative Applications (RSIA 2010) > 188-198
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2007 > Workshop on Ubiquitous Applications and Security Service (UASS 7) > 644-654
Lecture Notes in Computer Science > Advances in Computer Science and Information Technology > Information Security and Assurance > 143-149
Lecture Notes in Computer Science > Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems > Cryptography Scheme > 115-126
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2005 > Signatures and Authentication > 181-197
Lecture Notes in Computer Science > Public Key Cryptography - PKC 2006 > Signature and Identification > 364-377
Lecture Notes in Computer Science > Provable Security > Authentication and Symmetric Encryption (Short Papers) > 169-177
Lecture Notes in Computer Science > Security and Cryptography for Networks > Signature Schemes Variants > 34-48
Lecture Notes in Computer Science > Information Security and Privacy > Theory and Hash Functions > 522-531