Search results for: Jiwu Jing
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 1 > 111 - 122
IEEE Security & Privacy > 2016 > 14 > 6 > 63 - 70
Lecture Notes in Computer Science > Information Security, Practice and Experience > Network Security > 153-171
Lecture Notes in Computer Science > Information Security and Cryptology > Network and System Security > 313-323
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2010 > General Track on Computational Methods, Algorithms and Applications > 468-481
Lecture Notes in Computer Science > Information Security, Practice and Experience > Network Security > 172-186
Lecture Notes in Computer Science > Information Security Practice and Experience > Signature, Secrete Sharing and Traitor Tracing > 288-301
Lecture Notes in Computer Science > Information and Communications Security > Algorithms and Evaluation > 202-215
Lecture Notes in Computer Science > Information Security, Practice and Experience > Trust Management > 264-275
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Security and Privacy in Communication Networks > Security Protocols – I > 307-325
Communications in Computer and Information Science > Secure and Trust Computing, Data Management and Applications > STA2011 - Security Track > 114-121
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 12 > 2547 - 2561
IET Information Security > 2015 > 9 > 2 > 136 - 147