Browsing by Author Jiang, ZL

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 16 to 19 of 19 < previous 
TitleAuthor(s)Issue DateViews
 
Secure chained threshold proxy signature without and with supervision
Journal:Journal of Software Engineering and Applications
2009
170
 
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM
Proceeding/Conference:Proceeding-SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing
2017
128
Secure end-to-end browsing system with mobile composition
Proceeding/Conference:International Conference on Internet Technology and Applications (iTAP)
2011
133
SPECS: Secure and privacy enhancing communications schemes for VANETs
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
2010
97