共 50 条
- [32] Key agreement protocols and their security analysis (Extended abstract) [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 1997, 1355 : 30 - 45
- [33] Software Security Factors in Design Phase (Extended Abstract) [J]. INFORMATION SYSTEMS, TECHNOLOGY AND MANAGEMENT-THIRD INTERNATIONAL CONFERENCE, ICISTM 2009, 2009, 31 : 339 - 340
- [34] The Communication and Computation Cost of Wireless Security - Extended Abstract [J]. WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2011, : 1 - 3
- [35] An NSF View of Multimedia Privacy and Security Extended Abstract [J]. PROCEEDINGS OF THE 2017 WORKSHOP ON MULTIMEDIA PRIVACY AND SECURITY (MPS'17), 2017, : 19 - 20
- [36] Hybrid signcryption schemes with outsider security (Extended abstract) [J]. INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 203 - 217
- [37] Security with Noisy Data (Extended Abstract of Invited Talk) [J]. INFORMATION HIDING, 2010, 6387 : 48 - 50
- [38] Web services security: Techniques and challenges (extended abstract) [J]. DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 158 - 158
- [39] A model of program execution for security purposes, an extended abstract [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 509 - 513
- [40] On the Security of the EMV Secure Messaging API (Extended Abstract) [J]. SECURITY PROTOCOLS, 2010, 5964 : 147 - 149