Showing 1 - 6 results of 6 for search 'Feng Chao', query time: 0.02s
Refine Results
-
1
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols by FENG Chao, ZHANG Quan, TANG Chao-jing
Published 2011-01-01
Article -
2
Evaluating the network security by the Read<sub>W</sub>rite transition model by LU Zhi-yong1, 2, FENG Chao1, YU Hui2
Published 2010-01-01
Article -
3
-
4
-
5
The twinned crystal structure of 10-(4-methyl benzoate)-2,8-diethyl-5,5-difluoro-1,3,7,9-tetramethyl-5H-di-pyrrolo[1,2-c:2′,1′-f] [1,3,2]diazaborinin-4-ium-5-uide, C25H29BF2N2O2... by Usman Rabia, Bin-Jumah May Nasser, Altamimi Abeer A., Baeshen Kholoud A., Feng Chao, Al-Qhatani Mohsen Mohammed, Henidi Hanan A.
Published 2025-02-01
Article -
6