Showing 1 - 3 results of 3 for search 'WEN Qiao-yan', query time: 0.01s
Refine Results
-
1
Verifier-based password-authenticated key exchange protocol for three-party by LI Wen-min, WEN Qiao-yan, ZHANG Hua
Published 2008-01-01Get full text
Article -
2
Efficient traceable identity-based signature scheme by DU Hong-zhen1, WEN Qiao-yan2
Published 2009-01-01Get full text
Article -
3
Review of algebraic attacks on stream ciphers by ZHANG Long1, WU Wen-ling2, WEN Qiao-yan1
Published 2006-01-01Get full text
Article