Home Advanced Search

Advanced Search - Page 1

Communication system security
  • PDF
  • English
  • Year: 2012
  • Author: Chen, Lidong; Gong, Guang
Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings
  • PDF
  • English
  • Year: 2004
  • Author: Shaoquan Jiang, Guang Gong (auth.), Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan (eds.)
Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings
  • PDF
  • English
  • Year: 2004
  • Author: Shaoquan Jiang, Guang Gong (auth.), Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan (eds.)
Sequences and Their Applications – SETA 2012: 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings
  • PDF
  • English
  • Year: 2012
  • Author: Yang Yang, Guang Gong, Xiaohu Tang (auth.), Tor Helleseth, Jonathan Jedwab (eds.)
Selected Areas in Cryptography: 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers
  • PDF
  • English
  • Year: 2011
  • Author: Christina Boura, Anne Canteaut (auth.), Alex Biryukov, Guang Gong, Douglas R. Stinson (eds.)
Sequences, Subsequences, and Consequences: International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers
  • PDF
  • English
  • Year: 2007
  • Author: Solomon W. Golomb (auth.), Solomon W. Golomb, Guang Gong, Tor Helleseth, Hong-Yeop Song (eds.)
Sequences, Subsequences, and Consequences: International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers
  • PDF
  • English
  • Year: 2007
  • Author: Solomon W. Golomb (auth.), Solomon W. Golomb, Guang Gong, Tor Helleseth, Hong-Yeop Song (eds.)