Embedded Extended Visual Cryptography Schemes
Liu, Feng, Wu, Chuankun
Published in IEEE transactions on information forensics and security (01.06.2011)
Published in IEEE transactions on information forensics and security (01.06.2011)
Get full text
Journal Article
Step Construction of Visual Cryptography Schemes
Liu, Feng, Wu, Chuankun, Lin, Xijun
Published in IEEE transactions on information forensics and security (01.03.2010)
Published in IEEE transactions on information forensics and security (01.03.2010)
Get full text
Journal Article
Protecting white-box cryptographic implementations with obfuscated round boundaries
Xu, Tao, Wu, Chuankun, Liu, Feng, Zhao, Ruoxin
Published in Science China. Information sciences (01.03.2018)
Published in Science China. Information sciences (01.03.2018)
Get full text
Journal Article
A strongly secure identity-based authenticated group key exchange protocol
Teng, JiKai, Wu, ChuanKun, Tang, ChunMing, Tian, YouLiang
Published in Science China. Information sciences (01.09.2015)
Published in Science China. Information sciences (01.09.2015)
Get full text
Journal Article
An ID-based authenticated dynamic group key agreement with optimal round
Teng, JiKai, Wu, ChuanKun, Tang, ChunMing
Published in Science China. Information sciences (01.11.2012)
Published in Science China. Information sciences (01.11.2012)
Get full text
Journal Article