Showing 1 - 2 results of 2 for search 'Jiang-hong WEI', query time: 0.01s
Refine Results
-
1
Predicate-based authenticated key exchange protocol with attribute-hiding by Wen-fen LIU, Jiang-hong WEI, Xue-xian HU
Published 2012-09-01
Article -
2
Security analysis and improvement of two attribute-based signature schemes by Xiao YANG, Guang-li XIANG, Jiang-hong WEI, Rui-zong SUN
Published 2016-10-01
Article