Showing 1 - 9 results of 9 for search 'Wen QIAO', query time: 0.01s
Refine Results
-
1
Cross-correlation properties between GMW and WG sequences and that of WG sequences by TONG Xin, WEN Qiao-yan
Published 2007-01-01
Article -
2
Survey of braid-based cryptography by ZHU Ping1, WEN Qiao-yan2
Published 2009-01-01
Article -
3
Verifier-based password-authenticated key exchange protocol for three-party by LI Wen-min, WEN Qiao-yan, ZHANG Hua
Published 2008-01-01
Article -
4
Efficient traceable identity-based signature scheme by DU Hong-zhen1, WEN Qiao-yan2
Published 2009-01-01
Article -
5
Review of algebraic attacks on stream ciphers by ZHANG Long1, WU Wen-ling2, WEN Qiao-yan1
Published 2006-01-01
Article -
6
Further study of the trace representation of Bent sequences families by KE Pin-hui1, ZHANG Jie2, WEN Qiao-yan2
Published 2007-01-01
Article -
7
-
8
-
9
The combination of rAAV pseudo-lipid nanoparticle and triamcinolone acetonide enables multi-administration to liver by Chunmei Gan, Mi Leng, Yu Liu, Zhaoyue Zheng, Siwu He, Wen Qiao, Lin Xiao, Yao Xiao, Jingya Ye, Lixing Zhou, Jiao Zhou, Boduan Xiao, Wenxin Zhao, Jiamei Yang, Aohan Wu, Huiyuan Zhang, Hongbo Hu, Xiaobo Cen, Zhiyong Qian, Haohao Dong, C. Alexander Valencia, Lunzhi Dai, Hoi Yee Chow, Lei Zhang, Biao Dong
Published 2025-03-01
Article