Showing 1 - 4 results of 4 for search 'Xing-Hua Li', query time: 0.01s
Refine Results
-
1
Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA
Published 2013-08-01Get full text
Article -
2
Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA
Published 2013-08-01Get full text
Article -
3
-
4