Showing 1 - 3 results of 3 for search 'ZHENG Xue-feng', query time: 0.01s
Refine Results
-
1
ID-based efficient and proactive threshold proxy signature in the standard model by YU Yi-ke1, ZHENG Xue-feng2
Published 2011-01-01
Article -
2
Broadcast authentication algorithm for wireless sensor networks by YAO Xuan-xia, ZHENG Xue-feng, ZHOU Xian-wei
Published 2010-01-01
Article -
3
Trust model based on individual experience by WANG Shao-jie, ZHENG Xue-feng, WANG Xiong-bin, CHU Li-jun, YU Zhen
Published 2008-01-01
Article