Wang, Zhenfu
11  Ergebnisse:
Personensuche X
?
1

Thermal modeling and analysis of high power semiconductor l..:

, In: 2012 13th International Conference on Electronic Packaging Technology & High Density Packaging,
Zhang, Zhiyong ; Zhang, Pu ; Li, Xiaoning... - p. 560-566 , 2012
 
?
2

Lighter is Better: A Lighter Multi-client Verifiable Outsou..:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
Wang, Xingkai ; Cao, Zhenfu ; Liu, Zhen. - p. 105-125 , 2022
 
?
3

Text semantic understanding based on knowledge enhancement ..:

, In: 2020 Chinese Automation Congress (CAC),
Tang, Xianlun ; Hao, Bohui ; Dang, Xiaoyuan... - p. 337-341 , 2020
 
?
4

Forward Secure Dynamic Searchable Symmetric Encryption with..:

, In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy,
Chen, Jing ; Cao, Zhenfu ; Shen, Jiachen.. - p. 24-30 , 2020
 
?
5

Extending CCSDS 123.0-B-1 for Lossless 4D Image Compression:

, In: 2020 IEEE International Conference on Visual Communications and Image Processing (VCIP),
Zhang, Panpan ; Wang, Xiuheng ; Gao, Tiande.. - p. 435-438 , 2020
 
?
6

New Assumptions and Efficient Cryptosystems from the e-th P..:

, In: Information Security and Privacy; Lecture Notes in Computer Science,
Zhao, Xiaopeng ; Cao, Zhenfu ; Dong, Xiaolei... - p. 408-424 , 2020
 
?
7

An Effective Verifiable Symmetric Searchable Encryption Sch..:

, In: Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City,
Wang, Kangle ; Dong, Xiaolei ; Shen, Jiachen. - p. 98-102 , 2019
 
?
8

Efficient Collision Attack Frameworks for RIPEMD-160:

, In: Advances in Cryptology – CRYPTO 2019; Lecture Notes in Computer Science,
Liu, Fukang ; Dobraunig, Christoph ; Mendel, Florian... - p. 117-149 , 2019
 
?
9

Finding Ordinary Cube Variables for Keccak-MAC with Greedy ..:

, In: Advances in Information and Computer Security; Lecture Notes in Computer Science,
Liu, Fukang ; Cao, Zhenfu ; Wang, Gaoli - p. 287-305 , 2019
 
?
10

One-more matching conjugate problem and security of braid-b..:

, In: Proceedings of the 2nd ACM symposium on Information, computer and communications security,
Wang, Licheng ; Cao, Zhenfu ; Zeng, Peng. - p. 295-301 , 2007
 
?
11

Transformation-free proxy cryptosystems and their applicati..:

, In: Proceedings of the 3rd international conference on Information security,
Wang, Lihua ; Cao, Zhenfu ; Okamoto, Eiji.. - p. 92-98 , 2004
 
1-11