au.\*:("ZHENGTAO JIANG")
Results 1 to 2 of 2
Selection :
Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequencesZHENGTAO JIANG; YANG ZHAN; DAN CHEN et al.Applied mathematics and computation. 2005, Vol 171, Num 2, pp 900-911, issn 0096-3003, 12 p.Article
Versatile identity-based signatures for authentication in multi-user settingsXI SUN; ZHENGTAO JIANG; MEIRONG ZHOU et al.International journal of grid and utility computing (Print). 2014, Vol 5, Num 3, pp 156-164, issn 1741-847X, 9 p.Article