![]() |
| 2009 | ||
|---|---|---|
| 3 | EE | Lein Harn, Changlu Lin: Detection and identification of cheaters in ( t , n ) secret sharing scheme. Des. Codes Cryptography 52(1): 15-24 (2009) |
| 2008 | ||
| 2 | EE | Wei Zhao, Changlu Lin, Dingfeng Ye: Provably Secure Convertible Nominative Signature Scheme. Inscrypt 2008: 23-40 |
| 1 | EE | Peng Wang, Dengguo Feng, Changlu Lin, Wenling Wu: Security of Truncated MACs. Inscrypt 2008: 96-114 |
| 1 | Dengguo Feng | [1] |
| 2 | Lein Harn | [3] |
| 3 | Peng Wang | [1] |
| 4 | Wenling Wu | [1] |
| 5 | Dingfeng Ye | [2] |
| 6 | Wei Zhao | [2] |