Showing 1 - 5 results of 5 for search 'Xing-hua LI', query time: 0.01s
Refine Results
-
1
-
2
Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA
Published 2013-08-01
Article -
3
Multi-language oriented automatic realization method for cryptographic protocols by Xing-hua LI, Shuai-tuan LI, Deng LI, Jian-feng MA
Published 2012-09-01
Article -
4
-
5