Gong, G., & Gupta, K. C. (2005). Martin Hell, and Yassir Nawaz, Towards a General RC4-like Keystream Generator Beijing, China: Springer-verlag.
Reference author: Guang Gong
First name
Guang
Last name
Gong
Hoeper, K., & Gong, G. (2005). Pre-Authentication and Authentication Models in AdHocNetworks Wireless and Mobile Network Security, Y.Xiao et al. (Eds.).
Jiang, S., & Gong, G. (2005). A Round and Communication Efficient Secure Ranking Protocol Lecture Notes in Computer Science, Springer-verlag. (Original work published 2005)
Nawaz, Y., & Gong, G. (2005). The WG Steam Cipher Denmark. (Original work published 2005)
Jiang, S., & Gong, G. (2004). Multi-service Oriented Broadcast Encryption Springer-verlag.
Jiang, S., & Gong, G. (2004). Password Based Key Exchange with Mutual Authentication Selected Area in Cryptography, 3357, 291-306. (Original work published 2004)
Jiang, S., & Gong, G. (2004). Password Based Key Exchange with Mutual Authentication Selected Area in Cryptography, Waterloo, Canada, 291-306. (Original work published 2004)
Gong, G. (2004). Randomness and Discrepancy Transforms, Progress on Cryptography Kluwer Academic Publishing, 1-8.
Jiang, S., & Gong, G. (2003). On Edit Distance Attack to Alternating Step Generator (J.-S. No, H.-Y. Song, T. Helleseth, and V.Kumar (Ed), pp. 85-92). New York: Kluwer Academic Publishers.
Hoeper, K., & Gong, G. (2006). Key revocation for identity-based schemes in mobile ad hoc networks Proceedings of 5th International Conference on AD-HOC Networks and Wireless -AD HOCNOW, Lecture Notes in Computer Science, 4104, 224-237.
- Previous page
- Currently on page 2 2
- Next page