logo
ArticlesAbout
Register | Login
Research Article
JUCS - Journal of Universal Computer Science 25(3): 245-269
https://doi.org/10.3217/jucs-025-03-0245 (28 Mar 2019)
Other versions:
PDF
 
 
Twitter
Facebook
Mendeley
Reddit
Notify a colleague
  • Article InfoArticle Info
  • CitationCitation
  • MetricsMetrics
  • CommentComment
  • RelatedRelated
  • CitedCited
JUCS - Journal of Universal Computer Science 25(3): 245-269
doi: 10.3217/jucs-025-03-0245
Received: 28 Mar 2018 | Approved: 30 Dec 2018 | Published: 28 Mar 2019
This article is part of:
JUCS - Journal of Universal Computer Science 25(3): Advances of Provable Security Techniques
Authors
Meijuan Huang - Corresponding author
Shaanxi Normal University, Xi'an, China
Articles by this author in:  CrossRef  |  Google Scholar
Bo Yang
Shaanxi Normal University, Xi'an, China
Articles by this author in:  CrossRef  |  Google Scholar
Yi Zhao
University of Surrey, Guildford, United Kingdom
Articles by this author in:  CrossRef  |  Google Scholar
Kaitai Liang
University of Surrey, Guildford, United Kingdom
Articles by this author in:  CrossRef  |  Google Scholar
Liang Xue
University of Waterloo, Waterloo, Canada
Articles by this author in:  CrossRef  |  Google Scholar
Xiaoyi Yang
The Hong Kong Polytechnic University, Hong Kong, China
Articles by this author in:  CrossRef  |  Google Scholar
Conflict of interest
The authors have declared that no competing interests exist.
This article is freely available under the J.UCS Open Content License.
Powered by

This website uses cookies in order to improve your web experience. Read our Cookies Policy

OK