Kun Peng
发表
Hongbin Zha,
Xianghua Ying,
Kun Peng,
2009,
2009 IEEE International Conference on Robotics and Biomimetics (ROBIO).
Ed Dawson,
Kun Peng,
Feng Bao,
2008,
J. Res. Pract. Inf. Technol..
Ed Dawson,
Colin Boyd,
Kun Peng,
2003,
ACSW.
Kun Peng,
2014
.
Qing Li,
Kun Peng,
Min Zhang,
2016,
2016 15th International Conference on Optical Communications and Networks (ICOCN).
Kun Peng,
Feng Bao,
F. Bao,
2009,
ICISC.
Kun Peng,
Kun Peng,
2011,
ACISP.
Kun Peng,
2011,
CT-RSA.
Kun Peng,
Feng Bao,
2009,
Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications.
Kun Peng,
2012,
Int. J. Secur. Networks.
Ed Dawson,
Colin Boyd,
Kun Peng,
2005,
CRYPTO.
Kun Peng,
Kun Peng,
2011,
J. Syst. Softw..
Kun Peng,
Feng Bao,
F. Bao,
2009,
Inscrypt.
Liming Chen,
Kun Peng,
Su Ruan,
2005,
ICAPR.
Kun Peng,
2011,
International Journal of Information Security.
Kun Peng,
Kun Peng,
2011,
WISTP.
Kun Peng,
Feng Bao,
2010,
2010 Second International Symposium on Data, Privacy, and E-Commerce.
Kun Peng,
Feng Bao,
F. Bao,
2010,
2010 3rd International Conference on Computer Science and Information Technology.
Kun Peng,
2012,
IET Inf. Secur..
Kun Peng,
Feng Bao,
F. Bao,
2010,
TrustBus.
Li Yi,
Kun Peng,
Kun Peng,
2013,
AFRICACRYPT.
Byoungcheon Lee,
Ed Dawson,
Colin Boyd,
2004,
ACNS.
Byoungcheon Lee,
Ed Dawson,
Colin Boyd,
2004,
ICISC.
Kun Peng,
Feng Bao,
2011,
2011 14th IEEE International Conference on Computational Science and Engineering.
Kun Peng,
Kun Peng,
2013,
IET Inf. Secur..
Liming Chen,
Kun Peng,
Su Ruan,
2006,
UIC.
Hongbin Zha,
Xianghua Ying,
Kun Peng,
2010,
2010 20th International Conference on Pattern Recognition.
Ed Dawson,
Kun Peng,
E. Dawson,
2007,
ISPEC.
Byoungcheon Lee,
Ed Dawson,
Colin Boyd,
2004,
INDOCRYPT.
Ed Dawson,
Colin Boyd,
Kun Peng,
2002,
ICISC.
Kun Peng,
Feng Bao,
F. Bao,
2009,
WISA.
Ed Dawson,
Colin Boyd,
Kun Peng,
2004,
Public Key Cryptography.
Kun Peng,
Chen Jiang,
Jing-sheng Hu,
2012,
ITCS 2012.
Kun Peng,
Feng Bao,
F. Bao,
2009,
Inscrypt.
Kun Peng,
2011,
ArXiv.
Kun Peng,
Feng Bao,
2010,
2010 IEEE Second International Conference on Social Computing.
Ed Dawson,
Kun Peng,
Ernest Foo,
2003,
WISA.
Kun Peng,
Kun Peng,
2011,
International Journal of Information Security.
Kun Peng,
Kun Peng,
2013,
J. Inf. Process. Syst..
Ed Dawson,
Colin Boyd,
Kun Peng,
2002,
ICICS.
Kun Peng,
Feng Bao,
F. Bao,
2009,
VoteID.
Kun Peng,
2011,
ICON 2011.
Ed Dawson,
Colin Boyd,
Kun Peng,
2006,
SEC.
Ed Dawson,
Colin Boyd,
Kun Peng,
2006,
ACISP.
Kun Peng,
Pengjun Pei,
Guohua Cui,
2000,
OPSR.
Kun Peng,
2011,
2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies.
Kun Peng,
Yuexin Zhang,
Kun Peng,
2012,
IDCS.
Kun Peng,
Kun Peng,
2013,
AFRICACRYPT.
Byoungcheon Lee,
Ed Dawson,
Colin Boyd,
2005,
ICICS.
Matt Henricksen,
Ed Dawson,
Kun Peng,
2004,
EC-Web.
Hongbin Zha,
Xianghua Ying,
Kun Peng,
2013,
IEEE Transactions on Pattern Analysis and Machine Intelligence.
Kun Peng,
Feng Bao,
F. Bao,
2010,
AFRICACRYPT.
Kun Peng,
Henry Fuchs,
Andrew Maimone,
2012,
Comput. Graph..
Kun Peng,
Kun Peng,
2011,
IMACC.
Ed Dawson,
Colin Boyd,
Kun Peng,
2005,
Mycrypt.
Ed Dawson,
Kun Peng,
2007,
ACSW.
Kun Peng,
Kun Peng,
2011,
DBSec.
Hongbin Zha,
Xianghua Ying,
Kun Peng,
2010,
2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
Kun Peng,
Feng Bao,
F. Bao,
2010,
ISC.
Kun Peng,
2014,
Secur. Commun. Networks.
Kun Peng,
Kun Peng,
2009,
ISPEC.
Ed Dawson,
Colin Boyd,
Kun Peng,
2005,
ISC.
Matt Henricksen,
Kun Peng,
Matt Henricksen,
2013,
WISTP.
Kun Peng,
2011,
2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies.
Kun Peng,
Kun Peng,
2012,
IET Inf. Secur..
Ed Dawson,
Colin Boyd,
Kun Peng,
2003,
WISA.
Kun Peng,
2011,
INTRUST.
Ed Dawson,
Juan Manuel González Nieto,
Yvo Desmedt,
2006,
ICISC.
Kun Peng,
Feng Bao,
2010,
2010 Fourth International Conference on Network and System Security.
Kun Peng,
2012,
J. Inf. Process. Syst..
Hongbin Zha,
Xianghua Ying,
Kun Peng,
2010,
ISVC.
Kun Peng,
2013,
International Journal of Information Security.
Kun Peng,
2011,
J. Inf. Process. Syst..
Kun Peng,
Feng Bao,
F. Bao,
2009,
EuroPKI.
Byoungcheon Lee,
Ed Dawson,
Colin Boyd,
2004,
Cryptographic Algorithms and their Uses.
Kun Peng,
Feng Bao,
2010,
2010 International Conference on Security and Cryptography (SECRYPT).
Kun Peng,
Feng Bao,
F. Bao,
2010,
ProvSec.
Ed Dawson,
Colin Boyd,
Kun Peng,
2007,
TSEC.
Kun Peng,
Kun Peng,
2013
.
Kun Peng,
2014
.
Kun Peng,
Feng Bao,
2010,
2010 10th IEEE International Conference on Computer and Information Technology.
Ed Dawson,
Juan Manuel González Nieto,
Javier López,
2005,
CANS.
Kun Peng,
2014,
Int. J. Secur. Networks.
Kun Peng,
2007,
ICICS.
Matt Henricksen,
Kun Peng,
Matt Henricksen,
2012,
ACISP.
Min Zhang,
Kun Peng,
Qing Li,
2016,
2016 25th Wireless and Optical Communication Conference (WOCC).
Kun Peng,
Kun Peng,
2011,
J. Parallel Distributed Comput..
Ed Dawson,
Colin Boyd,
Kun Peng,
2006,
Comput. Commun..
Kun Peng,
Kun Peng,
2012,
ICDKE.
Kun Peng,
Feng Bao,
2010,
2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.
Kun Peng,
2012,
J. Inf. Process. Syst..
Kun Peng,
Feng Bao,
2010,
DBSec.
Ed Dawson,
Kun Peng,
Feng Bao,
2011,
International Journal of Information Security.
Kun Peng,
2011,
2011 IEEE 11th International Conference on Computer and Information Technology.
Liming Chen,
Kun Peng,
Su Ruan,
2005,
IEEE Conference on Advanced Video and Signal Based Surveillance, 2005..
Kun Peng,
Hao Zhu,
Stephen John Berselli,
2012
.
Ed Dawson,
Kun Peng,
Ming Yao,
2005,
ACISP.
Kun Peng,
Kun Peng,
2013
.
Kun Peng,
2021,
APKC@AsiaCCS.
Kun Peng,
Aiguo Chen,
Zhen Yang,
2021,
EURASIP J. Wirel. Commun. Netw..