Kun Peng

发表

Kun Peng, Feng Bao, F. Bao, 2010, 2010 3rd International Conference on Computer Science and Information Technology.

Matt Henricksen, Kun Peng, Matt Henricksen, 2013, WISTP.

Kun Peng, Kun Peng, 2011, J. Syst. Softw..

Kun Peng, Kun Peng, 2011, International Journal of Information Security.

Ed Dawson, Kun Peng, Feng Bao, 2011, International Journal of Information Security.

Ed Dawson, Colin Boyd, Kun Peng, 2006, Comput. Commun..

Ed Dawson, Colin Boyd, Kun Peng, 2003, ACSW.

Ed Dawson, Colin Boyd, Kun Peng, 2002, ICISC.

Aiguo Chen, Kun Peng, Zexin Sha, 2020, EURASIP Journal on Wireless Communications and Networking.

Kun Peng, 2013, International Journal of Information Security.

Kun Peng, Feng Bao, F. Bao, 2010, TrustBus.

Kun Peng, Kun Peng, 2012, IET Inf. Secur..

Kun Peng, 2022, 2022 19th Annual International Conference on Privacy, Security & Trust (PST).

Kun Peng, Kun Peng, 2013 .

Kun Peng, Feng Bao, F. Bao, 2010, ISC.

Kun Peng, Feng Bao, F. Bao, 2010, AFRICACRYPT.

Kun Peng, Feng Bao, F. Bao, 2009, VoteID.

Kun Peng, Kun Peng, 2009, ISPEC.

Ed Dawson, Juan Manuel González Nieto, Javier López, 2005, CANS.

Byoungcheon Lee, Ed Dawson, Colin Boyd, 2004, INDOCRYPT.

Ed Dawson, Kun Peng, Ernest Foo, 2003, WISA.

Li Yi, Kun Peng, Kun Peng, 2013, AFRICACRYPT.

Matt Henricksen, Kun Peng, Matt Henricksen, 2012, ACISP.

Kun Peng, Feng Bao, F. Bao, 2009, Inscrypt.

Ed Dawson, Colin Boyd, Kun Peng, 2004, Public Key Cryptography.

Kun Peng, Kun Peng, 2011, J. Parallel Distributed Comput..

Ed Dawson, Colin Boyd, Kun Peng, 2007, TSEC.

Byoungcheon Lee, Ed Dawson, Colin Boyd, 2004, Cryptographic Algorithms and their Uses.

Kun Peng, Kun Peng, 2013, J. Inf. Process. Syst..