Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by C. Li
Cryptanalysis of a Data Security Protection Scheme for VoIP
IEE Proceedings - Vision, Image, and Signal Processing
Three-Dimensional Structures ofE. coliPNP Complexes
Acta Crystallographica Section A Foundations of Crystallography
Inhibition of Human Pancreatic Alpha-Amylase by Montbretin A: A New Drug for Diabetes and Obesity?
Acta Crystallographica Section A Foundations of Crystallography
Coal Surface Control for Advanced Fine Coal Flotation
‹
15
16
17
18
Related publications
Ant Colony Optimization Based Handoff Scheme and Verifiable Secret Sharing Security With M-M Scheme for VoIP
International Journal of Intelligent Engineering and Systems
Engineering
Computer Science
An Efficient Packetization Scheme for Voip
Protection for Multi Owner Data Sharing Scheme
Bonfring International Journal of Advances in Image Processing
Cryptanalysis of a Biometric-Based Multi-Server Authentication Scheme
International Journal of Security and its Applications
Computer Science
Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network
Security and Communication Networks
Computer Networks
Information Systems
Communications
A New Coding Scheme for Data Security in RF Based Wireless Communication
Intelligent Applications for Heterogeneous System Modeling and Design
Cryptanalysis of the Revised NTRU Signature Scheme
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptanalysis of a Computer Cryptography Scheme Based on a Filter Bank
Chaos, Solitons and Fractals
Nonlinear Physics
Applied Mathematics
Statistical
Mathematics
Astronomy
Physics
TUKAB: An Efficient NAT Traversal Scheme on Security of VoIP Network System Based on Session Initiation Protocol
Journal of Computing and Information Technology
Computer Science