AAAAAA

   
Results: 1-10 |
Results: 10

Authors: He, WH Wu, TS
Citation: Wh. He et Ts. Wu, Comment on Lin-Wu (t, n)-threshold verifiable multisecret sharing scheme, IEE P-COM D, 148(3), 2001, pp. 139-139

Authors: He, WH Parker, R
Citation: Wh. He et R. Parker, The yeast cytoplasmic LsmI/Pat1p complex protects mRNA 3 ' termini from partial degradation, GENETICS, 158(4), 2001, pp. 1445-1455

Authors: He, WH
Citation: Wh. He, Digital signature scheme based on factoring and discrete logarithms, ELECTR LETT, 37(4), 2001, pp. 220-222

Authors: He, WH Wu, TC
Citation: Wh. He et Tc. Wu, Security of the Jan-Tseng integrated schemes for user authentication and access control, IEE P-COM D, 147(5), 2000, pp. 365-368

Authors: He, WH Parker, R
Citation: Wh. He et R. Parker, Functions of Lsm proteins in mRNA degradation and splicing, CURR OP CEL, 12(3), 2000, pp. 346-350

Authors: Tharun, S He, WH Mayes, AE Lennertz, P Beggs, JD Parker, R
Citation: S. Tharun et al., Yeast Sm-like proteins function in mRNA decapping and decay, NATURE, 404(6777), 2000, pp. 515-518

Authors: He, WH Wu, TC
Citation: Wh. He et Tc. Wu, Cryptanalysis and improvement of Petersen-Michels signcryption scheme, IEE P-COM D, 146(2), 1999, pp. 123-124

Authors: He, WH Parker, R
Citation: Wh. He et R. Parker, Analysis of mRNA decay pathways in Saccharomyces cerevisiae, METHODS, 17(1), 1999, pp. 3-10

Authors: He, WH Wu, TC
Citation: Wh. He et Tc. Wu, Cryptanalysis of Lee and Chang's ID-based information security functions, COMPUT COMM, 22(8), 1999, pp. 723-726

Authors: Wu, TS He, WH Hsu, CL
Citation: Ts. Wu et al., Security of authenticated multiple-key agreement protocols, ELECTR LETT, 35(5), 1999, pp. 391-392
Risultati: 1-10 |