1. Molecular-scale features that govern the effects of O-glycosylation on a carbohydrate-binding module12. Issue 12 (29th September 2015) Authors: Guan, Xiaoyang; Chaffey, Patrick K.; Zeng, Chen; Greene, Eric R.; Chen, Liqun; Drake, Matthew R.; Chen, Claire; Groobman, Ari; Resch, Michael G.; Himmel, Michael E.; Beckham, Gregg T.; Tan, Zhongping Journal: Chemical science Issue: Volume 6:Issue 12(2015:Dec.) Page Start: 7185 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Formation of surface nanobubbles on nanostructured substrates. Issue 3 (1st December 2016) Authors: Wang, Lei; Wang, Xingya; Wang, Liansheng; Hu, Jun; Wang, Chun Lei; Zhao, Binyu; Zhang, Xuehua; Tai, Renzhong; He, Mengdong; Chen, Liqun; Zhang, Lijuan Journal: Nanoscale Issue: Volume 9:Issue 3(2017) Page Start: 1078 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Cryptanalysis of Server-Aided RSA Protocols with Private-Key Splitting. (13th May 2019) Authors: Mefenza, Thierry; Vergnaud, Damien Editors: Chen, Liqun Journal: Computer journal Issue: Volume 62:Number 8(2019) Page Start: 1194 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model. (21st May 2019) Authors: Chang, Jinyong; Bian, Genqing; Ji, Yanyan; Xu, Maozhi Editors: Chen, Liqun Journal: Computer journal Issue: Volume 62:Number 8(2019) Page Start: 1232 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations. (27th December 2018) Authors: Emura, Keita; Kimura, Hayato; Ohigashi, Toshihiro; Suzuki, Tatsuya Editors: Chen, Liqun Journal: Computer journal Issue: Volume 62:Number 4(2019) Page Start: 614 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Non-transferable Proxy Re-encryption. (29th October 2018) Authors: Guo, Hui; Zhang, Zhenfeng; Xu, Jing; An, Ningyu Editors: Chen, Liqun Journal: Computer journal Issue: Volume 62:Number 4(2019) Page Start: 490 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates. (24th December 2018) Authors: Bingöl, Muhammed Ali; Biçer, Osman; Kiraz, Mehmet Sabir; Levi, Albert Editors: Chen, Liqun Journal: Computer journal Issue: Volume 62:Number 4(2019) Page Start: 598 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Attribute-Based Information Flow Control. (13th May 2019) Authors: Han, Jinguang; Bei, Maoxuan; Chen, Liqun; Xiang, Yang; Cao, Jie; Guo, Fuchun; Meng, Weizhi Editors: Levi, Albert Journal: Computer journal Issue: Volume 62:Number 8(2019) Page Start: 1214 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs. (31st October 2019) Authors: Zhao, Yi; Liang, Kaitai; Yang, Bo; Chen, Liqun Other Names: Gringoli Francesco Academic Editor. Journal: Security and communication networks Issue: Volume 2019(2019) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. On the Security of Secure Server-Designation Public Key Encryption with Keyword Search. (19th July 2018) Authors: Lin, Xi-Jun; Sun, Lin; Qu, Haipeng; Liu, Dongxiao Editors: Chen, Liqun Journal: Computer journal Issue: Volume 61:Number 12(2018) Page Start: 1791 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗