Skip to contents Zheng, Yuliang [Editor] ; ASIACRYPT 2002 Queenstown, Neuseeland, ASIACRYPT 2002 Queenstown, Neuseeland Advances in cryptology : proceedings Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin; Heidelberg [u.a.]: Springer, 2002 Published in: Lecture notes in computer science ; 2501 Zhang, Kan [Editor]; Zheng, Yuliang [Other] ; ISC 7 2004 Palo Alto, Calif Information security : 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin; Heidelberg [u.a.]: Springer, 2004 Published in: Lecture notes in computer science ; 3225 Imai, Hideki [Editor]; Zheng, Yuliang [Other] ; International Workshop on Practice and Theory in Public Key Cryptography 1 1998 Yokohama Public key cryptography : First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 1998; proceedings Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin; Heidelberg [u.a.]: Springer, 1998 Published in: Lecture notes in computer science ; 1431 Imai, Hideki [Editor]; Zheng, Yuliang [Other] ; International Workshop on Practice and Theory in Public Key Cryptosystems 3 2000 Melbourne Public key cryptography : proceedings Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin; Heidelberg [u.a.]: Springer, 2000 Published in: Lecture notes in computer science ; 1751 Zhang, Kan [Author] ; Zheng, Yuliang [Other] Information Security : 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings Books View online Schließen > Access ... to E-book via DOI Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004 Published in: Lecture notes in computer science ; 3225 Zhang, Kan [Author] ; Zheng, Yuliang [Other] Information Security : 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004. Proceedings Books View online Schließen > Access ... to E-book via DOI Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin; Heidelberg: Springer, 2004 Published in: Lecture notes in computer science ; 322500 Mambo, Masahiro [Author] ; Zheng, Yuliang [Other] Information Security : Second InternationalWorkshop, ISW’99 Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings Books View online Schließen > Access ... to E-book via DOI Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1999 Published in: Lecture notes in computer science ; 1739 Imai, Hideki [Author] ; Zheng, Yuliang [Other] Public Key Cryptography : First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings Books View online Schließen > Access ... to E-book via DOI Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998 Published in: Lecture notes in computer science ; 1431 Imai, Hideki [Author] ; Zheng, Yuliang [Other] Public Key Cryptography : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings Books View online Schließen > Access ... to E-book via DOI Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin; Heidelberg: Springer, 2000 Published in: Lecture notes in computer science ; 175100 Seberry, Jennifer [Author] ; Zheng, Yuliang [Other] Advances in Cryptology - AUSCRYPT '92 : Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings Books View online Schließen > Access ... to E-book via DOI Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993 Published in: Lecture notes in computer science ; 718 Zheng, Yuliang [Author] Advances in Cryptology — ASIACRYPT 2002 : 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings Books View online Schließen > Access ... to E-book via DOI (Volltext) Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2002 Published in: Lecture notes in computer science ; 2501 Imai, Hideki [Other]; Zheng, Yuliang [Other] Public Key Cryptography : Second International Workshop on Practice and Theory in Public Key Cryptography, PKC’99 Kamakura, Japan, March 1–3, 1999 Proceedings Books View online Schließen > Access ... to E-book via DOI Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1999 Published in: Lecture notes in computer science ; 1560 Wu, Jianqing [Author]; Zheng, Xiaoshan [Author]; Wang, Yingfei [Author]; Liu, Haijin [Author]; Wu, Yuliang [Author]; Jin, Xiaoyu [Author]; Chen, Ping [Author]; Lv, Wenying [Author]; Liu, Guoguang [Author] Activation of Peracetic Acid Via a Hollow Double Layered Co3o4 Polyhedron for the Highly Efficient Removal of Sulfonamides : Kinetics Insights and Assessment of Practical Applications Books View online Schließen > Access ... to E-book (freely accessible) Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. [S.l.]: SSRN, [2022] Zheng, Yuliang Information Security and Privacy: Public Key Cryptography for Mobile Cloud Articles View online Schließen > Access Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Springer Berlin Heidelberg, 2013 Published in: Information Security and Privacy (2013), Seite 435-435 Zheng, Yuliang Secure Mobile Ad-hoc Networks and Sensors: Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks Articles View online Schließen > Access Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Springer Berlin Heidelberg, 2006 Published in: Secure Mobile Ad-hoc Networks and Sensors (2006), Seite 117-117 Zheng, Yuliang Public Key Cryptography: Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite Articles View online Schließen > Access Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Springer Berlin Heidelberg, 2001 Published in: Public Key Cryptography (2001), Seite 48-63 Zheng, Yuliang Lecture Notes in Computer Science: Signcryption and its applications in efficient public key solutions Articles View online Schließen > Access Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Springer Berlin Heidelberg, 1998 Published in: Lecture Notes in Computer Science (1998), Seite 291-312 Zheng, Yuliang Advances in Cryptology — CRYPTO '97: Digital signcryption or how to achieve cost(signature & encryption) ≪ cost(signature) + cost(encryption) Articles View online Schließen > Access Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Springer Berlin Heidelberg, 1997 Published in: Advances in Cryptology — CRYPTO '97 (1997), Seite 165-179 Zheng, Yuliang Financial Cryptography: The SPEED cipher Articles View online Schließen > Access Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Springer Berlin Heidelberg, 1997 Published in: Financial Cryptography (1997), Seite 71-89 Zheng, Yuliang Advances in Cryptology — EUROCRYPT'94: How to break and repair Leighton and Micali's key agreement protocol Articles View online Schließen > Access Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Springer Berlin Heidelberg, 1995 Published in: Advances in Cryptology — EUROCRYPT'94 (1995), Seite 299-305
Zheng, Yuliang [Editor] ; ASIACRYPT 2002 Queenstown, Neuseeland, ASIACRYPT 2002 Queenstown, Neuseeland Advances in cryptology : proceedings Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin; Heidelberg [u.a.]: Springer, 2002 Published in: Lecture notes in computer science ; 2501
Zhang, Kan [Editor]; Zheng, Yuliang [Other] ; ISC 7 2004 Palo Alto, Calif Information security : 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin; Heidelberg [u.a.]: Springer, 2004 Published in: Lecture notes in computer science ; 3225
Imai, Hideki [Editor]; Zheng, Yuliang [Other] ; International Workshop on Practice and Theory in Public Key Cryptography 1 1998 Yokohama Public key cryptography : First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 1998; proceedings Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin; Heidelberg [u.a.]: Springer, 1998 Published in: Lecture notes in computer science ; 1431
Imai, Hideki [Editor]; Zheng, Yuliang [Other] ; International Workshop on Practice and Theory in Public Key Cryptosystems 3 2000 Melbourne Public key cryptography : proceedings Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin; Heidelberg [u.a.]: Springer, 2000 Published in: Lecture notes in computer science ; 1751
Zhang, Kan [Author] ; Zheng, Yuliang [Other] Information Security : 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings Books View online Schließen > Access ... to E-book via DOI Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004 Published in: Lecture notes in computer science ; 3225
Zhang, Kan [Author] ; Zheng, Yuliang [Other] Information Security : 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004. Proceedings Books View online Schließen > Access ... to E-book via DOI Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin; Heidelberg: Springer, 2004 Published in: Lecture notes in computer science ; 322500
Mambo, Masahiro [Author] ; Zheng, Yuliang [Other] Information Security : Second InternationalWorkshop, ISW’99 Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings Books View online Schließen > Access ... to E-book via DOI Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1999 Published in: Lecture notes in computer science ; 1739
Imai, Hideki [Author] ; Zheng, Yuliang [Other] Public Key Cryptography : First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings Books View online Schließen > Access ... to E-book via DOI Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998 Published in: Lecture notes in computer science ; 1431
Imai, Hideki [Author] ; Zheng, Yuliang [Other] Public Key Cryptography : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings Books View online Schließen > Access ... to E-book via DOI Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin; Heidelberg: Springer, 2000 Published in: Lecture notes in computer science ; 175100
Seberry, Jennifer [Author] ; Zheng, Yuliang [Other] Advances in Cryptology - AUSCRYPT '92 : Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings Books View online Schließen > Access ... to E-book via DOI Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993 Published in: Lecture notes in computer science ; 718
Zheng, Yuliang [Author] Advances in Cryptology — ASIACRYPT 2002 : 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings Books View online Schließen > Access ... to E-book via DOI (Volltext) Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2002 Published in: Lecture notes in computer science ; 2501
Imai, Hideki [Other]; Zheng, Yuliang [Other] Public Key Cryptography : Second International Workshop on Practice and Theory in Public Key Cryptography, PKC’99 Kamakura, Japan, March 1–3, 1999 Proceedings Books View online Schließen > Access ... to E-book via DOI Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1999 Published in: Lecture notes in computer science ; 1560
Wu, Jianqing [Author]; Zheng, Xiaoshan [Author]; Wang, Yingfei [Author]; Liu, Haijin [Author]; Wu, Yuliang [Author]; Jin, Xiaoyu [Author]; Chen, Ping [Author]; Lv, Wenying [Author]; Liu, Guoguang [Author] Activation of Peracetic Acid Via a Hollow Double Layered Co3o4 Polyhedron for the Highly Efficient Removal of Sulfonamides : Kinetics Insights and Assessment of Practical Applications Books View online Schließen > Access ... to E-book (freely accessible) Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. [S.l.]: SSRN, [2022]
Zheng, Yuliang Information Security and Privacy: Public Key Cryptography for Mobile Cloud Articles View online Schließen > Access Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Springer Berlin Heidelberg, 2013 Published in: Information Security and Privacy (2013), Seite 435-435
Zheng, Yuliang Secure Mobile Ad-hoc Networks and Sensors: Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks Articles View online Schließen > Access Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Springer Berlin Heidelberg, 2006 Published in: Secure Mobile Ad-hoc Networks and Sensors (2006), Seite 117-117
Zheng, Yuliang Public Key Cryptography: Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite Articles View online Schließen > Access Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Springer Berlin Heidelberg, 2001 Published in: Public Key Cryptography (2001), Seite 48-63
Zheng, Yuliang Lecture Notes in Computer Science: Signcryption and its applications in efficient public key solutions Articles View online Schließen > Access Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Springer Berlin Heidelberg, 1998 Published in: Lecture Notes in Computer Science (1998), Seite 291-312
Zheng, Yuliang Advances in Cryptology — CRYPTO '97: Digital signcryption or how to achieve cost(signature & encryption) ≪ cost(signature) + cost(encryption) Articles View online Schließen > Access Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Springer Berlin Heidelberg, 1997 Published in: Advances in Cryptology — CRYPTO '97 (1997), Seite 165-179
Zheng, Yuliang Financial Cryptography: The SPEED cipher Articles View online Schließen > Access Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Springer Berlin Heidelberg, 1997 Published in: Financial Cryptography (1997), Seite 71-89
Zheng, Yuliang Advances in Cryptology — EUROCRYPT'94: How to break and repair Leighton and Micali's key agreement protocol Articles View online Schließen > Access Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Springer Berlin Heidelberg, 1995 Published in: Advances in Cryptology — EUROCRYPT'94 (1995), Seite 299-305
> Media type Skip to next facet Articles (490) Wert ausschließen Books (14) Wert ausschließen Conference Proceedings (2) Wert ausschließen Show more show less
> Location Skip to next facet Departmental Library DrePunct (4) Wert ausschließen Show more show less
> Access State Skip to next facet Open Access (158) Wert ausschließen Without Specification (344) Wert ausschließen Show more show less
> Language Skip to next facet English (383) Wert ausschließen Not determined (121) Wert ausschließen Chinese (3) Wert ausschließen Show more show less
> Subject Skip to next facet Chemistry and pharmacology (39) Wert ausschließen Technology (28) Wert ausschließen Computer science (20) Wert ausschließen Physics (20) Wert ausschließen Mathmatics (17) Wert ausschließen Medicine (16) Wert ausschließen General (14) Wert ausschließen Biology (13) Wert ausschließen Geography (10) Wert ausschließen Geology and paleontology (4) Wert ausschließen Psychology (2) Wert ausschließen Agriculture and forestry, horticulture, fisheries, housekeeping (1) Wert ausschließen Jurisprudence (1) Wert ausschließen Economics (1) Wert ausschließen Show more show less
> Creator Skip to next facet Zheng, Yuliang (104) Wert ausschließen Li, Yuliang (103) Wert ausschließen Zhao, Yuliang (60) Wert ausschließen Xue, Yurui (43) Wert ausschließen Zhang, Yuliang (34) Wert ausschließen Liu, Huibiao (30) Wert ausschließen Zheng, Zhiqiang (24) Wert ausschließen Liu, Yuliang (23) Wert ausschließen Zheng, Haiyan (21) Wert ausschließen Zheng, Xuchen (20) Wert ausschließen Zhu, Daoben (19) Wert ausschließen Li, Yongjun (18) Wert ausschließen Wang, Yuliang (18) Wert ausschließen Imai, Hideki (17) Wert ausschließen Gu, Zhanjun (16) Wert ausschließen Qi, Lu (16) Wert ausschließen Yin, Xiaodong (16) Wert ausschließen Zhang, Xian-Mo (16) Wert ausschließen Zhu, Yuliang (16) Wert ausschließen Gao, Wei (15) Wert ausschließen Luan, Xiaoyu (15) Wert ausschließen Wu, Yongyan (15) Wert ausschließen Yan, Liang (15) Wert ausschließen Zheng, Xiwang (15) Wert ausschließen Gao, Yang (14) Wert ausschließen He, Feng (14) Wert ausschließen Chen, Siao (13) Wert ausschließen Nie, Wei (13) Wert ausschließen Wu, Yuliang (13) Wert ausschließen Yin, Wenyan (13) Wert ausschließen Zhang, Zhiyong (13) Wert ausschließen Zheng, Xiaopeng (13) Wert ausschließen Jakoby, Rolf (12) Wert ausschließen Niu, Min (12) Wert ausschließen Gao, Yaqi (11) Wert ausschließen Li, Zheng (11) Wert ausschließen Zhang, Jing (11) Wert ausschließen Zhao, Shuya (11) Wert ausschließen Chai, Zhifang (10) Wert ausschließen Li, Qiang (10) Wert ausschließen Tian, Gan (10) Wert ausschließen Wang, Zheng (10) Wert ausschließen Wen, Shuxin (10) Wert ausschließen Xue, Xuting (10) Wert ausschließen Zhang, Wei (10) Wert ausschließen Zhang, Yu (10) Wert ausschließen Zheng, Jinhai (10) Wert ausschließen Zuo, Zicheng (10) Wert ausschließen An, Qi (9) Wert ausschließen Bai, Huaiyong (9) Wert ausschließen Bao, Jie (9) Wert ausschließen Cao, Ping (9) Wert ausschließen Chen, Qiping (9) Wert ausschließen Chen, Yonghao (9) Wert ausschließen Cheng, Pinjing (9) Wert ausschließen Cui, Zengqi (9) Wert ausschließen Ding, Aijun (9) Wert ausschließen Fan, Ruirui (9) Wert ausschließen Feng, Changqing (9) Wert ausschließen Gu, Minhao (9) Wert ausschließen Guo, Fengqin (9) Wert ausschließen Han, Changcai (9) Wert ausschließen Han, Zijie (9) Wert ausschließen He, Guozhu (9) Wert ausschließen He, Yongcheng (9) Wert ausschließen He, Yuefeng (9) Wert ausschließen Huang, Hanxiong (9) Wert ausschließen Huang, Weiling (9) Wert ausschließen Huang, Xiru (9) Wert ausschließen Ji, Xiaolu (9) Wert ausschließen Ji, Xuyang (9) Wert ausschließen Jiang, Haoyu (9) Wert ausschließen Jiang, Wei (9) Wert ausschließen Jing, Hantao (9) Wert ausschließen Kang, Ling (9) Wert ausschließen Kang, Mingtao (9) Wert ausschließen Li, Bo (9) Wert ausschließen Li, Lun (9) Wert ausschließen Li, Xiao (9) Wert ausschließen Liu, Rong (9) Wert ausschließen Liu, Shubin (9) Wert ausschließen Liu, Xingyan (9) Wert ausschließen Lu, Yan (9) Wert ausschließen Luan, Guangyuan (9) Wert ausschließen Ma, Yinglin (9) Wert ausschließen Ning, Changjun (9) Wert ausschließen Qi, Binbin (9) Wert ausschließen Ren, Jie (9) Wert ausschließen Ruan, Xichao (9) Wert ausschließen Song, Zhaohui (9) Wert ausschließen Su, Yuliang (9) Wert ausschließen Sun, Hong (9) Wert ausschließen Sun, Xiaoyang (9) Wert ausschließen Sun, Yuliang (9) Wert ausschließen Sun, Zhijia (9) Wert ausschließen Tan, Zhixin (9) Wert ausschließen Tang, Hongqing (9) Wert ausschließen Tang, Jingyu (9) Wert ausschließen Wang, Pengcheng (9) Wert ausschließen Wang, Qi (9) Wert ausschließen Show more show less
> Collection Skip to next facet Wiley (CrossRef) (82) Wert ausschließen Springer Science and Business Media LLC (CrossRef) (71) Wert ausschließen Springer Berlin Heidelberg (CrossRef) (67) Wert ausschließen American Chemical Society (ACS) (CrossRef) (51) Wert ausschließen Elsevier BV (CrossRef) (41) Wert ausschließen Royal Society of Chemistry (RSC) (CrossRef) (26) Wert ausschließen Institute of Electrical and Electronics Engineers (IEEE) (CrossRef) (22) Wert ausschließen MDPI AG (CrossRef) (15) Wert ausschließen Verbunddaten SWB (13) Wert ausschließen Hindawi Limited (CrossRef) (11) Wert ausschließen Informa UK Limited (CrossRef) (11) Wert ausschließen Frontiers Media SA (CrossRef) (10) Wert ausschließen IOP Publishing (CrossRef) (7) Wert ausschließen AIP Publishing (CrossRef) (6) Wert ausschließen Copernicus GmbH (CrossRef) (6) Wert ausschließen DOAJ Directory of Open Access Journals (5) Wert ausschließen Ivyspring International Publisher (CrossRef) (5) Wert ausschließen JSTOR Life Sciences Archive (5) Wert ausschließen Oxford University Press (OUP) (CrossRef) (5) Wert ausschließen Coastal Education and Research Foundation (CrossRef) (4) Wert ausschließen Medknow (CrossRef) (4) Wert ausschließen American Geophysical Union (AGU) (CrossRef) (3) Wert ausschließen SAGE Publications (CrossRef) (3) Wert ausschließen Springer International Publishing (CrossRef) (3) Wert ausschließen BMJ (CrossRef) (2) Wert ausschließen Computers, Materials and Continua (Tech Science Press) (CrossRef) (2) Wert ausschließen Optica Publishing Group (CrossRef) (2) Wert ausschließen Ovid Technologies (Wolters Kluwer Health) (CrossRef) (2) Wert ausschließen SPIE (CrossRef) (2) Wert ausschließen Spandidos Publications (CrossRef) (2) Wert ausschließen American Association for Cancer Research (AACR) (CrossRef) (1) Wert ausschließen American Association for the Advancement of Science (AAAS) (CrossRef) (1) Wert ausschließen American Institute of Mathematical Sciences (AIMS) (CrossRef) (1) Wert ausschließen American Physical Society (APS) (CrossRef) (1) Wert ausschließen American Society of Clinical Oncology (ASCO) (CrossRef) (1) Wert ausschließen Association for Computing Machinery (ACM) (CrossRef) (1) Wert ausschließen Canadian Science Publishing (CrossRef) (1) Wert ausschließen Chinese Chemical Society (CrossRef) (1) Wert ausschließen EDP Sciences (CrossRef) (1) Wert ausschließen IWA Publishing (CrossRef) (1) Wert ausschließen International Scientific Information, Inc. (CrossRef) (1) Wert ausschließen Lizenzfreie Online-Ressourcen (1) Wert ausschließen Mary Ann Liebert Inc (CrossRef) (1) Wert ausschließen Proceedings of the National Academy of Sciences (CrossRef) (1) Wert ausschließen Scientific Societies (CrossRef) (1) Wert ausschließen Test accounts (CrossRef) (1) Wert ausschließen The Korean Society of Radiology (CrossRef) (1) Wert ausschließen The Optical Society (CrossRef) (1) Wert ausschließen Yandy Scientific Press (CrossRef) (1) Wert ausschließen Show more show less