2005 | ||
---|---|---|
4 | EE | Qiang Lei, Zhengtao Jiang, Yumin Wang: Ring-Based Anonymous Fingerprinting Scheme. CIS (2) 2005: 1080-1085 |
3 | EE | Zhengtao Jiang, Xi Sun, Yumin Wang: Security analysis and improvement of a double-trapdoor encryption scheme. Applied Mathematics and Computation 169(1): 41-50 (2005) |
2 | EE | Zhengtao Jiang, Mingsen Xiang, Yumin Wang: A research on new public-key encryption schemes. Applied Mathematics and Computation 169(1): 51-61 (2005) |
1 | EE | Zhengtao Jiang, Yang Zhan, Dan Chen, Yumin Wang: Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences. Applied Mathematics and Computation 171(2): 900-911 (2005) |
1 | Dan Chen | [1] |
2 | Qiang Lei | [4] |
3 | Xi Sun | [3] |
4 | Yumin Wang | [1] [2] [3] [4] |
5 | Mingsen Xiang | [2] |
6 | Yang Zhan | [1] |