dblp.uni-trier.dewww.uni-trier.de

Huaxiong Wang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
90EEQingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang: Efficient Disjointness Tests for Private Datasets. ACISP 2008: 155-169
89EEHung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo: On the Improvement of the BDF Attack on LSBS-RSA. ACISP 2008: 84-97
88EEQingsong Ye, Huaxiong Wang, Christophe Tartary: Privacy-Preserving Distributed Set Intersection. ARES 2008: 1332-1339
87EEZhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling, Huaxiong Wang: Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes. ASIACRYPT 2008: 19-36
86EEPeishun Wang, Huaxiong Wang, Josef Pieprzyk: Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. CANS 2008: 178-195
85EEHung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang: Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. CANS 2008: 49-63
84EERon Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang: Cryptanalysis of LASH. FSE 2008: 207-223
83EEYi Lu, Huaxiong Wang, San Ling: Cryptanalysis of Rabbit. ISC 2008: 204-214
82EEVijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang: An On-Line Secure E-Passport Protocol. ISPEC 2008: 14-28
81EEJin Yuan, Qingsong Ye, Huaxiong Wang, Josef Pieprzyk: Secure Computation of the Vector Dominance Problem. ISPEC 2008: 319-333
80EEQingsong Ye, Huaxiong Wang, Josef Pieprzyk: Distributed Private Matching and Set Operations. ISPEC 2008: 347-360
79EEPeishun Wang, Huaxiong Wang, Josef Pieprzyk: Threshold Privacy Preserving Keyword Searches. SOFSEM 2008: 646-658
78EEPeishun Wang, Huaxiong Wang, Josef Pieprzyk: An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. WISA 2008: 145-159
77EEZhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling, Huaxiong Wang: Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes CoRR abs/0812.2518: (2008)
76EEHuaxiong Wang, Duncan S. Wong: On Secret Reconstruction in Secret Sharing Schemes. IEEE Transactions on Information Theory 54(1): 473-480 (2008)
75EEChristophe Tartary, Huaxiong Wang, Josef Pieprzyk: A coding approach to the multicast stream authentication problem. Int. J. Inf. Sec. 7(4): 265-283 (2008)
74EEGuomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng: Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7): 1160-1172 (2008)
73 Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008)
72EEYan Wang, Duncan S. Wong, Huaxiong Wang: Employ a mobile agent for making a payment. Mobile Information Systems 4(1): 51-68 (2008)
2007
71 Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings Springer 2007
70EEChristophe Tartary, Huaxiong Wang: Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. ACISP 2007: 293-307
69EEYvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang: On Secure Multi-party Computation in Black-Box Groups. CRYPTO 2007: 591-612
68EERon Steinfeld, Josef Pieprzyk, Huaxiong Wang: How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. CT-RSA 2007: 357-371
67EEPeishun Wang, Huaxiong Wang, Josef Pieprzyk: A New Dynamic Accumulator for Batch Updates. ICICS 2007: 98-112
66EEChristophe Tartary, Josef Pieprzyk, Huaxiong Wang: Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. Inscrypt 2007: 167-181
65EEChristophe Tartary, Huaxiong Wang, Josef Pieprzyk: An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. ProvSec 2007: 17-34
64EEPeishun Wang, Huaxiong Wang, Josef Pieprzyk: Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. Secure Data Management 2007: 108-123
63EERon Steinfeld, Josef Pieprzyk, Huaxiong Wang: Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes. IEEE Transactions on Information Theory 53(7): 2542-2559 (2007)
62EEChristophe Tartary, Huaxiong Wang: Efficient multicast stream authentication for the fully adversarial network model. IJSN 2(3/4): 175-191 (2007)
2006
61EEVijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho: Formal analysis of card-based payment systems in mobile devices. ACSW Frontiers 2006: 213-220
60EEGaurav Gupta, Josef Pieprzyk, Huaxiong Wang: An attack-localizing watermarking scheme for natural language documents. ASIACCS 2006: 157-165
59EERon Steinfeld, Josef Pieprzyk, Huaxiong Wang: On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. ASIACRYPT 2006: 194-209
58EEChristophe Tartary, Huaxiong Wang: Achieving Multicast Stream Authentication Using MDS Codes. CANS 2006: 108-125
57EEGuomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng: Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). ICICS 2006: 82-91
56EEYvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang: A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. ISC 2006: 459-475
55EEChristophe Tartary, Huaxiong Wang: Rateless Codes for the Multicast Stream Authentication Problem. IWSEC 2006: 136-151
54EEChristophe Tartary, Huaxiong Wang: Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. Inscrypt 2006: 103-117
53EERon Steinfeld, Josef Pieprzyk, Huaxiong Wang: Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. Public Key Cryptography 2006: 157-173
52EEGuomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang: Anonymous Signature Schemes. Public Key Cryptography 2006: 347-363
51EEShoulun Long, Josef Pieprzyk, Huaxiong Wang, Duncan S. Wong: Generalised Cumulative Arrays in Secret Sharing. Des. Codes Cryptography 40(2): 191-209 (2006)
50EEReihaneh Safavi-Naini, Huaxiong Wang: Secret sharing schemes with partial broadcast channels. Des. Codes Cryptography 41(1): 5-22 (2006)
49EEReihaneh Safavi-Naini, Huaxiong Wang, Duncan S. Wong: Resilient Lkh: Secure Multicast Key Distribution Schemes. Int. J. Found. Comput. Sci. 17(5): 1205-1222 (2006)
2005
48 Yvo Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings Springer 2005
47EEVijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang: Privacy Enhanced Electronic Cheque System. CEC 2005: 431-434
46EEYvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, Huaxiong Wang: Radio Networks with Reliable Communication. COCOON 2005: 156-166
45EERon Steinfeld, Scott Contini, Huaxiong Wang, Josef Pieprzyk: Converse Results to the Wiener Attack on RSA. Public Key Cryptography 2005: 184-198
44EEBangyu Wu, Kwok-Yan Lam, Siu Leung Chung, Huaxiong Wang: Secure Construction of Virtual Organizations in Grid Computing Systems. WINE 2005: 959-968
43EEChristophe Tartary, Huaxiong Wang: Efficient Multicast Stream Authentication for the Fully Adversarial Network Model. WISA 2005: 108-125
42EEKeith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Distributing the Encryption and Decryption of a Block Cipher. Des. Codes Cryptography 36(3): 263-287 (2005)
2004
41 Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings Springer 2004
40EERon Steinfeld, Huaxiong Wang, Josef Pieprzyk: Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. ASIACRYPT 2004: 170-186
39EEHartono Kurnio, Huaxiong Wang, Josef Pieprzyk, Kris Gaj: Securing Multicast Groups in Ad Hoc Networks. AWCC 2004: 194-207
38EERon Steinfeld, Huaxiong Wang, Josef Pieprzyk: Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. Public Key Cryptography 2004: 86-100
37EEHuaxiong Wang, Josef Pieprzyk: Shared generation of pseudo-random functions. J. Complexity 20(2-3): 458-472 (2004)
2003
36EEHuaxiong Wang, Josef Pieprzyk: Efficient One-Time Proxy Signatures. ASIACRYPT 2003: 507-522
35EERon Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk: Universal Designated-Verifier Signatures. ASIACRYPT 2003: 523-542
34EEHuaxiong Wang, Josef Pieprzyk: Shared Generation of Pseudo-Random Functions with Cumulative Maps. CT-RSA 2003: 281-294
33EEJosef Pieprzyk, Huaxiong Wang, Chaoping Xing: Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks. Selected Areas in Cryptography 2003: 88-100
32 Huaxiong Wang, Chaoping Xing, Reihaneh Safavi-Naini: Linear authentication codes: bounds and constructions. IEEE Transactions on Information Theory 49(4): 866-872 (2003)
2002
31EEHartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: A Secure Re-keying Scheme with Key Recovery Property. ACISP 2002: 40-55
30EEHuaxiong Wang, Josef Pieprzyk: A Combinatorial Approach to Anonymous Membership Broadcast. COCOON 2002: 162-170
29EEYvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang: Redistribution of Mechanical Secret Shares. Financial Cryptography 2002: 238-252
28EEKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Threshold MACs. ICISC 2002: 237-252
27EEHartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang: A Dynamic Group Key Distribution Scheme with Flexible User Join. ICISC 2002: 478-496
26EEHartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: A Group Key Distribution Scheme with Decentralised User Join. SCN 2002: 146-163
25EEReihaneh Safavi-Naini, Huaxiong Wang: Bounds and Constructions for Threshold Shared Generation of Authenticators. Int. J. Comput. Math. 79(12): 1285-1301 (2002)
2001
24EEReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: How to Construct Fail-Stop Confirmer Signature Schemes. ACISP 2001: 435-444
23EEHartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: Efficient Revocation Schemes for Secure Multicast. ICISC 2001: 160-177
22EEBeomsik Song, Huaxiong Wang, Jennifer Seberry: A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. ICISC 2001: 18-31
21EEReihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing: Linear Authentication Codes: Bounds and Constructions. INDOCRYPT 2001: 127-135
20EEYvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk: Broadcast anti-jamming systems. Computer Networks 35(2-3): 223-236 (2001)
19EEHuaxiong Wang, Chaoping Xing: Explicit Constructions of Perfect Hash Families from Algebraic Curves over Finite Fields. J. Comb. Theory, Ser. A 93(1): 112-124 (2001)
18EEReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: An Efficient Construction for Fail-Stop Signature for Long Messages. J. Inf. Sci. Eng. 17(6): 879-898 (2001)
17EEReihaneh Safavi-Naini, Huaxiong Wang: Broadcast authentication for group communication. Theor. Comput. Sci. 269(1-2): 1-21 (2001)
2000
16 Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Key Management for Secure Multicast with Dynamic Controller. ACISP 2000: 178-190
15 Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao: On Multiplicative Secret Sharing Schemes. ACISP 2000: 342-351
14EEReihaneh Safavi-Naini, Huaxiong Wang: New constructions for multicast re-keying schemes using perfect hash families. ACM Conference on Computer and Communications Security 2000: 228-234
13EEReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Fail-Stop Signature for Long Messages. INDOCRYPT 2000: 165-177
12 Chaoping Xing, Huaxiong Wang, Kwok-Yan Lam: Constructions of authentication codes from algebraic curves over finite fields. IEEE Transactions on Information Theory 46(3): 886-892 (2000)
1999
11EEKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. ACISP 1999: 177-191
10 Reihaneh Safavi-Naini, Huaxiong Wang: Broadcast Authentication in Group Communication. ASIACRYPT 1999: 399-411
9 Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam: A New Approach to Robust Threshold RSA Signature Schemes. ICISC 1999: 184-196
8 Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. Australian Computer Journal 31(2): 34-43 (1999)
7 Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. Comput. J. 42(8): 638-649 (1999)
6 Reihaneh Safavi-Naini, Huaxiong Wang: Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions. Inf. Comput. 151(1-2): 148-172 (1999)
1998
5EEHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: On Construction of Cumulative Secret Sharing Schemes. ACISP 1998: 379-390
4EEReihaneh Safavi-Naini, Huaxiong Wang: Bounds and Constructions for Multireceiver Authentication Codes. ASIACRYPT 1998: 242-256
3EEReihaneh Safavi-Naini, Huaxiong Wang: New Results on Multi-Receiver Authentication Codes. EUROCRYPT 1998: 527-541
2EEHuaxiong Wang: On Syntactic Nuclei of Rational Languages. Inf. Process. Lett. 67(5): 221-226 (1998)
1EEHuaxiong Wang: On Rational Series and Rational Languages. Theor. Comput. Sci. 205(1-2): 329-336 (1998)

Coauthor Index

1Feng Bao [71]
2Lynn Margaret Batten [20]
3Laurence Bull [35]
4Chris Charnes [20]
5Yeow Meng Chee [77] [87]
6Liqun Chen [73]
7Joo Yeon Cho [61]
8Siu Leung Chung [44]
9Scott Contini [45] [84]
10Ed Dawson [73]
11Xiaotie Deng [52] [57] [74]
12Yvo Desmedt [20] [29] [46] [48] [56] [69]
13Kris Gaj [39]
14Hossein Ghodosi [5]
15Jian Guo [84] [85] [89]
16Gaurav Gupta [60]
17Hartono Kurnio [16] [23] [26] [27] [31] [39]
18Xuejia Lai [73]
19Kwok-Yan Lam [9] [12] [15] [44]
20Yongqing Li [48]
21San Ling [71] [77] [83] [84] [87]
22Mulan Liu [77] [87]
23Shoulun Long [51]
24Yi Lu [83]
25Masahiro Mambo [73]
26Keith M. Martin [7] [8] [11] [28] [42]
27Krystian Matusiewicz [84]
28Luke McAven [27]
29Atsuko Miyaji [73]
30Yi Mu [48] [73]
31Tatsuaki Okamoto [71]
32Vijayakrishnan Pasupathinathan [47] [61] [82]
33Josef Pieprzyk [5] [8] [11] [20] [28] [30] [33] [34] [35] [36] [37] [38] [39] [40] [41] [45] [47] [51] [53] [56] [59] [60] [61] [63] [64] [65] [66] [67] [68] [69] [75] [78] [79] [80] [81] [82] [84] [86] [90]
34David Pointcheval [73]
35Bart Preneel [73]
36Reihaneh Safavi-Naini [3] [4] [5] [6] [7] [8] [9] [10] [11] [13] [14] [16] [17] [18] [20] [21] [23] [24] [25] [26] [27] [28] [29] [31] [32] [42] [46] [49] [50]
37Jennifer Seberry (Jennifer Seberry Wallis) [22]
38Nigel P. Smart [73]
39Beomsik Song [22]
40Ron Steinfeld [35] [38] [40] [45] [53] [56] [59] [63] [68] [69] [84] [85]
41Hung-Min Sun [85] [89]
42Willy Susilo [13] [16] [18] [24] [73]
43Christophe Tartary [43] [54] [55] [58] [62] [65] [66] [70] [75] [88]
44Vijay Varadharajan [41]
45Peishun Wang [64] [67] [78] [79] [86]
46Yan Wang [72]
47Yongge Wang [46]
48Peter R. Wild [28] [42]
49Duncan S. Wong [49] [51] [52] [57] [72] [73] [74] [76]
50Bangyu Wu [44]
51Mu-En Wu [85] [89]
52Guozhen Xiao [15]
53Chaoping Xing [12] [19] [21] [32] [33] [71]
54Guomin Yang [52] [57] [74]
55Qingsong Ye [80] [81] [88] [90]
56Jin Yuan [81]
57Xian-Mo Zhang [90]
58Zhifang Zhang [77] [87]
59Huanhui Zhao [15]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)