2008 | ||
---|---|---|
90 | EE | Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang: Efficient Disjointness Tests for Private Datasets. ACISP 2008: 155-169 |
89 | EE | Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo: On the Improvement of the BDF Attack on LSBS-RSA. ACISP 2008: 84-97 |
88 | EE | Qingsong Ye, Huaxiong Wang, Christophe Tartary: Privacy-Preserving Distributed Set Intersection. ARES 2008: 1332-1339 |
87 | EE | Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling, Huaxiong Wang: Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes. ASIACRYPT 2008: 19-36 |
86 | EE | Peishun Wang, Huaxiong Wang, Josef Pieprzyk: Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. CANS 2008: 178-195 |
85 | EE | Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang: Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. CANS 2008: 49-63 |
84 | EE | Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang: Cryptanalysis of LASH. FSE 2008: 207-223 |
83 | EE | Yi Lu, Huaxiong Wang, San Ling: Cryptanalysis of Rabbit. ISC 2008: 204-214 |
82 | EE | Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang: An On-Line Secure E-Passport Protocol. ISPEC 2008: 14-28 |
81 | EE | Jin Yuan, Qingsong Ye, Huaxiong Wang, Josef Pieprzyk: Secure Computation of the Vector Dominance Problem. ISPEC 2008: 319-333 |
80 | EE | Qingsong Ye, Huaxiong Wang, Josef Pieprzyk: Distributed Private Matching and Set Operations. ISPEC 2008: 347-360 |
79 | EE | Peishun Wang, Huaxiong Wang, Josef Pieprzyk: Threshold Privacy Preserving Keyword Searches. SOFSEM 2008: 646-658 |
78 | EE | Peishun Wang, Huaxiong Wang, Josef Pieprzyk: An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. WISA 2008: 145-159 |
77 | EE | Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling, Huaxiong Wang: Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes CoRR abs/0812.2518: (2008) |
76 | EE | Huaxiong Wang, Duncan S. Wong: On Secret Reconstruction in Secret Sharing Schemes. IEEE Transactions on Information Theory 54(1): 473-480 (2008) |
75 | EE | Christophe Tartary, Huaxiong Wang, Josef Pieprzyk: A coding approach to the multicast stream authentication problem. Int. J. Inf. Sec. 7(4): 265-283 (2008) |
74 | EE | Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng: Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7): 1160-1172 (2008) |
73 | Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008) | |
72 | EE | Yan Wang, Duncan S. Wong, Huaxiong Wang: Employ a mobile agent for making a payment. Mobile Information Systems 4(1): 51-68 (2008) |
2007 | ||
71 | Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings Springer 2007 | |
70 | EE | Christophe Tartary, Huaxiong Wang: Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. ACISP 2007: 293-307 |
69 | EE | Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang: On Secure Multi-party Computation in Black-Box Groups. CRYPTO 2007: 591-612 |
68 | EE | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang: How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. CT-RSA 2007: 357-371 |
67 | EE | Peishun Wang, Huaxiong Wang, Josef Pieprzyk: A New Dynamic Accumulator for Batch Updates. ICICS 2007: 98-112 |
66 | EE | Christophe Tartary, Josef Pieprzyk, Huaxiong Wang: Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. Inscrypt 2007: 167-181 |
65 | EE | Christophe Tartary, Huaxiong Wang, Josef Pieprzyk: An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. ProvSec 2007: 17-34 |
64 | EE | Peishun Wang, Huaxiong Wang, Josef Pieprzyk: Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. Secure Data Management 2007: 108-123 |
63 | EE | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang: Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes. IEEE Transactions on Information Theory 53(7): 2542-2559 (2007) |
62 | EE | Christophe Tartary, Huaxiong Wang: Efficient multicast stream authentication for the fully adversarial network model. IJSN 2(3/4): 175-191 (2007) |
2006 | ||
61 | EE | Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho: Formal analysis of card-based payment systems in mobile devices. ACSW Frontiers 2006: 213-220 |
60 | EE | Gaurav Gupta, Josef Pieprzyk, Huaxiong Wang: An attack-localizing watermarking scheme for natural language documents. ASIACCS 2006: 157-165 |
59 | EE | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang: On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. ASIACRYPT 2006: 194-209 |
58 | EE | Christophe Tartary, Huaxiong Wang: Achieving Multicast Stream Authentication Using MDS Codes. CANS 2006: 108-125 |
57 | EE | Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng: Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). ICICS 2006: 82-91 |
56 | EE | Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang: A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. ISC 2006: 459-475 |
55 | EE | Christophe Tartary, Huaxiong Wang: Rateless Codes for the Multicast Stream Authentication Problem. IWSEC 2006: 136-151 |
54 | EE | Christophe Tartary, Huaxiong Wang: Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. Inscrypt 2006: 103-117 |
53 | EE | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang: Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. Public Key Cryptography 2006: 157-173 |
52 | EE | Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang: Anonymous Signature Schemes. Public Key Cryptography 2006: 347-363 |
51 | EE | Shoulun Long, Josef Pieprzyk, Huaxiong Wang, Duncan S. Wong: Generalised Cumulative Arrays in Secret Sharing. Des. Codes Cryptography 40(2): 191-209 (2006) |
50 | EE | Reihaneh Safavi-Naini, Huaxiong Wang: Secret sharing schemes with partial broadcast channels. Des. Codes Cryptography 41(1): 5-22 (2006) |
49 | EE | Reihaneh Safavi-Naini, Huaxiong Wang, Duncan S. Wong: Resilient Lkh: Secure Multicast Key Distribution Schemes. Int. J. Found. Comput. Sci. 17(5): 1205-1222 (2006) |
2005 | ||
48 | Yvo Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings Springer 2005 | |
47 | EE | Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang: Privacy Enhanced Electronic Cheque System. CEC 2005: 431-434 |
46 | EE | Yvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, Huaxiong Wang: Radio Networks with Reliable Communication. COCOON 2005: 156-166 |
45 | EE | Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef Pieprzyk: Converse Results to the Wiener Attack on RSA. Public Key Cryptography 2005: 184-198 |
44 | EE | Bangyu Wu, Kwok-Yan Lam, Siu Leung Chung, Huaxiong Wang: Secure Construction of Virtual Organizations in Grid Computing Systems. WINE 2005: 959-968 |
43 | EE | Christophe Tartary, Huaxiong Wang: Efficient Multicast Stream Authentication for the Fully Adversarial Network Model. WISA 2005: 108-125 |
42 | EE | Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Distributing the Encryption and Decryption of a Block Cipher. Des. Codes Cryptography 36(3): 263-287 (2005) |
2004 | ||
41 | Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings Springer 2004 | |
40 | EE | Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk: Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. ASIACRYPT 2004: 170-186 |
39 | EE | Hartono Kurnio, Huaxiong Wang, Josef Pieprzyk, Kris Gaj: Securing Multicast Groups in Ad Hoc Networks. AWCC 2004: 194-207 |
38 | EE | Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk: Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. Public Key Cryptography 2004: 86-100 |
37 | EE | Huaxiong Wang, Josef Pieprzyk: Shared generation of pseudo-random functions. J. Complexity 20(2-3): 458-472 (2004) |
2003 | ||
36 | EE | Huaxiong Wang, Josef Pieprzyk: Efficient One-Time Proxy Signatures. ASIACRYPT 2003: 507-522 |
35 | EE | Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk: Universal Designated-Verifier Signatures. ASIACRYPT 2003: 523-542 |
34 | EE | Huaxiong Wang, Josef Pieprzyk: Shared Generation of Pseudo-Random Functions with Cumulative Maps. CT-RSA 2003: 281-294 |
33 | EE | Josef Pieprzyk, Huaxiong Wang, Chaoping Xing: Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks. Selected Areas in Cryptography 2003: 88-100 |
32 | Huaxiong Wang, Chaoping Xing, Reihaneh Safavi-Naini: Linear authentication codes: bounds and constructions. IEEE Transactions on Information Theory 49(4): 866-872 (2003) | |
2002 | ||
31 | EE | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: A Secure Re-keying Scheme with Key Recovery Property. ACISP 2002: 40-55 |
30 | EE | Huaxiong Wang, Josef Pieprzyk: A Combinatorial Approach to Anonymous Membership Broadcast. COCOON 2002: 162-170 |
29 | EE | Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang: Redistribution of Mechanical Secret Shares. Financial Cryptography 2002: 238-252 |
28 | EE | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Threshold MACs. ICISC 2002: 237-252 |
27 | EE | Hartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang: A Dynamic Group Key Distribution Scheme with Flexible User Join. ICISC 2002: 478-496 |
26 | EE | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: A Group Key Distribution Scheme with Decentralised User Join. SCN 2002: 146-163 |
25 | EE | Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Constructions for Threshold Shared Generation of Authenticators. Int. J. Comput. Math. 79(12): 1285-1301 (2002) |
2001 | ||
24 | EE | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: How to Construct Fail-Stop Confirmer Signature Schemes. ACISP 2001: 435-444 |
23 | EE | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: Efficient Revocation Schemes for Secure Multicast. ICISC 2001: 160-177 |
22 | EE | Beomsik Song, Huaxiong Wang, Jennifer Seberry: A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. ICISC 2001: 18-31 |
21 | EE | Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing: Linear Authentication Codes: Bounds and Constructions. INDOCRYPT 2001: 127-135 |
20 | EE | Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk: Broadcast anti-jamming systems. Computer Networks 35(2-3): 223-236 (2001) |
19 | EE | Huaxiong Wang, Chaoping Xing: Explicit Constructions of Perfect Hash Families from Algebraic Curves over Finite Fields. J. Comb. Theory, Ser. A 93(1): 112-124 (2001) |
18 | EE | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: An Efficient Construction for Fail-Stop Signature for Long Messages. J. Inf. Sci. Eng. 17(6): 879-898 (2001) |
17 | EE | Reihaneh Safavi-Naini, Huaxiong Wang: Broadcast authentication for group communication. Theor. Comput. Sci. 269(1-2): 1-21 (2001) |
2000 | ||
16 | Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Key Management for Secure Multicast with Dynamic Controller. ACISP 2000: 178-190 | |
15 | Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao: On Multiplicative Secret Sharing Schemes. ACISP 2000: 342-351 | |
14 | EE | Reihaneh Safavi-Naini, Huaxiong Wang: New constructions for multicast re-keying schemes using perfect hash families. ACM Conference on Computer and Communications Security 2000: 228-234 |
13 | EE | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Fail-Stop Signature for Long Messages. INDOCRYPT 2000: 165-177 |
12 | Chaoping Xing, Huaxiong Wang, Kwok-Yan Lam: Constructions of authentication codes from algebraic curves over finite fields. IEEE Transactions on Information Theory 46(3): 886-892 (2000) | |
1999 | ||
11 | EE | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. ACISP 1999: 177-191 |
10 | Reihaneh Safavi-Naini, Huaxiong Wang: Broadcast Authentication in Group Communication. ASIACRYPT 1999: 399-411 | |
9 | Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam: A New Approach to Robust Threshold RSA Signature Schemes. ICISC 1999: 184-196 | |
8 | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. Australian Computer Journal 31(2): 34-43 (1999) | |
7 | Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. Comput. J. 42(8): 638-649 (1999) | |
6 | Reihaneh Safavi-Naini, Huaxiong Wang: Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions. Inf. Comput. 151(1-2): 148-172 (1999) | |
1998 | ||
5 | EE | Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: On Construction of Cumulative Secret Sharing Schemes. ACISP 1998: 379-390 |
4 | EE | Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Constructions for Multireceiver Authentication Codes. ASIACRYPT 1998: 242-256 |
3 | EE | Reihaneh Safavi-Naini, Huaxiong Wang: New Results on Multi-Receiver Authentication Codes. EUROCRYPT 1998: 527-541 |
2 | EE | Huaxiong Wang: On Syntactic Nuclei of Rational Languages. Inf. Process. Lett. 67(5): 221-226 (1998) |
1 | EE | Huaxiong Wang: On Rational Series and Rational Languages. Theor. Comput. Sci. 205(1-2): 329-336 (1998) |