| 2008 |
| 90 | EE | Qingsong Ye,
Huaxiong Wang,
Josef Pieprzyk,
Xian-Mo Zhang:
Efficient Disjointness Tests for Private Datasets.
ACISP 2008: 155-169 |
| 89 | EE | Hung-Min Sun,
Mu-En Wu,
Huaxiong Wang,
Jian Guo:
On the Improvement of the BDF Attack on LSBS-RSA.
ACISP 2008: 84-97 |
| 88 | EE | Qingsong Ye,
Huaxiong Wang,
Christophe Tartary:
Privacy-Preserving Distributed Set Intersection.
ARES 2008: 1332-1339 |
| 87 | EE | Zhifang Zhang,
Mulan Liu,
Yeow Meng Chee,
San Ling,
Huaxiong Wang:
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes.
ASIACRYPT 2008: 19-36 |
| 86 | EE | Peishun Wang,
Huaxiong Wang,
Josef Pieprzyk:
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups.
CANS 2008: 178-195 |
| 85 | EE | Hung-Min Sun,
Mu-En Wu,
Ron Steinfeld,
Jian Guo,
Huaxiong Wang:
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.
CANS 2008: 49-63 |
| 84 | EE | Ron Steinfeld,
Scott Contini,
Krystian Matusiewicz,
Josef Pieprzyk,
Jian Guo,
San Ling,
Huaxiong Wang:
Cryptanalysis of LASH.
FSE 2008: 207-223 |
| 83 | EE | Yi Lu,
Huaxiong Wang,
San Ling:
Cryptanalysis of Rabbit.
ISC 2008: 204-214 |
| 82 | EE | Vijayakrishnan Pasupathinathan,
Josef Pieprzyk,
Huaxiong Wang:
An On-Line Secure E-Passport Protocol.
ISPEC 2008: 14-28 |
| 81 | EE | Jin Yuan,
Qingsong Ye,
Huaxiong Wang,
Josef Pieprzyk:
Secure Computation of the Vector Dominance Problem.
ISPEC 2008: 319-333 |
| 80 | EE | Qingsong Ye,
Huaxiong Wang,
Josef Pieprzyk:
Distributed Private Matching and Set Operations.
ISPEC 2008: 347-360 |
| 79 | EE | Peishun Wang,
Huaxiong Wang,
Josef Pieprzyk:
Threshold Privacy Preserving Keyword Searches.
SOFSEM 2008: 646-658 |
| 78 | EE | Peishun Wang,
Huaxiong Wang,
Josef Pieprzyk:
An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data.
WISA 2008: 145-159 |
| 77 | EE | Zhifang Zhang,
Mulan Liu,
Yeow Meng Chee,
San Ling,
Huaxiong Wang:
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes
CoRR abs/0812.2518: (2008) |
| 76 | EE | Huaxiong Wang,
Duncan S. Wong:
On Secret Reconstruction in Secret Sharing Schemes.
IEEE Transactions on Information Theory 54(1): 473-480 (2008) |
| 75 | EE | Christophe Tartary,
Huaxiong Wang,
Josef Pieprzyk:
A coding approach to the multicast stream authentication problem.
Int. J. Inf. Sec. 7(4): 265-283 (2008) |
| 74 | EE | Guomin Yang,
Duncan S. Wong,
Huaxiong Wang,
Xiaotie Deng:
Two-factor mutual authentication based on smart cards and passwords.
J. Comput. Syst. Sci. 74(7): 1160-1172 (2008) |
| 73 | | Liqun Chen,
Willy Susilo,
Huaxiong Wang,
Duncan S. Wong,
Ed Dawson,
Xuejia Lai,
Masahiro Mambo,
Atsuko Miyaji,
Yi Mu,
David Pointcheval,
Bart Preneel,
Nigel P. Smart:
Cryptography in Computer System Security.
J. UCS 14(3): 314-317 (2008) |
| 72 | EE | Yan Wang,
Duncan S. Wong,
Huaxiong Wang:
Employ a mobile agent for making a payment.
Mobile Information Systems 4(1): 51-68 (2008) |
| 2007 |
| 71 | | Feng Bao,
San Ling,
Tatsuaki Okamoto,
Huaxiong Wang,
Chaoping Xing:
Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings
Springer 2007 |
| 70 | EE | Christophe Tartary,
Huaxiong Wang:
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.
ACISP 2007: 293-307 |
| 69 | EE | Yvo Desmedt,
Josef Pieprzyk,
Ron Steinfeld,
Huaxiong Wang:
On Secure Multi-party Computation in Black-Box Groups.
CRYPTO 2007: 591-612 |
| 68 | EE | Ron Steinfeld,
Josef Pieprzyk,
Huaxiong Wang:
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.
CT-RSA 2007: 357-371 |
| 67 | EE | Peishun Wang,
Huaxiong Wang,
Josef Pieprzyk:
A New Dynamic Accumulator for Batch Updates.
ICICS 2007: 98-112 |
| 66 | EE | Christophe Tartary,
Josef Pieprzyk,
Huaxiong Wang:
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures.
Inscrypt 2007: 167-181 |
| 65 | EE | Christophe Tartary,
Huaxiong Wang,
Josef Pieprzyk:
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.
ProvSec 2007: 17-34 |
| 64 | EE | Peishun Wang,
Huaxiong Wang,
Josef Pieprzyk:
Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data.
Secure Data Management 2007: 108-123 |
| 63 | EE | Ron Steinfeld,
Josef Pieprzyk,
Huaxiong Wang:
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes.
IEEE Transactions on Information Theory 53(7): 2542-2559 (2007) |
| 62 | EE | Christophe Tartary,
Huaxiong Wang:
Efficient multicast stream authentication for the fully adversarial network model.
IJSN 2(3/4): 175-191 (2007) |
| 2006 |
| 61 | EE | Vijayakrishnan Pasupathinathan,
Josef Pieprzyk,
Huaxiong Wang,
Joo Yeon Cho:
Formal analysis of card-based payment systems in mobile devices.
ACSW Frontiers 2006: 213-220 |
| 60 | EE | Gaurav Gupta,
Josef Pieprzyk,
Huaxiong Wang:
An attack-localizing watermarking scheme for natural language documents.
ASIACCS 2006: 157-165 |
| 59 | EE | Ron Steinfeld,
Josef Pieprzyk,
Huaxiong Wang:
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator.
ASIACRYPT 2006: 194-209 |
| 58 | EE | Christophe Tartary,
Huaxiong Wang:
Achieving Multicast Stream Authentication Using MDS Codes.
CANS 2006: 108-125 |
| 57 | EE | Guomin Yang,
Duncan S. Wong,
Huaxiong Wang,
Xiaotie Deng:
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper).
ICICS 2006: 82-91 |
| 56 | EE | Yvo Desmedt,
Josef Pieprzyk,
Ron Steinfeld,
Huaxiong Wang:
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders.
ISC 2006: 459-475 |
| 55 | EE | Christophe Tartary,
Huaxiong Wang:
Rateless Codes for the Multicast Stream Authentication Problem.
IWSEC 2006: 136-151 |
| 54 | EE | Christophe Tartary,
Huaxiong Wang:
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme.
Inscrypt 2006: 103-117 |
| 53 | EE | Ron Steinfeld,
Josef Pieprzyk,
Huaxiong Wang:
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption.
Public Key Cryptography 2006: 157-173 |
| 52 | EE | Guomin Yang,
Duncan S. Wong,
Xiaotie Deng,
Huaxiong Wang:
Anonymous Signature Schemes.
Public Key Cryptography 2006: 347-363 |
| 51 | EE | Shoulun Long,
Josef Pieprzyk,
Huaxiong Wang,
Duncan S. Wong:
Generalised Cumulative Arrays in Secret Sharing.
Des. Codes Cryptography 40(2): 191-209 (2006) |
| 50 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
Secret sharing schemes with partial broadcast channels.
Des. Codes Cryptography 41(1): 5-22 (2006) |
| 49 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang,
Duncan S. Wong:
Resilient Lkh: Secure Multicast Key Distribution Schemes.
Int. J. Found. Comput. Sci. 17(5): 1205-1222 (2006) |
| 2005 |
| 48 | | Yvo Desmedt,
Huaxiong Wang,
Yi Mu,
Yongqing Li:
Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings
Springer 2005 |
| 47 | EE | Vijayakrishnan Pasupathinathan,
Josef Pieprzyk,
Huaxiong Wang:
Privacy Enhanced Electronic Cheque System.
CEC 2005: 431-434 |
| 46 | EE | Yvo Desmedt,
Yongge Wang,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Radio Networks with Reliable Communication.
COCOON 2005: 156-166 |
| 45 | EE | Ron Steinfeld,
Scott Contini,
Huaxiong Wang,
Josef Pieprzyk:
Converse Results to the Wiener Attack on RSA.
Public Key Cryptography 2005: 184-198 |
| 44 | EE | Bangyu Wu,
Kwok-Yan Lam,
Siu Leung Chung,
Huaxiong Wang:
Secure Construction of Virtual Organizations in Grid Computing Systems.
WINE 2005: 959-968 |
| 43 | EE | Christophe Tartary,
Huaxiong Wang:
Efficient Multicast Stream Authentication for the Fully Adversarial Network Model.
WISA 2005: 108-125 |
| 42 | EE | Keith M. Martin,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Peter R. Wild:
Distributing the Encryption and Decryption of a Block Cipher.
Des. Codes Cryptography 36(3): 263-287 (2005) |
| 2004 |
| 41 | | Huaxiong Wang,
Josef Pieprzyk,
Vijay Varadharajan:
Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings
Springer 2004 |
| 40 | EE | Ron Steinfeld,
Huaxiong Wang,
Josef Pieprzyk:
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes.
ASIACRYPT 2004: 170-186 |
| 39 | EE | Hartono Kurnio,
Huaxiong Wang,
Josef Pieprzyk,
Kris Gaj:
Securing Multicast Groups in Ad Hoc Networks.
AWCC 2004: 194-207 |
| 38 | EE | Ron Steinfeld,
Huaxiong Wang,
Josef Pieprzyk:
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures.
Public Key Cryptography 2004: 86-100 |
| 37 | EE | Huaxiong Wang,
Josef Pieprzyk:
Shared generation of pseudo-random functions.
J. Complexity 20(2-3): 458-472 (2004) |
| 2003 |
| 36 | EE | Huaxiong Wang,
Josef Pieprzyk:
Efficient One-Time Proxy Signatures.
ASIACRYPT 2003: 507-522 |
| 35 | EE | Ron Steinfeld,
Laurence Bull,
Huaxiong Wang,
Josef Pieprzyk:
Universal Designated-Verifier Signatures.
ASIACRYPT 2003: 523-542 |
| 34 | EE | Huaxiong Wang,
Josef Pieprzyk:
Shared Generation of Pseudo-Random Functions with Cumulative Maps.
CT-RSA 2003: 281-294 |
| 33 | EE | Josef Pieprzyk,
Huaxiong Wang,
Chaoping Xing:
Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks.
Selected Areas in Cryptography 2003: 88-100 |
| 32 | | Huaxiong Wang,
Chaoping Xing,
Reihaneh Safavi-Naini:
Linear authentication codes: bounds and constructions.
IEEE Transactions on Information Theory 49(4): 866-872 (2003) |
| 2002 |
| 31 | EE | Hartono Kurnio,
Reihaneh Safavi-Naini,
Huaxiong Wang:
A Secure Re-keying Scheme with Key Recovery Property.
ACISP 2002: 40-55 |
| 30 | EE | Huaxiong Wang,
Josef Pieprzyk:
A Combinatorial Approach to Anonymous Membership Broadcast.
COCOON 2002: 162-170 |
| 29 | EE | Yvo Desmedt,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Redistribution of Mechanical Secret Shares.
Financial Cryptography 2002: 238-252 |
| 28 | EE | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Peter R. Wild:
Threshold MACs.
ICISC 2002: 237-252 |
| 27 | EE | Hartono Kurnio,
Luke McAven,
Reihaneh Safavi-Naini,
Huaxiong Wang:
A Dynamic Group Key Distribution Scheme with Flexible User Join.
ICISC 2002: 478-496 |
| 26 | EE | Hartono Kurnio,
Reihaneh Safavi-Naini,
Huaxiong Wang:
A Group Key Distribution Scheme with Decentralised User Join.
SCN 2002: 146-163 |
| 25 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
Bounds and Constructions for Threshold Shared Generation of Authenticators.
Int. J. Comput. Math. 79(12): 1285-1301 (2002) |
| 2001 |
| 24 | EE | Reihaneh Safavi-Naini,
Willy Susilo,
Huaxiong Wang:
How to Construct Fail-Stop Confirmer Signature Schemes.
ACISP 2001: 435-444 |
| 23 | EE | Hartono Kurnio,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Efficient Revocation Schemes for Secure Multicast.
ICISC 2001: 160-177 |
| 22 | EE | Beomsik Song,
Huaxiong Wang,
Jennifer Seberry:
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances.
ICISC 2001: 18-31 |
| 21 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang,
Chaoping Xing:
Linear Authentication Codes: Bounds and Constructions.
INDOCRYPT 2001: 127-135 |
| 20 | EE | Yvo Desmedt,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Lynn Margaret Batten,
Chris Charnes,
Josef Pieprzyk:
Broadcast anti-jamming systems.
Computer Networks 35(2-3): 223-236 (2001) |
| 19 | EE | Huaxiong Wang,
Chaoping Xing:
Explicit Constructions of Perfect Hash Families from Algebraic Curves over Finite Fields.
J. Comb. Theory, Ser. A 93(1): 112-124 (2001) |
| 18 | EE | Reihaneh Safavi-Naini,
Willy Susilo,
Huaxiong Wang:
An Efficient Construction for Fail-Stop Signature for Long Messages.
J. Inf. Sci. Eng. 17(6): 879-898 (2001) |
| 17 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
Broadcast authentication for group communication.
Theor. Comput. Sci. 269(1-2): 1-21 (2001) |
| 2000 |
| 16 | | Hartono Kurnio,
Reihaneh Safavi-Naini,
Willy Susilo,
Huaxiong Wang:
Key Management for Secure Multicast with Dynamic Controller.
ACISP 2000: 178-190 |
| 15 | | Huaxiong Wang,
Kwok-Yan Lam,
Guozhen Xiao,
Huanhui Zhao:
On Multiplicative Secret Sharing Schemes.
ACISP 2000: 342-351 |
| 14 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
New constructions for multicast re-keying schemes using perfect hash families.
ACM Conference on Computer and Communications Security 2000: 228-234 |
| 13 | EE | Reihaneh Safavi-Naini,
Willy Susilo,
Huaxiong Wang:
Fail-Stop Signature for Long Messages.
INDOCRYPT 2000: 165-177 |
| 12 | | Chaoping Xing,
Huaxiong Wang,
Kwok-Yan Lam:
Constructions of authentication codes from algebraic curves over finite fields.
IEEE Transactions on Information Theory 46(3): 886-892 (2000) |
| 1999 |
| 11 | EE | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels.
ACISP 1999: 177-191 |
| 10 | | Reihaneh Safavi-Naini,
Huaxiong Wang:
Broadcast Authentication in Group Communication.
ASIACRYPT 1999: 399-411 |
| 9 | | Reihaneh Safavi-Naini,
Huaxiong Wang,
Kwok-Yan Lam:
A New Approach to Robust Threshold RSA Signature Schemes.
ICISC 1999: 184-196 |
| 8 | | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels.
Australian Computer Journal 31(2): 34-43 (1999) |
| 7 | | Keith M. Martin,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures.
Comput. J. 42(8): 638-649 (1999) |
| 6 | | Reihaneh Safavi-Naini,
Huaxiong Wang:
Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions.
Inf. Comput. 151(1-2): 148-172 (1999) |
| 1998 |
| 5 | EE | Hossein Ghodosi,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
On Construction of Cumulative Secret Sharing Schemes.
ACISP 1998: 379-390 |
| 4 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
Bounds and Constructions for Multireceiver Authentication Codes.
ASIACRYPT 1998: 242-256 |
| 3 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
New Results on Multi-Receiver Authentication Codes.
EUROCRYPT 1998: 527-541 |
| 2 | EE | Huaxiong Wang:
On Syntactic Nuclei of Rational Languages.
Inf. Process. Lett. 67(5): 221-226 (1998) |
| 1 | EE | Huaxiong Wang:
On Rational Series and Rational Languages.
Theor. Comput. Sci. 205(1-2): 329-336 (1998) |