2008 |
90 | EE | Qingsong Ye,
Huaxiong Wang,
Josef Pieprzyk,
Xian-Mo Zhang:
Efficient Disjointness Tests for Private Datasets.
ACISP 2008: 155-169 |
89 | EE | Hung-Min Sun,
Mu-En Wu,
Huaxiong Wang,
Jian Guo:
On the Improvement of the BDF Attack on LSBS-RSA.
ACISP 2008: 84-97 |
88 | EE | Qingsong Ye,
Huaxiong Wang,
Christophe Tartary:
Privacy-Preserving Distributed Set Intersection.
ARES 2008: 1332-1339 |
87 | EE | Zhifang Zhang,
Mulan Liu,
Yeow Meng Chee,
San Ling,
Huaxiong Wang:
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes.
ASIACRYPT 2008: 19-36 |
86 | EE | Peishun Wang,
Huaxiong Wang,
Josef Pieprzyk:
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups.
CANS 2008: 178-195 |
85 | EE | Hung-Min Sun,
Mu-En Wu,
Ron Steinfeld,
Jian Guo,
Huaxiong Wang:
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.
CANS 2008: 49-63 |
84 | EE | Ron Steinfeld,
Scott Contini,
Krystian Matusiewicz,
Josef Pieprzyk,
Jian Guo,
San Ling,
Huaxiong Wang:
Cryptanalysis of LASH.
FSE 2008: 207-223 |
83 | EE | Yi Lu,
Huaxiong Wang,
San Ling:
Cryptanalysis of Rabbit.
ISC 2008: 204-214 |
82 | EE | Vijayakrishnan Pasupathinathan,
Josef Pieprzyk,
Huaxiong Wang:
An On-Line Secure E-Passport Protocol.
ISPEC 2008: 14-28 |
81 | EE | Jin Yuan,
Qingsong Ye,
Huaxiong Wang,
Josef Pieprzyk:
Secure Computation of the Vector Dominance Problem.
ISPEC 2008: 319-333 |
80 | EE | Qingsong Ye,
Huaxiong Wang,
Josef Pieprzyk:
Distributed Private Matching and Set Operations.
ISPEC 2008: 347-360 |
79 | EE | Peishun Wang,
Huaxiong Wang,
Josef Pieprzyk:
Threshold Privacy Preserving Keyword Searches.
SOFSEM 2008: 646-658 |
78 | EE | Peishun Wang,
Huaxiong Wang,
Josef Pieprzyk:
An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data.
WISA 2008: 145-159 |
77 | EE | Zhifang Zhang,
Mulan Liu,
Yeow Meng Chee,
San Ling,
Huaxiong Wang:
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes
CoRR abs/0812.2518: (2008) |
76 | EE | Huaxiong Wang,
Duncan S. Wong:
On Secret Reconstruction in Secret Sharing Schemes.
IEEE Transactions on Information Theory 54(1): 473-480 (2008) |
75 | EE | Christophe Tartary,
Huaxiong Wang,
Josef Pieprzyk:
A coding approach to the multicast stream authentication problem.
Int. J. Inf. Sec. 7(4): 265-283 (2008) |
74 | EE | Guomin Yang,
Duncan S. Wong,
Huaxiong Wang,
Xiaotie Deng:
Two-factor mutual authentication based on smart cards and passwords.
J. Comput. Syst. Sci. 74(7): 1160-1172 (2008) |
73 | | Liqun Chen,
Willy Susilo,
Huaxiong Wang,
Duncan S. Wong,
Ed Dawson,
Xuejia Lai,
Masahiro Mambo,
Atsuko Miyaji,
Yi Mu,
David Pointcheval,
Bart Preneel,
Nigel P. Smart:
Cryptography in Computer System Security.
J. UCS 14(3): 314-317 (2008) |
72 | EE | Yan Wang,
Duncan S. Wong,
Huaxiong Wang:
Employ a mobile agent for making a payment.
Mobile Information Systems 4(1): 51-68 (2008) |
2007 |
71 | | Feng Bao,
San Ling,
Tatsuaki Okamoto,
Huaxiong Wang,
Chaoping Xing:
Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings
Springer 2007 |
70 | EE | Christophe Tartary,
Huaxiong Wang:
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.
ACISP 2007: 293-307 |
69 | EE | Yvo Desmedt,
Josef Pieprzyk,
Ron Steinfeld,
Huaxiong Wang:
On Secure Multi-party Computation in Black-Box Groups.
CRYPTO 2007: 591-612 |
68 | EE | Ron Steinfeld,
Josef Pieprzyk,
Huaxiong Wang:
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.
CT-RSA 2007: 357-371 |
67 | EE | Peishun Wang,
Huaxiong Wang,
Josef Pieprzyk:
A New Dynamic Accumulator for Batch Updates.
ICICS 2007: 98-112 |
66 | EE | Christophe Tartary,
Josef Pieprzyk,
Huaxiong Wang:
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures.
Inscrypt 2007: 167-181 |
65 | EE | Christophe Tartary,
Huaxiong Wang,
Josef Pieprzyk:
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.
ProvSec 2007: 17-34 |
64 | EE | Peishun Wang,
Huaxiong Wang,
Josef Pieprzyk:
Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data.
Secure Data Management 2007: 108-123 |
63 | EE | Ron Steinfeld,
Josef Pieprzyk,
Huaxiong Wang:
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes.
IEEE Transactions on Information Theory 53(7): 2542-2559 (2007) |
62 | EE | Christophe Tartary,
Huaxiong Wang:
Efficient multicast stream authentication for the fully adversarial network model.
IJSN 2(3/4): 175-191 (2007) |
2006 |
61 | EE | Vijayakrishnan Pasupathinathan,
Josef Pieprzyk,
Huaxiong Wang,
Joo Yeon Cho:
Formal analysis of card-based payment systems in mobile devices.
ACSW Frontiers 2006: 213-220 |
60 | EE | Gaurav Gupta,
Josef Pieprzyk,
Huaxiong Wang:
An attack-localizing watermarking scheme for natural language documents.
ASIACCS 2006: 157-165 |
59 | EE | Ron Steinfeld,
Josef Pieprzyk,
Huaxiong Wang:
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator.
ASIACRYPT 2006: 194-209 |
58 | EE | Christophe Tartary,
Huaxiong Wang:
Achieving Multicast Stream Authentication Using MDS Codes.
CANS 2006: 108-125 |
57 | EE | Guomin Yang,
Duncan S. Wong,
Huaxiong Wang,
Xiaotie Deng:
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper).
ICICS 2006: 82-91 |
56 | EE | Yvo Desmedt,
Josef Pieprzyk,
Ron Steinfeld,
Huaxiong Wang:
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders.
ISC 2006: 459-475 |
55 | EE | Christophe Tartary,
Huaxiong Wang:
Rateless Codes for the Multicast Stream Authentication Problem.
IWSEC 2006: 136-151 |
54 | EE | Christophe Tartary,
Huaxiong Wang:
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme.
Inscrypt 2006: 103-117 |
53 | EE | Ron Steinfeld,
Josef Pieprzyk,
Huaxiong Wang:
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption.
Public Key Cryptography 2006: 157-173 |
52 | EE | Guomin Yang,
Duncan S. Wong,
Xiaotie Deng,
Huaxiong Wang:
Anonymous Signature Schemes.
Public Key Cryptography 2006: 347-363 |
51 | EE | Shoulun Long,
Josef Pieprzyk,
Huaxiong Wang,
Duncan S. Wong:
Generalised Cumulative Arrays in Secret Sharing.
Des. Codes Cryptography 40(2): 191-209 (2006) |
50 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
Secret sharing schemes with partial broadcast channels.
Des. Codes Cryptography 41(1): 5-22 (2006) |
49 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang,
Duncan S. Wong:
Resilient Lkh: Secure Multicast Key Distribution Schemes.
Int. J. Found. Comput. Sci. 17(5): 1205-1222 (2006) |
2005 |
48 | | Yvo Desmedt,
Huaxiong Wang,
Yi Mu,
Yongqing Li:
Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings
Springer 2005 |
47 | EE | Vijayakrishnan Pasupathinathan,
Josef Pieprzyk,
Huaxiong Wang:
Privacy Enhanced Electronic Cheque System.
CEC 2005: 431-434 |
46 | EE | Yvo Desmedt,
Yongge Wang,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Radio Networks with Reliable Communication.
COCOON 2005: 156-166 |
45 | EE | Ron Steinfeld,
Scott Contini,
Huaxiong Wang,
Josef Pieprzyk:
Converse Results to the Wiener Attack on RSA.
Public Key Cryptography 2005: 184-198 |
44 | EE | Bangyu Wu,
Kwok-Yan Lam,
Siu Leung Chung,
Huaxiong Wang:
Secure Construction of Virtual Organizations in Grid Computing Systems.
WINE 2005: 959-968 |
43 | EE | Christophe Tartary,
Huaxiong Wang:
Efficient Multicast Stream Authentication for the Fully Adversarial Network Model.
WISA 2005: 108-125 |
42 | EE | Keith M. Martin,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Peter R. Wild:
Distributing the Encryption and Decryption of a Block Cipher.
Des. Codes Cryptography 36(3): 263-287 (2005) |
2004 |
41 | | Huaxiong Wang,
Josef Pieprzyk,
Vijay Varadharajan:
Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings
Springer 2004 |
40 | EE | Ron Steinfeld,
Huaxiong Wang,
Josef Pieprzyk:
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes.
ASIACRYPT 2004: 170-186 |
39 | EE | Hartono Kurnio,
Huaxiong Wang,
Josef Pieprzyk,
Kris Gaj:
Securing Multicast Groups in Ad Hoc Networks.
AWCC 2004: 194-207 |
38 | EE | Ron Steinfeld,
Huaxiong Wang,
Josef Pieprzyk:
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures.
Public Key Cryptography 2004: 86-100 |
37 | EE | Huaxiong Wang,
Josef Pieprzyk:
Shared generation of pseudo-random functions.
J. Complexity 20(2-3): 458-472 (2004) |
2003 |
36 | EE | Huaxiong Wang,
Josef Pieprzyk:
Efficient One-Time Proxy Signatures.
ASIACRYPT 2003: 507-522 |
35 | EE | Ron Steinfeld,
Laurence Bull,
Huaxiong Wang,
Josef Pieprzyk:
Universal Designated-Verifier Signatures.
ASIACRYPT 2003: 523-542 |
34 | EE | Huaxiong Wang,
Josef Pieprzyk:
Shared Generation of Pseudo-Random Functions with Cumulative Maps.
CT-RSA 2003: 281-294 |
33 | EE | Josef Pieprzyk,
Huaxiong Wang,
Chaoping Xing:
Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks.
Selected Areas in Cryptography 2003: 88-100 |
32 | | Huaxiong Wang,
Chaoping Xing,
Reihaneh Safavi-Naini:
Linear authentication codes: bounds and constructions.
IEEE Transactions on Information Theory 49(4): 866-872 (2003) |
2002 |
31 | EE | Hartono Kurnio,
Reihaneh Safavi-Naini,
Huaxiong Wang:
A Secure Re-keying Scheme with Key Recovery Property.
ACISP 2002: 40-55 |
30 | EE | Huaxiong Wang,
Josef Pieprzyk:
A Combinatorial Approach to Anonymous Membership Broadcast.
COCOON 2002: 162-170 |
29 | EE | Yvo Desmedt,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Redistribution of Mechanical Secret Shares.
Financial Cryptography 2002: 238-252 |
28 | EE | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Peter R. Wild:
Threshold MACs.
ICISC 2002: 237-252 |
27 | EE | Hartono Kurnio,
Luke McAven,
Reihaneh Safavi-Naini,
Huaxiong Wang:
A Dynamic Group Key Distribution Scheme with Flexible User Join.
ICISC 2002: 478-496 |
26 | EE | Hartono Kurnio,
Reihaneh Safavi-Naini,
Huaxiong Wang:
A Group Key Distribution Scheme with Decentralised User Join.
SCN 2002: 146-163 |
25 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
Bounds and Constructions for Threshold Shared Generation of Authenticators.
Int. J. Comput. Math. 79(12): 1285-1301 (2002) |
2001 |
24 | EE | Reihaneh Safavi-Naini,
Willy Susilo,
Huaxiong Wang:
How to Construct Fail-Stop Confirmer Signature Schemes.
ACISP 2001: 435-444 |
23 | EE | Hartono Kurnio,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Efficient Revocation Schemes for Secure Multicast.
ICISC 2001: 160-177 |
22 | EE | Beomsik Song,
Huaxiong Wang,
Jennifer Seberry:
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances.
ICISC 2001: 18-31 |
21 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang,
Chaoping Xing:
Linear Authentication Codes: Bounds and Constructions.
INDOCRYPT 2001: 127-135 |
20 | EE | Yvo Desmedt,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Lynn Margaret Batten,
Chris Charnes,
Josef Pieprzyk:
Broadcast anti-jamming systems.
Computer Networks 35(2-3): 223-236 (2001) |
19 | EE | Huaxiong Wang,
Chaoping Xing:
Explicit Constructions of Perfect Hash Families from Algebraic Curves over Finite Fields.
J. Comb. Theory, Ser. A 93(1): 112-124 (2001) |
18 | EE | Reihaneh Safavi-Naini,
Willy Susilo,
Huaxiong Wang:
An Efficient Construction for Fail-Stop Signature for Long Messages.
J. Inf. Sci. Eng. 17(6): 879-898 (2001) |
17 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
Broadcast authentication for group communication.
Theor. Comput. Sci. 269(1-2): 1-21 (2001) |
2000 |
16 | | Hartono Kurnio,
Reihaneh Safavi-Naini,
Willy Susilo,
Huaxiong Wang:
Key Management for Secure Multicast with Dynamic Controller.
ACISP 2000: 178-190 |
15 | | Huaxiong Wang,
Kwok-Yan Lam,
Guozhen Xiao,
Huanhui Zhao:
On Multiplicative Secret Sharing Schemes.
ACISP 2000: 342-351 |
14 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
New constructions for multicast re-keying schemes using perfect hash families.
ACM Conference on Computer and Communications Security 2000: 228-234 |
13 | EE | Reihaneh Safavi-Naini,
Willy Susilo,
Huaxiong Wang:
Fail-Stop Signature for Long Messages.
INDOCRYPT 2000: 165-177 |
12 | | Chaoping Xing,
Huaxiong Wang,
Kwok-Yan Lam:
Constructions of authentication codes from algebraic curves over finite fields.
IEEE Transactions on Information Theory 46(3): 886-892 (2000) |
1999 |
11 | EE | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels.
ACISP 1999: 177-191 |
10 | | Reihaneh Safavi-Naini,
Huaxiong Wang:
Broadcast Authentication in Group Communication.
ASIACRYPT 1999: 399-411 |
9 | | Reihaneh Safavi-Naini,
Huaxiong Wang,
Kwok-Yan Lam:
A New Approach to Robust Threshold RSA Signature Schemes.
ICISC 1999: 184-196 |
8 | | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels.
Australian Computer Journal 31(2): 34-43 (1999) |
7 | | Keith M. Martin,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures.
Comput. J. 42(8): 638-649 (1999) |
6 | | Reihaneh Safavi-Naini,
Huaxiong Wang:
Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions.
Inf. Comput. 151(1-2): 148-172 (1999) |
1998 |
5 | EE | Hossein Ghodosi,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
On Construction of Cumulative Secret Sharing Schemes.
ACISP 1998: 379-390 |
4 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
Bounds and Constructions for Multireceiver Authentication Codes.
ASIACRYPT 1998: 242-256 |
3 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
New Results on Multi-Receiver Authentication Codes.
EUROCRYPT 1998: 527-541 |
2 | EE | Huaxiong Wang:
On Syntactic Nuclei of Rational Languages.
Inf. Process. Lett. 67(5): 221-226 (1998) |
1 | EE | Huaxiong Wang:
On Rational Series and Rational Languages.
Theor. Comput. Sci. 205(1-2): 329-336 (1998) |