2008 | ||
---|---|---|
56 | EE | Ying Wang, Xinjun Du, Hui Li, Yumin Wang: The Design of Optimal Period Interleaver. AINA Workshops 2008: 413-415 |
55 | EE | Liaojun Pang, Huixian Li, Ye Yao, Yumin Wang: A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses. ISECS 2008: 22-26 |
54 | EE | Jingliang Zhang, Lizhen Ma, Rong Sun, Yumin Wang: More Efficient VLR Group Signature Satisfying Exculpability. IEICE Transactions 91-A(7): 1831-1835 (2008) |
2007 | ||
53 | EE | Jingliang Zhang, Lizhen Ma, Yumin Wang: Dynamic Fair Electronic Cash Model without Trustees. I3E (1) 2007: 259-264 |
52 | EE | Lin-hui Zhao, Yumin Wang, Jing Xiao, Ya-ping Dai, Fang-yan Dong, Hai-le Liu: A Three-Level-Module Adaptive Intrusion Detection System. ICNSC 2007: 840-845 |
51 | EE | Shuhai Li, Yumin Wang: Exploiting randomness on continuous sets. Inf. Sci. 177(1): 192-201 (2007) |
50 | EE | Haibo Tian, Xi Sun, Yumin Wang: A New Public-Key Encryption Scheme. J. Comput. Sci. Technol. 22(1): 95-102 (2007) |
2006 | ||
49 | EE | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang: Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). ATC 2006: 531-540 |
48 | EE | Xinxin Fan, Thomas J. Wollinger, Yumin Wang: Efficient Doubling on Genus 3 Curves over Binary Fields. CT-RSA 2006: 64-81 |
47 | Haibo Tian, Yumin Wang: Security Analysis of the Digital Transmission Copy Protection Specification. Security and Management 2006: 134-137 | |
46 | EE | Zhenjie Huang, Kefei Chen, Yumin Wang: Provably Secure Convertible User Designating Confirmer Partially Blind Signatures. Informatica, Lith. Acad. Sci. 17(3): 347-362 (2006) |
2005 | ||
45 | EE | Zhenjie Huang, Zhixiong Chen, Yumin Wang: Convertible Undeniable Partially Blind Signatures. AINA 2005: 609-614 |
44 | EE | Zhenjie Huang, Dan Chen, Yumin Wang: Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environments. AINA 2005: 67-71 |
43 | EE | Xinxin Fan, Yumin Wang: Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem. AINA 2005: 978-983 |
42 | EE | Zhenjie Huang, Kefei Chen, Yumin Wang: Efficient Identity-Based Signatures and Blind Signatures. CANS 2005: 120-133 |
41 | EE | Qiang Lei, Zhengtao Jiang, Yumin Wang: Ring-Based Anonymous Fingerprinting Scheme. CIS (2) 2005: 1080-1085 |
40 | EE | Haibo Tian, Xi Sun, Yumin Wang: A Virtual Bridge Certificate Authority Model. CIS (2) 2005: 500-507 |
39 | EE | Jianhong Zhang, Jiancheng Zou, Yumin Wang: A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents. ICCNMC 2005: 836-844 |
38 | EE | Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen, Yumin Wang: t-Out-of-n String/Bit Oblivious Transfers Revisited. ISPEC 2005: 410-421 |
37 | EE | Xinxin Fan, Thomas J. Wollinger, Yumin Wang: Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations. ITCC (1) 2005: 642-647 |
36 | EE | Jianhong Zhang, Jiancheng Zou, Yumin Wang: An Improved Group Signature Scheme. TrustBus 2005: 185-194 |
35 | EE | Jianhong Zhang, Yumin Wang: On the security of Miyaji et al. group signature scheme. Applied Mathematics and Computation 167(2): 1373-1382 (2005) |
34 | EE | Zhengtao Jiang, Xi Sun, Yumin Wang: Security analysis and improvement of a double-trapdoor encryption scheme. Applied Mathematics and Computation 169(1): 41-50 (2005) |
33 | EE | Zhengtao Jiang, Mingsen Xiang, Yumin Wang: A research on new public-key encryption schemes. Applied Mathematics and Computation 169(1): 51-61 (2005) |
32 | EE | Jianhong Zhang, Yumin Wang: On the security of a convertible authenticated encryption. Applied Mathematics and Computation 169(2): 1063-1069 (2005) |
31 | EE | Jianhong Zhang, Yumin Wang: Two provably secure k-out-of-n oblivious transfer schemes. Applied Mathematics and Computation 169(2): 1211-1220 (2005) |
30 | EE | Jianhong Zhang, Yumin Wang: An improved signature scheme without using one-way Hash functions. Applied Mathematics and Computation 170(2): 905-908 (2005) |
29 | EE | Zhengtao Jiang, Yang Zhan, Dan Chen, Yumin Wang: Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences. Applied Mathematics and Computation 171(2): 900-911 (2005) |
28 | EE | Changjie Wang, Ho-fung Leung, S. C. Cheung, Yumin Wang: Use of cryptographic technologies for privacy protection of watermarks in internet retails of digital contents. IJHPCN 3(5/6): 385-394 (2005) |
27 | EE | Jianhong Zhang, Wei Zou, Dan Chen, Yumin Wang: On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key. Informatica (Slovenia) 29(3): 243-346 (2005) |
26 | EE | Jianhong Zhang, Qianhong Wu, Yumin Wang: A New Efficient Group Signature With Forward Security. Informatica (Slovenia) 29(3): 321-326 (2005) |
25 | EE | Qianhong Wu, Bo Qin, Yumin Wang: Extended Methodology of RS Design and Instances Based on GIP. J. Comput. Sci. Technol. 20(2): 270-275 (2005) |
2004 | ||
24 | EE | Zhenjie Huang, Yumin Wang: Convertible Nominative Signatures. ACISP 2004: 348-357 |
23 | EE | Changjie Wang, Ho-fung Leung, Shing-Chi Cheung, Yumin Wang: Use of Cryptographic Technologies for Privacy Protection of Watermarks in Internet Retails of Digital Contents. AINA (1) 2004: 414-419 |
22 | EE | Jianhong Zhang, Qianhong Wu, Jilin Wang, Yumin Wang: An Improved Nominative Proxy Signature Scheme for Mobile Communication. AINA (2) 2004: 23-26 |
21 | EE | Zewen Chen, Jiwu Huang, Daren Huang, Jianhong Zhang, Yumin Wang: Provably Secure and ID-Based Group Signature Scheme. AINA (2) 2004: 384-388 |
20 | EE | Qianhong Wu, Changjie Wang, Xiaofeng Chen, Yumin Wang: Publicly Verifiable Auctions with Minimal Leakage. COMPSAC 2004: 384-389 |
19 | EE | Qianhong Wu, Xiaofeng Chen, Changjie Wang, Yumin Wang: Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. ISC 2004: 330-341 |
2003 | ||
18 | EE | Changjie Wang, Xiaofeng Chen, Yumin Wang: An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids. AINA 2003: 194-197 |
17 | EE | Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang: A Method for Security Enhancements in AODV Protocol . AINA 2003: 237-240 |
16 | EE | Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang: A Group Key Establishment Scheme for Ad Hoc Networks. AINA 2003: 518-520 |
15 | EE | Xiaofeng Chen, Fei Feng, Yumin Wang: New Key Improvements and Its Application to XTR System. AINA 2003: 561-564 |
14 | EE | Qianhong Wu, Jianhong Zhang, Yumin Wang: Practical t-out-n Oblivious Transfer and Its Applications. ICICS 2003: 226-237 |
13 | EE | Jianhong Zhang, Qianhong Wu, Yumin Wang: A Novel Efficient Group Signature Scheme with Forward Security. ICICS 2003: 292-300 |
12 | EE | Changjie Wang, Ho-fung Leung, Yumin Wang: Secure Double Auction Protocols with Full Privacy Protection. ICISC 2003: 215-229 |
11 | EE | Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang: An Efficient Revocation Algorithm in Group Signatures. ICISC 2003: 339-351 |
10 | EE | Changjie Wang, Fangguo Zhang, Yumin Wang: Secure Web Transaction with Anonymous Mobile Agent over Internet. J. Comput. Sci. Technol. 18(1): 84-89 (2003) |
2002 | ||
9 | Changjie Wang, Yumin Wang, Fangguo Zhang: An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet. Informatica (Slovenia) 26(3): (2002) | |
8 | EE | Bo Yang, Liu Dongsu, Yumin Wang: An anonymity-revoking e-payment system with a smart card. Int. J. on Digital Libraries 3(4): 291-296 (2002) |
7 | EE | Xiaofeng Chen, Changjie Wang, Yumin Wang: Fair Electronic Cash Based on Double Signatur. J. Comput. Sci. Technol. 17(6): 830-835 (2002) |
6 | EE | Fangguo Zhang, Futai Zhang, Yumin Wang: Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield. J. Comput. Sci. Technol. 17(6): 836-842 (2002) |
5 | Changjie Wang, Fangguo Zhang, Yumin Wang: SAWT: A New System for Secure and Anonymous Web Transactions over the Internet. Journal of Research and Practice in Information Technology 34(1): 34-46 (2002) | |
2001 | ||
4 | EE | Bo Yang, Shixiong Zhu, Yumin Wang: Unconditionally-Secure Oblivious Transfer. ICICS 2001: 35-41 |
3 | EE | Fangguo Zhang, Futai Zhang, Yumin Wang: Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves. ICICS 2001: 74-83 |
2000 | ||
2 | Fangguo Zhang, Futai Zhang, Yumin Wang: Fair Electronic Cash Systems with Multiple Banks. SEC 2000: 461-470 | |
1999 | ||
1 | Shengli Liu, Yumin Wang: An Authetnication Scheme over Non-Authentic Public Channel in Information-Theoretic Secret-Key Agreement. AAECC 1999: 294-301 |