dblp.uni-trier.dewww.uni-trier.de

Yumin Wang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
56EEYing Wang, Xinjun Du, Hui Li, Yumin Wang: The Design of Optimal Period Interleaver. AINA Workshops 2008: 413-415
55EELiaojun Pang, Huixian Li, Ye Yao, Yumin Wang: A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses. ISECS 2008: 22-26
54EEJingliang Zhang, Lizhen Ma, Rong Sun, Yumin Wang: More Efficient VLR Group Signature Satisfying Exculpability. IEICE Transactions 91-A(7): 1831-1835 (2008)
2007
53EEJingliang Zhang, Lizhen Ma, Yumin Wang: Dynamic Fair Electronic Cash Model without Trustees. I3E (1) 2007: 259-264
52EELin-hui Zhao, Yumin Wang, Jing Xiao, Ya-ping Dai, Fang-yan Dong, Hai-le Liu: A Three-Level-Module Adaptive Intrusion Detection System. ICNSC 2007: 840-845
51EEShuhai Li, Yumin Wang: Exploiting randomness on continuous sets. Inf. Sci. 177(1): 192-201 (2007)
50EEHaibo Tian, Xi Sun, Yumin Wang: A New Public-Key Encryption Scheme. J. Comput. Sci. Technol. 22(1): 95-102 (2007)
2006
49EEBo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang: Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). ATC 2006: 531-540
48EEXinxin Fan, Thomas J. Wollinger, Yumin Wang: Efficient Doubling on Genus 3 Curves over Binary Fields. CT-RSA 2006: 64-81
47 Haibo Tian, Yumin Wang: Security Analysis of the Digital Transmission Copy Protection Specification. Security and Management 2006: 134-137
46EEZhenjie Huang, Kefei Chen, Yumin Wang: Provably Secure Convertible User Designating Confirmer Partially Blind Signatures. Informatica, Lith. Acad. Sci. 17(3): 347-362 (2006)
2005
45EEZhenjie Huang, Zhixiong Chen, Yumin Wang: Convertible Undeniable Partially Blind Signatures. AINA 2005: 609-614
44EEZhenjie Huang, Dan Chen, Yumin Wang: Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environments. AINA 2005: 67-71
43EEXinxin Fan, Yumin Wang: Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem. AINA 2005: 978-983
42EEZhenjie Huang, Kefei Chen, Yumin Wang: Efficient Identity-Based Signatures and Blind Signatures. CANS 2005: 120-133
41EEQiang Lei, Zhengtao Jiang, Yumin Wang: Ring-Based Anonymous Fingerprinting Scheme. CIS (2) 2005: 1080-1085
40EEHaibo Tian, Xi Sun, Yumin Wang: A Virtual Bridge Certificate Authority Model. CIS (2) 2005: 500-507
39EEJianhong Zhang, Jiancheng Zou, Yumin Wang: A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents. ICCNMC 2005: 836-844
38EEQianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen, Yumin Wang: t-Out-of-n String/Bit Oblivious Transfers Revisited. ISPEC 2005: 410-421
37EEXinxin Fan, Thomas J. Wollinger, Yumin Wang: Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations. ITCC (1) 2005: 642-647
36EEJianhong Zhang, Jiancheng Zou, Yumin Wang: An Improved Group Signature Scheme. TrustBus 2005: 185-194
35EEJianhong Zhang, Yumin Wang: On the security of Miyaji et al. group signature scheme. Applied Mathematics and Computation 167(2): 1373-1382 (2005)
34EEZhengtao Jiang, Xi Sun, Yumin Wang: Security analysis and improvement of a double-trapdoor encryption scheme. Applied Mathematics and Computation 169(1): 41-50 (2005)
33EEZhengtao Jiang, Mingsen Xiang, Yumin Wang: A research on new public-key encryption schemes. Applied Mathematics and Computation 169(1): 51-61 (2005)
32EEJianhong Zhang, Yumin Wang: On the security of a convertible authenticated encryption. Applied Mathematics and Computation 169(2): 1063-1069 (2005)
31EEJianhong Zhang, Yumin Wang: Two provably secure k-out-of-n oblivious transfer schemes. Applied Mathematics and Computation 169(2): 1211-1220 (2005)
30EEJianhong Zhang, Yumin Wang: An improved signature scheme without using one-way Hash functions. Applied Mathematics and Computation 170(2): 905-908 (2005)
29EEZhengtao Jiang, Yang Zhan, Dan Chen, Yumin Wang: Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences. Applied Mathematics and Computation 171(2): 900-911 (2005)
28EEChangjie Wang, Ho-fung Leung, S. C. Cheung, Yumin Wang: Use of cryptographic technologies for privacy protection of watermarks in internet retails of digital contents. IJHPCN 3(5/6): 385-394 (2005)
27EEJianhong Zhang, Wei Zou, Dan Chen, Yumin Wang: On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key. Informatica (Slovenia) 29(3): 243-346 (2005)
26EEJianhong Zhang, Qianhong Wu, Yumin Wang: A New Efficient Group Signature With Forward Security. Informatica (Slovenia) 29(3): 321-326 (2005)
25EEQianhong Wu, Bo Qin, Yumin Wang: Extended Methodology of RS Design and Instances Based on GIP. J. Comput. Sci. Technol. 20(2): 270-275 (2005)
2004
24EEZhenjie Huang, Yumin Wang: Convertible Nominative Signatures. ACISP 2004: 348-357
23EEChangjie Wang, Ho-fung Leung, Shing-Chi Cheung, Yumin Wang: Use of Cryptographic Technologies for Privacy Protection of Watermarks in Internet Retails of Digital Contents. AINA (1) 2004: 414-419
22EEJianhong Zhang, Qianhong Wu, Jilin Wang, Yumin Wang: An Improved Nominative Proxy Signature Scheme for Mobile Communication. AINA (2) 2004: 23-26
21EEZewen Chen, Jiwu Huang, Daren Huang, Jianhong Zhang, Yumin Wang: Provably Secure and ID-Based Group Signature Scheme. AINA (2) 2004: 384-388
20EEQianhong Wu, Changjie Wang, Xiaofeng Chen, Yumin Wang: Publicly Verifiable Auctions with Minimal Leakage. COMPSAC 2004: 384-389
19EEQianhong Wu, Xiaofeng Chen, Changjie Wang, Yumin Wang: Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. ISC 2004: 330-341
2003
18EEChangjie Wang, Xiaofeng Chen, Yumin Wang: An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids. AINA 2003: 194-197
17EEXinjun Du, Ying Wang, Jianhua Ge, Yumin Wang: A Method for Security Enhancements in AODV Protocol . AINA 2003: 237-240
16EEXinjun Du, Ying Wang, Jianhua Ge, Yumin Wang: A Group Key Establishment Scheme for Ad Hoc Networks. AINA 2003: 518-520
15EEXiaofeng Chen, Fei Feng, Yumin Wang: New Key Improvements and Its Application to XTR System. AINA 2003: 561-564
14EEQianhong Wu, Jianhong Zhang, Yumin Wang: Practical t-out-n Oblivious Transfer and Its Applications. ICICS 2003: 226-237
13EEJianhong Zhang, Qianhong Wu, Yumin Wang: A Novel Efficient Group Signature Scheme with Forward Security. ICICS 2003: 292-300
12EEChangjie Wang, Ho-fung Leung, Yumin Wang: Secure Double Auction Protocols with Full Privacy Protection. ICISC 2003: 215-229
11EEZewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang: An Efficient Revocation Algorithm in Group Signatures. ICISC 2003: 339-351
10EEChangjie Wang, Fangguo Zhang, Yumin Wang: Secure Web Transaction with Anonymous Mobile Agent over Internet. J. Comput. Sci. Technol. 18(1): 84-89 (2003)
2002
9 Changjie Wang, Yumin Wang, Fangguo Zhang: An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet. Informatica (Slovenia) 26(3): (2002)
8EEBo Yang, Liu Dongsu, Yumin Wang: An anonymity-revoking e-payment system with a smart card. Int. J. on Digital Libraries 3(4): 291-296 (2002)
7EEXiaofeng Chen, Changjie Wang, Yumin Wang: Fair Electronic Cash Based on Double Signatur. J. Comput. Sci. Technol. 17(6): 830-835 (2002)
6EEFangguo Zhang, Futai Zhang, Yumin Wang: Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield. J. Comput. Sci. Technol. 17(6): 836-842 (2002)
5 Changjie Wang, Fangguo Zhang, Yumin Wang: SAWT: A New System for Secure and Anonymous Web Transactions over the Internet. Journal of Research and Practice in Information Technology 34(1): 34-46 (2002)
2001
4EEBo Yang, Shixiong Zhu, Yumin Wang: Unconditionally-Secure Oblivious Transfer. ICICS 2001: 35-41
3EEFangguo Zhang, Futai Zhang, Yumin Wang: Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves. ICICS 2001: 74-83
2000
2 Fangguo Zhang, Futai Zhang, Yumin Wang: Fair Electronic Cash Systems with Multiple Banks. SEC 2000: 461-470
1999
1 Shengli Liu, Yumin Wang: An Authetnication Scheme over Non-Authentic Public Channel in Information-Theoretic Secret-Key Agreement. AAECC 1999: 294-301

Coauthor Index

1Dan Chen [27] [29] [44]
2Kefei Chen [42] [46]
3Xiaofeng Chen [7] [15] [18] [19] [20] [38]
4Zewen Chen [11] [21]
5Zhixiong Chen [45]
6Shing-Chi Cheung (S. C. Cheung) [23] [28]
7Ya-ping Dai [52]
8Fang-yan Dong [52]
9Liu Dongsu [8]
10Xinjun Du [16] [17] [56]
11Xinxin Fan [37] [43] [48]
12Fei Feng [15]
13Jianhua Ge [16] [17]
14Daren Huang [11] [21]
15Jiwu Huang [11] [21]
16Zhenjie Huang [24] [42] [44] [45] [46]
17Zhengtao Jiang [29] [33] [34] [41]
18Qiang Lei [41]
19Ho-fung Leung (Ho-Fung Leung) [12] [23] [28]
20Hui Li [56]
21Huixian Li [55]
22Shuhai Li [51]
23Hai-le Liu [52]
24Shengli Liu [1]
25Lizhen Ma [53] [54]
26Yi Mu [49]
27Liaojun Pang [55]
28Bo Qin [25] [38] [49]
29Rong Sun [54]
30Xi Sun [34] [40] [50]
31Willy Susilo [49]
32Haibo Tian [40] [47] [50]
33Changjie Wang [5] [7] [9] [10] [12] [18] [19] [20] [23] [28] [38]
34Jilin Wang [11] [22]
35Ying Wang [16] [17] [56]
36Thomas J. Wollinger [37] [48]
37Qianhong Wu [13] [14] [19] [20] [22] [25] [26] [38] [49]
38Mingsen Xiang [33]
39Jing Xiao [52]
40Bo Yang [4] [8]
41Ye Yao [55]
42Yang Zhan [29]
43Fangguo Zhang [2] [3] [5] [6] [9] [10]
44Futai Zhang [2] [3] [6]
45Jianhong Zhang [13] [14] [21] [22] [26] [27] [30] [31] [32] [35] [36] [39]
46Jingliang Zhang [53] [54]
47Lin-hui Zhao [52]
48Shixiong Zhu [4]
49Jiancheng Zou [36] [39]
50Wei Zou [27]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)