2008 |
56 | EE | Ying Wang,
Xinjun Du,
Hui Li,
Yumin Wang:
The Design of Optimal Period Interleaver.
AINA Workshops 2008: 413-415 |
55 | EE | Liaojun Pang,
Huixian Li,
Ye Yao,
Yumin Wang:
A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses.
ISECS 2008: 22-26 |
54 | EE | Jingliang Zhang,
Lizhen Ma,
Rong Sun,
Yumin Wang:
More Efficient VLR Group Signature Satisfying Exculpability.
IEICE Transactions 91-A(7): 1831-1835 (2008) |
2007 |
53 | EE | Jingliang Zhang,
Lizhen Ma,
Yumin Wang:
Dynamic Fair Electronic Cash Model without Trustees.
I3E (1) 2007: 259-264 |
52 | EE | Lin-hui Zhao,
Yumin Wang,
Jing Xiao,
Ya-ping Dai,
Fang-yan Dong,
Hai-le Liu:
A Three-Level-Module Adaptive Intrusion Detection System.
ICNSC 2007: 840-845 |
51 | EE | Shuhai Li,
Yumin Wang:
Exploiting randomness on continuous sets.
Inf. Sci. 177(1): 192-201 (2007) |
50 | EE | Haibo Tian,
Xi Sun,
Yumin Wang:
A New Public-Key Encryption Scheme.
J. Comput. Sci. Technol. 22(1): 95-102 (2007) |
2006 |
49 | EE | Bo Qin,
Qianhong Wu,
Willy Susilo,
Yi Mu,
Yumin Wang:
Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).
ATC 2006: 531-540 |
48 | EE | Xinxin Fan,
Thomas J. Wollinger,
Yumin Wang:
Efficient Doubling on Genus 3 Curves over Binary Fields.
CT-RSA 2006: 64-81 |
47 | | Haibo Tian,
Yumin Wang:
Security Analysis of the Digital Transmission Copy Protection Specification.
Security and Management 2006: 134-137 |
46 | EE | Zhenjie Huang,
Kefei Chen,
Yumin Wang:
Provably Secure Convertible User Designating Confirmer Partially Blind Signatures.
Informatica, Lith. Acad. Sci. 17(3): 347-362 (2006) |
2005 |
45 | EE | Zhenjie Huang,
Zhixiong Chen,
Yumin Wang:
Convertible Undeniable Partially Blind Signatures.
AINA 2005: 609-614 |
44 | EE | Zhenjie Huang,
Dan Chen,
Yumin Wang:
Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environments.
AINA 2005: 67-71 |
43 | EE | Xinxin Fan,
Yumin Wang:
Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem.
AINA 2005: 978-983 |
42 | EE | Zhenjie Huang,
Kefei Chen,
Yumin Wang:
Efficient Identity-Based Signatures and Blind Signatures.
CANS 2005: 120-133 |
41 | EE | Qiang Lei,
Zhengtao Jiang,
Yumin Wang:
Ring-Based Anonymous Fingerprinting Scheme.
CIS (2) 2005: 1080-1085 |
40 | EE | Haibo Tian,
Xi Sun,
Yumin Wang:
A Virtual Bridge Certificate Authority Model.
CIS (2) 2005: 500-507 |
39 | EE | Jianhong Zhang,
Jiancheng Zou,
Yumin Wang:
A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents.
ICCNMC 2005: 836-844 |
38 | EE | Qianhong Wu,
Bo Qin,
Changjie Wang,
Xiaofeng Chen,
Yumin Wang:
t-Out-of-n String/Bit Oblivious Transfers Revisited.
ISPEC 2005: 410-421 |
37 | EE | Xinxin Fan,
Thomas J. Wollinger,
Yumin Wang:
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations.
ITCC (1) 2005: 642-647 |
36 | EE | Jianhong Zhang,
Jiancheng Zou,
Yumin Wang:
An Improved Group Signature Scheme.
TrustBus 2005: 185-194 |
35 | EE | Jianhong Zhang,
Yumin Wang:
On the security of Miyaji et al. group signature scheme.
Applied Mathematics and Computation 167(2): 1373-1382 (2005) |
34 | EE | Zhengtao Jiang,
Xi Sun,
Yumin Wang:
Security analysis and improvement of a double-trapdoor encryption scheme.
Applied Mathematics and Computation 169(1): 41-50 (2005) |
33 | EE | Zhengtao Jiang,
Mingsen Xiang,
Yumin Wang:
A research on new public-key encryption schemes.
Applied Mathematics and Computation 169(1): 51-61 (2005) |
32 | EE | Jianhong Zhang,
Yumin Wang:
On the security of a convertible authenticated encryption.
Applied Mathematics and Computation 169(2): 1063-1069 (2005) |
31 | EE | Jianhong Zhang,
Yumin Wang:
Two provably secure k-out-of-n oblivious transfer schemes.
Applied Mathematics and Computation 169(2): 1211-1220 (2005) |
30 | EE | Jianhong Zhang,
Yumin Wang:
An improved signature scheme without using one-way Hash functions.
Applied Mathematics and Computation 170(2): 905-908 (2005) |
29 | EE | Zhengtao Jiang,
Yang Zhan,
Dan Chen,
Yumin Wang:
Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences.
Applied Mathematics and Computation 171(2): 900-911 (2005) |
28 | EE | Changjie Wang,
Ho-fung Leung,
S. C. Cheung,
Yumin Wang:
Use of cryptographic technologies for privacy protection of watermarks in internet retails of digital contents.
IJHPCN 3(5/6): 385-394 (2005) |
27 | EE | Jianhong Zhang,
Wei Zou,
Dan Chen,
Yumin Wang:
On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key.
Informatica (Slovenia) 29(3): 243-346 (2005) |
26 | EE | Jianhong Zhang,
Qianhong Wu,
Yumin Wang:
A New Efficient Group Signature With Forward Security.
Informatica (Slovenia) 29(3): 321-326 (2005) |
25 | EE | Qianhong Wu,
Bo Qin,
Yumin Wang:
Extended Methodology of RS Design and Instances Based on GIP.
J. Comput. Sci. Technol. 20(2): 270-275 (2005) |
2004 |
24 | EE | Zhenjie Huang,
Yumin Wang:
Convertible Nominative Signatures.
ACISP 2004: 348-357 |
23 | EE | Changjie Wang,
Ho-fung Leung,
Shing-Chi Cheung,
Yumin Wang:
Use of Cryptographic Technologies for Privacy Protection of Watermarks in Internet Retails of Digital Contents.
AINA (1) 2004: 414-419 |
22 | EE | Jianhong Zhang,
Qianhong Wu,
Jilin Wang,
Yumin Wang:
An Improved Nominative Proxy Signature Scheme for Mobile Communication.
AINA (2) 2004: 23-26 |
21 | EE | Zewen Chen,
Jiwu Huang,
Daren Huang,
Jianhong Zhang,
Yumin Wang:
Provably Secure and ID-Based Group Signature Scheme.
AINA (2) 2004: 384-388 |
20 | EE | Qianhong Wu,
Changjie Wang,
Xiaofeng Chen,
Yumin Wang:
Publicly Verifiable Auctions with Minimal Leakage.
COMPSAC 2004: 384-389 |
19 | EE | Qianhong Wu,
Xiaofeng Chen,
Changjie Wang,
Yumin Wang:
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group.
ISC 2004: 330-341 |
2003 |
18 | EE | Changjie Wang,
Xiaofeng Chen,
Yumin Wang:
An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids.
AINA 2003: 194-197 |
17 | EE | Xinjun Du,
Ying Wang,
Jianhua Ge,
Yumin Wang:
A Method for Security Enhancements in AODV Protocol .
AINA 2003: 237-240 |
16 | EE | Xinjun Du,
Ying Wang,
Jianhua Ge,
Yumin Wang:
A Group Key Establishment Scheme for Ad Hoc Networks.
AINA 2003: 518-520 |
15 | EE | Xiaofeng Chen,
Fei Feng,
Yumin Wang:
New Key Improvements and Its Application to XTR System.
AINA 2003: 561-564 |
14 | EE | Qianhong Wu,
Jianhong Zhang,
Yumin Wang:
Practical t-out-n Oblivious Transfer and Its Applications.
ICICS 2003: 226-237 |
13 | EE | Jianhong Zhang,
Qianhong Wu,
Yumin Wang:
A Novel Efficient Group Signature Scheme with Forward Security.
ICICS 2003: 292-300 |
12 | EE | Changjie Wang,
Ho-fung Leung,
Yumin Wang:
Secure Double Auction Protocols with Full Privacy Protection.
ICISC 2003: 215-229 |
11 | EE | Zewen Chen,
Jilin Wang,
Yumin Wang,
Jiwu Huang,
Daren Huang:
An Efficient Revocation Algorithm in Group Signatures.
ICISC 2003: 339-351 |
10 | EE | Changjie Wang,
Fangguo Zhang,
Yumin Wang:
Secure Web Transaction with Anonymous Mobile Agent over Internet.
J. Comput. Sci. Technol. 18(1): 84-89 (2003) |
2002 |
9 | | Changjie Wang,
Yumin Wang,
Fangguo Zhang:
An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet.
Informatica (Slovenia) 26(3): (2002) |
8 | EE | Bo Yang,
Liu Dongsu,
Yumin Wang:
An anonymity-revoking e-payment system with a smart card.
Int. J. on Digital Libraries 3(4): 291-296 (2002) |
7 | EE | Xiaofeng Chen,
Changjie Wang,
Yumin Wang:
Fair Electronic Cash Based on Double Signatur.
J. Comput. Sci. Technol. 17(6): 830-835 (2002) |
6 | EE | Fangguo Zhang,
Futai Zhang,
Yumin Wang:
Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield.
J. Comput. Sci. Technol. 17(6): 836-842 (2002) |
5 | | Changjie Wang,
Fangguo Zhang,
Yumin Wang:
SAWT: A New System for Secure and Anonymous Web Transactions over the Internet.
Journal of Research and Practice in Information Technology 34(1): 34-46 (2002) |
2001 |
4 | EE | Bo Yang,
Shixiong Zhu,
Yumin Wang:
Unconditionally-Secure Oblivious Transfer.
ICICS 2001: 35-41 |
3 | EE | Fangguo Zhang,
Futai Zhang,
Yumin Wang:
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves.
ICICS 2001: 74-83 |
2000 |
2 | | Fangguo Zhang,
Futai Zhang,
Yumin Wang:
Fair Electronic Cash Systems with Multiple Banks.
SEC 2000: 461-470 |
1999 |
1 | | Shengli Liu,
Yumin Wang:
An Authetnication Scheme over Non-Authentic Public Channel in Information-Theoretic Secret-Key Agreement.
AAECC 1999: 294-301 |