![]() |
Victor K. Wei, Victor Keh-Wei Wei
List of publications from the DBLP Bibliography Server - FAQ
| 2007 | ||
|---|---|---|
| 53 | EE | Victor K. Wei: Invisible designated confirmer signatures without random oracles. ASIACCS 2007: 356-358 |
| 2006 | ||
| 52 | EE | Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Liu, Tsz Hon Yuen: Ring signatures without random oracles. ASIACCS 2006: 297-302 |
| 2005 | ||
| 51 | EE | Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang: Group Signature Where Group Manager, Members and Open Authority Are Identity-Based. ACISP 2005: 468-480 |
| 50 | EE | Tsz Hon Yuen, Victor K. Wei: Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. CT-RSA 2005: 305-322 |
| 49 | EE | Victor K. Wei: Tracing-by-Linking Group Signatures. ISC 2005: 149-163 |
| 48 | EE | Patrick P. Tsang, Victor K. Wei: Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. ISPEC 2005: 48-60 |
| 2004 | ||
| 47 | EE | Joseph K. Liu, Victor K. Wei, Duncan S. Wong: Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). ACISP 2004: 325-335 |
| 46 | EE | Tony K. Chan, Karyin Fung, Joseph K. Liu, Victor K. Wei: Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups. ESAS 2004: 82-94 |
| 45 | EE | Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong: Separable Linkable Threshold Ring Signatures. INDOCRYPT 2004: 384-398 |
| 44 | EE | Joseph K. Liu, Victor K. Wei, Duncan S. Wong: Custodian-Hiding Verifiable Encryption. WISA 2004: 51-64 |
| 43 | Fang-Wei Fu, A. J. Han Vinck, Victor K. Wei, Raymond W. Yeung: On the capacity of write-unidirectional memories with nonperiodic codes. IEEE Transactions on Information Theory 50(4): 649-656 (2004) | |
| 42 | EE | Lusheng Chen, Fang-Wei Fu, Victor K.-W. Wei: On the constructions and nonlinearity of binary vector-output correlation-immune functions. J. Complexity 20(2-3): 266-283 (2004) |
| 2003 | ||
| 41 | EE | Duncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei: On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. ICICS 2003: 34-46 |
| 40 | EE | Joseph K. Liu, Victor K. Wei, Duncan S. Wong: A Separable Threshold Ring Signature Scheme. ICISC 2003: 12-26 |
| 39 | EE | Fang-Wei Fu, Torleiv Kløve, Luo Yuan, Victor K. Wei: On Equidistant Constant Weight Codes. Discrete Applied Mathematics 128(1): 157-164 (2003) |
| 38 | Fang-Wei Fu, Torleiv Kløve, Victor K.-W. Wei: On the undetected error probability for binary codes. IEEE Transactions on Information Theory 49(2): 382-390 (2003) | |
| 2002 | ||
| 37 | EE | Jeff S. L. Cheng, Victor K. Wei: Defenses against the Truncation of Computation Results of Free-Roaming Agents. ICICS 2002: 1-12 |
| 36 | EE | P. C. Chan, Victor K. Wei: Preemptive Distributed Intrusion Detection Using Mobile Agents. WETICE 2002: 103-108 |
| 35 | EE | K. Shum, Victor K. Wei: A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection. WETICE 2002: 55-56 |
| 34 | EE | T. C. Lam, Victor K. Wei: A Mobile Agent Clone Detection System with Itinerary Privacy. WETICE 2002: 68-76 |
| 33 | Fang-Wei Fu, Victor K. Wei: elf-Complementary Balanced Codes and Quasi-Symmetric Designs. Des. Codes Cryptography 27(3): 271-279 (2002) | |
| 32 | Cunsheng Ding, Fang-Wei Fu, Torleiv Kløve, Victor K.-W. Wei: Constructions of permutation arrays. IEEE Transactions on Information Theory 48(4): 977-980 (2002) | |
| 2001 | ||
| 31 | Fang-Wei Fu, Victor K. Wei, Raymond W. Yeung: On the minimum average distance of binary codes: linear programming approach. Discrete Applied Mathematics 111(3): 263-281 (2001) | |
| 30 | EE | Fang-Wei Fu, Torleiv Kløve, Yuan Luo, Victor K. Wei: On Equidistant Constant Weight Codes. Electronic Notes in Discrete Mathematics 6: 187-194 (2001) |
| 29 | Fang-Wei Fu, Torleiv Kløve, Luo Yuan, Victor K. Wei: On the Svanström bound for ternary constant-weight codes. IEEE Transactions on Information Theory 47(5): 2061-2064 (2001) | |
| 28 | EE | Lusheng Chen, Fang-Wei Fu, Victor K. Wei: On the constructions of highly nonlinear zigzag functions and unbiased functions. Inf. Process. Lett. 79(3): 135-140 (2001) |
| 2000 | ||
| 27 | Luo Yuan, Fang-Wei Fu, Victor K.-W. Wei: On the depth distribution of linear codes. IEEE Transactions on Information Theory 46(6): 2197-2203 (2000) | |
| 1997 | ||
| 26 | Zhen Zhang, En-Hui Yang, Victor K. Wei: The redundancy of source coding with a fidelity criterion: 1. Known statistics. IEEE Transactions on Information Theory 43(1): 71-91 (1997) | |
| 1996 | ||
| 25 | Zhen Zhang, Victor K.-W. Wei: An on-line universal lossy data compression algorithm via continuous codebook refinement - Part I: Basic results. IEEE Transactions on Information Theory 42(3): 803-821 (1996) | |
| 1995 | ||
| 24 | Dennis Grinberg, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan, Victor K. Wei: Splay Trees for Data Compression. SODA 1995: 522-530 | |
| 23 | Tuvi Etzion, Victor K. Wei, Zhen Zhang: Bounds on the Sizes of Constant Weight Covering Codes. Des. Codes Cryptography 5(3): 217-239 (1995) | |
| 22 | Gilles Lachaud, Michael A. Tsfasman, Jørn Justesen, Victor K.-W. Wei: Introduction to the special issue on algebraic geometry codes. IEEE Transactions on Information Theory 41(6): 1545-1547 (1995) | |
| 1994 | ||
| 21 | T. V. Lakshman, Victor K. Wei: Distributed Computing on Regular Networks with Anonymous Nodes. IEEE Trans. Computers 43(2): 211-218 (1994) | |
| 20 | Victor K.-W. Wei, Gui Liang Feng: Improved lower bounds on the sizes of error-correcting codes for list decoding. IEEE Transactions on Information Theory 40(2): 558- (1994) | |
| 19 | Gui Liang Feng, Victor K.-W. Wei, Thammavarapu R. N. Rao, Kenneth K. Tzeng: Simplified understanding and efficient decoding of a class of algebraic-geometric codes. IEEE Transactions on Information Theory 40(4): 981-1002 (1994) | |
| 18 | Venkat Anantharam, Michael L. Honig, U. Madhov, Victor K. Wei: Optimization of a Database Hierarchy for Mobility Tracking in a Personal Communications Network. Perform. Eval. 20(1-3): 278-300 (1994) | |
| 1993 | ||
| 17 | Sergio Verdú, Victor K.-W. Wei: Explicit construction of optimal constant-weight codes for identification via channels. IEEE Transactions on Information Theory 39(1): 30-36 (1993) | |
| 16 | Victor K.-W. Wei, Kyeongcheol Yang: On the generalized Hamming weights of product codes. IEEE Transactions on Information Theory 39(5): 1709- (1993) | |
| 1992 | ||
| 15 | Gui Liang Feng, Kenneth K. Tzeng, Victor K.-W. Wei: On the generalized Hamming weights of several classes of cyclic codes. IEEE Transactions on Information Theory 38(3): 1125- (1992) | |
| 14 | Fan R. K. Chung, Jawad A. Salehi, Victor K.-W. Wei: Correction to 'Optical orthogonal codes: Design, analysis, and applications' (May 89 595-604). IEEE Transactions on Information Theory 38(4): 1429- (1992) | |
| 13 | P. Vijay Kumar, Victor K.-W. Wei: Minimum distance of logarithmic and fractional partial m-sequences. IEEE Transactions on Information Theory 38(5): 1474-1482 (1992) | |
| 1991 | ||
| 12 | Victor K.-W. Wei: Generalized Hamming weights for linear codes. IEEE Transactions on Information Theory 37(5): 1412- (1991) | |
| 1987 | ||
| 11 | Abbas A. El Gamal, Lane A. Hemachandra, Itzhak Shperling, Victor K.-W. Wei: Using simulated annealing to design good codes. IEEE Transactions on Information Theory 33(1): 116-123 (1987) | |
| 1986 | ||
| 10 | Jon Louis Bentley, Daniel Dominic Sleator, Robert Endre Tarjan, Victor K. Wei: A Locally Adaptive Data Compression Scheme. Commun. ACM 29(4): 320-330 (1986) | |
| 9 | EE | János Körner, Victor K. Wei: Addendum to "odd and even hamming spheres also have minimum boundary". Discrete Mathematics 62(1): 105-106 (1986) |
| 8 | Shu Lin, Victor K.-W. Wei: Nonhomogeneous Trellis codes for the Quasi-Synchronous Multiple-Access Binary adder channel with Two Users. IEEE Transactions on Information Theory 32(6): 787-796 (1986) | |
| 7 | EE | Clyde L. Monma, Victor K.-W. Wei: Intersection graphs of paths in a tree. J. Comb. Theory, Ser. B 41(2): 141-181 (1986) |
| 1985 | ||
| 6 | Tadao Kasami, Shu Lin, Victor K.-W. Wei, Saburo Yamamura: Coding for the binary symmetric broadcast channel with two receivers. IEEE Transactions on Information Theory 31(5): 616-625 (1985) | |
| 1984 | ||
| 5 | EE | János Körner, Victor K. Wei: Odd and even hamming spheres also have minimum boundary. Discrete Mathematics 51(2): 147-165 (1984) |
| 4 | Victor K.-W. Wei: An error-trapping decoder for nonbinary cyclic codes. IEEE Transactions on Information Theory 30(3): 538- (1984) | |
| 3 | Frank K. Hwang, János Körner, Victor K.-W. Wei: Selecting Non-consecutive Balls Arranged in Many Lines. J. Comb. Theory, Ser. A 37(3): 327-336 (1984) | |
| 1983 | ||
| 2 | EE | Frank K. Hwang, Victor K.-W. Wei: A partition identity. Discrete Mathematics 46(3): 323-326 (1983) |
| 1 | Tadao Kasami, Shu Lin, Victor K.-W. Wei, Saburo Yamamura: Graph theoretic approaches to the code construction for the two-user multiple- access binary adder channel. IEEE Transactions on Information Theory 29(1): 114-130 (1983) | |