dblp.uni-trier.dewww.uni-trier.de

Yongdong Wu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
37EEYongdong Wu, Qiming Li, Feng Bao: Optimizing the capacity of distortion-freewatermarking on palette images. ICME 2008: 205-208
36EEYongdong Wu, Haixia Yao, Feng Bao: Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. SEC 2008: 47-61
2007
35EEYongdong Wu, Feng Bao, Robert H. Deng: Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. ACISP 2007: 171-183
34EEYongdong Wu: Security Flaws in Kuribayashi-Tanaka Fingerprinting Protocol. ICC 2007: 1317-1322
33EETieyan Li, Yongdong Wu: Resilient Aggregation Scheme for Confidential Sensor Reports. ICC 2007: 1472-1477
32EEYongdong Wu, Bo Qiu, Feng Bao: Evaluating Ouda's Tamper-Localization Watermarking Scheme. ICME 2007: 843-846
31EEYongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffron, Frederic Rousseau: Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. Inscrypt 2007: 472-481
30EEYongdong Wu, Di Ma, Robert H. Deng: Flexible Access Control to JPEG 2000 Image Code-Streams. IEEE Transactions on Multimedia 9(6): 1314-1324 (2007)
2006
29EEYongdong Wu, Zhigang Zhao, Tian Wei Chui: An Attack on SMC-Based Software Protection. ICICS 2006: 352-368
28EEYongdong Wu: Tamper-Localization Watermarking with Systematic Error Correcting Code. ICIP 2006: 1965-1968
27EEYongdong Wu: Protection of Video Logos with Randomization. ICME 2006: 1341-1344
26EEFang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu: Preventing Web-Spoofing with Automatic Detecting Security Indicator. ISPEC 2006: 112-122
25EEYongdong Wu, Feng Bao: Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. Inscrypt 2006: 264-278
24EETieyan Li, Yongdong Wu, Huafei Zhu: An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks. VTC Spring 2006: 831-835
23EEYongdong Wu, Robert H. Deng: Scalable authentication of MPEG-4 streams. IEEE Transactions on Multimedia 8(1): 152-161 (2006)
22EEYongdong Wu: Nonlinear collusion attack on a watermarking scheme for buyer authentication. IEEE Transactions on Multimedia 8(3): 626-629 (2006)
2005
21EEYongdong Wu: Efficient Authentication of Electronic Document Workflow. CISC 2005: 101-112
20EETieyan Li, Huafei Zhu, Yongdong Wu: Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream. ICICS 2005: 389-401
19EEFang Qi, Weijia Jia, Feng Bao, Yongdong Wu: Batching SSL/TLS Handshake Improved. ICICS 2005: 402-413
18EEYongdong Wu: Aggregating signatures of MPEG-4 elementary streams. ICME 2005: 181-184
17 Yongdong Wu, Feng Bao, Robert H. Deng: Secure Person-To-Person Communications Based on Biometrics Signals. SEC 2005: 205-222
16 Yongdong Wu, Tieyan Li, Robert H. Deng: Protecting Group Dynamic Information in Large Scale Multicast Groups. SEC 2005: 459-476
15EEYongdong Wu, Robert H. Deng: Security of an ill-posed operator for image authentication. IEEE Trans. Circuits Syst. Video Techn. 15(1): 161-163 (2005)
14EEYongdong Wu: On the security of an SVD-based ownership watermarking. IEEE Transactions on Multimedia 7(4): 624-627 (2005)
13EERobert H. Deng, Di Ma, Weizhong Shao, Yongdong Wu: Scalable trusted online dissemination of JPEG2000 images. Multimedia Syst. 11(1): 60-67 (2005)
2004
12EEYongdong Wu, Feng Bao: Collusion attack on a multi-key secure video proxy scheme. ACM Multimedia 2004: 380-383
11EEDi Ma, Robert H. Deng, Yongdong Wu, Tieyan Li: Dynamic Access Control for Multi-privileged Group Communications. ICICS 2004: 508-519
10EETieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng: Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. ICICS 2004: 79-91
9 Yongdong Wu, Robert H. Deng: Compliant encryption of jpeg2000 codestreanis. ICIP 2004: 3439-3442
8 Yongdong Wu, Di Ma, Robert H. Deng: Progressive protection of jpeg2000 codestreams. ICIP 2004: 3447-3450
2003
7EECheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao: A flexible and scalable authentication scheme for JPEG2000 image codestreams. ACM Multimedia 2003: 433-441
6EETieyan Li, Yongdong Wu: Trust on Web Browser: Attack vs. Defense. ACNS 2003: 241-253
5EEYongdong Wu, Robert H. Deng: Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. ICICS 2003: 238-248
4EEYongdong Wu: Zero-Distortion Authentication Watermarking. ISC 2003: 325-337
3 Yongdong Wu, Changsheng Xu: Fault-induced attack on semi-fragile image authentication schemes. VCIP 2003: 1875-1883
2002
2EEYongdong Wu, Di Ma, Changsheng Xu: Efficient Object-Based Stream Authentication. INDOCRYPT 2002: 354-367
1EEYongdong Wu, Changsheng Xu, Feng Bao: Counterfeiting Attack on a Lossless Authentication Watermarking Scheme. VIP 2002: 109-112

Coauthor Index

1Feng Bao [1] [12] [17] [19] [25] [26] [31] [32] [35] [36] [37]
2Tian Wei Chui [29]
3Robert H. Deng (Robert Huijie Deng) [5] [7] [8] [9] [10] [11] [13] [15] [16] [17] [23] [30] [31] [35]
4Weijia Jia [19] [26]
5Qiming Li [37]
6Tieyan Li [6] [10] [11] [16] [20] [24] [26] [33]
7Di Ma [2] [8] [10] [11] [13] [30]
8Marc Mouffron [31]
9Cheng Peng [7]
10Fang Qi [19] [26]
11Bo Qiu [32]
12Frederic Rousseau [31]
13Weizhong Shao [7] [13]
14Changsheng Xu [1] [2] [3]
15Haixia Yao [36]
16Zhigang Zhao [29]
17Huafei Zhu [10] [20] [24]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)