|
Search the dblp DataBase
Xinmei Wang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yuanxing Li, Xinmei Wang
A Joint Authentication and Enryption Scheme Based on Algebraic Coding Theory. [Citation Graph (0, 0)][DBLP] AAECC, 1991, pp:241-245 [Conf]
- Xiangguo Cheng, Jingmei Liu, Xinmei Wang
An Identity-Based Signature and Its Threshold Version. [Citation Graph (0, 0)][DBLP] AINA, 2005, pp:973-977 [Conf]
- Jingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang
An AES S-Box to Increase Complexity and Cryptographic Analysis. [Citation Graph (0, 0)][DBLP] AINA, 2005, pp:724-728 [Conf]
- Jingmei Liu, Xiangguo Cheng, Xinmei Wang
Methods to Forge ElGamal Signatures and Determine Secret Key. [Citation Graph (0, 0)][DBLP] AINA (1), 2006, pp:859-862 [Conf]
- Baodian Wei, Dongsu Liu, Xinmei Wang
Activity Attack on Rijndael . [Citation Graph (0, 0)][DBLP] AINA, 2003, pp:803-806 [Conf]
- Jianjun Mu, Xinmei Wang
Analysis of the Thresholds for Regular Low-Density Erasure Codes. [Citation Graph (0, 0)][DBLP] AINA, 2007, pp:800-804 [Conf]
- Chen Yang, Furong Wang, Xinmei Wang
Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:109-112 [Conf]
- Chen Yang, Wenping Ma, Benxiong Huang, Xinmei Wang
Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards. [Citation Graph (0, 0)][DBLP] AINA Workshops (2), 2007, pp:448-452 [Conf]
- Chen Yang, Xiangguo Cheng, Wenping Ma, Xinmei Wang
A New ID-Based Broadcast Encryption Scheme. [Citation Graph (0, 0)][DBLP] ATC, 2006, pp:487-492 [Conf]
- Jingmei Liu, Xiangguo Cheng, Xinmei Wang
Cryptanalysis of a Cellular Automata Cryptosystem. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:49-54 [Conf]
- Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang
Efficient Group Signatures from Bilinear Pairing. [Citation Graph (0, 0)][DBLP] CISC, 2005, pp:128-139 [Conf]
- Baodian Wei, Dongsu Liu, Xinmei Wang
The General Autocorrelation and Its Application. [Citation Graph (0, 0)][DBLP] CW, 2002, pp:267-276 [Conf]
- Xiangguo Cheng, Jingmei Liu, Xinmei Wang
Identity-Based Aggregate and Verifiably Encrypted Signatures from Bilinear Pairing. [Citation Graph (0, 0)][DBLP] ICCSA (4), 2005, pp:1046-1054 [Conf]
- Hongpei Li, Lianli Chang, Xinmei Wang
A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls. [Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:441-450 [Conf]
- Chen Yang, Wenping Ma, Xinmei Wang
New Traitor Tracing Scheme against Anonymous Attack. [Citation Graph (0, 0)][DBLP] ICICIC (1), 2006, pp:389-392 [Conf]
- Baodian Wei, Dongsu Liu, Xinmei Wang
Analysis of AES S-box with Walsh Spectrum. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal]
- Yongxing Sun, Xinmei Wang
An approach to finding the attacks on the cryptographic protocols. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2000, v:34, n:3, pp:19-28 [Journal]
- Li Ping, Baoming Bai, Xinmei Wang
Low-complexity concatenated two-state TCM schemes with near-capacity performance. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2003, v:49, n:12, pp:3225-3234 [Journal]
- Chen Yang, Wenping Ma, Xinmei Wang
Novel Remote User Authentication Scheme Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:306-312 [Conf]
A New Low Complexity Iterative Detection for Space-Time Bit-Interleaved Coded Modulation Schemes. [Citation Graph (, )][DBLP]
Fair Exchange Signature Schemes. [Citation Graph (, )][DBLP]
Union Bound Analysis of Concatenated Twist Hadamard Codes. [Citation Graph (, )][DBLP]
Network Coding Scheme Based on Key Nodes. [Citation Graph (, )][DBLP]
An Algorithm to Search Minimal Subtree Graphs. [Citation Graph (, )][DBLP]
Network Coding Based Multicast in Internet. [Citation Graph (, )][DBLP]
IP Traceback Using Digital Watermark and Honeypot. [Citation Graph (, )][DBLP]
Transmission Strategies for Parallel Relay Networks Based on Superposition Coding. [Citation Graph (, )][DBLP]
Girth-12 Quasi-Cyclic LDPC Codes with Consecutive Lengths [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.302secs
|