The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xinmei Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yuanxing Li, Xinmei Wang
    A Joint Authentication and Enryption Scheme Based on Algebraic Coding Theory. [Citation Graph (0, 0)][DBLP]
    AAECC, 1991, pp:241-245 [Conf]
  2. Xiangguo Cheng, Jingmei Liu, Xinmei Wang
    An Identity-Based Signature and Its Threshold Version. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:973-977 [Conf]
  3. Jingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang
    An AES S-Box to Increase Complexity and Cryptographic Analysis. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:724-728 [Conf]
  4. Jingmei Liu, Xiangguo Cheng, Xinmei Wang
    Methods to Forge ElGamal Signatures and Determine Secret Key. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:859-862 [Conf]
  5. Baodian Wei, Dongsu Liu, Xinmei Wang
    Activity Attack on Rijndael . [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:803-806 [Conf]
  6. Jianjun Mu, Xinmei Wang
    Analysis of the Thresholds for Regular Low-Density Erasure Codes. [Citation Graph (0, 0)][DBLP]
    AINA, 2007, pp:800-804 [Conf]
  7. Chen Yang, Furong Wang, Xinmei Wang
    Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:109-112 [Conf]
  8. Chen Yang, Wenping Ma, Benxiong Huang, Xinmei Wang
    Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:448-452 [Conf]
  9. Chen Yang, Xiangguo Cheng, Wenping Ma, Xinmei Wang
    A New ID-Based Broadcast Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:487-492 [Conf]
  10. Jingmei Liu, Xiangguo Cheng, Xinmei Wang
    Cryptanalysis of a Cellular Automata Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:49-54 [Conf]
  11. Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang
    Efficient Group Signatures from Bilinear Pairing. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:128-139 [Conf]
  12. Baodian Wei, Dongsu Liu, Xinmei Wang
    The General Autocorrelation and Its Application. [Citation Graph (0, 0)][DBLP]
    CW, 2002, pp:267-276 [Conf]
  13. Xiangguo Cheng, Jingmei Liu, Xinmei Wang
    Identity-Based Aggregate and Verifiably Encrypted Signatures from Bilinear Pairing. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2005, pp:1046-1054 [Conf]
  14. Hongpei Li, Lianli Chang, Xinmei Wang
    A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:441-450 [Conf]
  15. Chen Yang, Wenping Ma, Xinmei Wang
    New Traitor Tracing Scheme against Anonymous Attack. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:389-392 [Conf]
  16. Baodian Wei, Dongsu Liu, Xinmei Wang
    Analysis of AES S-box with Walsh Spectrum. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal]
  17. Yongxing Sun, Xinmei Wang
    An approach to finding the attacks on the cryptographic protocols. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2000, v:34, n:3, pp:19-28 [Journal]
  18. Li Ping, Baoming Bai, Xinmei Wang
    Low-complexity concatenated two-state TCM schemes with near-capacity performance. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:12, pp:3225-3234 [Journal]
  19. Chen Yang, Wenping Ma, Xinmei Wang
    Novel Remote User Authentication Scheme Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:306-312 [Conf]

  20. A New Low Complexity Iterative Detection for Space-Time Bit-Interleaved Coded Modulation Schemes. [Citation Graph (, )][DBLP]


  21. Fair Exchange Signature Schemes. [Citation Graph (, )][DBLP]


  22. Union Bound Analysis of Concatenated Twist Hadamard Codes. [Citation Graph (, )][DBLP]


  23. Network Coding Scheme Based on Key Nodes. [Citation Graph (, )][DBLP]


  24. An Algorithm to Search Minimal Subtree Graphs. [Citation Graph (, )][DBLP]


  25. Network Coding Based Multicast in Internet. [Citation Graph (, )][DBLP]


  26. IP Traceback Using Digital Watermark and Honeypot. [Citation Graph (, )][DBLP]


  27. Transmission Strategies for Parallel Relay Networks Based on Superposition Coding. [Citation Graph (, )][DBLP]


  28. Girth-12 Quasi-Cyclic LDPC Codes with Consecutive Lengths [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.302secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002