Search the dblp DataBase
Yumin Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Shengli Liu , Yumin Wang An Authetnication Scheme over Non-Authentic Public Channel in Information-Theoretic Secret-Key Agreement. [Citation Graph (0, 0)][DBLP ] AAECC, 1999, pp:294-301 [Conf ] Zhenjie Huang , Yumin Wang Convertible Nominative Signatures. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:348-357 [Conf ] Xiaofeng Chen , Fei Feng , Yumin Wang New Key Improvements and Its Application to XTR System. [Citation Graph (0, 0)][DBLP ] AINA, 2003, pp:561-564 [Conf ] Zewen Chen , Jiwu Huang , Daren Huang , Jianhong Zhang , Yumin Wang Provably Secure and ID-Based Group Signature Scheme. [Citation Graph (0, 0)][DBLP ] AINA (2), 2004, pp:384-388 [Conf ] Xinjun Du , Ying Wang , Jianhua Ge , Yumin Wang A Method for Security Enhancements in AODV Protocol . [Citation Graph (0, 0)][DBLP ] AINA, 2003, pp:237-240 [Conf ] Xinjun Du , Ying Wang , Jianhua Ge , Yumin Wang A Group Key Establishment Scheme for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] AINA, 2003, pp:518-520 [Conf ] Xinxin Fan , Yumin Wang Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:978-983 [Conf ] Zhenjie Huang , Dan Chen , Yumin Wang Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environments. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:67-71 [Conf ] Zhenjie Huang , Zhixiong Chen , Yumin Wang Convertible Undeniable Partially Blind Signatures. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:609-614 [Conf ] Changjie Wang , Ho-fung Leung , Shing-Chi Cheung , Yumin Wang Use of Cryptographic Technologies for Privacy Protection of Watermarks in Internet Retails of Digital Contents. [Citation Graph (0, 0)][DBLP ] AINA (1), 2004, pp:414-419 [Conf ] Changjie Wang , Xiaofeng Chen , Yumin Wang An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids. [Citation Graph (0, 0)][DBLP ] AINA, 2003, pp:194-197 [Conf ] Jianhong Zhang , Qianhong Wu , Jilin Wang , Yumin Wang An Improved Nominative Proxy Signature Scheme for Mobile Communication. [Citation Graph (0, 0)][DBLP ] AINA (2), 2004, pp:23-26 [Conf ] Bo Qin , Qianhong Wu , Willy Susilo , Yi Mu , Yumin Wang Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:531-540 [Conf ] Zhenjie Huang , Kefei Chen , Yumin Wang Efficient Identity-Based Signatures and Blind Signatures. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:120-133 [Conf ] Qiang Lei , Zhengtao Jiang , Yumin Wang Ring-Based Anonymous Fingerprinting Scheme. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:1080-1085 [Conf ] Haibo Tian , Xi Sun , Yumin Wang A Virtual Bridge Certificate Authority Model. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:500-507 [Conf ] Qianhong Wu , Changjie Wang , Xiaofeng Chen , Yumin Wang Publicly Verifiable Auctions with Minimal Leakage. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2004, pp:384-389 [Conf ] Haibo Tian , Yumin Wang Security Analysis of the Digital Transmission Copy Protection Specification. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:134-137 [Conf ] Xinxin Fan , Thomas J. Wollinger , Yumin Wang Efficient Doubling on Genus 3 Curves over Binary Fields. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:64-81 [Conf ] Jianhong Zhang , Jiancheng Zou , Yumin Wang A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:836-844 [Conf ] Qian-Hong Wu , Jian-Hong Zhang , Yu-Min Wang Practical t-out-n Oblivious Transfer and Its Applications. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:226-237 [Conf ] Bo Yang , Shixiong Zhu , Yumin Wang Unconditionally-Secure Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:35-41 [Conf ] Jianhong Zhang , Qianhong Wu , Yumin Wang A Novel Efficient Group Signature Scheme with Forward Security. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:292-300 [Conf ] Fangguo Zhang , Futai Zhang , Yumin Wang Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:74-83 [Conf ] Zewen Chen , Jilin Wang , Yumin Wang , Jiwu Huang , Daren Huang An Efficient Revocation Algorithm in Group Signatures. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:339-351 [Conf ] Changjie Wang , Ho-fung Leung , Yumin Wang Secure Double Auction Protocols with Full Privacy Protection. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:215-229 [Conf ] Qianhong Wu , Bo Qin , Changjie Wang , Xiaofeng Chen , Yumin Wang t -Out-of-n String/Bit Oblivious Transfers Revisited. [Citation Graph (0, 0)][DBLP ] ISPEC, 2005, pp:410-421 [Conf ] Qianhong Wu , Xiaofeng Chen , Changjie Wang , Yumin Wang Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:330-341 [Conf ] Xinxin Fan , Thomas J. Wollinger , Yumin Wang Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:642-647 [Conf ] Fangguo Zhang , Futai Zhang , Yumin Wang Fair Electronic Cash Systems with Multiple Banks. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:461-470 [Conf ] Jianhong Zhang , Jiancheng Zou , Yumin Wang An Improved Group Signature Scheme. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:185-194 [Conf ] Changjie Wang , Fangguo Zhang , Yumin Wang SAWT: A New System for Secure and Anonymous Web Transactions over the Internet. [Citation Graph (0, 0)][DBLP ] Journal of Research and Practice in Information Technology, 2002, v:34, n:1, pp:34-46 [Journal ] Changjie Wang , Yumin Wang , Fangguo Zhang An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal ] Jianhong Zhang , Qianhong Wu , Yumin Wang A New Efficient Group Signature With Forward Security. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2005, v:29, n:3, pp:321-326 [Journal ] Jianhong Zhang , Wei Zou , Dan Chen , Yumin Wang On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2005, v:29, n:3, pp:243-346 [Journal ] Shuhai Li , Yumin Wang Exploiting randomness on continuous sets. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2007, v:177, n:1, pp:192-201 [Journal ] Xiaofeng Chen , Changjie Wang , Yumin Wang Fair Electronic Cash Based on Double Signatur. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2002, v:17, n:6, pp:830-835 [Journal ] Changjie Wang , Fangguo Zhang , Yumin Wang Secure Web Transaction with Anonymous Mobile Agent over Internet. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2003, v:18, n:1, pp:84-89 [Journal ] Fangguo Zhang , Futai Zhang , Yumin Wang Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2002, v:17, n:6, pp:836-842 [Journal ] Bo Yang , Liu Dongsu , Yumin Wang An anonymity-revoking e-payment system with a smart card. [Citation Graph (0, 0)][DBLP ] Int. J. on Digital Libraries, 2002, v:3, n:4, pp:291-296 [Journal ] Zhengtao Jiang , Yang Zhan , Dan Chen , Yumin Wang Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences. [Citation Graph (0, 0)][DBLP ] Applied Mathematics and Computation, 2005, v:171, n:2, pp:900-911 [Journal ] Zhenjie Huang , Kefei Chen , Yumin Wang Provably Secure Convertible User Designating Confirmer Partially Blind Signatures. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2006, v:17, n:3, pp:347-362 [Journal ] The Design of Optimal Period Interleaver. [Citation Graph (, )][DBLP ] Some Notes on Password Authenticated Key Exchange Based on RSA. [Citation Graph (, )][DBLP ] An Efficient Fast Authentication Protocol. [Citation Graph (, )][DBLP ] Dynamic Fair Electronic Cash Model without Trustees. [Citation Graph (, )][DBLP ] C and M: A New Network Coding Scheme for Wireless Networks. [Citation Graph (, )][DBLP ] Efficient Certificate-Based Signature Scheme. [Citation Graph (, )][DBLP ] A Deep Copy Protection Framework for Electronic Devices within Home. [Citation Graph (, )][DBLP ] A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses. [Citation Graph (, )][DBLP ] A Three-Level-Module Adaptive Intrusion Detection System. [Citation Graph (, )][DBLP ] Improved Secret Sharing with Access Structures in a Hierarchy. [Citation Graph (, )][DBLP ] Search in 0.021secs, Finished in 0.023secs