The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yumin Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shengli Liu, Yumin Wang
    An Authetnication Scheme over Non-Authentic Public Channel in Information-Theoretic Secret-Key Agreement. [Citation Graph (0, 0)][DBLP]
    AAECC, 1999, pp:294-301 [Conf]
  2. Zhenjie Huang, Yumin Wang
    Convertible Nominative Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:348-357 [Conf]
  3. Xiaofeng Chen, Fei Feng, Yumin Wang
    New Key Improvements and Its Application to XTR System. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:561-564 [Conf]
  4. Zewen Chen, Jiwu Huang, Daren Huang, Jianhong Zhang, Yumin Wang
    Provably Secure and ID-Based Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:384-388 [Conf]
  5. Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
    A Method for Security Enhancements in AODV Protocol . [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:237-240 [Conf]
  6. Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
    A Group Key Establishment Scheme for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:518-520 [Conf]
  7. Xinxin Fan, Yumin Wang
    Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:978-983 [Conf]
  8. Zhenjie Huang, Dan Chen, Yumin Wang
    Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environments. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:67-71 [Conf]
  9. Zhenjie Huang, Zhixiong Chen, Yumin Wang
    Convertible Undeniable Partially Blind Signatures. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:609-614 [Conf]
  10. Changjie Wang, Ho-fung Leung, Shing-Chi Cheung, Yumin Wang
    Use of Cryptographic Technologies for Privacy Protection of Watermarks in Internet Retails of Digital Contents. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:414-419 [Conf]
  11. Changjie Wang, Xiaofeng Chen, Yumin Wang
    An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:194-197 [Conf]
  12. Jianhong Zhang, Qianhong Wu, Jilin Wang, Yumin Wang
    An Improved Nominative Proxy Signature Scheme for Mobile Communication. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:23-26 [Conf]
  13. Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang
    Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:531-540 [Conf]
  14. Zhenjie Huang, Kefei Chen, Yumin Wang
    Efficient Identity-Based Signatures and Blind Signatures. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:120-133 [Conf]
  15. Qiang Lei, Zhengtao Jiang, Yumin Wang
    Ring-Based Anonymous Fingerprinting Scheme. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1080-1085 [Conf]
  16. Haibo Tian, Xi Sun, Yumin Wang
    A Virtual Bridge Certificate Authority Model. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:500-507 [Conf]
  17. Qianhong Wu, Changjie Wang, Xiaofeng Chen, Yumin Wang
    Publicly Verifiable Auctions with Minimal Leakage. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2004, pp:384-389 [Conf]
  18. Haibo Tian, Yumin Wang
    Security Analysis of the Digital Transmission Copy Protection Specification. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:134-137 [Conf]
  19. Xinxin Fan, Thomas J. Wollinger, Yumin Wang
    Efficient Doubling on Genus 3 Curves over Binary Fields. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:64-81 [Conf]
  20. Jianhong Zhang, Jiancheng Zou, Yumin Wang
    A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:836-844 [Conf]
  21. Qian-Hong Wu, Jian-Hong Zhang, Yu-Min Wang
    Practical t-out-n Oblivious Transfer and Its Applications. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:226-237 [Conf]
  22. Bo Yang, Shixiong Zhu, Yumin Wang
    Unconditionally-Secure Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:35-41 [Conf]
  23. Jianhong Zhang, Qianhong Wu, Yumin Wang
    A Novel Efficient Group Signature Scheme with Forward Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:292-300 [Conf]
  24. Fangguo Zhang, Futai Zhang, Yumin Wang
    Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:74-83 [Conf]
  25. Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang
    An Efficient Revocation Algorithm in Group Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:339-351 [Conf]
  26. Changjie Wang, Ho-fung Leung, Yumin Wang
    Secure Double Auction Protocols with Full Privacy Protection. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:215-229 [Conf]
  27. Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen, Yumin Wang
    t-Out-of-n String/Bit Oblivious Transfers Revisited. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:410-421 [Conf]
  28. Qianhong Wu, Xiaofeng Chen, Changjie Wang, Yumin Wang
    Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:330-341 [Conf]
  29. Xinxin Fan, Thomas J. Wollinger, Yumin Wang
    Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:642-647 [Conf]
  30. Fangguo Zhang, Futai Zhang, Yumin Wang
    Fair Electronic Cash Systems with Multiple Banks. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:461-470 [Conf]
  31. Jianhong Zhang, Jiancheng Zou, Yumin Wang
    An Improved Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:185-194 [Conf]
  32. Changjie Wang, Fangguo Zhang, Yumin Wang
    SAWT: A New System for Secure and Anonymous Web Transactions over the Internet. [Citation Graph (0, 0)][DBLP]
    Journal of Research and Practice in Information Technology, 2002, v:34, n:1, pp:34-46 [Journal]
  33. Changjie Wang, Yumin Wang, Fangguo Zhang
    An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal]
  34. Jianhong Zhang, Qianhong Wu, Yumin Wang
    A New Efficient Group Signature With Forward Security. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2005, v:29, n:3, pp:321-326 [Journal]
  35. Jianhong Zhang, Wei Zou, Dan Chen, Yumin Wang
    On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2005, v:29, n:3, pp:243-346 [Journal]
  36. Shuhai Li, Yumin Wang
    Exploiting randomness on continuous sets. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:1, pp:192-201 [Journal]
  37. Xiaofeng Chen, Changjie Wang, Yumin Wang
    Fair Electronic Cash Based on Double Signatur. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2002, v:17, n:6, pp:830-835 [Journal]
  38. Changjie Wang, Fangguo Zhang, Yumin Wang
    Secure Web Transaction with Anonymous Mobile Agent over Internet. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2003, v:18, n:1, pp:84-89 [Journal]
  39. Fangguo Zhang, Futai Zhang, Yumin Wang
    Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2002, v:17, n:6, pp:836-842 [Journal]
  40. Bo Yang, Liu Dongsu, Yumin Wang
    An anonymity-revoking e-payment system with a smart card. [Citation Graph (0, 0)][DBLP]
    Int. J. on Digital Libraries, 2002, v:3, n:4, pp:291-296 [Journal]
  41. Zhengtao Jiang, Yang Zhan, Dan Chen, Yumin Wang
    Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2005, v:171, n:2, pp:900-911 [Journal]
  42. Zhenjie Huang, Kefei Chen, Yumin Wang
    Provably Secure Convertible User Designating Confirmer Partially Blind Signatures. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2006, v:17, n:3, pp:347-362 [Journal]

  43. The Design of Optimal Period Interleaver. [Citation Graph (, )][DBLP]


  44. Some Notes on Password Authenticated Key Exchange Based on RSA. [Citation Graph (, )][DBLP]


  45. An Efficient Fast Authentication Protocol. [Citation Graph (, )][DBLP]


  46. Dynamic Fair Electronic Cash Model without Trustees. [Citation Graph (, )][DBLP]


  47. C and M: A New Network Coding Scheme for Wireless Networks. [Citation Graph (, )][DBLP]


  48. Efficient Certificate-Based Signature Scheme. [Citation Graph (, )][DBLP]


  49. A Deep Copy Protection Framework for Electronic Devices within Home. [Citation Graph (, )][DBLP]


  50. A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses. [Citation Graph (, )][DBLP]


  51. A Three-Level-Module Adaptive Intrusion Detection System. [Citation Graph (, )][DBLP]


  52. Improved Secret Sharing with Access Structures in a Hierarchy. [Citation Graph (, )][DBLP]


Search in 0.328secs, Finished in 0.330secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002