The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Huaxiong Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang
    On Construction of Cumulative Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:379-390 [Conf]
  2. Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
    Key Management for Secure Multicast with Dynamic Controller. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:178-190 [Conf]
  3. Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang
    A Secure Re-keying Scheme with Key Recovery Property. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:40-55 [Conf]
  4. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang
    Changing Thresholds in the Absence of Secure Channels. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:177-191 [Conf]
  5. Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
    How to Construct Fail-Stop Confirmer Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:435-444 [Conf]
  6. Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao
    On Multiplicative Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:342-351 [Conf]
  7. Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho
    Formal analysis of card-based payment systems in mobile devices. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2006, pp:213-220 [Conf]
  8. Reihaneh Safavi-Naini, Huaxiong Wang
    Bounds and Constructions for Multireceiver Authentication Codes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:242-256 [Conf]
  9. Reihaneh Safavi-Naini, Huaxiong Wang
    Broadcast Authentication in Group Communication. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:399-411 [Conf]
  10. Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk
    Universal Designated-Verifier Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:523-542 [Conf]
  11. Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
    On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:194-209 [Conf]
  12. Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
    Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:170-186 [Conf]
  13. Huaxiong Wang, Josef Pieprzyk
    Efficient One-Time Proxy Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:507-522 [Conf]
  14. Hartono Kurnio, Huaxiong Wang, Josef Pieprzyk, Kris Gaj
    Securing Multicast Groups in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AWCC, 2004, pp:194-207 [Conf]
  15. Christophe Tartary, Huaxiong Wang
    Achieving Multicast Stream Authentication Using MDS Codes. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:108-125 [Conf]
  16. Gaurav Gupta, Josef Pieprzyk, Huaxiong Wang
    An attack-localizing watermarking scheme for natural language documents. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:157-165 [Conf]
  17. Reihaneh Safavi-Naini, Huaxiong Wang
    New constructions for multicast re-keying schemes using perfect hash families. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:228-234 [Conf]
  18. Christophe Tartary, Huaxiong Wang
    Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:103-117 [Conf]
  19. Yvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, Huaxiong Wang
    Radio Networks with Reliable Communication. [Citation Graph (0, 0)][DBLP]
    COCOON, 2005, pp:156-166 [Conf]
  20. Huaxiong Wang, Josef Pieprzyk
    A Combinatorial Approach to Anonymous Membership Broadcast. [Citation Graph (0, 0)][DBLP]
    COCOON, 2002, pp:162-170 [Conf]
  21. Huaxiong Wang, Josef Pieprzyk
    Shared Generation of Pseudo-Random Functions with Cumulative Maps. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:281-294 [Conf]
  22. Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
    How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:357-371 [Conf]
  23. Reihaneh Safavi-Naini, Huaxiong Wang
    New Results on Multi-Receiver Authentication Codes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:527-541 [Conf]
  24. Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang
    Redistribution of Mechanical Secret Shares. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:238-252 [Conf]
  25. Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng
    Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:82-91 [Conf]
  26. Hartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang
    A Dynamic Group Key Distribution Scheme with Flexible User Join. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:478-496 [Conf]
  27. Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang
    Efficient Revocation Schemes for Secure Multicast. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:160-177 [Conf]
  28. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild
    Threshold MACs. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:237-252 [Conf]
  29. Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam
    A New Approach to Robust Threshold RSA Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:184-196 [Conf]
  30. Beomsik Song, Huaxiong Wang, Jennifer Seberry
    A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:18-31 [Conf]
  31. Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing
    Linear Authentication Codes: Bounds and Constructions. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:127-135 [Conf]
  32. Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
    Fail-Stop Signature for Long Messages. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:165-177 [Conf]
  33. Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang
    A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:459-475 [Conf]
  34. Christophe Tartary, Huaxiong Wang
    Rateless Codes for the Multicast Stream Authentication Problem. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:136-151 [Conf]
  35. Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef Pieprzyk
    Converse Results to the Wiener Attack on RSA. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:184-198 [Conf]
  36. Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
    Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:157-173 [Conf]
  37. Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
    Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:86-100 [Conf]
  38. Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang
    Anonymous Signature Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:347-363 [Conf]
  39. Josef Pieprzyk, Huaxiong Wang, Chaoping Xing
    Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2003, pp:88-100 [Conf]
  40. Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang
    A Group Key Distribution Scheme with Decentralised User Join. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:146-163 [Conf]
  41. Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang
    Privacy Enhanced Electronic Cheque System. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:431-434 [Conf]
  42. Bangyu Wu, Kwok-Yan Lam, Siu Leung Chung, Huaxiong Wang
    Secure Construction of Virtual Organizations in Grid Computing Systems. [Citation Graph (0, 0)][DBLP]
    WINE, 2005, pp:959-968 [Conf]
  43. Christophe Tartary, Huaxiong Wang
    Efficient Multicast Stream Authentication for the Fully Adversarial Network Model. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:108-125 [Conf]
  44. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang
    Changing Thresholds in the Absence of Secure Channels. [Citation Graph (0, 0)][DBLP]
    Australian Computer Journal, 1999, v:31, n:2, pp:34-43 [Journal]
  45. Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang
    Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1999, v:42, n:8, pp:638-649 [Journal]
  46. Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk
    Broadcast anti-jamming systems. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:35, n:2-3, pp:223-236 [Journal]
  47. Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild
    Distributing the Encryption and Decryption of a Block Cipher. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:3, pp:263-287 [Journal]
  48. Shoulun Long, Josef Pieprzyk, Huaxiong Wang, Duncan S. Wong
    Generalised Cumulative Arrays in Secret Sharing. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:40, n:2, pp:191-209 [Journal]
  49. Reihaneh Safavi-Naini, Huaxiong Wang
    Secret sharing schemes with partial broadcast channels. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:41, n:1, pp:5-22 [Journal]
  50. Reihaneh Safavi-Naini, Huaxiong Wang
    Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1999, v:151, n:1-2, pp:148-172 [Journal]
  51. Reihaneh Safavi-Naini, Huaxiong Wang
    Bounds and Constructions for Threshold Shared Generation of Authenticators. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Math., 2002, v:79, n:12, pp:1285-1301 [Journal]
  52. Reihaneh Safavi-Naini, Huaxiong Wang, Duncan S. Wong
    Resilient Lkh: Secure Multicast Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2006, v:17, n:5, pp:1205-1222 [Journal]
  53. Huaxiong Wang
    On Syntactic Nuclei of Rational Languages. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:67, n:5, pp:221-226 [Journal]
  54. Huaxiong Wang, Josef Pieprzyk
    Shared generation of pseudo-random functions. [Citation Graph (0, 0)][DBLP]
    J. Complexity, 2004, v:20, n:2-3, pp:458-472 [Journal]
  55. Huaxiong Wang, Chaoping Xing
    Explicit Constructions of Perfect Hash Families from Algebraic Curves over Finite Fields. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 2001, v:93, n:1, pp:112-124 [Journal]
  56. Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
    An Efficient Construction for Fail-Stop Signature for Long Messages. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:6, pp:879-898 [Journal]
  57. Reihaneh Safavi-Naini, Huaxiong Wang
    Broadcast authentication for group communication. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2001, v:269, n:1-2, pp:1-21 [Journal]
  58. Huaxiong Wang
    On Rational Series and Rational Languages. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1998, v:205, n:1-2, pp:329-336 [Journal]
  59. Huaxiong Wang, Chaoping Xing, Reihaneh Safavi-Naini
    Linear authentication codes: bounds and constructions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:4, pp:866-872 [Journal]
  60. Chaoping Xing, Huaxiong Wang, Kwok-Yan Lam
    Constructions of authentication codes from algebraic curves over finite fields. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:3, pp:886-892 [Journal]
  61. Christophe Tartary, Huaxiong Wang
    Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:293-307 [Conf]
  62. Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang
    On Secure Multi-party Computation in Black-Box Groups. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:591-612 [Conf]
  63. Peishun Wang, Huaxiong Wang, Josef Pieprzyk
    A New Dynamic Accumulator for Batch Updates. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:98-112 [Conf]
  64. Peishun Wang, Huaxiong Wang, Josef Pieprzyk
    Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:108-123 [Conf]
  65. Christophe Tartary, Huaxiong Wang, Josef Pieprzyk
    An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:17-34 [Conf]

  66. Privacy-Preserving Distributed Set Intersection. [Citation Graph (, )][DBLP]


  67. On the Improvement of the BDF Attack on LSBS-RSA. [Citation Graph (, )][DBLP]


  68. Efficient Disjointness Tests for Private Datasets. [Citation Graph (, )][DBLP]


  69. A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. [Citation Graph (, )][DBLP]


  70. On the Security of PAS (Predicate-Based Authentication Service). [Citation Graph (, )][DBLP]


  71. Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes. [Citation Graph (, )][DBLP]


  72. Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. [Citation Graph (, )][DBLP]


  73. Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. [Citation Graph (, )][DBLP]


  74. 256 Bit Standardized Crypto for 650 GE - GOST Revisited. [Citation Graph (, )][DBLP]


  75. Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. [Citation Graph (, )][DBLP]


  76. Plaintext-Awareness of Hybrid Encryption. [Citation Graph (, )][DBLP]


  77. Cryptanalysis of LASH. [Citation Graph (, )][DBLP]


  78. Cryptanalysis of the LAKE Hash Family. [Citation Graph (, )][DBLP]


  79. Efficient Fuzzy Matching and Intersection on Private Datasets. [Citation Graph (, )][DBLP]


  80. Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes. [Citation Graph (, )][DBLP]


  81. Distributed Private Matching and Set Operations. [Citation Graph (, )][DBLP]


  82. An On-Line Secure E-Passport Protocol. [Citation Graph (, )][DBLP]


  83. Secure Computation of the Vector Dominance Problem. [Citation Graph (, )][DBLP]


  84. Cryptanalysis of Rabbit. [Citation Graph (, )][DBLP]


  85. Practical Pseudo-collisions for Hash Functions ARIRANG-224/384. [Citation Graph (, )][DBLP]


  86. A Fair e-Tendering Protocol. [Citation Graph (, )][DBLP]


  87. Certified Pseudonyms Colligated with Master Secret Key. [Citation Graph (, )][DBLP]


  88. Threshold Privacy Preserving Keyword Searches. [Citation Graph (, )][DBLP]


  89. An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. [Citation Graph (, )][DBLP]


  90. Improvement of a Dynamic Accumulator at ICICS 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted Data. [Citation Graph (, )][DBLP]


  91. Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes [Citation Graph (, )][DBLP]


  92. Query-Efficient Locally Decodable Codes of Subexponential Length [Citation Graph (, )][DBLP]


Search in 0.163secs, Finished in 0.165secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002