Search the dblp DataBase
Huaxiong Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Hossein Ghodosi , Josef Pieprzyk , Reihaneh Safavi-Naini , Huaxiong Wang On Construction of Cumulative Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:379-390 [Conf ] Hartono Kurnio , Reihaneh Safavi-Naini , Willy Susilo , Huaxiong Wang Key Management for Secure Multicast with Dynamic Controller. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:178-190 [Conf ] Hartono Kurnio , Reihaneh Safavi-Naini , Huaxiong Wang A Secure Re-keying Scheme with Key Recovery Property. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:40-55 [Conf ] Keith M. Martin , Josef Pieprzyk , Reihaneh Safavi-Naini , Huaxiong Wang Changing Thresholds in the Absence of Secure Channels. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:177-191 [Conf ] Reihaneh Safavi-Naini , Willy Susilo , Huaxiong Wang How to Construct Fail-Stop Confirmer Signature Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:435-444 [Conf ] Huaxiong Wang , Kwok-Yan Lam , Guozhen Xiao , Huanhui Zhao On Multiplicative Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:342-351 [Conf ] Vijayakrishnan Pasupathinathan , Josef Pieprzyk , Huaxiong Wang , Joo Yeon Cho Formal analysis of card-based payment systems in mobile devices. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2006, pp:213-220 [Conf ] Reihaneh Safavi-Naini , Huaxiong Wang Bounds and Constructions for Multireceiver Authentication Codes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:242-256 [Conf ] Reihaneh Safavi-Naini , Huaxiong Wang Broadcast Authentication in Group Communication. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:399-411 [Conf ] Ron Steinfeld , Laurence Bull , Huaxiong Wang , Josef Pieprzyk Universal Designated-Verifier Signatures. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:523-542 [Conf ] Ron Steinfeld , Josef Pieprzyk , Huaxiong Wang On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:194-209 [Conf ] Ron Steinfeld , Huaxiong Wang , Josef Pieprzyk Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:170-186 [Conf ] Huaxiong Wang , Josef Pieprzyk Efficient One-Time Proxy Signatures. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:507-522 [Conf ] Hartono Kurnio , Huaxiong Wang , Josef Pieprzyk , Kris Gaj Securing Multicast Groups in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] AWCC, 2004, pp:194-207 [Conf ] Christophe Tartary , Huaxiong Wang Achieving Multicast Stream Authentication Using MDS Codes. [Citation Graph (0, 0)][DBLP ] CANS, 2006, pp:108-125 [Conf ] Gaurav Gupta , Josef Pieprzyk , Huaxiong Wang An attack-localizing watermarking scheme for natural language documents. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:157-165 [Conf ] Reihaneh Safavi-Naini , Huaxiong Wang New constructions for multicast re-keying schemes using perfect hash families. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:228-234 [Conf ] Christophe Tartary , Huaxiong Wang Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:103-117 [Conf ] Yvo Desmedt , Yongge Wang , Reihaneh Safavi-Naini , Huaxiong Wang Radio Networks with Reliable Communication. [Citation Graph (0, 0)][DBLP ] COCOON, 2005, pp:156-166 [Conf ] Huaxiong Wang , Josef Pieprzyk A Combinatorial Approach to Anonymous Membership Broadcast. [Citation Graph (0, 0)][DBLP ] COCOON, 2002, pp:162-170 [Conf ] Huaxiong Wang , Josef Pieprzyk Shared Generation of Pseudo-Random Functions with Cumulative Maps. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:281-294 [Conf ] Ron Steinfeld , Josef Pieprzyk , Huaxiong Wang How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2007, pp:357-371 [Conf ] Reihaneh Safavi-Naini , Huaxiong Wang New Results on Multi-Receiver Authentication Codes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:527-541 [Conf ] Yvo Desmedt , Reihaneh Safavi-Naini , Huaxiong Wang Redistribution of Mechanical Secret Shares. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2002, pp:238-252 [Conf ] Guomin Yang , Duncan S. Wong , Huaxiong Wang , Xiaotie Deng Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:82-91 [Conf ] Hartono Kurnio , Luke McAven , Reihaneh Safavi-Naini , Huaxiong Wang A Dynamic Group Key Distribution Scheme with Flexible User Join. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:478-496 [Conf ] Hartono Kurnio , Reihaneh Safavi-Naini , Huaxiong Wang Efficient Revocation Schemes for Secure Multicast. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:160-177 [Conf ] Keith M. Martin , Josef Pieprzyk , Reihaneh Safavi-Naini , Huaxiong Wang , Peter R. Wild Threshold MACs. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:237-252 [Conf ] Reihaneh Safavi-Naini , Huaxiong Wang , Kwok-Yan Lam A New Approach to Robust Threshold RSA Signature Schemes. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:184-196 [Conf ] Beomsik Song , Huaxiong Wang , Jennifer Seberry A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:18-31 [Conf ] Reihaneh Safavi-Naini , Huaxiong Wang , Chaoping Xing Linear Authentication Codes: Bounds and Constructions. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:127-135 [Conf ] Reihaneh Safavi-Naini , Willy Susilo , Huaxiong Wang Fail-Stop Signature for Long Messages. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:165-177 [Conf ] Yvo Desmedt , Josef Pieprzyk , Ron Steinfeld , Huaxiong Wang A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. [Citation Graph (0, 0)][DBLP ] ISC, 2006, pp:459-475 [Conf ] Christophe Tartary , Huaxiong Wang Rateless Codes for the Multicast Stream Authentication Problem. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:136-151 [Conf ] Ron Steinfeld , Scott Contini , Huaxiong Wang , Josef Pieprzyk Converse Results to the Wiener Attack on RSA. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2005, pp:184-198 [Conf ] Ron Steinfeld , Josef Pieprzyk , Huaxiong Wang Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:157-173 [Conf ] Ron Steinfeld , Huaxiong Wang , Josef Pieprzyk Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:86-100 [Conf ] Guomin Yang , Duncan S. Wong , Xiaotie Deng , Huaxiong Wang Anonymous Signature Schemes. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:347-363 [Conf ] Josef Pieprzyk , Huaxiong Wang , Chaoping Xing Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2003, pp:88-100 [Conf ] Hartono Kurnio , Reihaneh Safavi-Naini , Huaxiong Wang A Group Key Distribution Scheme with Decentralised User Join. [Citation Graph (0, 0)][DBLP ] SCN, 2002, pp:146-163 [Conf ] Vijayakrishnan Pasupathinathan , Josef Pieprzyk , Huaxiong Wang Privacy Enhanced Electronic Cheque System. [Citation Graph (0, 0)][DBLP ] CEC, 2005, pp:431-434 [Conf ] Bangyu Wu , Kwok-Yan Lam , Siu Leung Chung , Huaxiong Wang Secure Construction of Virtual Organizations in Grid Computing Systems. [Citation Graph (0, 0)][DBLP ] WINE, 2005, pp:959-968 [Conf ] Christophe Tartary , Huaxiong Wang Efficient Multicast Stream Authentication for the Fully Adversarial Network Model. [Citation Graph (0, 0)][DBLP ] WISA, 2005, pp:108-125 [Conf ] Keith M. Martin , Josef Pieprzyk , Reihaneh Safavi-Naini , Huaxiong Wang Changing Thresholds in the Absence of Secure Channels. [Citation Graph (0, 0)][DBLP ] Australian Computer Journal, 1999, v:31, n:2, pp:34-43 [Journal ] Keith M. Martin , Reihaneh Safavi-Naini , Huaxiong Wang Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. [Citation Graph (0, 0)][DBLP ] Comput. J., 1999, v:42, n:8, pp:638-649 [Journal ] Yvo Desmedt , Reihaneh Safavi-Naini , Huaxiong Wang , Lynn Margaret Batten , Chris Charnes , Josef Pieprzyk Broadcast anti-jamming systems. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2001, v:35, n:2-3, pp:223-236 [Journal ] Keith M. Martin , Reihaneh Safavi-Naini , Huaxiong Wang , Peter R. Wild Distributing the Encryption and Decryption of a Block Cipher. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2005, v:36, n:3, pp:263-287 [Journal ] Shoulun Long , Josef Pieprzyk , Huaxiong Wang , Duncan S. Wong Generalised Cumulative Arrays in Secret Sharing. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2006, v:40, n:2, pp:191-209 [Journal ] Reihaneh Safavi-Naini , Huaxiong Wang Secret sharing schemes with partial broadcast channels. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2006, v:41, n:1, pp:5-22 [Journal ] Reihaneh Safavi-Naini , Huaxiong Wang Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1999, v:151, n:1-2, pp:148-172 [Journal ] Reihaneh Safavi-Naini , Huaxiong Wang Bounds and Constructions for Threshold Shared Generation of Authenticators. [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Math., 2002, v:79, n:12, pp:1285-1301 [Journal ] Reihaneh Safavi-Naini , Huaxiong Wang , Duncan S. Wong Resilient Lkh: Secure Multicast Key Distribution Schemes. [Citation Graph (0, 0)][DBLP ] Int. J. Found. Comput. Sci., 2006, v:17, n:5, pp:1205-1222 [Journal ] Huaxiong Wang On Syntactic Nuclei of Rational Languages. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1998, v:67, n:5, pp:221-226 [Journal ] Huaxiong Wang , Josef Pieprzyk Shared generation of pseudo-random functions. [Citation Graph (0, 0)][DBLP ] J. Complexity, 2004, v:20, n:2-3, pp:458-472 [Journal ] Huaxiong Wang , Chaoping Xing Explicit Constructions of Perfect Hash Families from Algebraic Curves over Finite Fields. [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 2001, v:93, n:1, pp:112-124 [Journal ] Reihaneh Safavi-Naini , Willy Susilo , Huaxiong Wang An Efficient Construction for Fail-Stop Signature for Long Messages. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2001, v:17, n:6, pp:879-898 [Journal ] Reihaneh Safavi-Naini , Huaxiong Wang Broadcast authentication for group communication. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2001, v:269, n:1-2, pp:1-21 [Journal ] Huaxiong Wang On Rational Series and Rational Languages. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1998, v:205, n:1-2, pp:329-336 [Journal ] Huaxiong Wang , Chaoping Xing , Reihaneh Safavi-Naini Linear authentication codes: bounds and constructions. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2003, v:49, n:4, pp:866-872 [Journal ] Chaoping Xing , Huaxiong Wang , Kwok-Yan Lam Constructions of authentication codes from algebraic curves over finite fields. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2000, v:46, n:3, pp:886-892 [Journal ] Christophe Tartary , Huaxiong Wang Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:293-307 [Conf ] Yvo Desmedt , Josef Pieprzyk , Ron Steinfeld , Huaxiong Wang On Secure Multi-party Computation in Black-Box Groups. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2007, pp:591-612 [Conf ] Peishun Wang , Huaxiong Wang , Josef Pieprzyk A New Dynamic Accumulator for Batch Updates. [Citation Graph (0, 0)][DBLP ] ICICS, 2007, pp:98-112 [Conf ] Peishun Wang , Huaxiong Wang , Josef Pieprzyk Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:108-123 [Conf ] Christophe Tartary , Huaxiong Wang , Josef Pieprzyk An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. [Citation Graph (0, 0)][DBLP ] ProvSec, 2007, pp:17-34 [Conf ] Privacy-Preserving Distributed Set Intersection. [Citation Graph (, )][DBLP ] On the Improvement of the BDF Attack on LSBS-RSA. [Citation Graph (, )][DBLP ] Efficient Disjointness Tests for Private Datasets. [Citation Graph (, )][DBLP ] A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. [Citation Graph (, )][DBLP ] On the Security of PAS (Predicate-Based Authentication Service). [Citation Graph (, )][DBLP ] Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes. [Citation Graph (, )][DBLP ] Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. [Citation Graph (, )][DBLP ] Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. [Citation Graph (, )][DBLP ] 256 Bit Standardized Crypto for 650 GE - GOST Revisited. [Citation Graph (, )][DBLP ] Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. [Citation Graph (, )][DBLP ] Plaintext-Awareness of Hybrid Encryption. [Citation Graph (, )][DBLP ] Cryptanalysis of LASH. [Citation Graph (, )][DBLP ] Cryptanalysis of the LAKE Hash Family. [Citation Graph (, )][DBLP ] Efficient Fuzzy Matching and Intersection on Private Datasets. [Citation Graph (, )][DBLP ] Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes. [Citation Graph (, )][DBLP ] Distributed Private Matching and Set Operations. [Citation Graph (, )][DBLP ] An On-Line Secure E-Passport Protocol. [Citation Graph (, )][DBLP ] Secure Computation of the Vector Dominance Problem. [Citation Graph (, )][DBLP ] Cryptanalysis of Rabbit. [Citation Graph (, )][DBLP ] Practical Pseudo-collisions for Hash Functions ARIRANG-224/384. [Citation Graph (, )][DBLP ] A Fair e-Tendering Protocol. [Citation Graph (, )][DBLP ] Certified Pseudonyms Colligated with Master Secret Key. [Citation Graph (, )][DBLP ] Threshold Privacy Preserving Keyword Searches. [Citation Graph (, )][DBLP ] An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. [Citation Graph (, )][DBLP ] Improvement of a Dynamic Accumulator at ICICS 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted Data. [Citation Graph (, )][DBLP ] Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes [Citation Graph (, )][DBLP ] Query-Efficient Locally Decodable Codes of Subexponential Length [Citation Graph (, )][DBLP ] Search in 0.163secs, Finished in 0.165secs