The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Victor K. Wei: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jon Louis Bentley, Daniel Dominic Sleator, Robert Endre Tarjan, Victor K. Wei
    A Locally Adaptive Data Compression Scheme. [Citation Graph (2, 0)][DBLP]
    Commun. ACM, 1986, v:29, n:4, pp:320-330 [Journal]
  2. Venkat Anantharam, Michael L. Honig, U. Madhov, Victor K. Wei
    Optimization of a Database Hierarchy for Mobility Tracking in a Personal Communications Network. [Citation Graph (2, 0)][DBLP]
    Perform. Eval., 1994, v:20, n:1-3, pp:278-300 [Journal]
  3. Joseph K. Liu, Victor K. Wei, Duncan S. Wong
    Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:325-335 [Conf]
  4. Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
    Group Signature Where Group Manager, Members and Open Authority Are Identity-Based. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:468-480 [Conf]
  5. Victor K. Wei
    Invisible designated confirmer signatures without random oracles. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:356-358 [Conf]
  6. Tsz Hon Yuen, Victor K. Wei
    Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:305-322 [Conf]
  7. Tony K. Chan, Karyin Fung, Joseph K. Liu, Victor K. Wei
    Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:82-94 [Conf]
  8. Jeff S. L. Cheng, Victor K. Wei
    Defenses against the Truncation of Computation Results of Free-Roaming Agents. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:1-12 [Conf]
  9. Duncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei
    On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:34-46 [Conf]
  10. Joseph K. Liu, Victor K. Wei, Duncan S. Wong
    A Separable Threshold Ring Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:12-26 [Conf]
  11. Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong
    Separable Linkable Threshold Ring Signatures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:384-398 [Conf]
  12. Patrick P. Tsang, Victor K. Wei
    Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:48-60 [Conf]
  13. Victor K. Wei
    Tracing-by-Linking Group Signatures. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:149-163 [Conf]
  14. Dennis Grinberg, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan, Victor K. Wei
    Splay Trees for Data Compression. [Citation Graph (0, 0)][DBLP]
    SODA, 1995, pp:522-530 [Conf]
  15. P. C. Chan, Victor K. Wei
    Preemptive Distributed Intrusion Detection Using Mobile Agents. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:103-108 [Conf]
  16. T. C. Lam, Victor K. Wei
    A Mobile Agent Clone Detection System with Itinerary Privacy. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:68-76 [Conf]
  17. K. Shum, Victor K. Wei
    A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:55-56 [Conf]
  18. Joseph K. Liu, Victor K. Wei, Duncan S. Wong
    Custodian-Hiding Verifiable Encryption. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:51-64 [Conf]
  19. Fang-Wei Fu, Torleiv Kløve, Yuan Luo, Victor K. Wei
    On Equidistant Constant Weight Codes. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2003, v:128, n:1, pp:157-164 [Journal]
  20. Fang-Wei Fu, Victor K. Wei, Raymond W. Yeung
    On the minimum average distance of binary codes: linear programming approach. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2001, v:111, n:3, pp:263-281 [Journal]
  21. Fang-Wei Fu, Victor K. Wei
    elf-Complementary Balanced Codes and Quasi-Symmetric Designs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2002, v:27, n:3, pp:271-279 [Journal]
  22. Tuvi Etzion, Victor K. Wei, Zhen Zhang
    Bounds on the Sizes of Constant Weight Covering Codes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1995, v:5, n:3, pp:217-239 [Journal]
  23. Lusheng Chen, Fang-Wei Fu, Victor K. Wei
    On the constructions of highly nonlinear zigzag functions and unbiased functions. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2001, v:79, n:3, pp:135-140 [Journal]
  24. T. V. Lakshman, Victor K. Wei
    Distributed Computing on Regular Networks with Anonymous Nodes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1994, v:43, n:2, pp:211-218 [Journal]
  25. Fang-Wei Fu, Torleiv Kløve, Yuan Luo, Victor K. Wei
    On the Svanström bound for ternary constant-weight codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:5, pp:2061-2064 [Journal]
  26. Fang-Wei Fu, A. J. Han Vinck, Victor K. Wei, Raymond W. Yeung
    On the capacity of write-unidirectional memories with nonperiodic codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2004, v:50, n:4, pp:649-656 [Journal]
  27. Zhen Zhang, En-Hui Yang, Victor K. Wei
    The redundancy of source coding with a fidelity criterion: 1. Known statistics. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:1, pp:71-91 [Journal]
  28. János Körner, Victor K. Wei
    Odd and even hamming spheres also have minimum boundary. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1984, v:51, n:2, pp:147-165 [Journal]
  29. János Körner, Victor K. Wei
    Addendum to "odd and even hamming spheres also have minimum boundary". [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1986, v:62, n:1, pp:105-106 [Journal]

Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002