|
Search the dblp DataBase
Yejing Wang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Dingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini
Characterization of Optimal Authentication Codes with Arbitration. [Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:303-313 [Conf]
- Reihaneh Safavi-Naini, Yejing Wang
Bounds and Constructions for A3-code with Multi-senders. [Citation Graph (0, 0)][DBLP] ACISP, 1998, pp:159-168 [Conf]
- Yejing Wang, Reihaneh Safavi-Naini
A3-Codes under Collusion Attacks. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:390-398 [Conf]
- Reihaneh Safavi-Naini, Yejing Wang
Collusion Secure q-ary Fingerprinting for Perceptual Content. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2001, pp:57-75 [Conf]
- Reihaneh Safavi-Naini, Yejing Wang
Traitor Tracing for Shortened and Corrupted Fingerprints. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2002, pp:81-100 [Conf]
- Reihaneh Safavi-Naini, Yejing Wang
A Combinatorial Approach to Asymmetric Traitor Tracing. [Citation Graph (0, 0)][DBLP] COCOON, 2000, pp:416-425 [Conf]
- Reihaneh Safavi-Naini, Yejing Wang
Sequential Traitor Tracing. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:316-332 [Conf]
- Reihaneh Safavi-Naini, Yejing Wang
Anonymous Traceability Schemes with Unconditional Security. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2000, pp:250-261 [Conf]
- Vu Dong Tô, Reihaneh Safavi-Naini, Yejing Wang
A 2-Secure Code with Efficient Tracing Algorithm. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2002, pp:149-162 [Conf]
- Reihaneh Safavi-Naini, Yejing Wang
New results on frame-proof codes and traceability schemes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2001, v:47, n:7, pp:3029-3033 [Journal]
- Reihaneh Safavi-Naini, Yejing Wang
Sequential traitor tracing. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2003, v:49, n:5, pp:1319-1326 [Journal]
Search in 0.025secs, Finished in 0.025secs
|