The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yongdong Wu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tie-Yan Li, Yongdong Wu
    Trust on Web Browser: Attack vs. Defense. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:241-253 [Conf]
  2. Yongdong Wu
    Efficient Authentication of Electronic Document Workflow. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:101-112 [Conf]
  3. Yongdong Wu, Feng Bao
    Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:264-278 [Conf]
  4. Yongdong Wu, Robert H. Deng
    Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:238-248 [Conf]
  5. Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng
    Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:79-91 [Conf]
  6. Tieyan Li, Huafei Zhu, Yongdong Wu
    Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:389-401 [Conf]
  7. Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu
    Batching SSL/TLS Handshake Improved. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:402-413 [Conf]
  8. Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li
    Dynamic Access Control for Multi-privileged Group Communications. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:508-519 [Conf]
  9. Yongdong Wu, Zhigang Zhao, Tian Wei Chui
    An Attack on SMC-Based Software Protection. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:352-368 [Conf]
  10. Yongdong Wu, Robert H. Deng
    Compliant encryption of jpeg2000 codestreanis. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:3439-3442 [Conf]
  11. Yongdong Wu, Di Ma, Robert H. Deng
    Progressive protection of jpeg2000 codestreams. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:3447-3450 [Conf]
  12. Yongdong Wu, Di Ma, Changsheng Xu
    Efficient Object-Based Stream Authentication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:354-367 [Conf]
  13. Fang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu
    Preventing Web-Spoofing with Automatic Detecting Security Indicator. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:112-122 [Conf]
  14. Yongdong Wu
    Zero-Distortion Authentication Watermarking. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:325-337 [Conf]
  15. Yongdong Wu, Feng Bao
    Collusion attack on a multi-key secure video proxy scheme. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2004, pp:380-383 [Conf]
  16. Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao
    A flexible and scalable authentication scheme for JPEG2000 image codestreams. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2003, pp:433-441 [Conf]
  17. Yongdong Wu, Feng Bao, Robert H. Deng
    Secure Person-To-Person Communications Based on Biometrics Signals. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:205-222 [Conf]
  18. Yongdong Wu, Tieyan Li, Robert H. Deng
    Protecting Group Dynamic Information in Large Scale Multicast Groups. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:459-476 [Conf]
  19. Yongdong Wu, Changsheng Xu
    Fault-induced attack on semi-fragile image authentication schemes. [Citation Graph (0, 0)][DBLP]
    VCIP, 2003, pp:1875-1883 [Conf]
  20. Yongdong Wu, Changsheng Xu, Feng Bao
    Counterfeiting Attack on a Lossless Authentication Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    VIP, 2002, pp:109-112 [Conf]
  21. Robert H. Deng, Di Ma, Weizhong Shao, Yongdong Wu
    Scalable trusted online dissemination of JPEG2000 images. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2005, v:11, n:1, pp:60-67 [Journal]
  22. Yongdong Wu, Robert H. Deng
    Security of an ill-posed operator for image authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2005, v:15, n:1, pp:161-163 [Journal]
  23. Yongdong Wu
    On the security of an SVD-based ownership watermarking. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2005, v:7, n:4, pp:624-627 [Journal]
  24. Yongdong Wu
    Nonlinear collusion attack on a watermarking scheme for buyer authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2006, v:8, n:3, pp:626-629 [Journal]
  25. Yongdong Wu, Robert H. Deng
    Scalable authentication of MPEG-4 streams. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2006, v:8, n:1, pp:152-161 [Journal]
  26. Yongdong Wu, Feng Bao, Robert H. Deng
    Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:171-183 [Conf]
  27. Yongdong Wu
    Tamper-Localization Watermarking with Systematic Error Correcting Code. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:1965-1968 [Conf]

  28. Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. [Citation Graph (, )][DBLP]


  29. Security Flaws in Kuribayashi-Tanaka Fingerprinting Protocol. [Citation Graph (, )][DBLP]


  30. Resilient Aggregation Scheme for Confidential Sensor Reports. [Citation Graph (, )][DBLP]


  31. Tracing Stateful Pirate Decoders. [Citation Graph (, )][DBLP]


  32. A Lightweight Fast Handover Authentication Scheme in Mobile Networks. [Citation Graph (, )][DBLP]


  33. Protection of Video Logos with Randomization. [Citation Graph (, )][DBLP]


  34. Aggregating signatures of MPEG-4 elementary streams. [Citation Graph (, )][DBLP]


  35. Evaluating Ouda's Tamper-Localization Watermarking Scheme. [Citation Graph (, )][DBLP]


  36. Optimizing the capacity of distortion-freewatermarking on palette images. [Citation Graph (, )][DBLP]


  37. Transforming a pattern identifier into biometric key generators. [Citation Graph (, )][DBLP]


  38. Improving a Digital Rights Management Scheme for Video Broadcast. [Citation Graph (, )][DBLP]


  39. Evaluating a Multimedia-Based Tele-Ophthalmology System. [Citation Graph (, )][DBLP]


  40. A Reversible Data Hiding Scheme for JPEG Images. [Citation Graph (, )][DBLP]


  41. Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. [Citation Graph (, )][DBLP]


  42. An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks. [Citation Graph (, )][DBLP]


Search in 0.089secs, Finished in 0.091secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002