The SCEAS System
Navigation Menu

Search the dblp DataBase


Weidong Kou: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Weihong Fu, Weidong Kou
    A New Look at Coding and Decoding Algorithm for SFC-OFDM System. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:91-94 [Conf]
  2. Lanjun Dang, Weidong Kou, Yuxia Xiao
    An Improved Scheme for Unilateral Asymmetric Smart Card Authentication. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:265-268 [Conf]
  3. Zheng Dong, Huang Zheng, Kefei Chen, Weidong Kou
    ID-Based Proxy Blind Signature. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:380-383 [Conf]
  4. Kai Fan, Weidong Kou
    A Secure Steganography Scheme Based on (N, t) Threshold. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:536-539 [Conf]
  5. Xiaohui Li, Weidong Kou
    A Secure M-Commerce Model Based On Wireless Local Area Network. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:520-523 [Conf]
  6. Changhua Zhu, Changxing Pei, Jiandong Li, Weidong Kou
    QoS-Oriented Hybrid Admission Control in IEEE 802.11 WLAN. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:484-487 [Conf]
  7. Chaoqin Lei, Weidong Kou, Kai Fan, Wei Fan
    An Traceable Electronic Cash Model Based on Group Signature. [Citation Graph (0, 0)][DBLP]
    CSREA EEE, 2006, pp:209-214 [Conf]
  8. Jingwei Liu, Weidong Kou, Rong Sun, Yuxia Xiao
    The Security Analyses of RosettaNet in Grid. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:540-544 [Conf]
  9. Zichen Li, Junmei Zhang, Weidong Kou
    The Unlinkability of Randomization-Enhanced Chaum's Blind Signature Scheme. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2003, pp:244- [Conf]
  10. William Song, Weidong Kou, C. J. Tan
    An Investigation on Multiple e-Payments and Micro-Payment - A Technical and Market View. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2002, pp:- [Conf]
  11. Huaping Li, Weidong Kou, Xiaozhen Du
    Fair E-Commerce Protocols without a Third Party. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:324-327 [Conf]
  12. Li Chen, Elke A. Rundensteiner, Afshan Ally, Rice Chen, Weidong Kou
    Active Page Generation via Customizing XML for Data Beans in E-Commerce Applications. [Citation Graph (0, 0)][DBLP]
    ISEC, 2001, pp:79-97 [Conf]
  13. Carsten Passch, William Song, Weidong Kou, Chung-Jen Tan
    Online Auction Protocols: A Comparative Study. [Citation Graph (0, 0)][DBLP]
    ISEC, 2001, pp:170-186 [Conf]
  14. Xiaodong Lin, Johnny W. Wong, Weidong Kou
    Performance Analysis of Secure Web Server Based on SSL. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:249-261 [Conf]
  15. Xiaohui Li, Naian Liu, Changxing Pei, Kechu Yi, Weidong Kou
    Design and Analysis of High Speed WLAN Systems with Adaptive Margin Technology. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:284-287 [Conf]
  16. Weidong Kou, David Lauzon, William G. O'Farrell, Teo Loo See, Daniel Wee, Daniel Tan, Kelvin Cheung, Richard Gregory, Kostas Kontogiannis, John Mylopoulos
    End-to-end E-commerce Application Development Based on XML Tools. [Citation Graph (0, 0)][DBLP]
    IEEE Data Eng. Bull., 2000, v:23, n:1, pp:29-36 [Journal]
  17. Weidong Kou, Yelena Yesha
    Editorial. [Citation Graph (0, 0)][DBLP]
    Int. J. on Digital Libraries, 2002, v:3, n:4, pp:277-278 [Journal]
  18. Xuefei Cao, Weidong Kou, Huaping Li, Jie Xu
    An Efficient Anonymous Registration Scheme for Mobile IPv4. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:758-766 [Conf]
  19. Junzuo Lai, Weidong Kou
    Self-Generated-Certificate Public Key Encryption Without Pairing. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:476-489 [Conf]

  20. Adaptive Encrypted Information Hiding Scheme for Images. [Citation Graph (, )][DBLP]

  21. A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol. [Citation Graph (, )][DBLP]

  22. Fair e-payment protocols. [Citation Graph (, )][DBLP]

  23. Efficient CCA-Secure PKE from Identity-Based Techniques. [Citation Graph (, )][DBLP]

  24. RSA-Based Certificateless Public Key Encryption. [Citation Graph (, )][DBLP]

  25. Design of Secure Watermarking Scheme for Watermarking Protocol. [Citation Graph (, )][DBLP]

  26. IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002