Search the dblp DataBase
Yongge Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yvo Desmedt , Yongge Wang Approximation Hardness and Secure Communication in Broadcast Channels. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:247-257 [Conf ] Yongge Wang Linear Complexity versus Pseudorandomness: On Beth and Dai's Result. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:288-298 [Conf ] Yongge Wang The Law of the Iterated Logarithm for p-Random Sequences. [Citation Graph (0, 0)][DBLP ] IEEE Conference on Computational Complexity, 1996, pp:180-189 [Conf ] Yvo Desmedt , Yongge Wang Maximum Flows and Critical Vertices in AND/OR Graphs. [Citation Graph (0, 0)][DBLP ] COCOON, 2002, pp:238-248 [Conf ] Yvo Desmedt , Yongge Wang , Reihaneh Safavi-Naini , Huaxiong Wang Radio Networks with Reliable Communication. [Citation Graph (0, 0)][DBLP ] COCOON, 2005, pp:156-166 [Conf ] Yvo Desmedt , Yongge Wang Perfectly Secure Message Transmission Revisited. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:502-517 [Conf ] Yongge Wang , Yvo Desmedt Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:446-458 [Conf ] Zhaoyu Liu , Yongge Wang A Secure Agent Architecture for Sensor Networks. [Citation Graph (0, 0)][DBLP ] IC-AI, 2003, pp:10-16 [Conf ] Yongge Wang , Yuliang Zheng , Bei-tseng Chu Efficient and Secure Storage Systems Based on Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP ] IC-AI, 2003, pp:17-22 [Conf ] Yongge Wang , Xintao Wu Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and Approximation. [Citation Graph (0, 0)][DBLP ] ICDM, 2005, pp:482-489 [Conf ] Xintao Wu , Chintan Sanghvi , Yongge Wang , Yuliang Zheng Privacy Aware Data Generation for Testing Database Applications. [Citation Graph (0, 0)][DBLP ] IDEAS, 2005, pp:317-326 [Conf ] Yvo Desmedt , Yongge Wang , Mike Burmester A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback. [Citation Graph (0, 0)][DBLP ] ISAAC, 2005, pp:277-287 [Conf ] Xintao Wu , Yongge Wang , Yuliang Zheng Statistical Database Modeling for Privacy Preserving Database Generation. [Citation Graph (0, 0)][DBLP ] ISMIS, 2005, pp:382-390 [Conf ] Wolfgang Merkle , Yongge Wang Separations by Random Oracles and "Almost" Classes for Generalized Reducibilities. [Citation Graph (0, 0)][DBLP ] MFCS, 1995, pp:179-190 [Conf ] Mike Burmester , Yvo Desmedt , Yongge Wang Using Approximation Hardness to Achieve Dependable Computation. [Citation Graph (0, 0)][DBLP ] RANDOM, 1998, pp:172-186 [Conf ] Yongge Wang Randomness, Stochasticity and Approximations. [Citation Graph (0, 0)][DBLP ] RANDOM, 1997, pp:213-225 [Conf ] Yvo Desmedt , Yongge Wang Efficient Zero-Knowledge Proofs for Some Practical Graph Problems. [Citation Graph (0, 0)][DBLP ] SCN, 2002, pp:290-302 [Conf ] Xintao Wu , Ying Wu , Yongge Wang , Yingjiu Li Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining. [Citation Graph (0, 0)][DBLP ] SDM, 2005, pp:- [Conf ] Yongge Wang Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:161-170 [Conf ] Yongge Wang , Yuliang Zheng Fast and Secure Magnetic WORM Storage Systems. [Citation Graph (0, 0)][DBLP ] IEEE Security in Storage Workshop, 2003, pp:11-19 [Conf ] Klaus Ambos-Spies , Elvira Mayordomo , Yongge Wang , Xizhong Zheng Resource-Bounded Balanced Genericity, Stochasticity and Weak Randomness. [Citation Graph (0, 0)][DBLP ] STACS, 1996, pp:63-74 [Conf ] Cristian Calude , Peter Hertling , Bakhadyr Khoussainov , Yongge Wang Recursively Enumerable Reals and Chaitin Omega Numbers. [Citation Graph (0, 0)][DBLP ] STACS, 1998, pp:596-606 [Conf ] Yongge Wang , Xintao Wu , Yuliang Zheng Privacy Preserving Data Generation for Database Application Performance Testing. [Citation Graph (0, 0)][DBLP ] TrustBus, 2004, pp:142-151 [Conf ] Xintao Wu , Yongge Wang , Yuliang Zheng Privacy preserving database application testing. [Citation Graph (0, 0)][DBLP ] WPES, 2003, pp:118-128 [Conf ] Yvo Desmedt , Yongge Wang , Mike Burmester Revisiting Colored Networks and Privacy Preserving Censorship. [Citation Graph (0, 0)][DBLP ] CRITIS, 2006, pp:140-150 [Conf ] Qiaofang Lian , Yongge Wang , Dunyan Yan A characterization of Lp (R) by local trigonometric bases with 1<p <infinity. [Citation Graph (0, 0)][DBLP ] Adv. Comput. Math., 2006, v:25, n:1-3, pp:91-104 [Journal ] Yvo Desmedt , Yongge Wang Perfectly Secure Message Transmission Revisited [Citation Graph (0, 0)][DBLP ] CoRR, 2002, v:0, n:, pp:- [Journal ] Yongge Wang NP-hard Sets Are Superterse unless NP Is Small [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 1996, v:3, n:21, pp:- [Journal ] Yongge Wang , Yvo Desmedt , Mike Burmester Models For Dependable Computation with Multiple Inputs and Some Hardness Results. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2000, v:42, n:1, pp:61-73 [Journal ] Yvo Desmedt , Yongge Wang Analyzing Vulnerabilities Of Critical Infrastructures Using Flows And Critical Vertices In And/Or Graphs. [Citation Graph (0, 0)][DBLP ] Int. J. Found. Comput. Sci., 2004, v:15, n:1, pp:107-125 [Journal ] Yongge Wang NP-Hard Sets are Superterse Unless NP is Small. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1997, v:61, n:1, pp:1-6 [Journal ] Yongge Wang A Separation of Two Randomness Concepts. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1999, v:69, n:3, pp:115-118 [Journal ] Yongge Wang , Yvo Desmedt Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2001, v:14, n:2, pp:121-135 [Journal ] Peter Hertling , Yongge Wang Invariance Properties of Random Sequences. [Citation Graph (0, 0)][DBLP ] J. UCS, 1997, v:3, n:11, pp:1241-1249 [Journal ] Wolfgang Merkle , Yongge Wang Separations by Random Oracles and "Almost" Classes for Generalized Reducibilities. [Citation Graph (0, 0)][DBLP ] Math. Log. Q., 2001, v:47, n:2, pp:249-269 [Journal ] Yongge Wang Genericity, Randomness, and Polynomial-Time Approximations. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1998, v:28, n:2, pp:394-408 [Journal ] Yongge Wang Robust key establishment in sensor networks. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2004, v:33, n:1, pp:14-19 [Journal ] Cristian Calude , Peter Hertling , Bakhadyr Khoussainov , Yongge Wang Recursively enumerable reals and Chaitin Omega numbers. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2001, v:255, n:1-2, pp:125-149 [Journal ] Yongge Wang Resource bounded randomness and computational complexity. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2000, v:237, n:1-2, pp:33-55 [Journal ] Yongge Wang A comparison of two approaches to pseudorandomness. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2002, v:276, n:1-2, pp:449-459 [Journal ] Zhu Zhao , Zhongqi Dong , Yongge Wang Security analysis of a password-based authentication protocol proposed to IEEE 1363. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2006, v:352, n:1-3, pp:280-287 [Journal ] Xintao Wu , Yongge Wang , Songtao Guo , Yuliang Zheng Privacy Preserving Database Generation for Database Application Testing. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2007, v:78, n:4, pp:595-612 [Journal ] Efficient and provably secure ciphers for storage device block level encryption. [Citation Graph (, )][DBLP ] The algebraic structure of the isomorphic types of tally, polynomial time computable sets. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.007secs