The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yongge Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yvo Desmedt, Yongge Wang
    Approximation Hardness and Secure Communication in Broadcast Channels. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:247-257 [Conf]
  2. Yongge Wang
    Linear Complexity versus Pseudorandomness: On Beth and Dai's Result. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:288-298 [Conf]
  3. Yongge Wang
    The Law of the Iterated Logarithm for p-Random Sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Conference on Computational Complexity, 1996, pp:180-189 [Conf]
  4. Yvo Desmedt, Yongge Wang
    Maximum Flows and Critical Vertices in AND/OR Graphs. [Citation Graph (0, 0)][DBLP]
    COCOON, 2002, pp:238-248 [Conf]
  5. Yvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, Huaxiong Wang
    Radio Networks with Reliable Communication. [Citation Graph (0, 0)][DBLP]
    COCOON, 2005, pp:156-166 [Conf]
  6. Yvo Desmedt, Yongge Wang
    Perfectly Secure Message Transmission Revisited. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:502-517 [Conf]
  7. Yongge Wang, Yvo Desmedt
    Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:446-458 [Conf]
  8. Zhaoyu Liu, Yongge Wang
    A Secure Agent Architecture for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IC-AI, 2003, pp:10-16 [Conf]
  9. Yongge Wang, Yuliang Zheng, Bei-tseng Chu
    Efficient and Secure Storage Systems Based on Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    IC-AI, 2003, pp:17-22 [Conf]
  10. Yongge Wang, Xintao Wu
    Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and Approximation. [Citation Graph (0, 0)][DBLP]
    ICDM, 2005, pp:482-489 [Conf]
  11. Xintao Wu, Chintan Sanghvi, Yongge Wang, Yuliang Zheng
    Privacy Aware Data Generation for Testing Database Applications. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2005, pp:317-326 [Conf]
  12. Yvo Desmedt, Yongge Wang, Mike Burmester
    A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback. [Citation Graph (0, 0)][DBLP]
    ISAAC, 2005, pp:277-287 [Conf]
  13. Xintao Wu, Yongge Wang, Yuliang Zheng
    Statistical Database Modeling for Privacy Preserving Database Generation. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2005, pp:382-390 [Conf]
  14. Wolfgang Merkle, Yongge Wang
    Separations by Random Oracles and "Almost" Classes for Generalized Reducibilities. [Citation Graph (0, 0)][DBLP]
    MFCS, 1995, pp:179-190 [Conf]
  15. Mike Burmester, Yvo Desmedt, Yongge Wang
    Using Approximation Hardness to Achieve Dependable Computation. [Citation Graph (0, 0)][DBLP]
    RANDOM, 1998, pp:172-186 [Conf]
  16. Yongge Wang
    Randomness, Stochasticity and Approximations. [Citation Graph (0, 0)][DBLP]
    RANDOM, 1997, pp:213-225 [Conf]
  17. Yvo Desmedt, Yongge Wang
    Efficient Zero-Knowledge Proofs for Some Practical Graph Problems. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:290-302 [Conf]
  18. Xintao Wu, Ying Wu, Yongge Wang, Yingjiu Li
    Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining. [Citation Graph (0, 0)][DBLP]
    SDM, 2005, pp:- [Conf]
  19. Yongge Wang
    Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:161-170 [Conf]
  20. Yongge Wang, Yuliang Zheng
    Fast and Secure Magnetic WORM Storage Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2003, pp:11-19 [Conf]
  21. Klaus Ambos-Spies, Elvira Mayordomo, Yongge Wang, Xizhong Zheng
    Resource-Bounded Balanced Genericity, Stochasticity and Weak Randomness. [Citation Graph (0, 0)][DBLP]
    STACS, 1996, pp:63-74 [Conf]
  22. Cristian Calude, Peter Hertling, Bakhadyr Khoussainov, Yongge Wang
    Recursively Enumerable Reals and Chaitin Omega Numbers. [Citation Graph (0, 0)][DBLP]
    STACS, 1998, pp:596-606 [Conf]
  23. Yongge Wang, Xintao Wu, Yuliang Zheng
    Privacy Preserving Data Generation for Database Application Performance Testing. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:142-151 [Conf]
  24. Xintao Wu, Yongge Wang, Yuliang Zheng
    Privacy preserving database application testing. [Citation Graph (0, 0)][DBLP]
    WPES, 2003, pp:118-128 [Conf]
  25. Yvo Desmedt, Yongge Wang, Mike Burmester
    Revisiting Colored Networks and Privacy Preserving Censorship. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:140-150 [Conf]
  26. Qiaofang Lian, Yongge Wang, Dunyan Yan
    A characterization of Lp(R) by local trigonometric bases with 1<p<infinity. [Citation Graph (0, 0)][DBLP]
    Adv. Comput. Math., 2006, v:25, n:1-3, pp:91-104 [Journal]
  27. Yvo Desmedt, Yongge Wang
    Perfectly Secure Message Transmission Revisited [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  28. Yongge Wang
    NP-hard Sets Are Superterse unless NP Is Small [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 1996, v:3, n:21, pp:- [Journal]
  29. Yongge Wang, Yvo Desmedt, Mike Burmester
    Models For Dependable Computation with Multiple Inputs and Some Hardness Results. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2000, v:42, n:1, pp:61-73 [Journal]
  30. Yvo Desmedt, Yongge Wang
    Analyzing Vulnerabilities Of Critical Infrastructures Using Flows And Critical Vertices In And/Or Graphs. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2004, v:15, n:1, pp:107-125 [Journal]
  31. Yongge Wang
    NP-Hard Sets are Superterse Unless NP is Small. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:61, n:1, pp:1-6 [Journal]
  32. Yongge Wang
    A Separation of Two Randomness Concepts. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:69, n:3, pp:115-118 [Journal]
  33. Yongge Wang, Yvo Desmedt
    Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2001, v:14, n:2, pp:121-135 [Journal]
  34. Peter Hertling, Yongge Wang
    Invariance Properties of Random Sequences. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1997, v:3, n:11, pp:1241-1249 [Journal]
  35. Wolfgang Merkle, Yongge Wang
    Separations by Random Oracles and "Almost" Classes for Generalized Reducibilities. [Citation Graph (0, 0)][DBLP]
    Math. Log. Q., 2001, v:47, n:2, pp:249-269 [Journal]
  36. Yongge Wang
    Genericity, Randomness, and Polynomial-Time Approximations. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1998, v:28, n:2, pp:394-408 [Journal]
  37. Yongge Wang
    Robust key establishment in sensor networks. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2004, v:33, n:1, pp:14-19 [Journal]
  38. Cristian Calude, Peter Hertling, Bakhadyr Khoussainov, Yongge Wang
    Recursively enumerable reals and Chaitin Omega numbers. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2001, v:255, n:1-2, pp:125-149 [Journal]
  39. Yongge Wang
    Resource bounded randomness and computational complexity. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2000, v:237, n:1-2, pp:33-55 [Journal]
  40. Yongge Wang
    A comparison of two approaches to pseudorandomness. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2002, v:276, n:1-2, pp:449-459 [Journal]
  41. Zhu Zhao, Zhongqi Dong, Yongge Wang
    Security analysis of a password-based authentication protocol proposed to IEEE 1363. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:352, n:1-3, pp:280-287 [Journal]
  42. Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
    Privacy Preserving Database Generation for Database Application Testing. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2007, v:78, n:4, pp:595-612 [Journal]

  43. Efficient and provably secure ciphers for storage device block level encryption. [Citation Graph (, )][DBLP]


  44. The algebraic structure of the isomorphic types of tally, polynomial time computable sets. [Citation Graph (, )][DBLP]


Search in 0.288secs, Finished in 0.290secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002