Yongge Wang
Cited by
Cited by
Secure key distribution for the smart grid
J Xia, Y Wang
IEEE Transactions on Smart Grid 3 (3), 1437-1443, 2012
Recursively enumerable reals and Chaitin O numbers
CS Calude, PH Hertling, B Khoussainov, Y Wang
Theoretical Computer Science 255 (1), 125-150, 2001
Perfectly secure message transmission revisited
Y Desmedt, Y Wang
International Conference on the Theory and Applications of Cryptographic …, 2002
Efficient identity-based and authenticated key agreement protocol
Y Wang
Transactions On Computational Science Xvii, 172-197, 2013
Randomness and complexity
Y Wang
Password protected smart card and memory stick authentication against off-line dictionary attacks
Y Wang
IFIP international information security conference, 489-500, 2012
sSCADA: securing SCADA infrastructure communications
Y Wang
International journal of communication networks and distributed systems 6 (1 …, 2011
Perfectly secure message transmission revisited
Y Wang, Y Desmedt
IEEE Transactions on Information Theory 54 (6), 2582-2595, 2008
Secure communication in broadcast channels: the answer to Franklin and Wright’s question
Y Wang, Y Desmedt
Advances in Cryptology—EUROCRYPT’99, 446-458, 1999
Privacy-aware market basket data set generation: A feasible approach for inverse frequent set mining
X Wu, Y Wu, Y Wang, Y Li
Proceedings of the 2005 SIAM International Conference on Data Mining, 103-114, 2005
Resource-bounded balanced genericity, stochasticity and weak randomness
K Ambos-Spies, E Mayordomo, Y Wang, X Zheng
Annual Symposium on Theoretical Aspects of Computer Science, 61-74, 1996
Approximate inverse frequent itemset mining: Privacy, complexity, and approximation
Y Wang, X Wu
Fifth IEEE International Conference on Data Mining (ICDM'05), 8 pp., 2005
Security analysis of a password-based authentication protocol proposed to IEEE 1363
Z Zhao, Z Dong, Y Wang
Theoretical Computer Science 352 (1-3), 280-287, 2006
Quantum resistant random linear code based public key encryption scheme RLCE
Y Wang
2016 IEEE International Symposium on Information Theory (ISIT), 2519-2523, 2016
Privacy preserving database application testing
X Wu, Y Wang, Y Zheng
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society …, 2003
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications
ME Tozal, Y Wang, E Al-Shaer, K Sarac, B Thuraisingham, BT Chu
Mobile Networks and Applications 18 (5), 697-711, 2013
Distribution of protein composition in bread wheat flour mill streams and relationship to breadmaking quality
YG Wang, K Khan, G Hareland, G Nygard
Cereal chemistry 84 (3), 271-275, 2007
Quantitative glutenin composition from gel electrophoresis of flour mill streams and relationship to breadmaking quality
YG Wang, K Khan, G Hareland, G Nygard
Cereal chemistry 83 (3), 293-299, 2006
A complete characterization of tolerable adversary structures for secure point-to-point transmissions without feedback
Y Desmedt, Y Wang, M Burmester
International Symposium on Algorithms and Computation, 277-287, 2005
Notes on two fully homomorphic encryption schemes without bootstrapping
Y Wang
Cryptology ePrint Archive, 2015
The system can't perform the operation now. Try again later.
Articles 1–20