Follow
Yongge Wang
Title
Cited by
Cited by
Year
Secure key distribution for the smart grid
J Xia, Y Wang
IEEE Transactions on Smart Grid 3 (3), 1437-1443, 2012
2222012
Recursively enumerable reals and Chaitin O numbers
CS Calude, PH Hertling, B Khoussainov, Y Wang
Theoretical Computer Science 255 (1), 125-150, 2001
179*2001
Perfectly secure message transmission revisited
Y Desmedt, Y Wang
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
1322002
Randomness and complexity
Y Wang
BULLETIN-EUROPEAN ASSOCIATION FOR THEORETICAL COMPUTER SCIENCE 62, 347-348, 1997
1221997
Efficient Identity-Based and Authenticated Key Agreement Protocol.
Y Wang
Trans. Comput. Sci. 17, 172-197, 2013
1162013
Password protected smart card and memory stick authentication against off-line dictionary attacks
Y Wang
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
782012
sSCADA: securing SCADA infrastructure communications
Y Wang
International journal of communication networks and distributed systems 6 (1 …, 2011
75*2011
Perfectly secure message transmission revisited
Y Wang, Y Desmedt
IEEE Transactions on Information Theory 54 (6), 2582-2595, 2008
692008
Secure communication in broadcast channels: the answer to Franklin and Wright’s question
Y Wang, Y Desmedt
Advances in Cryptology—EUROCRYPT’99, 446-458, 1999
64*1999
Privacy-aware market basket data set generation: A feasible approach for inverse frequent set mining
X Wu, Y Wu, Y Wang, Y Li
Proceedings of the 2005 SIAM international conference on data mining, 103-114, 2005
582005
Quantum resistant random linear code based public key encryption scheme RLCE
Y Wang
2016 IEEE International Symposium on Information Theory (ISIT), 2519-2523, 2016
552016
Resource-bounded balanced genericity, stochasticity and weak randomness
K Ambos-Spies, E Mayordomo, Y Wang, X Zheng
STACS 96: 13th Annual Symposium on Theoretical Aspects of Computer Science …, 1996
551996
Approximate inverse frequent itemset mining: Privacy, complexity, and approximation
Y Wang, X Wu
Fifth IEEE International Conference on Data Mining (ICDM'05), 8 pp., 2005
542005
Security analysis of a password-based authentication protocol proposed to IEEE 1363
Z Zhao, Z Dong, Y Wang
Theoretical Computer Science 352 (1-3), 280-287, 2006
522006
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications
ME Tozal, Y Wang, E Al-Shaer, K Sarac, B Thuraisingham, BT Chu
Mobile Networks and Applications 18 (5), 697-711, 2013
44*2013
Quantitative glutenin composition from gel electrophoresis of flour mill streams and relationship to breadmaking quality
YG Wang, K Khan, G Hareland, G Nygard
Cereal Chemistry 83 (3), 293-299, 2006
422006
Privacy preserving database application testing
X Wu, Y Wang, Y Zheng
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society …, 2003
412003
Distribution of protein composition in bread wheat flour mill streams and relationship to breadmaking quality
YG Wang, K Khan, G Hareland, G Nygard
Cereal chemistry 84 (3), 271-275, 2007
392007
A complete characterization of tolerable adversary structures for secure point-to-point transmissions without feedback
Y Desmedt, Y Wang, M Burmester
Algorithms and Computation: 16th International Symposium, ISAAC 2005, Sanya …, 2005
382005
Notes on two fully homomorphic encryption schemes without bootstrapping
Y Wang
Cryptology ePrint Archive, 2015
372015
The system can't perform the operation now. Try again later.
Articles 1–20