Follow
Yongge Wang
Title
Cited by
Cited by
Year
Secure key distribution for the smart grid
J Xia, Y Wang
IEEE Transactions on Smart Grid 3 (3), 1437-1443, 2012
2602012
Recursively enumerable reals and Chaitin O numbers
CS Calude, PH Hertling, B Khoussainov, Y Wang
Theoretical Computer Science 255 (1), 125-150, 2001
1912001
Perfectly secure message transmission revisited
Y Desmedt, Y Wang
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
1362002
Randomness and complexity
Y Wang
BULLETIN-EUROPEAN ASSOCIATION FOR THEORETICAL COMPUTER SCIENCE 62, 347-348, 1997
1231997
Efficient identity-based and authenticated key agreement protocol
Y Wang
Transactions On Computational Science Xvii, 172-197, 2013
1202013
Password protected smart card and memory stick authentication against off-line dictionary attacks
Y Wang
IFIP international information security conference, 489-500, 2012
842012
sSCADA: securing SCADA infrastructure communications
Y Wang
International journal of communication networks and distributed systems 6 (1 …, 2011
81*2011
Perfectly secure message transmission revisited
Y Wang, Y Desmedt
IEEE Transactions on Information Theory 54 (6), 2582-2595, 2008
752008
Quantum resistant random linear code based public key encryption scheme RLCE
Y Wang
2016 IEEE International Symposium on Information Theory (ISIT), 2519-2523, 2016
642016
Secure communication in broadcast channels: the answer to Franklin and Wright’s question
Y Wang, Y Desmedt
Advances in Cryptology—EUROCRYPT’99, 446-458, 1999
64*1999
Privacy-aware market basket data set generation: A feasible approach for inverse frequent set mining
X Wu, Y Wu, Y Wang, Y Li
Proceedings of the 2005 SIAM international conference on data mining, 103-114, 2005
582005
Security analysis of a password-based authentication protocol proposed to IEEE 1363
Z Zhao, Z Dong, Y Wang
Theoretical Computer Science 352 (1-3), 280-287, 2006
572006
Approximate inverse frequent itemset mining: Privacy, complexity, and approximation
Y Wang, X Wu
Fifth IEEE International Conference on Data Mining (ICDM'05), 8 pp., 2005
562005
Resource-bounded balanced genericity, stochasticity and weak randomness
K Ambos-Spies, E Mayordomo, Y Wang, X Zheng
STACS 96: 13th Annual Symposium on Theoretical Aspects of Computer Science …, 1996
551996
Distribution of protein composition in bread wheat flour mill streams and relationship to breadmaking quality
YG Wang, K Khan, G Hareland, G Nygard
Cereal chemistry 84 (3), 271-275, 2007
542007
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications
ME Tozal, Y Wang, E Al-Shaer, K Sarac, B Thuraisingham, BT Chu
Mobile Networks and Applications 18 (5), 697-711, 2013
47*2013
Constructivist approach to information security awareness in the Middle East
M Boujettif, Y Wang
2010 International Conference on Broadband, Wireless Computing …, 2010
452010
Quantitative glutenin composition from gel electrophoresis of flour mill streams and relationship to breadmaking quality
YG Wang, K Khan, G Hareland, G Nygard
Cereal Chemistry 83 (3), 293-299, 2006
432006
Privacy preserving database application testing
X Wu, Y Wang, Y Zheng
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society …, 2003
422003
Notes on two fully homomorphic encryption schemes without bootstrapping
Y Wang
Cryptology ePrint Archive, 2015
402015
The system can't perform the operation now. Try again later.
Articles 1–20