Secure key distribution for the smart grid J Xia, Y Wang IEEE Transactions on Smart Grid 3 (3), 1437-1443, 2012 | 260 | 2012 |
Recursively enumerable reals and Chaitin O numbers CS Calude, PH Hertling, B Khoussainov, Y Wang Theoretical Computer Science 255 (1), 125-150, 2001 | 191 | 2001 |
Perfectly secure message transmission revisited Y Desmedt, Y Wang Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002 | 136 | 2002 |
Randomness and complexity Y Wang BULLETIN-EUROPEAN ASSOCIATION FOR THEORETICAL COMPUTER SCIENCE 62, 347-348, 1997 | 123 | 1997 |
Efficient identity-based and authenticated key agreement protocol Y Wang Transactions On Computational Science Xvii, 172-197, 2013 | 120 | 2013 |
Password protected smart card and memory stick authentication against off-line dictionary attacks Y Wang IFIP international information security conference, 489-500, 2012 | 84 | 2012 |
sSCADA: securing SCADA infrastructure communications Y Wang International journal of communication networks and distributed systems 6 (1 …, 2011 | 81* | 2011 |
Perfectly secure message transmission revisited Y Wang, Y Desmedt IEEE Transactions on Information Theory 54 (6), 2582-2595, 2008 | 75 | 2008 |
Quantum resistant random linear code based public key encryption scheme RLCE Y Wang 2016 IEEE International Symposium on Information Theory (ISIT), 2519-2523, 2016 | 64 | 2016 |
Secure communication in broadcast channels: the answer to Franklin and Wright’s question Y Wang, Y Desmedt Advances in Cryptology—EUROCRYPT’99, 446-458, 1999 | 64* | 1999 |
Privacy-aware market basket data set generation: A feasible approach for inverse frequent set mining X Wu, Y Wu, Y Wang, Y Li Proceedings of the 2005 SIAM international conference on data mining, 103-114, 2005 | 58 | 2005 |
Security analysis of a password-based authentication protocol proposed to IEEE 1363 Z Zhao, Z Dong, Y Wang Theoretical Computer Science 352 (1-3), 280-287, 2006 | 57 | 2006 |
Approximate inverse frequent itemset mining: Privacy, complexity, and approximation Y Wang, X Wu Fifth IEEE International Conference on Data Mining (ICDM'05), 8 pp., 2005 | 56 | 2005 |
Resource-bounded balanced genericity, stochasticity and weak randomness K Ambos-Spies, E Mayordomo, Y Wang, X Zheng STACS 96: 13th Annual Symposium on Theoretical Aspects of Computer Science …, 1996 | 55 | 1996 |
Distribution of protein composition in bread wheat flour mill streams and relationship to breadmaking quality YG Wang, K Khan, G Hareland, G Nygard Cereal chemistry 84 (3), 271-275, 2007 | 54 | 2007 |
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications ME Tozal, Y Wang, E Al-Shaer, K Sarac, B Thuraisingham, BT Chu Mobile Networks and Applications 18 (5), 697-711, 2013 | 47* | 2013 |
Constructivist approach to information security awareness in the Middle East M Boujettif, Y Wang 2010 International Conference on Broadband, Wireless Computing …, 2010 | 45 | 2010 |
Quantitative glutenin composition from gel electrophoresis of flour mill streams and relationship to breadmaking quality YG Wang, K Khan, G Hareland, G Nygard Cereal Chemistry 83 (3), 293-299, 2006 | 43 | 2006 |
Privacy preserving database application testing X Wu, Y Wang, Y Zheng Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society …, 2003 | 42 | 2003 |
Notes on two fully homomorphic encryption schemes without bootstrapping Y Wang Cryptology ePrint Archive, 2015 | 40 | 2015 |