Yongge Wang
Cited by
Cited by
Secure key distribution for the smart grid
J Xia, Y Wang
IEEE Transactions on Smart Grid 3 (3), 1437-1443, 2012
Recursively enumerable reals and Chaitin O numbers
CS Calude, PH Hertling, B Khoussainov, Y Wang
Theoretical Computer Science 255 (1), 125-150, 2001
Perfectly secure message transmission revisited
Y Desmedt, Y Wang
International Conference on the Theory and Applications of Cryptographic …, 2002
Randomness and complexity
Y Wang
Efficient identity-based and authenticated key agreement protocol
Y Wang
Transactions On Computational Science Xvii, 172-197, 2013
Password protected smart card and memory stick authentication against off-line dictionary attacks
Y Wang
IFIP international information security conference, 489-500, 2012
sSCADA: securing SCADA infrastructure communications
Y Wang
arXiv preprint arXiv:1207.5434, 2012
Perfectly secure message transmission revisited
Y Wang, Y Desmedt
IEEE Transactions on Information Theory 54 (6), 2582-2595, 2008
Secure communication in broadcast channels: the answer to Franklin and Wright’s question
Y Wang, Y Desmedt
Advances in Cryptology—EUROCRYPT’99, 446-458, 1999
Privacy-aware market basket data set generation: A feasible approach for inverse frequent set mining
X Wu, Y Wu, Y Wang, Y Li
Proceedings of the 2005 SIAM international conference on data mining, 103-114, 2005
Resource-bounded balanced genericity, stochasticity and weak randomness
K Ambos-Spies, E Mayordomo, Y Wang, X Zheng
Annual Symposium on Theoretical Aspects of Computer Science, 61-74, 1996
Approximate inverse frequent itemset mining: Privacy, complexity, and approximation
Y Wang, X Wu
Fifth IEEE International Conference on Data Mining (ICDM'05), 8 pp., 2005
Security analysis of a password-based authentication protocol proposed to IEEE 1363
Z Zhao, Z Dong, Y Wang
Theoretical Computer Science 352 (1-3), 280-287, 2006
Quantum resistant random linear code based public key encryption scheme RLCE
Y Wang
2016 IEEE International Symposium on Information Theory (ISIT), 2519-2523, 2016
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications
ME Tozal, Y Wang, E Al-Shaer, K Sarac, B Thuraisingham, BT Chu
Mobile Networks and Applications 18 (5), 697-711, 2013
Privacy preserving database application testing
X Wu, Y Wang, Y Zheng
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society …, 2003
Quantitative glutenin composition from gel electrophoresis of flour mill streams and relationship to breadmaking quality
YG Wang, K Khan, G Hareland, G Nygard
Cereal chemistry 83 (3), 293-299, 2006
Distribution of protein composition in bread wheat flour mill streams and relationship to breadmaking quality
YG Wang, K Khan, G Hareland, G Nygard
Cereal chemistry 84 (3), 271-275, 2007
A complete characterization of tolerable adversary structures for secure point-to-point transmissions without feedback
Y Desmedt, Y Wang, M Burmester
International Symposium on Algorithms and Computation, 277-287, 2005
Constructivist approach to information security awareness in the Middle East
M Boujettif, Y Wang
2010 International Conference on Broadband, Wireless Computing …, 2010
The system can't perform the operation now. Try again later.
Articles 1–20