Follow
Yongge Wang
Title
Cited by
Cited by
Year
Secure key distribution for the smart grid
J Xia, Y Wang
IEEE Transactions on Smart Grid 3 (3), 1437-1443, 2012
2042012
Recursively enumerable reals and Chaitin O numbers
CS Calude, PH Hertling, B Khoussainov, Y Wang
Theoretical Computer Science 255 (1), 125-150, 2001
1782001
Perfectly secure message transmission revisited
Y Desmedt, Y Wang
International Conference on the Theory and Applications of Cryptographic …, 2002
1302002
Randomness and complexity
Y Wang
1201996
Efficient identity-based and authenticated key agreement protocol
Y Wang
Transactions On Computational Science Xvii, 172-197, 2013
1162013
Password protected smart card and memory stick authentication against off-line dictionary attacks
Y Wang
IFIP international information security conference, 489-500, 2012
762012
sSCADA: securing SCADA infrastructure communications
Y Wang
arXiv preprint arXiv:1207.5434, 2012
72*2012
Perfectly secure message transmission revisited
Y Wang, Y Desmedt
IEEE Transactions on Information Theory 54 (6), 2582-2595, 2008
642008
Secure communication in broadcast channels: the answer to Franklin and Wright’s question
Y Wang, Y Desmedt
Advances in Cryptology—EUROCRYPT’99, 446-458, 1999
62*1999
Privacy-aware market basket data set generation: A feasible approach for inverse frequent set mining
X Wu, Y Wu, Y Wang, Y Li
Proceedings of the 2005 SIAM international conference on data mining, 103-114, 2005
562005
Resource-bounded balanced genericity, stochasticity and weak randomness
K Ambos-Spies, E Mayordomo, Y Wang, X Zheng
Annual Symposium on Theoretical Aspects of Computer Science, 61-74, 1996
551996
Approximate inverse frequent itemset mining: Privacy, complexity, and approximation
Y Wang, X Wu
Fifth IEEE International Conference on Data Mining (ICDM'05), 8 pp., 2005
532005
Security analysis of a password-based authentication protocol proposed to IEEE 1363
Z Zhao, Z Dong, Y Wang
Theoretical Computer Science 352 (1-3), 280-287, 2006
502006
Quantum resistant random linear code based public key encryption scheme RLCE
Y Wang
2016 IEEE International Symposium on Information Theory (ISIT), 2519-2523, 2016
482016
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications
ME Tozal, Y Wang, E Al-Shaer, K Sarac, B Thuraisingham, BT Chu
Mobile Networks and Applications 18 (5), 697-711, 2013
41*2013
Privacy preserving database application testing
X Wu, Y Wang, Y Zheng
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society …, 2003
412003
Quantitative glutenin composition from gel electrophoresis of flour mill streams and relationship to breadmaking quality
YG Wang, K Khan, G Hareland, G Nygard
Cereal chemistry 83 (3), 293-299, 2006
402006
Distribution of protein composition in bread wheat flour mill streams and relationship to breadmaking quality
YG Wang, K Khan, G Hareland, G Nygard
Cereal chemistry 84 (3), 271-275, 2007
382007
A complete characterization of tolerable adversary structures for secure point-to-point transmissions without feedback
Y Desmedt, Y Wang, M Burmester
International Symposium on Algorithms and Computation, 277-287, 2005
372005
Constructivist approach to information security awareness in the Middle East
M Boujettif, Y Wang
2010 International Conference on Broadband, Wireless Computing …, 2010
352010
The system can't perform the operation now. Try again later.
Articles 1–20