default search action
Yumin Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j56]Yiming Guo, Lei-Lei Qiu, Lianwen Deng, Yueyang Wu, Yumin Wang, Shengxiang Huang:
Signal-interference-based quasi-reflectionless bandpass filter for wideband and high-selectivity. Int. J. Circuit Theory Appl. 52(7): 3144-3153 (2024) - 2023
- [j55]Xiren Zhou, Shikang Liu, Ao Chen, Qiuju Chen, Fang Xiong, Yumin Wang, Huanhuan Chen:
Underground Anomaly Detection in GPR Data by Learning in the C3 Model Space. IEEE Trans. Geosci. Remote. Sens. 61: 1-11 (2023) - [c59]Yumin Wang, Jinhao Xie, Wenqi Zhang, Yuan Yao, Gang Yang:
Research on Improved Algorithm of UAV Swarm Target Search Strategy Based on Freshness and Target Density. QRS Companion 2023: 626-632 - 2022
- [j54]Yumin Wang, Hanzhou Wu:
Protecting the Intellectual Property of Speaker Recognition Model by Black-Box Watermarking in the Frequency Domain. Symmetry 14(3): 619 (2022) - 2021
- [c58]Yumin Wang, Jingyu Ye, Hanzhou Wu:
Generating Watermarked Speech Adversarial Examples. ACM TUR-C 2021: 254-260 - [c57]Yumin Wang, Yichi Zhang:
The Teaching System of IT Support Course Group of Economics and Management Majors Based on Big Data Technology. CSIA (1) 2021: 502-509 - [c56]Yumin Wang, Nientsu Wang:
Factors Affectting Customer's Behavior Intention. IPEC 2021: 108-112
2010 – 2019
- 2019
- [j53]Chun Lu, Lijuan Chen, Yumin Wang, Shan Gao:
The threshold of stochastic Gilpin-Ayala model subject to general Lévy jumps. J. Appl. Math. Comput. 60(1-2): 731-747 (2019) - [j52]Fei Kong, Jiangbo Li, Yumin Wang:
Human-computer interactive teaching model based on fuzzy set and BP neural network. J. Intell. Fuzzy Syst. 37(1): 103-113 (2019) - [j51]Jiangbo Li, Yumin Wang:
Coupling effect of regional industrial cluster and innovation based on complex system metric and fuzzy mathematics. J. Intell. Fuzzy Syst. 37(5): 6115-6126 (2019) - [j50]Fei Kong, Yumin Wang:
Design of computer interactive system for sports training based on artificial intelligence and improved support vector. J. Intell. Fuzzy Syst. 37(5): 6165-6175 (2019) - [c55]Weijian Ran, Xin Tian, Yumin Wang:
Health Risk Assessment Model of Drinking Water Sources Based on Combination of Bayesian and Triangle Fuzzy Number. ICAIP 2019: 175-179 - 2018
- [j49]Yang Ming, Yumin Wang:
Certificateless Proxy Signature Scheme in the Standard Model. Fundam. Informaticae 160(4): 409-445 (2018) - 2017
- [j48]Liaojun Pang, Yufei Hu, Xia Zhou, Yumin Wang, Huixian Li:
Directed proxy signature with fast revocation proven secure in the standard model. IET Inf. Secur. 11(3): 168-176 (2017) - 2016
- [j47]Yang Ming, Yumin Wang:
Identity based broadcast encryption with group of prime order. Int. Arab J. Inf. Technol. 13(5): 531-541 (2016) - [j46]Wujun Zhang, Shunrong Jiang, Xiaoyan Zhu, Yumin Wang:
Cooperative downloading with privacy preservation and access control for value-added services in VANETs. Int. J. Grid Util. Comput. 7(1): 50-60 (2016) - [j45]Yang Ming, Yumin Wang:
Cryptanalysis of an Identity Based Signcryption Scheme in the Standard Model. Int. J. Netw. Secur. 18(1): 165-171 (2016) - 2015
- [j44]Liaojun Pang, Lu Gao, Huixian Li, Yumin Wang:
Anonymous multi-receiver ID-based signcryption scheme. IET Inf. Secur. 9(3): 194-201 (2015) - [j43]Wujun Zhang, Xiaohui Wang, Yunya Zhou, Hua Deng, Yumin Wang:
A GAA-based batch authentication and key agreement for LTE networks. Int. J. Embed. Syst. 7(3/4): 289-295 (2015) - [j42]Yang Ming, Yumin Wang:
On the Security of Three Public Auditing Schemes in Cloud Computing. Int. J. Netw. Secur. 17(6): 795-802 (2015) - [j41]Yang Ming, Yumin Wang:
Proxy signcryption scheme in the standard model. Secur. Commun. Networks 8(8): 1431-1446 (2015) - 2014
- [j40]Liaojun Pang, Huixian Li, Li-wei He, Ali Alramadhan, Yumin Wang:
Secure and efficient lightweight RFID authentication protocol based on fast tag indexing. Int. J. Commun. Syst. 27(11): 3244-3254 (2014) - [j39]Xi Sun, Haibo Tian, Yumin Wang:
Toward quantum-resistant strong designated verifier signature. Int. J. Grid Util. Comput. 5(2): 80-86 (2014) - [j38]Xi Sun, Zhengtao Jiang, Meirong Zhou, Yumin Wang:
Versatile identity-based signatures for authentication in multi-user settings. Int. J. Grid Util. Comput. 5(3): 156-164 (2014) - 2013
- [j37]Wujun Zhang, Yueyu Zhang, Jie Chen, Hui Li, Yumin Wang:
End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture. Clust. Comput. 16(4): 861-871 (2013) - [j36]Yuelei Xiao, Yumin Wang, Liaojun Pang, Shichong Tan:
A Trusted Network Access Protocol for WLAN Mesh Networks. IEICE Trans. Inf. Syst. 96-D(12): 2865-2869 (2013) - [j35]Liaojun Pang, Huixian Li, Qingqi Pei, Yumin Wang:
Improvement on Meshram et al.'s ID-based cryptographic mechanism. Inf. Process. Lett. 113(19-21): 789-792 (2013) - [c54]Jiangyu Li, Yang Liu, Xiaolei Wang, Yiqing Mao, Yumin Wang, Dongsheng Zhao:
Hadoop-RINS - A Hadoop Accelerated Pipeline for Rapid Nonhuman Sequence Identification. BIOINFORMATICS 2013: 296-299 - [c53]Wujun Zhang, Shunrong Jiang, Xiaoyan Zhu, Yumin Wang:
Privacy-Preserving Cooperative Downloading for Value-Added Services in VANETs. INCoS 2013: 358-362 - [c52]Liaojun Pang, Liwei He, Qingqi Pei, Yumin Wang:
Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard. WCNC 2013: 1870-1875 - 2012
- [j34]Yuelei Xiao, Yumin Wang, Liaojun Pang:
Verification of Trusted Network Access Protocols in the Strand Space Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(3): 665-668 (2012) - [j33]Deqiao Tian, Yunzhou Yu, Yumin Wang, Tao Zheng:
Comparison of trends in the quantity and variety of Science Citation Index (SCI) literature on human pathogens between China and the United States. Scientometrics 93(3): 1019-1027 (2012) - [c51]Xi Sun, Haibo Tian, Yumin Wang:
Toward Quantum-Resistant Strong Designated Verifier Signature from Isogenies. INCoS 2012: 292-296 - [c50]Xi Sun, Zhengtao Jiang, Meirong Zhou, Yumin Wang:
An Efficient Probably CP-CM-Secure Identity-Based Signature Scheme Applicable to Authentication in Multiuser Settings. INCoS 2012: 318-322 - [c49]Wujun Zhang, Yueyu Zhang, Jie Chen, Hui Li, Yumin Wang:
End-to-End Security Scheme for Machine Type Communication Based on Generic Authentication Architecture. INCoS 2012: 353-359 - 2011
- [j32]Zhuo Jin, Yumin Wang, Gang George Yin:
Numerical solutions of quantile hedging for guaranteed minimum death benefits under a regime-switching jump-diffusion formulation. J. Comput. Appl. Math. 235(8): 2842-2860 (2011) - [c48]Yang Ming, Xiangmo Zhao, Yumin Wang:
Multi-receiver Identity-Based Signcryption Scheme in the Standard Model. ICICA (LNCS) 2011: 487-494 - 2010
- [j31]Xiaoyan Zhu, Yuguang Fang, Yumin Wang:
How to secure multi-domain wireless mesh networks. Wirel. Networks 16(5): 1215-1222 (2010) - [c47]Yang Ming, Yumin Wang:
Improved Identity Based Online/Offline Signature Scheme. UIC/ATC Workshops 2010: 126-131
2000 – 2009
- 2009
- [j30]Zhengtao Jiang, Yongbin Wang, Yong Wang, Yumin Wang:
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model. Intell. Inf. Manag. 1(1): 6-13 (2009) - [j29]Yang Ming, Yumin Wang:
An Efficient Verifiably Encrypted Signature Scheme without Random Oracles. Int. J. Netw. Secur. 8(2): 125-130 (2009) - [j28]Xiaoyan Zhu, Pan Li, Yuguang Fang, Yumin Wang:
Throughput and Delay in Cooperative Wireless Networks With Partial Infrastructure. IEEE Trans. Veh. Technol. 58(8): 4620-4627 (2009) - [j27]Xiaoyan Zhu, Hao Yue, Yuguang Fang, Yumin Wang:
A batched network coding scheme for wireless networks. Wirel. Networks 15(8): 1152-1164 (2009) - [c46]Yang Zhan, Haibo Tian, Qingqi Pei, Yueyu Zhang, Yumin Wang, Weidong Zhang:
A Deep Copy Protection Framework for Electronic Devices within Home. IAS 2009: 23-26 - [c45]Yang Ming, Yumin Wang:
Efficient Certificate-Based Signature Scheme. IAS 2009: 87-90 - [c44]Xiaoyan Zhu, Hao Yue, Yumin Wang:
C and M: A New Network Coding Scheme for Wireless Networks. IAS 2009: 432-436 - [c43]Hui Zhu, Hui Li, Yumin Wang:
An Efficient Fast Authentication Protocol. CIS (2) 2009: 222-225 - [c42]Shichong Tan, Hui Zhu, Yumin Wang:
Some Notes on Password Authenticated Key Exchange Based on RSA. CIS (2) 2009: 580-583 - 2008
- [j26]Jingliang Zhang, Lizhen Ma, Rong Sun, Yumin Wang:
More Efficient VLR Group Signature Satisfying Exculpability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(7): 1831-1835 (2008) - [j25]Haibo Tian, Willy Susilo, Yang Ming, Yumin Wang:
A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles. J. Comput. Sci. Technol. 23(5): 832-842 (2008) - [c41]Ying Wang, Xinjun Du, Hui Li, Yumin Wang:
The Design of Optimal Period Interleaver. AINA Workshops 2008: 413-415 - [c40]Liaojun Pang, Huixian Li, Ye Yao, Yumin Wang:
A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses. ISECS 2008: 22-26 - 2007
- [j24]Shuhai Li, Yumin Wang:
Exploiting randomness on continuous sets. Inf. Sci. 177(1): 192-201 (2007) - [j23]Haibo Tian, Xi Sun, Yumin Wang:
A New Public-Key Encryption Scheme. J. Comput. Sci. Technol. 22(1): 95-102 (2007) - [j22]Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang, Zhengtao Jiang:
Short Group Signatures Without Random Oracles. J. Comput. Sci. Technol. 22(6): 805-821 (2007) - [c39]Jingliang Zhang, Lizhen Ma, Yumin Wang:
Dynamic Fair Electronic Cash Model without Trustees. I3E (1) 2007: 259-264 - [c38]Lin-hui Zhao, Yumin Wang, Jing Xiao, Ya-Ping Dai, Fang-yan Dong, Hai-le Liu:
A Three-Level-Module Adaptive Intrusion Detection System. ICNSC 2007: 840-845 - [i9]Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang:
Group Decryption. IACR Cryptol. ePrint Arch. 2007: 17 (2007) - 2006
- [j21]Zhenjie Huang, Kefei Chen, Yumin Wang:
Provably Secure Convertible User Designating Confirmer Partially Blind Signatures. Informatica 17(3): 347-362 (2006) - [c37]Yi Liu, Ling Zhang, Yumin Wang:
Improved Secret Sharing with Access Structures in a Hierarchy. APSCC 2006: 18-25 - [c36]Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang:
Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). ATC 2006: 531-540 - [c35]Haibo Tian, Yumin Wang:
Security Analysis of the Digital Transmission Copy Protection Specification. Security and Management 2006: 134-137 - [c34]Xinxin Fan, Thomas J. Wollinger, Yumin Wang:
Efficient Doubling on Genus 3 Curves over Binary Fields. CT-RSA 2006: 64-81 - [i8]Zhenjie Huang, Kefei Chen, Yumin Wang:
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes. IACR Cryptol. ePrint Arch. 2006: 353 (2006) - 2005
- [j20]Jianhong Zhang, Yumin Wang:
On the security of Miyaji et al. group signature scheme. Appl. Math. Comput. 167(2): 1373-1382 (2005) - [j19]Zhengtao Jiang, Xi Sun, Yumin Wang:
Security analysis and improvement of a double-trapdoor encryption scheme. Appl. Math. Comput. 169(1): 41-50 (2005) - [j18]Zhengtao Jiang, Mingsen Xiang, Yumin Wang:
A research on new public-key encryption schemes. Appl. Math. Comput. 169(1): 51-61 (2005) - [j17]Jianhong Zhang, Yumin Wang:
On the security of a convertible authenticated encryption. Appl. Math. Comput. 169(2): 1063-1069 (2005) - [j16]Jianhong Zhang, Yumin Wang:
Two provably secure k-out-of-n oblivious transfer schemes. Appl. Math. Comput. 169(2): 1211-1220 (2005) - [j15]Jianhong Zhang, Yumin Wang:
An improved signature scheme without using one-way Hash functions. Appl. Math. Comput. 170(2): 905-908 (2005) - [j14]Zhengtao Jiang, Yang Zhan, Dan Chen, Yumin Wang:
Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences. Appl. Math. Comput. 171(2): 900-911 (2005) - [j13]Changjie Wang, Ho-fung Leung, Shing-Chi Cheung, Yumin Wang:
Use of cryptographic technologies for privacy protection of watermarks in internet retails of digital contents. Int. J. High Perform. Comput. Netw. 3(5/6): 385-394 (2005) - [j12]Jianhong Zhang, Wei Zou, Dan Chen, Yumin Wang:
On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key. Informatica (Slovenia) 29(3): 243-346 (2005) - [j11]Jianhong Zhang, Qianhong Wu, Yumin Wang:
A New Efficient Group Signature With Forward Security. Informatica (Slovenia) 29(3): 321-326 (2005) - [j10]Qianhong Wu, Bo Qin, Yumin Wang:
Extended Methodology of RS Design and Instances Based on GIP. J. Comput. Sci. Technol. 20(2): 270-275 (2005) - [j9]Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang:
An ID-based broadcast encryption scheme for key distribution. IEEE Trans. Broadcast. 51(2): 264-266 (2005) - [j8]Haibo Tian, Yang Zhan, Yumin Wang:
Analysis of host authentication mechanism in current POD copy protection system. IEEE Trans. Consumer Electron. 51(3): 922-924 (2005) - [c33]Zhenjie Huang, Dan Chen, Yumin Wang:
Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environments. AINA 2005: 67-71 - [c32]Zhenjie Huang, Zhixiong Chen, Yumin Wang:
Convertible Undeniable Partially Blind Signatures. AINA 2005: 609-614 - [c31]Xinxin Fan, Yumin Wang:
Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem. AINA 2005: 978-983 - [c30]Zhenjie Huang, Kefei Chen, Yumin Wang:
Efficient Identity-Based Signatures and Blind Signatures. CANS 2005: 120-133 - [c29]Haibo Tian, Xi Sun, Yumin Wang:
A Virtual Bridge Certificate Authority Model. CIS (2) 2005: 500-507 - [c28]Qiang Lei, Zhengtao Jiang, Yumin Wang:
Ring-Based Anonymous Fingerprinting Scheme. CIS (2) 2005: 1080-1085 - [c27]Jianhong Zhang, Jiancheng Zou, Yumin Wang:
A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents. ICCNMC 2005: 836-844 - [c26]Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen, Yumin Wang:
t-Out-of-n String/Bit Oblivious Transfers Revisited. ISPEC 2005: 410-421 - [c25]Xinxin Fan, Thomas J. Wollinger, Yumin Wang:
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations. ITCC (1) 2005: 642-647 - [c24]Jianhong Zhang, Jiancheng Zou, Yumin Wang:
An Improved Group Signature Scheme. TrustBus 2005: 185-194 - [i7]Xinxin Fan, Thomas J. Wollinger, Yumin Wang:
Efficient Doubling on Genus 3 Curves over Binary Fields. IACR Cryptol. ePrint Arch. 2005: 228 (2005) - 2004
- [j7]Jianhong Zhang, Qianhong Wu, Yumin Wang:
A New Efficient Group Signature With Forward Security. Informatica (Slovenia) 28(2): 153-157 (2004) - [c23]Zhenjie Huang, Yumin Wang:
Convertible Nominative Signatures. ACISP 2004: 348-357 - [c22]Jianhong Zhang, Qianhong Wu, Jilin Wang, Yumin Wang:
An Improved Nominative Proxy Signature Scheme for Mobile Communication. AINA (2) 2004: 23-26 - [c21]Zewen Chen, Jiwu Huang, Daren Huang, Jianhong Zhang, Yumin Wang:
Provably Secure and ID-Based Group Signature Scheme. AINA (2) 2004: 384-388 - [c20]Changjie Wang, Ho-fung Leung, Shing-Chi Cheung, Yumin Wang:
Use of Cryptographic Technologies for Privacy Protection of Watermarks in Internet Retails of Digital Contents. AINA (1) 2004: 414-419 - [c19]Qianhong Wu, Changjie Wang, Xiaofeng Chen, Yumin Wang:
Publicly Verifiable Auctions with Minimal Leakage. COMPSAC 2004: 384-389 - [c18]Zan Li, Yilin Chang, Weidong Kou, Lijun Jin, Yumin Wang:
A family of FH sequences based on 3DES block cipher for FHMA communications. ICC 2004: 311-315 - [c17]Qianhong Wu, Bo Qin, Yumin Wang:
How to conduct a sealed bargain on the internet. InfoSecu 2004: 130-135 - [c16]Qianhong Wu, Xiaofeng Chen, Changjie Wang, Yumin Wang:
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. ISC 2004: 330-341 - [i6]Xinxin Fan, Yumin Wang:
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves. IACR Cryptol. ePrint Arch. 2004: 223 (2004) - 2003
- [j6]Changjie Wang, Fangguo Zhang, Yumin Wang:
Secure Web Transaction with Anonymous Mobile Agent over Internet. J. Comput. Sci. Technol. 18(1): 84-89 (2003) - [c15]Changjie Wang, Xiaofeng Chen, Yumin Wang:
An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids. AINA 2003: 194-197 - [c14]Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang:
A Method for Security Enhancements in AODV Protocol . AINA 2003: 237-240 - [c13]Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang:
A Group Key Establishment Scheme for Ad Hoc Networks. AINA 2003: 518-520 - [c12]Xiaofeng Chen, Fei Feng, Yumin Wang:
New Key Improvements and Its Application to XTR System. AINA 2003: 561-564 - [c11]Qianhong Wu, Jianhong Zhang, Yumin Wang:
Practical t-out-n Oblivious Transfer and Its Applications. ICICS 2003: 226-237 - [c10]Jianhong Zhang, Qianhong Wu, Yumin Wang:
A Novel Efficient Group Signature Scheme with Forward Security. ICICS 2003: 292-300 - [c9]Changjie Wang, Ho-fung Leung, Yumin Wang:
Secure Double Auction Protocols with Full Privacy Protection. ICISC 2003: 215-229 - [c8]Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang:
An Efficient Revocation Algorithm in Group Signatures. ICISC 2003: 339-351 - [c7]Jianhong Zhang, Xiaofeng Chen, Yumin Wang:
Security analysis of the improved group signature. ITW 2003: 171-174 - [i5]Xiaofeng Chen, Fangguo Zhang, Yumin Wang:
A New Approach to Prevent Blackmailing in E-Cash. IACR Cryptol. ePrint Arch. 2003: 55 (2003) - [i4]Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang:
Chameleon Signature from Bilinear Pairing. IACR Cryptol. ePrint Arch. 2003: 238 (2003) - [i3]Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang:
ID-based Authenticated Two Round Multi-Party Key Agreement. IACR Cryptol. ePrint Arch. 2003: 247 (2003) - [i2]Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang:
An Improved ID-based Authenticated Group Key Agreement Scheme. IACR Cryptol. ePrint Arch. 2003: 260 (2003) - 2002
- [j5]Changjie Wang, Fangguo Zhang, Yumin Wang:
SAWT: A New System for Secure and Anonymous Web Transactions over the Internet. J. Res. Pract. Inf. Technol. 34(1): 34-46 (2002) - [j4]Changjie Wang, Yumin Wang, Fangguo Zhang:
An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet. Informatica (Slovenia) 26(3) (2002) - [j3]Xiaofeng Chen, Changjie Wang, Yumin Wang:
Fair Electronic Cash Based on Double Signatur. J. Comput. Sci. Technol. 17(6): 830-835 (2002) - [j2]Fangguo Zhang, Futai Zhang, Yumin Wang:
Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield. J. Comput. Sci. Technol. 17(6): 836-842 (2002) - [j1]Bo Yang, Liu Dongsu, Yumin Wang:
An anonymity-revoking e-payment system with a smart card. Int. J. Digit. Libr. 3(4): 291-296 (2002) - [i1]Jianhong Zhang, Jilin Wang, Yumin Wang:
two attacks on xia-you Group Signature. IACR Cryptol. ePrint Arch. 2002: 177 (2002) - 2001
- [c6]Bo Yang, Shixiong Zhu, Yumin Wang:
Unconditionally-Secure Oblivious Transfer. ICICS 2001: 35-41 - [c5]Fangguo Zhang, Futai Zhang, Yumin Wang:
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves. ICICS 2001: 74-83 - 2000
- [c4]Fangguo Zhang, Futai Zhang, Yumin Wang:
Fair Electronic Cash Systems with Multiple Banks. SEC 2000: 461-470
1990 – 1999
- 1999
- [c3]Shengli Liu, Yumin Wang:
An Authetnication Scheme over Non-Authentic Public Channel in Information-Theoretic Secret-Key Agreement. AAECC 1999: 294-301 - 1996
- [c2]Jianwei Liu, Yumin Wang:
Authentication of mobile users in personal communication system. PIMRC 1996: 1239-1242 - 1995
- [c1]Jianwei Liu, Yumin Wang:
A user authentication protocol for digital mobile communication network. PIMRC 1995: 608-612
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint