Yongge Wang
Title
Cited by
Cited by
Year
Recursively enumerable reals and Chaitin O numbers
CS Calude, PH Hertling, B Khoussainov, Y Wang
Theoretical Computer Science 255 (1), 125-150, 2001
1762001
Secure key distribution for the smart grid
J Xia, Y Wang
IEEE Transactions on Smart Grid 3 (3), 1437-1443, 2012
1572012
Perfectly secure message transmission revisited
Y Desmedt, Y Wang
International Conference on the Theory and Applications of Cryptographic …, 2002
1292002
Randomness and complexity
Y Wang
1041996
Efficient identity-based and authenticated key agreement protocol
Y Wang
Transactions on Computational Science Xvii, 172-197, 2013
1012013
Password protected smart card and memory stick authentication against off-line dictionary attacks
Y Wang
IFIP international information security conference, 489-500, 2012
672012
sSCADA: securing SCADA infrastructure communications
Y Wang
International journal of communication networks and distributed systems 6 (1 …, 2011
66*2011
Perfectly secure message transmission revisited
Y Wang, Y Desmedt
IEEE Transactions on Information Theory 54 (6), 2582-2595, 2008
612008
Secure communication in broadcast channels: the answer to Franklin and Wright’s question
Y Wang, Y Desmedt
Advances in Cryptology—EUROCRYPT’99, 446-458, 1999
57*1999
Resource-bounded balanced genericity, stochasticity and weak randomness
K Ambos-Spies, E Mayordomo, Y Wang, X Zheng
Annual Symposium on Theoretical Aspects of Computer Science, 61-74, 1996
521996
Privacy-aware market basket data set generation: A feasible approach for inverse frequent set mining
X Wu, Y Wu, Y Wang, Y Li
Proceedings of the 2005 SIAM International Conference on Data Mining, 103-114, 2005
502005
Security analysis of a password-based authentication protocol proposed to IEEE 1363
Z Zhao, Z Dong, Y Wang
Theoretical Computer Science 352 (1-3), 280-287, 2006
472006
Approximate inverse frequent itemset mining: Privacy, complexity, and approximation
Y Wang, X Wu
Fifth IEEE International Conference on Data Mining (ICDM'05), 8 pp., 2005
462005
Quantum resistant random linear code based public key encryption scheme RLCE
Y Wang
2016 IEEE International Symposium on Information Theory (ISIT), 2519-2523, 2016
392016
A complete characterization of tolerable adversary structures for secure point-to-point transmissions without feedback
Y Desmedt, Y Wang, M Burmester
International Symposium on Algorithms and Computation, 277-287, 2005
372005
Distribution of protein composition in bread wheat flour mill streams and relationship to breadmaking quality
YG Wang, K Khan, G Hareland, G Nygard
Cereal chemistry 84 (3), 271-275, 2007
362007
Privacy preserving database application testing
X Wu, Y Wang, Y Zheng
Proceedings of the 2003 ACM workshop on Privacy in the electronic society …, 2003
352003
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications
ME Tozal, Y Wang, E Al-Shaer, K Sarac, B Thuraisingham, BT Chu
Mobile Networks and Applications 18 (5), 697-711, 2013
33*2013
Quantitative glutenin composition from gel electrophoresis of flour mill streams and relationship to breadmaking quality
YG Wang, K Khan, G Hareland, G Nygard
Cereal Chemistry 83 (3), 293-299, 2006
332006
A separation of two randomness concepts
Y Wang
Information Processing Letters 69 (3), 115-118, 1999
321999
The system can't perform the operation now. Try again later.
Articles 1–20