Li-Ping Wang
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Known people with the same name:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Information Security - 27th International Conference, 2024
PROFL: A Privacy-Preserving Federated Learning Method with Stringent Defense Against Poisoning Attacks.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Two-Server Verifiable Federated Learning: Unconditional Security and Practical Efficiency.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
J. Inf. Secur. Appl., December, 2023
Comput. J., December, 2023
J. Inf. Secur. Appl., September, 2023
Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping.
Theor. Comput. Sci., August, 2023
J. Syst. Sci. Complex., June, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
HERMS: A Hierarchical Electronic Records Management System Based on Blockchain with Distributed Key Generation.
Proceedings of the IEEE International Conference on Services Computing, 2022
2021
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
2019
Numerical algorithm to solve generalized fractional pantograph equations with variable coefficients based on shifted Chebyshev polynomials.
Int. J. Comput. Math., 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Cryptogr. Commun., 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
2017
Finite Fields Their Appl., 2017
2016
Partial Bits Exposure Attacks on a New Commitment Scheme Based on the Zagier Polynomial.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
Proceedings of the 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
Appl. Math. Comput., 2014
2012
Lagrange interpolation polynomials and generalized Reed-Solomon codes over rings of matrices.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
2008
A lattice-based linear shift register synthesis for multisequences of varying length.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
2005
Comparative analysis for the <i>N</i> policy M/G/1 queueing system with a removable and unreliable server.
Math. Methods Oper. Res., 2005