Yongge Wang
Orcid: 0000-0002-1403-2922
According to our database1,
Yongge Wang
authored at least 107 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on jucs.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
BDLS as a Blockchain Finality Gadget: Improving Byzantine Fault Tolerance in Hyperledger Fabric.
IEEE Access, 2024
Securing the Connected World: Fast and Byzantine Fault Tolerant Protocols for IoT, Edge, and Cloud Systems.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024
2022
Distributed Ledger Technol. Res. Pract., 2022
Proceedings of the 3rd International Conference on Mathematical Research for Blockchain Economy, 2022
Proceedings of the Information Security - 25th International Conference, 2022
2021
IACR Cryptol. ePrint Arch., 2021
2020
CoRR, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 6th IEEE International Conference on Dependability in Sensor, 2020
2019
Secur. Commun. Networks, 2019
IT Prof., 2019
IACR Cryptol. ePrint Arch., 2019
Commun. ACM, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the Code-Based Cryptography - 7th International Workshop, 2019
Proceedings of the Codes, Cryptology and Information Security, 2019
2018
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
2017
空间Skyline查询处理: 应用、研究与挑战 (Spatial Skyline Queries: Applications, Research and Challenges).
计算机科学, 2017
Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Scheme.
IACR Cryptol. ePrint Arch., 2017
Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes.
IACR Cryptol. ePrint Arch., 2017
Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Schemes.
CoRR, 2017
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Candidate MDS Array Codes for Tolerating Three Disk Failures in RAID-7 Architectures.
Proceedings of the Fourth IEEE/ACM International Conference on Big Data Computing, 2017
2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
Proceedings of the Intelligent Computing Methodologies - 12th International Conference, 2016
Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes.
Proceedings of the Computer Security - ESORICS 2016, 2016
Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016
2015
IEEE Trans. Cloud Comput., 2015
Adaptive Filter Updating for Energy-Efficient Top-k Queries in Wireless Sensor Networks Using Gaussian Process Regression.
Int. J. Distributed Sens. Networks, 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
On statistical distance based testing of pseudo random sequences and experiments with PHP and Debian OpenSSL.
Comput. Secur., 2015
Asymptotic-Efficient Algorithms for Skyline Query Processing over Uncertain Contexts.
Proceedings of the 19th International Database Engineering & Applications Symposium, 2015
2014
Prediction-Based Filter Updating Policies for Top-k Monitoring Queries in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
Histogram Estimation for Optimal Filter Skyline Query Processing in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 IEEE Information Theory Workshop, 2014
Statistical Properties of Pseudo Random Sequences and Experiments with PHP and Debian OpenSSL.
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Trans. Comput. Sci., 2013
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications.
Mob. Networks Appl., 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013
2012
Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks.
IACR Cryptol. ePrint Arch., 2012
2011
Inf. Process. Lett., 2011
Int. J. Commun. Networks Distributed Syst., 2011
Proceedings of the Information Theoretic Security - 5th International Conference, 2011
2010
Insecure "Provably Secure Network Coding" and Homomorphic Authentication Schemes for Network Coding.
IACR Cryptol. ePrint Arch., 2010
An image reconstruction algorithm based on compressed sensing using conjugate gradient.
Proceedings of the 4th International Universal Communication Symposium, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2009
2008
2007
Fundam. Informaticae, 2007
2006
Theor. Comput. Sci., 2006
A characterization of L<sup>p</sup>(R) by local trigonometric bases with 1<<i>p</i><infinity.
Adv. Comput. Math., 2006
Proceedings of the Critical Information Infrastructures Security, 2006
2005
RFC, April, 2005
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining.
Proceedings of the 2005 SIAM International Conference on Data Mining, 2005
Proceedings of the Foundations of Intelligent Systems, 15th International Symposium, 2005
A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback.
Proceedings of the Algorithms and Computation, 16th International Symposium, 2005
Proceedings of the Ninth International Database Engineering and Applications Symposium (IDEAS 2005), 2005
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 2005
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005
2004
Analyzing Vulnerabilities Of Critical Infrastructures Using Flows And Critical Vertices In And/Or Graphs.
Int. J. Found. Comput. Sci., 2004
IACR Cryptol. ePrint Arch., 2004
Sci. China Ser. F Inf. Sci., 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
2003
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003
Efficient and Secure Storage Systems Based on Peer-to-Peer Systems.
Proceedings of the International Conference on Artificial Intelligence, 2003
A Secure Agent Architecture for Sensor Networks.
Proceedings of the International Conference on Artificial Intelligence, 2003
2002
The algebraic structure of the isomorphic types of tally, polynomial time computable sets.
Arch. Math. Log., 2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002
2001
Math. Log. Q., 2001
Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question.
J. Cryptol., 2001
2000
Fundam. Informaticae, 2000
Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1999
Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question.
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
Proceedings of the Randomization and Approximation Techniques in Computer Science, 1998
1997
1996
Proceedings of the STACS 96, 1996
Proceedings of the Eleveth Annual IEEE Conference on Computational Complexity, 1996