Yuliang Zheng
Orcid: 0000-0002-9815-9727Affiliations:
- University of Alabama at Birmingham, AB, USA
- University of North Carolina at Charlotte, NC, USA (former)
- Monash University, Melbourne, VIC, Australia (former)
- University of Wollongong , NSW, Australia (former)
According to our database1,
Yuliang Zheng
authored at least 139 papers
between 1989 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on sis.uncc.edu
-
on dl.acm.org
On csauthors.net:
Bibliography
2023
A Blockchain Design Supporting Verifiable Reputation-based Selection of Committee Members and IPFS for Storage.
Proceedings of the 20th International Conference on Software Architecture, 2023
2021
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021
2020
Proceedings of the National Cyber Summit (NCS) Research Track 2020, 2020
2018
IACR Cryptol. ePrint Arch., 2018
2015
An ID-based signcryption scheme with compartmented secret sharing for unsigncryption.
Inf. Process. Lett., 2015
Int. J. Found. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
2014
Int. J. Found. Comput. Sci., 2014
Proceedings of the Information Security Practice and Experience, 2014
2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Comput. Electr. Eng., 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
Trans. Comput. Sci., 2010
2009
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009
2008
IEEE Trans. Inf. Theory, 2008
2007
Fundam. Informaticae, 2007
2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
2005
Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms.
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
Proceedings of the Foundations of Intelligent Systems, 15th International Symposium, 2005
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005
Proceedings of the Ninth International Database Engineering and Applications Symposium (IDEAS 2005), 2005
Proceedings of the Web Engineering, 5th International Conference, 2005
2004
A Hierarchical Extraction Policy for content extraction signatures: Selectively handling verifiable digital content.
Int. J. Digit. Libr., 2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
Appl. Algebra Eng. Commun. Comput., 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic.
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
2003
Theor. Comput. Sci., 2003
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003
Efficient and Secure Storage Systems Based on Peer-to-Peer Systems.
Proceedings of the International Conference on Artificial Intelligence, 2003
Proceedings of the Global Telecommunications Conference, 2003
Proceedings of the Topics in Cryptology, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks.
Comput. J., 2002
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite.
Proceedings of the Public Key Cryptography, 2001
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).
Proceedings of the Cryptography and Coding, 2001
Proceedings of the Topics in Cryptology, 2001
A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components.
Proceedings of the 13th Australian Software Engineering Conference (ASWEC 2001), 2001
2000
Relating Differential Distribution Tables to Other Properties of of Substitution Boxes.
Des. Codes Cryptogr., 2000
Proceedings of the TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October, 2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Information Security, Third International Workshop, 2000
Proceedings of the Information Security, Third International Workshop, 2000
Proceedings of the Information Security and Cryptology, 2000
Parasitic Authentication.
Proceedings of the Smart Card Research and Advanced Applications, 2000
Proceedings of the 12th Australian Software Engineering Conference (ASWEC 2000), 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
Proceedings of the Public Key Cryptography, 1999
Proceedings of the Information Security, Second International Workshop, 1999
Proceedings of the Information Security, Second International Workshop, 1999
Proceedings of the Information Security and Cryptology, 1999
Proceedings of the Information Security and Cryptology, 1999
Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.
Proceedings of the Information and Communication Security, Second International Conference, 1999
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves.
Proceedings of the Advances in Cryptology, 1999
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks.
Proceedings of the Advances in Cryptology, 1999
Organizational Modeling for Efficient Specification of Information Security Requirements.
Proceedings of the Advances in Databases and Information Systems, 1999
1998
Inf. Process. Lett., 1998
Proceedings of the Worldwide Computing and Its Applications, International Conference, 1998
Proceedings of the Selected Areas in Cryptography '98, 1998
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation.
Proceedings of the Public Key Cryptography, 1998
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998
The nonhomomorphicity of S-boxes.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
A formal model to aid documenting and harmonizing of information security requirements.
Proceedings of the Information Security in Research and Business, 1997
Proceedings of the Third Pacific Asia Conference on Information Systems, 1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption).
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
J. Univers. Comput. Sci., 1996
Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors.
Des. Codes Cryptogr., 1996
Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract).
Proceedings of the Algorithms and Computation, 7th International Symposium, 1996
An Authentication and Security Protocol for Mobile Computing.
Proceedings of the Mobile Communications: Technology, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
1995
Inf. Comput., May, 1995
J. Univers. Comput. Sci., 1995
The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions.
J. Univers. Comput. Sci., 1995
Proceedings of the Advances in Cryptology, 1995
1994
Inf. Process. Lett., 1994
Australas. J Comb., 1994
Kuperee: An Approach to Authentication using Public Keys.
Proceedings of the Upper Layer Protocols, 1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Advances in Cryptology, 1994
Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract).
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
IEEE J. Sel. Areas Commun., 1993
On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract).
Proceedings of the Advances in Cryptology, 1993
Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract).
Proceedings of the Advances in Cryptology, 1993
Proceedings of the CCS '93, 1993
1992
Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Applied Algebra, 1990
1989
Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract).
Proceedings of the Advances in Cryptology, 1989
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses.
Proceedings of the Advances in Cryptology, 1989