
|
Journal Papers
- S. Ling, F. Özbudak, C. Xing. (2006). An explicit class of codes with good parameters and their duals. Discrete Applied Mathematics, 154, 346-356.
- S. Ling, F. Özbudak. (2006). Improved p-ary codes and sequence families from Galois rings of characteristic p2. SIAM Journal on Discrete Mathematics, 19, 1011-1028.
- S. Ling, H. Niederreiter, P. Solé. (2006). On the algebraic structure of quasi-cyclic codes IV: repeated roots. Designs Codes and Cryptography, 38, 337-361.
- S. Dougherty, S. Ling. (2006). Cyclic codes over Z4of even length. Designs Codes and Cryptography, 39, 127-153.
- Y. Tang, F.-W. Fu, S. Ling. (2006). On the reliability-order-based decoding algorithm for binary linear block codes. IEEE Transactions on Information Theory, 52, 328-336.
- K. Feng, S. Ling, C. Xing. (2006). Asymptotic bounds on quantum codes from algebraic geometry codes. IEEE Transactions on Information Theory, 52, 986-991.
- S. Ling, F. Özbudak. (2006). Aperiodic and odd correlations of some p-ary sequences from Galois rings. IEICE - Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E89-A(9), 2258-2263.
- S.-T. Xia, F.-W. Fu, S. Ling. (2006). A lower bound on the probability of undetected error for binary constant weight codes. IEEE Transactions on Information Theory, 52(9), 4235-4243.
- R. Safavi-Naini, H. Wang, D. S. Wong. (2006). Resilient LKH: Secure Multicast Key Distribution Schemes. International Journal of Foundations of Computer Science,17(5), 1205 -1221.
- R. Safavi-Naini, H. Wang. (2006). Secret Sharing Schemes with Partial Broadcast Channels, Designs. Designs Codes and Cryptography, 41(1), 5-22.
- S. Long, J. Pieprzyk, H. Wang, D. S. Wong. (2006). Generalised Cumulative Arrays in Secret Sharing. Designs Codes and Cryptography, 40(3),191-209.
- R. Steinfeld, J. Pieprzyk, H. Wang. (2006). Lattice-Based Threshold-Changeability for Standard CRT Secret-Sharing Schemes. Finite Fields and Their Applications, 12(2), 653-680.
Conference Papers
- S. Ling, F. Özbudak. (2006). Improved bounds on Weil sums over Galois rings and homogeneous weights. Coding and Cryptography, WCC 2005, Lecture Notes in Computer Science, vol. 3969, pp. 412-426, Springer.
- S.-T. Xia, F.-W. Fu, S. Ling. (2006). A lower bound on the probability of undetected error for binary constant weight codes. International Symposium on Information Theory, ISIT 2006, pp. 302-306.
- G. Gupta, J. Pieprzyk, H. Wang. (2006). An attack-localizing watermarking scheme for natural language documents. The ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS 2006), pp. 157 – 165. ACM Press.
- R. Steinfeld, J. Pieprzyk, H. Wang. (2006). On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. Advances in Cryptology (ASIACRYPT 2006), Lecture Notes in Computer Science, vol. 4284, pp. 194 - 209, Springer-Verlag.
- G. Yang, D. S. Wong, H. Wang, X. Deng. (2006). Anonymous Signature Schemes. International Workshop on Practice and Theory in Public Key Cryptography (PKC 2006), Lecture Notes in Computer Science, vol. 3958, pp. 347 - 343, Springer-Verlag.
- R. Steinfeld, J. Pieprzyk, H. Wang. (2006). Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. International Workshop on Practice and Theory in Public Key Cryptography (PKC 2006), Lecture Notes in Computer Science, vol. 3958, pp. 157 - 173, Springer-Verlag.
- C. Tartary, H. Wang. (2006). Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. 2nd SKLOIS Conference on Information Security and Cryptology (INSCRYPT 2006), Lecture Notes in Computer Science, vol. 4318, pp. 103 - 117, Springer-Verlag.
- C. Tartary, H. Wang. (2006). Rateless Codes for the Multicast Stream Authentication Problem. The 1st International Workshop on Security ( IWSEC2006), Lecture Notes in Computer Science, vol. 3786, pp. 108 - 125, Springer-Verlag.
- G. Yang, D. S. Wong, H. Wang, X. Deng. (2006). Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme. 8th International Conference on Information and Communications Security (ICICS 2006), Lecture Notes in Computer Science, vol. 4307, pp. 82 - 91, Springer-Verlag.
|
|
|