
|
Journal Papers
- S. Ling, F. Özbudak. (2007). Constructions and bounds on linear error-block codes. Designs Codes and Cryptography, 45, 297-316.
- L. Pu, H. Shen, J. Ma, S. Ling. (2007). Cycle systems in the complete bipartite graph plus one factor. SIAM Journal on Discrete Mathematics, 21(4), 1083-1092.
- C. Tartary, H. Wang. (2007). Efficient Multicast Stream Authentication for the Fully Adversarial Network. International Journal of Security and Network, 2(3/4), 175 - 191.
- C. Xing. (2007). Zeta functions of algebraic curves of genus 2. J. Algebra, 308, 734-741.
- C. Xing, S. L. Yeo. (2007). Algebraic curves with many points over the binary field. J. Algebra, 311, 775-780.
- C. Xing. (2007). Diagonal lattice space-time codes from number fields and asymptotic bounds. IEEE Transactions on Information Theory, 53, 3921-3926.
- C. Xing, S. L. Yeo. (2007). New Linear Codes and Algebraic Function Fields over Finite Fields. IEEE Transactions on Information Theory, 53, 4822-4825.
- Y. M. Chee, A. C. H. Ling. (2007). On extremal k-graphs without repeated copies of 2-intersecting edges. SIAM Journal on Discrete Mathematics, 21(3), 805-821.
- Y. M. Chee, A. C. H. Ling, S. Ling, H. Shen. (2007). The PBD-closure of constant-composition codes. IEEE Transactions on Information Theory, 53(8), 2685-2692.
- R. Steinfeld, J. Pieprzyk, H. Wang. (2007). Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. IEEE Transactions on Information Theory, 53(7), 2542-2559.
- H. van Tilborg, J. Pieprzyk, R. Steinfeld, H. Wang. (2007). New constructions of anonymous membership broadcasting schemes. Advances in Mathematics of Communications, 1(1), 29-44.
- Y. M. Chee. (2007). A new lower bound for A(17,6,6). Ars Combinatoria, 83, 361-363.
- Y. M. Chee, S. Ling. (2007). Constructions for q-ary constant-weight codes. IEEE Transactions on Information Theory, 53(1), 135-146.
Conference Papers
- P. Wang, H. Wang, J. Pieprzyk. (2007). Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. 4th VLDB Workshop on Secure Data Management, (SDM 2007). Lecture Notes in Computer Science, vol. 4721, pp. 108 - 123, Springer-Verlag.
- C. Tartary, H. Wang, J. Pieprzyk. (2007). An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. International Conference on Provable Security 2007, Lecture Notes in Computer Science, vol. 4784, pp. 17 - 34, Springer-Verlag.
- Y. Desmedt, J. Pieprzyk, R. Steinfeld, H. Wang. (2007). On Secure Multi-Party Computation in Black Box Groups. Crypto 2007, Lecture Notes in Computer Science, vol. 4622, pp. 591 - 612, Springer-Verlag.
- C. Tartary, H. Wang. (2007). Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. 12th Australasian Conference on Information Security and Privacy (ACISP 2007), Lecture Notes in Computer Science, vol. 4586, pp. 293 - 307, Springer-Verlag.
- C. Tartary, J. Pieprzyk, H. Wang. (2007). Verifiable Multi-Secret Sharing Schemes for Multiple Threshold Access Structures. 3rd SKLOIS Conference on Information Security and Cryptology (INSCRYPT 2007), Lecture Notes in Computer Science, vol. 4990, pp. 167 - 181, Springer-Verlag.
- R. Steinfeld, J. Pieprzyk, H. Wang. (2007). How to Strengthen any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. CT-RSA 2007, Lecture Notes in Computer Science, vol. 4371, pp. 357 - 371, Springer-Verlag.
- Y. M. Chee, D. L. Kreher. (2007). Graphical designs, CRC Handbook of Combinatorial Designs (2nd edition), pp. 490-493, CRC Press.
- S. Ling, H. Wang, C. Xing. (2007). Cover-free families and their applications, Security in Distributed and Networking Systems, pp. 75-98, World Scientific.
- H. Niederreiter, H. Wang, C. Xing. (2007). Function Fields over Finite Fields and Their Applications to Cryptography Topics in Geometry, Coding Theory and Cryptograph by Aenaldo Garcia and Henning Stichtenoth, pp. 59 – 104, Springer-Verlag.
Book Editorial
- F. Bao, S. Ling, T. Okamoto, H. Wang, C. Xing (Eds.). (2007). Cryptology and Network Security. Proceedings of 6th International Conference, CANS, Lecture Notes in Computer Science, vol. 4856, Springer.
|
|
|