Wang Yumin
XidianUniversityInformationEngineeringExpert
ExpertInformation
WangYumin,bornonFebruary18,1936,isanativeofBeijing.HeiscurrentlyaprofessoranddoctoralsupervisorintheSchoolofCommunicationEngineeringofXidianUniversity.Part-timeprofessoranddoctoralsupervisorofSunYat-senUniversity.HeonceservedasthedirectoroftheeditorialboardoftheJournalofXidianUniversityandthedirectoroftheinformationtheoryteachingandresearchsection.
Educationandworkexperience
InJuly1959,hegraduatedfromXidianUniversitywithafive-yeartelecommunicationsengineeringmajor.
FromDecember1979toDecember1981,hewenttotheDepartmentofElectricalEngineering,UniversityofHawaiiasavisitingscholar.
InOctober1986,heservedasaprofessorintheSchoolofCommunicationEngineeringofXidianUniversity.
InOctober1992,hewasratedasadoctoralsupervisorincryptography.
Socialservice
1.FellowoftheChineseInstituteofElectronicsandtheChineseInstituteofCommunications.
2.HonorarydirectorofChinaCryptographySociety.
3.MemberofChinaNaturalFoundationResearchAssociation.
4.IEEEseniormember.
5.OnceservedasthedirectoroftheNationalCollegesandUniversitiesCommunicationandInformationEngineeringTeachingSteeringCommittee.
6.FormermemberoftheInformationTheorySocietyoftheChineseInstituteofElectronics.
7.OnceservedasthevicechairmanoftheShaanxiInstituteofElectronicsandthedirectoroftheacademiccommittee.
8.From1996to2000,heservedasthedirectoroftheNationalCollegesandUniversitiesCommunicationandInformationEngineeringTeachingSteeringCommittee.
9.Memberoftheeditorialboardof"ChinaCommunications"(English),memberoftheeditorialboardof"ZTETechnology"magazine,andmemberoftheeditorialboardof"InformationandCommunicationEngineering".
10."KeyLaboratoryofComputerNetworkandInformationSecurityoftheMinistryofEducation,XidianUniversity","KeyLaboratoryofInformationSecurityTechnologyofGuangdongProvince","KeyLaboratoryofCryptographyandInformationSecurityofShandongUniversity,MinistryofEducation","TsinghuaUniversityCryptographicTheoryandTechnologyResearchCenter"academiccommitteemember.
Scientificresearch
Researchdirection
Hehaslongbeenengagedinteachingandscientificresearchonthetheoryandapplicationofcommunication,informationtheory,coding,andcryptography.
Scientificresearchprojects
PresidedoveranumberofscientificresearchessuchastheNationalNaturalScienceFoundationofChina,theConfidentialCommunicationDevelopmentFund,theMilitaryElectronicPre-researchFund,andtheEighthFive-YearMilitaryCommunicationEquipmentDevelopment.
ScientificResearchAchievements
WonthesecondprizeofNationalTechnologyInventionAward,thesecondandthirdprizeofScienceandTechnologyAchievementoftheMinistryofElectronics,thesecondprizeofScienceandTechnologyProgressAwardoftheProvincialEducationCommission,andthesecondprizeofNationalTeachingAchievement.ThethirdprizeofGuanghuaFundandsoon.
Publishedbooks
Thesismonograph
Publishedmorethan200papersinacademicjournalsandconferencesathomeandabroad,publishedmonographsandtranslationsManybooks.
Publishedmonographs:
1."StillRandomSequencesandTheirApplications",NationalDefenseIndustryPress,1985.
2,"Confidentiality:BasicsandApplications",XidianUniversityPress,1990.
3,"TheSecurityofCommunicationNetworks-TheoryandTechnology"XidianUniversityPress1999(wonthefirstprizeofexcellenttextbooksforordinarycollegesanduniversitiesnationwide,andthepostgraduateteachingbooksrecommendedbythePostgraduateOfficeoftheMinistryofEducation).
4,"NetworkSecurity:TechnologyandPractice"TsinghuaUniversityPress2005.
5,"InformationTheoryandCodingTheory"HigherEducationPress2005(WonthefirstprizeofexcellenttextbooksforordinarycollegesanduniversitiesinShaanxiProvince).
6,"InformationHiding:TheoryandTechnology"TsinghuaUniversityPress2006.
7,"CryptographyandDataSecurity"(translation),NationalDefenseIndustryPress,1991.
Publishedpapers
1Alarge-capacityrobustdigitalwatermarkingschemebasedoncodedivisionmultipleaccessXuWenli;WangMingyu;WangYumin[Journal]JournalofJilinUniversity(EngineeringEdition)2011-03-15
2AnanonymousbroadcastauthenticationprotocolforwirelesssensornetworksbasedonbilinearpairingDingYong;HuJian;LiYahui;WangYumin[Journal]JilinUniversityJournal(EngineeringEdition)2011-03-15
3Provablysecureidentity-basedsignatureschemeunderthestandardmodelMingYang;ShenXiaoqin;PangLiaojun;WangYumin[Journal]JournalofBeijingUniversityofPostsandTelecommunications2011-02-15
4Anidentity-basedsignatureschemewithintermediarySuWanli;ZhangXiaohong;YangJungang;WangYuminJournalofNorthUniversityofChina(NaturalScienceEdition)2010-12-15
5Adaptivemulti-partynon-repudiationprotocolLiLei;WangYumin[Journal]NetworkSecurityTechnologyandApplication2010-03-15
6DonotusetwolinesNon-certificateauthenticationprotocolforsexpairsZhuHui;LiHui;TanShichong;WangYumin[Journal]JournalofWuhanUniversity(InformationScienceEdition)2010-05-05
7StandardsProvablysecuremulti-identitysingle-keydecryptionschemeunderthemodelMingYang;WangYumin;PangLiaojun[Journal]ComputerScience2010-03-15
8Identity-basedkeylessescrowChameleonhashfunctionandsignatureZhanYang;TianHaibo;ChenXiaofeng;WangYumin[Journal]JournalofBeijingUniversityofTechnology2010-05-15
9LinearshiftregistersinsecureRSAmodeResearchonApplicationofMathsJiangZhengtao;WangYong;WangYongbin;WangYumin[Journal]JournalofCommunications2010-05-25
10Non-repudiationprotocolfairnessanalysisofextendedstringspacemethodLiLei;ChenJing;WangYumin[Journal]JournalofXi’anJiaotongUniversity2010-06-10
11TheformationanddevelopmentofinformationspaceWangYuminXidianUniversitySchoolofCommunicationEngineering[Journal]ZTETechnology2010-10-10
12AcertificatelesssigncryptionschemewithoutbilinearpairingZhuHui;LiHui;WangYumin【Journal】ComputerResearchandDevelopment2010-09-15
13Anewwhole-diskencryptionschemebasedonlogicalpasswordlockZhaoFuxiang;PangLiaojun;WangYumin【Journal】ComputerScience2010-10-15
14EfficientandsecureidentityauthenticationprotocolunderthestandardmodelLiYanping;WangYumin[Journal]JournalofCommunications2009-01-15
15NewprovablysecurefastauthenticationprotocolZhuHui;LiHui;PangLiaojun;WangYumin[Journal]ElectronicsJournalofUniversityofScienceandTechnology2009-01-31
16PCLProofofWAPIKeyManagementProtocolTieManxia;LiJiandong;WangYumin[Journal]JournalofElectronicsandInformation2009-02-15
17AfastauthenticationprotocolundertheCanetti-KrawczykmodelZhuHui;LiHui;WangYumin[Journal]JournalofXidianUniversity2009-02-20
18NewID-basedidentityauthenticationschemeLiYanping;SuWanli;WangYumin[Journal]JournalofHarbinEngineeringUniversity2009-01-15
19Efficientanonymouspassword-basedTanShichong;PangLiaojun;SuWanli;WangYumin[Journal]JournalofCommunications2009-04-15
20Identity-basedanonymouswirelessauthenticationschemeZhuHui;LiHui;SuWanli;WangYumin[Journal]JournalofCommunications2009-04-15
21Provablysecuremulti-trustdomainauthenticationkeyagreementprotocolZhuHui;LiHui;WangYumin[Journal]JournalofHuazhongUniversityofScienceandTechnology(NaturalScienceEdition)2009-05-15
22ResearchandAnalysisontheEffectivenessandWeakModelofRSAPopularizationCyclicAttackJiangZhengtao;HuaiJinPeng;WangYumin[Journal]JournalofCommunications2009-06-25
23PartiallyblindsignaturewithoutcertificateSuWanli;TanShichong;LiYanping;WangYumin【Journal]JournalofJilinUniversity(EngineeringandTechnologyEdition)2009-07-15
24SupportingtransparentofflineTTPmulti-partynon-repudiationprotocolLiLei;YangJiaxi;WangYumin[Journal]JournalofJilinUniversity(EngineeringEdition)2009-07-15
25DirectedDiffusionProtocolSecurityAnalysisandImprovementPangLiaojun;LiHuixian;LiuYi;JiaoLicheng;WangYumin【Journal】SystemEngineeringandElectronicsTechnology2009-07-15
26AneffectivecertificatelesssignatureschemeSuWanli;LiHui;ZhangYueyu;WangYumin[Journal]JournalofJiangsuUniversity(NaturalScienceEdition)2009-07-10
27No-certificateblindsignatureschemeSuWanli;ZhangYueyu;ZhangXiaohong;WangYumin[Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2009-07-31
28Designandanalysisofaprovablysecuremulti-receiverpublickeyencryptionschemePangLiaojun;LiHuixian;JiaoLicheng;WangYumin[Journal]JournalofSoftware2009-10-15
29Commentson"NewProvablySecureDigitalSignatureScheme"LiYanping;WangYumin[Journal]JournalofHuaihaiInstituteofTechnology(NaturalScienceEdition)2009-09-15
30secretKeychainmulti-partynon-repudiationprotocolLiLei;TanXinlian;WangYumin[Journal]ComputerScience2009-10-15
31AkeymanagementschemesuitableforadhocnetworkswithoutasecurechannelLiHuixian;PangLiaojun;WangYumin[Journal]JournalofCommunications2010-01-25
32AnelectronicauctionschemetoprotectbiddingsecurityQinBo;QinHui;WangShangping;WangYumin[Journal]ComputerResearchandDevelopment2006-01-30
33Multi-secretsharingschemebasedongeneralaccessstructurePangLiaojun;JiangZhengtao;WangYumin[Journal]ComputerResearchAnddevelopment2006-01-30
34AnimprovedsignaturesystembasedonbraidgroupDingYong;TianHaibo;WangYumin[Journal]JournalofXidianUniversity2006-02-20
35AJPEGimagemaskingalgorithmthatpreserveshistogramcharacteristicsChenDan;LuoXin;WangYumin[Journal]JournalofElectronicsandInformationTechnology2006-02-28
36ResearchonConstructingPublicKeyCryptosystemBasedonLFSRHigh-orderResidualProblemJiangZhengtao;LiuYi;WangYumin[Journal]JournalofElectronicsandInformation2006-03-30
37IKEActiveModeGroupInconsistencyImprovementMethodGengHang;PengZhiwei;WangYumin[Journal]ComputerEngineering2006-02-20
38AnewfairelectronicmoneysystemZhangJianhong;WangYumin[Journal]ComputerEngineering2006-03-20
39AnovelcolorwatermarkimagegeometricdistortioncorrectionalgorithmYangXiaoyuan;JiChengli;WangYumin;ZhangChong[Journal]ComputerEngineering2006-03-20
40AsecureAdHocOn-demandroutingprotocolDuXinjun;WangYing;GeJianhua;WangYumin【Journal]JournalofCircuitsandSystems2006-02-28
41Aneffective(t,n)thresholdmultiplesecretsharingsystemPangLiaojun;LiuYi;WangYumin[Journal]JournalofElectronics2006-04-30
42CryptographicAnalysisofTwoTraitorTrackingSchemesZhangXuejun;WangYumin[Journal]ComputerEngineeringandApplications2006-05-21
43BasedonprincipalcomponentsAnalysisofPan-blindMaskingAnalysisSchemeChenDan;ZhangJianhong;WangYumin[Journal]JournalofImageandGraphics2006-03-30
44AnewkindofnothirdpartyparticipationThebuyer-sellerwatermarkingagreementZhangXuejun;WangYumin[Journal]ComputerApplication2006-07-01
45Amulti-service-orientedandrevocableasymmetricpublickeytraitortracingschemeZhangXuejun;WangYumin[Journal]ComputerApplication2006-08-01
46ImprovementandAnalysisofG-PaillierEncryptionSystemJiangZhengtao;LiuYi;WangYumin【Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2006-08-20
47ThresholdsecretsharingschemebasedonECCanditssecurityPangLiaojun;ZhanYang;WangYumin[Journal]XidianUniversityJournal(NaturalScienceEdition)2006-08-20
48Apubliclyverifiableandforward-securesigncryptionschemeLiYanping;TanShichong;WangYumin[Journal]ComputerApplicationsResearch2006-09-01
49Anewmulti-partyundeniableagreementLiYanping;SiGuangdong;WangYumin[Journal]ComputerScience2006-08-25
50AnAnti-collusionAsymmetricPublicKeyTraitorTrackingSchemeZhangXuejun;ZhouLihua;WangYumin[Journal]ComputerScience2006-08-25
51TwoCryptographicanalysisofproxysignatureschemeMingYang;WangYumin[Journal]ComputerScience2006-08-25
52BlindsignatureandproxysignaturebasedonidentitywithouttrustedcenterZhangXuejun;WangYumin[Journal]ComputerApplication2006-10-01
53AsafeandefficientM+1electronicauctionYangJiaxi;WangYumin[Journal]NetworkSecurityTechnologyandApplication2006-11-01
54Fastalgorithmforsuperellipticcurvewithgenus3inprimenumberfieldHaoYanhua;TanShichong;WangYumin【Journal】ComputerScience2006-10-25
55Multi-secretsharingschemebasedongeometricpropertiesandgeneralaccessstructurePangLiaojun;LiHuixian;WangYumin[Journal]ComputerScience2006-10-25
56A(t,nthresholdsignature-(k,mthresholdverificationgroupsignatureProjectPangLiaojun;LiHuixian;WangYumin[Journal]ComputerScience2006-11-25
57AFairandEffectiveElectronicPaymentProtocolPangLiaojun;LiShuhai;WangYumin[Journal]ComputerEngineering2006-11-20
58Efficientidentity-basedproxyblindsignatureZhangXuejun;WangYumin[Journal]ComputerApplication2006-11-01
59AnimprovedstrongproxysignatureschemeMingYang;JiangZhengtao;WangYumin[Journal]JournalofXidianUniversity2006-10-20
60JointnamedproxysignatureschemeLeiQiang;WangYumin[Journal]JournalofXidianUniversity2006-10-20
61ResearchontheComputationalReliabilityofFormalAttackerCapabilityDescriptionTianHaibo;DingYong;WangYumin[Journal]JournalofXidianUniversity2006-10-20
62EfficientproofofcommitmentvalueinaspecificintervalZhangJingliang;MaLizhen;WangYumin[Journal】JournalofXidianUniversity2006-12-20
63ImprovedTraitorTrackingSchemeBasedonBilinearMappingZhangXuejun;ZhouLihua;WangYumin[Journal]JournalofBeijingUniversityofPostsandTelecommunications2006-12-30
64Securityanalysisofaproxymulti-signatureZhangJianhong;ZouJiancheng;WangYumin[Journal]JournalofHarbinInstituteofTechnology2006-11-30
65Asafeandefficientthresholdmulti-secretsharingschemePangLiaojun;WangYumin[Journal]ComputerScience2006-01-25
66Aboutconstructinganeasy-to-accessandsecuremanagementResearchonGridJiangZhengtao;YiPengchao;WangYumin[Journal]ComputerScience2006-04-25
67SecretsharingschemebasedonLUCgeneralaccessstructureanditssecurityPangLiaojun;LiHuixian;WangYumin[Journal]ComputerScience2006-05-25
68AnefficientgeneralizeddesignatedverifiersignatureverificationMingYang;LiShuhai;WangYumin
b>[Journal]JournalofElectronics2006-12-1569Newidentity-basedblindsignatureandproxysignaturewithouttrustedcenterZhangXuejun;WangYumin[Journal]ComputerEngineeringandApplication2007-01-01
70verifiable(t,n)thresholdsecretsharingschemeanditssecurityPangLiaojun;LiHuixian;WangYumin[Journal]JournalofSouthChinaUniversityofTechnology(sinceNaturalScienceEdition)2007-01-30
71Efficientidentity-basedproxysigncryptionZhangXuejun;WangYumin[Journal]ComputerEngineeringandApplications2007-01-21
72Anti-fraudsecretsharingschemebasedonLUCcryptosystemPangLiaojun;LiHuixian;WangYumin[Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2007-02-20
73BifenyuanziImprovementofseveralresultsofelementrepresentationingroupJiangZhengtao;LiuJianwei;YuanPingzhi;WangYumin[Journal]JournalofCommunications2007-01-25
74AnalternatingstructurebasedonchaoticmappingImageencryptionalgorithmZhangYiwei;WangYumin;ShenXubang[Journal]ScienceinChina(SeriesE:InformationScience)2007-02-28
75Efficientidentity-basedpartialblindsignatureZhangXuejun;WangYumin[Journal]ComputerEngineeringandApplications2007-04-11
76AnanonymousdigitalfingerprintingschemebasedongroupsignatureTanShichong;WangYumin
b>[Journal]ComputerScience2007-03-2577AvideowatermarkingalgorithmagainstgeometricattacksYangXiaoyuan;NiuKe;WeiPing;WangYumin[Journal]ComputerEngineering2007-04-20
78AFraudPrevention(t,n)ThresholdDigitalSignatureSchemePangLiaojun;TanShichong;WangYumin[Journal]JournalofElectronicsandInformation2007-04-30
79ZhangJingliang,afastHarnsystemdevelopedbyn-adic;WangYumin[Journal]ComputerScience2007-05-25
80SomeevidencesCryptographicAnalysisoftheSecureSignatureSchemeMingYang;WangYumin[Journal]ComputerScience2007-05-25
81ImplementationofVRMLNetworkCommunicationFunctionBasedonJavaPangLiaojun;LiHuixian;WangLi;WangYumin[Journal]ComputerEngineering2007-06-05
82ForwardSecurityAuthenticationandEncryptionSchemeLiYanping;YangWenjie;WangYumin[Journal]HuaihaiJournalofInstituteofTechnology(NaturalScienceEdition)2007-06-15
83DesignofImage-basedInformationStealthDetectionSystemLiuJia;YangXiaoyuan;WangYumin;TangYuhua[Journal]ComputerEngineering2007-06-20
84Parallelalgorithmforsuperellipticcurvedivisoradditionwithgenus3HaoYanhua;FanXinxin;WangYumin【Journal】ComputerScience2007-08-25
85SpreadspectrumwatermarkingschemebasedonchaoticscramblingandhybridtransformdomainXuWenli;SuWanli;LiLei;WangYumin[Journal]ComputerScience2007-07-25
86AnefficientLocalverifierrevocationgroupsignatureschemeZhangYueyu;PangLiaojun;SuWanli;WangYumin[Journal]JournalofXidianUniversity2007-10-15
87AsafeandefficientaccessstructureSecretSharingSchemePangLiaojun;LiHuixian;WangYumin[Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2007-10-20
88RestrictedGeneralizedDesignatedVerifierSignatureundertheStandardModelMingYang;ShenXiaoqin;WangYumin[Journal]JournalofJilinUniversity(EngineeringandTechnologyEdition)2007-11-15
89AnewelectronicauctionbasedonHashchainYangJiaxi;LiYongjiang;WangYumin[Journal]ComputerEngineering2007-10-05
90Chameleonsignatureschemebasedonbilinearpairing(English)DuXinjun;WangYing;GeJianhua;WangYumin【Journal]JournalofSoftware2007-10-15
91CryptographicanalysisoftwoprovablysecureshortsignatureschemesMingYang;WangYumin【Journal】ComputerEngineering2007-11-20
92Averifiablemulti-secretsharingschemesuitableforarbitraryaccessstructureZhangFutai;WangYumin[Journal]JournalofCommunications2007-11-15
93OneIND-CCA2CompletelyAnonymousShortGroupSignatureZhangYueyu;ChenJie;SuWanli;WangYumin[Journal]JournalofComputerScience2007-10-15
94AmobileagentdataresistanttotruncationattacksProtectionschemeLiuYi;ZhangLing;WangYumin[Journal]ComputerEngineering2007-12-05
TheUsabilityAnalysisandImprovementof95WAPIProtocolTieManxia;LiJiandong;WangYumin[Journal]ComputerScience2007-10-15
96ADisclosureMethodforProtectingSensitiveAttributeCertificatesJiangZhengtao;HuaiJinpeng;WangYumin[Journal]BeijingAirlinesJournalofUniversityofAstronautics2007-12-15
97AquantumencryptionalgorithmbasedonkeyrecoveryLiShuhai;WangYumin【Journal】ComputerScience2007-11-25
98AgeneralmaskinganalysistechniqueforadditiveairspacemaskingalgorithmsChenDan;WangYumin【Journal】JournalofSoutheastUniversity(NaturalScienceEdition)2007-09-20
99Improvedforward-secureauthenticationandencryptionschemeLiYanping;ZhangJingliang;WangYumin[Journal]JournalofSoutheastUniversity(NaturalScienceEdition)2007-09-20
100Encryption|n|+AnefficientpublickeyprobabilisticencryptionsystemforkbitplaintextJiangZhengtao;LiuJianwei;QinBo;WangYumin[Journal]JournalofBeijingUniversityofAeronauticsandAstronautics2008-01-15
101Usingmulti-basechainsAnefficientalgorithmforcalculatingellipticcurvescalarmultiplicationHaoYanhua;LiLei;WangYumin[Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2008-11-30
1021-out-of-ninadvertentlytransmittedTransformationandApplicationZhangJingliang;MaLizhen;WangYumin[Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2008-11-30
103AnimprovedcertificatelesssignatureschemeMingYang;ZhanYang;WangYumin;PangLiaojun[Journal]JournalofXidianUniversity2008-12-15
104Quantumkeydistributionprotocolonfour-dimensionalHilbertspaceLiShuhai;WangYumin【Journal】ComputerScience2008-01-25
105AnanonymousandefficientM+1electronicauctionYangJiaxi;TanXinlian;WangYumin【Journal】ComputerScience2008-02-25
106ApubliclyverifiablesecureelectronicauctionschemeYangJiaxi;LiLei;WangYumin[Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2008-01-30
107NewpasswordauthenticationKeyAgreementProtocolTanShichong;ZhangNing;WangYumin[Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2008-01-30
108SecureandefficientwatermarkauthenticationprotocolXuWenli;YuYeyun;WangYumin[Journal]ComputerResearchandDevelopment2008-03-15
109ThedesignatedverifierproxysignatureschemewithoutrandomoracleMingyang;WangYumin[Journal]JournalofElectronicsandInformationTechnology2008-03-15
110Paillier-PointchevalPublicKeyProbabilisticEncryptionSystemImprovementJiangZhengtao;LiuJianwei;WangYumin[Journal]ComputerEngineering2008-02-05
111Robustdigitalwatermarkingschemeagainstnoise,geometricdistortionandJPEGcompressionattacksXuWenli;LiLei;WangYumin【Journal】JournalofElectronicsandInformationTechnology2008-04-15
112RSAinZ[ω]ZhangJingliang;WangYumin[Journal]MathematicalPracticeandUnderstanding2008-04-23
113ID-basedringsignatureschemeunderthestandardmodelZhangYueyu;LiHui;WangYumin[Journal]JournalofCommunications2008-04-15
114MingYang,aneffectivecertificatelesssignaturescheme;WangYumin[Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2008-03-30
115NewandperfectWAPIprotocolsecurityanalysis(English)PangLiaojun;LiHuixian;WangYumin[Journal]JournalofSoutheastUniversity(EnglishEdition)2008-03-15
116AdistributedautonomoustrustcomputingmodelZhanYang;PangLiaojun;ZhuXiaoyan;WangYumin[Journal]JournalofXidianUniversity2008-06-20
117ResearchonanewpublickeycryptosystemequivalenttothedecompositionoflargeintegersJiangZhengtao;ZhangJingliang;WangYumin[Journal]JournalofElectronicsandInformationTechnology2008-06-15
118Privacy-protectedvehicleauthenticationbasedongroupsignatureinvehiclenetworkZhangJingliang;ZhangYueyu;WangYumin[Journal]JournalofWuhanUniversityofTechnology(TransportationScienceandEngineeringEdition)2008-06-15
119AfairandpubliclyverifiableelectronicauctionprotocolYangJiaxi;LiLei;ZhuHui;WangYumin[Journal]JournalofJilinUniversity(EngineeringandTechnologyEdition)2008-07-15
120AsecureelectronicauctionschemebasedongroupsignaturesZhangYueyu;LiHui;WangYumin
b>[Journal]JournalofXidianUniversity2008-08-20121DynamicThresholdMultipleSecretSharingSchemePangLiaojun;LiHuixian;WangYumin[Journal]ComputerEngineering2008-08-05
122ApracticalAdhocnetworkauthenticationroutingprotocolAARPTieManxia;LiJiandong;WangYumin[Journal]ComputerScience2008-08-25
123Averifiablethresholdmulti-secretsharingschemePangLiaojun;LiHuixian;LiZhijie;WangYumin[Journal]JournalofHarbinInstituteofTechnology2008-09-15
124WirelessSensorNetworkNodesAuthenticationandKeyAgreementProtocolPangLiaojun;JiaoLicheng;WangYumin[Journal]JournalofSensorTechnology2008-08-15
125WirelesssensornetworkbroadcastkeybasedonsecretsharingDistributionAgreementPangLiaojun;LiHuixian;JiaoLicheng;WangYumin【Journal】JournalofSensorTechnology2008-10-20
126AnalysisandimprovementoftwoquantumkeydistributionprotocolsusingBellmeasurementbasesLiShuhai;MingYang;WangYumin[Journal]JournalofJilinUniversity(Engineering)Edition)2008-11-15
127Multi-bankfairelectroniccashsystembasedonACJTgroupblindsignatureZhangJingliang;HuangHuawei;WangYumin[Journal]JournalofWuhanUniversityofTechnology(TransportationScienceandEngineeringEdition)2008-10-15
128ID-basedthresholdmultiplesecretsharingschemePangLiaojun;PeiQingqi;JiaoLicheng;WangYumin[Journal]JournalofSoftware2008-10-15
129Anidentity-basedanonymouswirelessauthenticationprotocolZhuHui;LiHui;WangYumin;LiuShuanggen[Journal]JournalofWuhanUniversity(ScienceEdition)2008-10-24
130IdentityauthenticationschemebasedoncertificatelesspublickeycryptosystemLiYanping;WangYumin[Journal]JournalofWuhanUniversity(ScienceEdition)2008-10-24
131YesShortgroupsignatureschemewithpartialverifierrevocationDomainAuthenticationProtocolZhuHui;LiHui;YangJiaxi;WangYumin[Journal]JournalofWuhanUniversity(InformationScienceEdition)2008-10-05
133WirelessSensorNetworkSecurityRoutingProtocolDesignandAnalysisPangLiaojun;JiaoLicheng;WangYumin[Journal]JournalofSensorTechnology2008-09-15
134Apracticaloff-linefairelectroniccashsystemGaoHuming;MaoJian;WangYumin[Journal]JournalofElectronics2003-02-25
135AsecureelectronicvotingschemebasedonanonymouscommunicationchannelsChenXiaofeng;WangYumin[Journal]】ActaElectronica2003-03-25
136DistributedkeygenerationbasedongeneralizedverifiablesecretsharingZhangFutai;WangYumin【Journal】ActaElectronica2003-04-25
p>137AnimprovedsecurityanalysisofTSENG-JANgroupsignatureZhangJianhong;WangYumin;ZhangFutai[Journal]ElectronicJournal2003-04-25
138AsecureSealedelectronicauctionschemeWangJilin;ChenXiaofeng;WangYumin[Journal]JournalofElectronics2003-10-25
139Non-receiptelectronicvotingbasedonsemi-trustmodelChenXiaofeng;WangJilin;WangYumin[Journal]ChineseJournalofComputers2003-05-12
140DigitaltimeauthenticationschemebasedonPKIsystemHanWei;FengFei;ChenXiaofeng;WangYumin[Journal]JournalofComputerScience2003-10-12
141Anew(t,N-2)flexibleMixNetGaoHuming;ChenXiaofeng;WangYumin【Journal]ChineseJournalofComputers2003-10-12
142TurbocodematrixdescriptionanditsinfluenceoninterleaverdesignWangYing;LiHui;WangYumin[Journal]JournalofComputers2003-10-12
143AverifieddigitalsignatureschemebasedonDSAandRSAWangShangping;WangYumin;ZhangYaling[Journal]JournalofSoftware2003-03-23
144UpdateOperatorSolutionforMemberDeletioninGroupSignatureWangShangping;WangYumin;WangXiaofeng;QinBo;HeCheng;ZouYoujiao[Journal]JournalofSoftware2003-11-23
145AneffectiveOFDMtime-frequencysynchronizationsystemsuitableforRayleighfadingchannelsWangYali;HeFei;ZhangHailin;WangYumin[Journal]JournalofCommunications2003-01-25
146Aproxyencryptionconversioninformationtransmissionschemebasedonmulti-partysecretsharingZhaoFuxiang;ZhaoHongyun;WangYumin;YangShiping[Journal]JournalofCommunications2003-04-25
147RSA-basedMultipledigitalsignaturesZhangJianhong;WeiYongzhuang;WangYumin[Journal]JournalofCommunications2003-08-25
148Forwardsecuredigitalsignatureschemebasedonzero-knowledgeproofWangShangping;WangYumin;WangXiaofeng;QinBo;ZhangYaling[Journal]JournalofCommunications2003-09-25
149Afourth-ordermeanvalueformulasimilartoDedekindsumsChenXiaofeng;WangYumin;ZhangWenpeng[Journal]JournalofNorthwestUniversity(NaturalScienceEdition)2003-04-25
150ResearchProgressofSecureElectronicAuctionsWangJilin;ChenXiaofeng;WangYumin[Journal]Xi'anElectronicTechnologyJournaloftheUniversity2003-02-25
151Fullyanonymousandconvertiblemulti-certificateelectronicauctionZhangJianhong;WuQianhong;WangYumin[Journal]JournalofXidianUniversity2003-04-25
152Keyagreementschemebasedonsecuretwo-partycalculationChenXiaofeng;WuQianhong;WangYumin[Journal]Xi’anElectronicsJournalofUniversityofScienceandTechnology2003-08-25
153AnewelectronicauctionbasedonsecretsharingZhangJianhong;WuQianhong;WangYumin[Journal]JournalofXidianUniversity2003-10-25
154AsafeM+1priceelectronicauctionschemeWangJilin;GaoHuming;WangYumin[Journal]JournalofXidianUniversity2003-10-25
155SecuremobileagentbasedonproxysignaturechainZhangJianhong;WuQianhong;WangYumin[Journal]JournalofXidianUniversity2003-12-25
156BasedonRSAFunction-basedpracticalelectronicauctionschemeWuQianhong;ZhuXiaoyan;WangYumin[Journal]JournalofXidianUniversity2003-12-25
157SeveraladvancesininformationsecuritytheoryandtechnologySituationWangYumin[Journal]NationalScienceFoundation2003-04-23
158WiMAXSecurityMechanismResearchPangLiaojun;WangYumin[Journal]ZTETechnology2005-04-10
159OpenSSLprogramdesignYuanSuchun;WangYumin;LiGang[Journal]ComputerSecurity2005-06-05
160Privacy-protecteddigitalproductsonlineTransactionplanMaoJian;YangBo;WangYumin[Journal]JournalofElectronics2005-06-25
161AnefficientgroupsignatureZhangJianhong;WuQianhong;ZouJiancheng;WangYumin[Journal]ActaElectronica2005-06-25
162WatermarkimagedistortioncorrectionalgorithmbasedongeometrictransformationfeaturesetYangXiaoyuan;JiChengli;WangYumin;QinQing[Journal]ComputerEngineeringandApplications2005-06-01
163BasedonRSAcryptosystem(t,n)thresholdsecretsharingschemePangLiaojun;WangYumin[Journal]JournalofCommunications2005-06-25
164UseeffectiveinversionalgorithmtoquicklycalculatehyperellipticcurvescalarmultiplicationHaoYanhua;JiangZhengtao;WangYumin[Journal]JournalofXidianUniversity2005-06-20
165ThebestperiodicinterleavingmethodbasedonfinitefieldWangYing;WangYumin[Journal]JournalofXidianUniversity2005-06-20
166ApplicationofSupportVectorMachineinImageStealthDetectionYangXiaoyuan;WangZhigang;WangYumin[Journal]JournalofXidianUniversity2005-06-20
167MobileagentsecurepaymentprotocolbasedonverifiablesecretsharingLiuYi;XuWenli;WangYumin[Journal]JournalofSouthChinaUniversityofTechnology(NaturalScienceEdition)2005-06-28
168BasedonChameleonSignatureSchemeBasedonBilinearPairsandIdentity(English)DuXinjun;WangYing;GeJianhua;WangYumin[Journal]JournalofSouthChinaUniversityofTechnology(NaturalScienceEdition)2005-06-28
169Mobileagent-basedvariableroutingsecurityprotocolLiuYi;WuQianhong;WangYumin[Journal]ChineseJournalofComputers2005-07-12
170ConstantComplexityHundredsThemillionaireagreementQinBo;QinHui;ZhouKefu;WangXiaofeng;WangYumin[Journal]JournalofXi'anUniversityofTechnology2005-06-30
171WatermarkdetectionbasedonerrorcontrolcodingXuWenli;WangYumin[Journal]ElectronicsActa2005-07-25
172Merkletree-basedsecuremobileagentroutingprotocolanditspromotionLiuYi;JiangZhengtao;WangYumin[Journal]ActaElectronica2005-07-25
173AnewmaskinganalysistechniquebasedonimagecomplexityTianWei;ChenDan;WangYumin[Journal]InformationCommandandcontrolsystemandsimulationtechnology2005-08-15
174AnefficientdirectedtransfersignatureschemeHuangZhenjie;HaoYanhua;WangYumin;ChenKefei[Journal]JournalofElectronics2005-08-25
175FurtherresearchoncryptosystembasedoncubiclinearrecursivesequenceJiangZhengtao;SunXi;TianLei;WangYumin[Journal]JournalofCommunications2005-09-25
176SecurityAnalysisofConstantinGroupSignatureZhangJianhong;WangYumin[Journal]JournalofNorthChinaUniversityofTechnology2005-09-30
177Apan-blindcrypticforcolorimagesAnalysisschemeChenDan;ChenYuan;WangYumin[Journal]JournalofElectronicsandInformationTechnology2005-10-20
178SecureMobileAgentRoutingBasedonHashFunctionCollisionLiuYi;JiangZhengtao;WangYumin[Journal]ComputerApplications2005-09-10
179AnoptimizedpaymentprotocolbasedonmobileagentsLiuYi;PangLiaojun;WangYumin[Journal]ComputerResearchAnddevelopment2005-10-16
180(t,n)thresholdsecretsharingschemebasedonLUCcryptosystemPangLiaojun;WangYumin[Journal]JournalofXidianUniversity2005-12-20
181PowercontrolandcapacitysimulationinCDMA2000SongXin;WangYumin[Journal]ZTETechnology2005-12-10
182Nyberg-RueppelmessagerecoverygeneralizationandimprovementofblindsignatureHuangZhenjie;WangYumin;ChenKefei[Journal]JournalofCommunications2005-12-25
183BlindsignatureschemebasedonXTRsystemChenXiaofeng;GaoHuming;WangYumin[Journal]JournalofElectronicsandInformationTechnology2003-06-15
184ArobustroutingprotocolbasedonmobileagentsLiuYi;WangYumin[Journal]ComputerResearchandDevelopment2005-12-16
Afastcalculationmethodforscalarmultiplicationinthe185KoblitzcurveDingYong;LiXinguo;WangYumin
b>[Journal]JournalofNorthwestUniversity(NaturalScienceEdition)2005-12-25186ModulardesignmethodoffairelectroniccontractagreementPangLiaojun;LiuYi;WangYumin[Journal]ComputerScience2005-03-23
187Merkletree-basedsecuremobileagentroutingprotocolLiuYi;JiangZhengtao;WangYumin[Journal]ComputerScience2005-07-23
188SecurityanalysisofanencryptionsystembasedonellipticcurveJiangZhengtao;HaoYanhua;WangYumin[Journal]ComputerScience2005-09-23
189AkindofeliminationElectronicauctionwithoutauctionhouseZhangJianhong;WangYumin[Journal]ComputerEngineeringandDesign2003-08-28
190XMLOverviewFuHaiying;LiHui;WangYumin[Journal]CommunicationTechnology2003-02-28
191AnembeddedintrusiondetectionsystemforapplicationsFengFei;HanWei;WangYumin[Journal]CommunicationTechnology2003-02-28
Theeffectivenessof192Turbocodeonnon-standardsource-channelWangYing;LiHui;WangYumin【Journal】CommunicationTechnology2003-03-30
193ImageauthenticationandintegrityprotectiontechnologybasedonwatermarkChenDan;WangYumin[Journal]CommunicationTechnology2003-08-30
194AkindofeliminationZhangJianhong;WangYumin[Journal]JournaloftheGraduateSchooloftheChineseAcademyofSciences2003-09-30
195WLANSecurityImplementationMechanismTianHaibo;PengZhiwei;WangYumin[Journal]ZTETechnology2003-04-25
AnalysisofEnhancedWLANSecurityTechnologyin196NiYuan;PengZhiwei;WangYumin[Journal]ZTETechnology2003-12-25
197NewProgressinInformationSecurityTechnologyWangYumin[Journal]ZTETechnology2003-12-30
198AschemeforenhancingthesecurityofAdhocnetworkroutingprotocolZhuXiaoyan;WangYumin[Journal]JournalofHuazhongUniversityofScienceandTechnology(NaturalScienceEdition)2003-12-30
p>199AnalysisandResearchonActualIntrusionDetectionFengFei;WangYumin[Journal]NetworkSecurityTechnologyandApplication2003-04-15
200RoutingProtocolSecurityResearchShiPeng;TianHaibo;WangYumin[Journal]NetworkSecurityTechnologyandApplication2003-07-15
AnalysisandResearchon201IntrusionDetectionandResponseSystemShaoXianguo;ShiPeng;WangYumin[Journal]NetworkSecurityTechnologyandApplication2003-09-15
202XMLandrelatedsecurityresearchprogressFuHaiying;LiHui;WangYumin【Journal】ComputerApplicationResearch2004-02-28
203Zero-knowledgeproofwithRSAdigitalsignatureWangShangping;WangYumin;WangXiaofeng;QinBo[Journal]JournalofCommunications2004-01-25
204PublicKeyCryptosystemandtheSecurityofSelectedCiphertextChenYuan;WangYumin;XiaoGuozhen[Journal]JournalofXidianUniversity2004-02-20
205Abulletinboard-basedanti-rejectionagreementZhangJianhong;WangJilin;WangYumin[Journal]JournalofElectronicsandInformation2004-02-20
206MobileAdhocNetworkSecurityStrategyZhuXiaoyan;WuQianhong;WangYumin[Journal]NetworkSecurityTechnologyandApplication2004-01-01
207AsecurityelectronicauctionmodelbasedonBitPromisesWangJilin;YuBinxiao;WangYumin[Journal]JournalofComputerScience2004-03-12
208TheconditionsanddesignofperfectingthesecretcryptosystemKangBaoyuan;WangYumin[Journal]CommunicationsJournal2004-02-25
209Animprovedsignaturewithsubmarinechannel(English)ZhangJianhong;WuQianhong;WangJilin;WangYumin[Journal]PostgraduateofChineseAcademyofSciencesJournaloftheChineseAcademyofSciences2004-03-15
210TheOptimalContractSigningSchemeWithoutForceChenXiaofeng;WangJilin;WangYumin[Journal]ElectronicJournal2004-03-25
211AclustersignatureschemebasedontheideaofringsignatureWangJilin;ZhangJianhong;WangYumin[Journal]JournalofElectronics2004-03-25
212IntroductiontotheTKIPprotocolanditssecurityanalysisZhuXiaoyan;TianHaibo;WangYumin[Journal]InformationSecurityandCommunicationSecrecy2004-04-10
213TCPFloodAttacksandCountermeasuresunderDDoSSunXi;ZhuXiaoyan;WangYumin[Journal]NetworkSecurityTechnologyandApplication2004-04-01
214ConditionsforaCompleteSecretSharingSchemeKangBaoyuan;WangYumin[Journal]JournalofEngineeringMathematics2004-04-30
215AnunconditionallyanonymoussigncryptionalgorithmWangJilin;MaoJian;WangYumin[Journal]JournalofElectronicsandInformation2004-03-20
216SignatureSchemeBasedonGeneralizedXTRSystemChenXiaofeng;WangJilin;WangYumin[Journal]JournalofElectronicsandInformationTechnology2004-04-20
217AuthorizedGroupSignatureHuangZhenjie;HaoYanhua;WangYumin[Journal]JournalofElectronics2004-05-25
218Zero-knowledgeproofofDSAdigitalsignatureWangShangping;WangYumin;WangXiaofeng;ZhangYaling;QinBo[Journal】ActaElectronica2004-05-25
219AnelectronicvotingschemebasedonMixnetGaoHuming;WangJilin;WangYumin[Journal]ElectronicActa2004-06-25
220SchnorrsignatureandringsignaturealgorithmbasedonXTRWangJilin;WuQianhong;GaoHuming;WangYumin[Journal]JournalofXidianUniversity2004-06-20
221AmultiplesigncryptionmodelanditsapplicationZhangJianhong;WangJilin;WangYumin[Journal]JournalofXidianUniversity2004-06-20
222AnewbroadcastchannelconferenceKeyAgreementProtocolMaoJian;GaoHuming;WangYumin[Journal]ActaElectronica2004-04-25
223AnimprovedspatialLSBconcealmentalgorithmGaoMing;ChenDan;WangYumin[Journal]NetworkSecurityTechnologyandApplication2004-08-01
Signatureof224CamenischGroupSchemeimprovementandmemberabolitionHuangZhenjie;NiuZhihua;WangYumin[Journal]JournalofComputerScience2004-08-12
225VerifiablesecretsharingofinformationtheorysecurityonvectorspaceaccessstructureZhangFutaiShiJun;WangYumin[Journal]JournalofElectronicsandInformation2004-08-20
226ADoSattacksecurityvulnerabilityintheIKEprotocolDingYong;PengZhiwei;WangYumin[Journal]ZTETechnology2004-08-10
Thedesignof227short-frameTurbocodeinterleaverWangYing;LiHui;WangYumin【Journal】JournalofCircuitsandSystems2004-08-30
228AgroupsignatureschemebasedontheChineseremaindertheoremChenZewen;ZhangLongjun;WangYumin;HuangJiwu;HuangDaren[Journal]JournalofElectronics2004-07-25
229Simplyprovethatacommitmentvalueiswithinacertainintervalbeforethefirstred;ZhangJianhong;WangYumin[Journal]JournalofElectronics2004-07-25
230ResearchandProgressofPublicKeyCryptographyChenXiaofeng;WangYumin[Journal]JournalofCommunications2004-08-25
231AnefficientmatchingprotocolWuQianhong;ZhangJianhong;WangYumin[Journal]JournalofCommunications2004-08-25
232Amobileagent-basedmicrosecurepaymentprotocolLiuYi;WangYumin[Journal]Xi’anElectronicsJournalofUniversityofScienceandTechnology2004-08-20
233IKEActiveModeGroupInconsistencyImprovementMethodGengHang;PengZhiwei;WangYumin[Journal]ComputerSecurity2004-11-05
Theapplicationresearchof234ellipticcurvecryptographyine-commercecashsystemYangXiaoyuan;ZhouXuanwu;WangYumin;ZhangMinqing[Journal]JournalofNavalUniversityofEngineering2004-10-30
235ConvertiblePartiallyBlindSignatureofDesignatedVerifierHuangZhenjie;HaoYanhua;WangYumin[Journal]JournalofXidianUniversity2004-10-20
236BattleofWirelessAccessTechnologyWangYumin[Journal]ZTETechnology2004-12-30
237AnewdigitalimagedetectionschemeQinQing;YangXiaoyuan;WangYumin;WangZhigang【Journal】ComputerEngineeringandApplication2004-11-11
238NominatedSignatureandNominatedAgencySignatureHuangZhenjie;HaoYanhua;WangYumin【Journal】ElectronicsJournalofInformationandInformationTechnology2004-12-20
239AnAuthenticatedGroupKeyAgreementProtocolBasedonDLEProtocol——EAGKADingYong;TianHaibo;WangYumin[Journal]Xi’anElectronicTechnologyJournaloftheUniversity2004-12-20
240RobustwatermarkauthenticationalgorithmusingvisualmaskingvalueChenDan;WuQianhong;WangYumin[Journal]JournalofXidianUniversity2004-12-20
241AlgorithmdesignandsecurityanalysisofseveralpartialblindsignaturesZhangTong;WangYumin[Journal]JournalofXidianUniversity2004-12-20
242AnalysisofPolynomialTransformationandBitSecurityofDHKeysJiangZhengtao;WuQianhong;WangYumin[Journal]JournalofCommunications2004-12-25
243ClosedthresholdThetheoreticalmodelofthelowerchannelLiShuhai;WangYumin[Journal]JournalofSunYat-SenUniversity(NaturalScienceEdition)2004-12-30
244Pan-blindmaskingbasedonprincipalcomponentanalysisandRBFnetworkChenDan;ZhangJianhong;WangYumin[Journal]JournalofSunYat-senUniversity(NaturalScienceEdition)2004-12-30
245AfastandeffectivegeometricdistortioncorrectionofwatermarkedimagesAlgorithmYangXiaoyuan;JiChengli;WangYumin;ZhangMinqing[Journal]JournalofSunYat-SenUniversity(NaturalScienceEdition)2004-12-30
246AnalysisandimprovementJiangZhengtao;YuanChunhua;XuWenli;WangYumin[Journal]JournalofCommunications2004-11-25
247TwoID-basedring-likesignatureschemes(English)ZhangJianhong;WangJilin;WangYumin[Journal]JournaloftheGraduateSchooloftheChineseAcademyofSciences2005-01-15
248ImageStealthDetectionAlgorithmBasedonWaveletPacketDecompositionandSupportVectorMachineWangZhigang;YangXiaoyuan;WangYumin;QinQing[Journal]ComputerEngineering2005-01-05
Theefficientrealizationofmembercancellationinthe249ACJTgroupsignatureschemeChenZewen;WangJilin;HuangJiwu;WangYumin;HuangDaren[Journal]SoftwareJournal2005-01-30
250ApubliclyverifiableM+1electronicauctionwithminimalleakageWuQianhong;JiangZhengtao;YuanSuchun;WangYumin[Journal]JournalofCommunications2005-01-25
251ResearchprogressofanonymitytechnologyWangJilin;WuQianhong;ChenDeren;WangYumin[Journal]JournalofCommunications2005-02-25
252AnalysisofInadvertentTransmissionProtocolJiangZhengtao;HaoYanhua;WangYumin[Journal]JournalofXidianUniversity2005-02-20
253PubliclyverifiableElGamal/RSAencryptionWuQianhong;WangJilin;YuanSuchun;WangYumin[Journal]JournalofElectronicsandInformationTechnology2005-04-20
254AnefficientalternativeEncryptionsystemtoverifyintegrityandmessagesourceJiangZhengtao;PangLiaojun;WangYumin[Journal]JournalofElectronicsandInformationTechnology2005-04-20
255Blockcipher-basedfrequencyhoppingsequencefamilyconstructionLiZan;ChangYilin;CaiJueping;WangYumin[Journal]ActaElectronica2005-04-25
256OFDMfrequencyoffsetcorrectionsystembasedontimedomainoversamplingWangYali;LuJunzhe;WangYumin[Journal]JournalofElectronics2005-04-25
257NewThoughtsonTrapdoorOne-wayFunctionEncryptionModelChenYuan;XiaoGuozhen;WangYumin
b>[Journal]ActaElectronica2005-04-25258ResearchandDevelopmentofDigitalImageStealthDetectionSystemQinQing;YangXiaoyuan;WangYumin[Journal]ComputerEngineering2005-04-05
259A(t,n)multiplesecretsharingschemebasedongeometricpropertiesPangLiaojun;WangYumin[Journal]JournalofXi’anJiaotongUniversity2005-04-10
260KeyAgreementSchemeforWirelessMobileNetworksQinBo;ZhouKefu;QinHui;WangShangping;WangYumin[Journal]JournalofXi’anUniversityofTechnology2005-03-30
261Akey-basedimageconcealmentalgorithmShiPeng;ChenDan;WangYumin[Journal]ComputerScience2004-09-25
262withjudgmentfeedbackBlindMaximumLikelihoodSequenceEstimationXuJinbiao;WangYumin;DuLimin[Journal]ActaElectronica1999-04-25
263KeyEscrowSchemeinMobileCommunicationSunXiaorong;LiuJianwei;WangYumin[Journal]ElectronicJournal1999-04-25
264AnelectronicpaymentsystemwithrevocableanonymityusingSmartcardsYangBo;LiuShengli;WangYumin【Journal]ActaElectronica1999-10-25
265UnconditionalSecurityKeyExtractionLiuShengli;WangYumin[Journal]ActaElectronica1999-10-25
266MCJofTMNprotocolModelanalysisZhengDong;WangYumin[Journal]JournalofElectronics1999-10-25
267Arealizationofanti-activeattackconfidentialityenhancementLiuShengli;TianJianbo;WangYuminb>[Journal]ActaElectronica1999-11-25
268ResearchonAuthenticationandKeyDistributioninComputerDistributedEnvironmentSunXiaorong;WangYumin[Journal]ChineseJournalofComputers1999-06-12
269AFairPaymentSystemUsingElectronicWalletYangBo;WangYumin[Journal]ChineseJournalofComputers1999-08-12
270UnconditionalsecurekeyagreementResearchonauthenticationissuesinChinaLiuShengli;WangYumin[Journal]JournalofComputerScience1999-11-12
271ConferenceKeyDistributionSchemeBasedonPCNAuthenticationArchitectureSunXiaorong;LiuJianwei;WangYumin[Journal]JournalofCommunications1999-12-30
272PublicKeyAuthenticationinDistributedEnvironmentSunXiaorong;LiuJianwei;WangYumin[Journal]JournalofCommunications1999-12-30
273MobileuserauthenticationschemebasedonmodifiedElGamalsignatureLiuJianwei;WangYumin;XiaoGuozhen[Journal]JournalofXidianUniversity1999-02-20
274ATypeofBelief-ReducibleAuthenticationProtocolLiuShengli;TianJianbo;WangYumin[Journal]JournalofXidianUniversity1999-04-20
275BasedonRabinencryptionalgorithmYangBo;ZhengDong;WangYumin[Journal]JournalofXidianUniversity1999-04-20
276Theconstructionofpseudo-randomsynthesizerbasedonellipticcurveZhengDongYangBo;WangYumin[Journal]JournalofXidianUniversity1999-06-20
277AnelectronicpaymentsystemwithrevocableanonymityYangBo;LiuShengli;WangYumin[Journal]JournalofXidianUniversity1999-08-20
278UnconditionalsecuritysecretkeylengthextractedbypublicnegotiationLiuShengli;WangYumin[Journal]Xi’anElectronicsJournalofUniversityofScienceandTechnology1999-08-20
279AmessageauthenticationcodebasedonlatticeproblemZhengDong;WangYumin[Journal]JournalofXidianUniversity1999-10-20
Thecascadestructureof280inputvariable-lengthmessageauthenticationcodeZhengDong;YangBo;WangYumin[Journal]JournalofXidianUniversity1999-12-20
281Asecureandefficientgeneralverifiablesecretsharingprotocol(English)ZhangFutai;ZhangFangguo;WangYumin[Journal]JournalofSoftware2002-07-23
282ApplicationandDevelopmentofMicroelectronicPaymentProtocolZhaoFuxiang;ZhangFutai;WangYumin[Journal]JournalofCommunications2002-01-25
283AuthenticationandPaymentResearchJiDongyao;WangYumin[Journal]JournalofCommunications2002-02-25
284AnalysisofWeilDescentAlgebraicAttackonHyperellipticCurveDiscreteLogarithmZhangFangguo;WangYumin[Journal]JournalofCommunications2002-03-25
285ResearchonSeveralMethodsofClosingSubliminalChannelsZhangTong;YangBo;WangYumin;LiZhenfu[Journal]JournalofCommunications2002-04-25
286signcryptionthresholdgenerationprotocolZhangFutai;JiDongyao;WangYumin[Journal]JournalofCommunications2002-05-25
287ElectronicsResearchStatusandProgressofAuctionChenXiaofeng;WangYumin[Journal]JournalofCommunications2002-12-25
288ApubliclyverifiablesecretsharingschemebasedondiscretelogarithmZhangFutai;JiDongyao;WangYumin[Journal]JournalofXidianUniversity2002-02-25
Thecomplexityanalysisofpseudo-randomsequences~∞and?~∞on289GF(2)WangShangPing;GaoHuming;WangYumin[Journal]JournalofXidianUniversity2002-02-25
290SharedverificationsignatureschemebasedonverifiablesecretsharingZhangFutai;ZhaoFuxiang;WangYumin[Journal]JournalofXidianUniversity2002-04-25
HonorAward
1."CommunicationNetworkSecurity-TheoryandTechnology"2002Wonthefirstprizeforexcellenttextbooksofordinarycollegesanduniversitiesnationwide,andrecommendedpostgraduatetextbooksnationwide.
2,"BroadbandWirelessNetworkWAPISecurityTechnology"wonthesecondprizeofNationalTechnologyInventionin2005.
ThecontentofBaiduEncyclopediaisco-editedbynetizens.Ifyoufindthatthecontentofyourentryisinaccurateorimperfect,welcometousemyentryeditingservice(free)toparticipateinthecorrection.Gonow>>
Latest: Doctrine
Next: Computer surfing