Wang Yumin

honggarae 12/04/2022 830

XidianUniversityInformationEngineeringExpert

ExpertInformation

WangYumin,bornonFebruary18,1936,isanativeofBeijing.HeiscurrentlyaprofessoranddoctoralsupervisorintheSchoolofCommunicationEngineeringofXidianUniversity.Part-timeprofessoranddoctoralsupervisorofSunYat-senUniversity.HeonceservedasthedirectoroftheeditorialboardoftheJournalofXidianUniversityandthedirectoroftheinformationtheoryteachingandresearchsection.

Educationandworkexperience

InJuly1959,hegraduatedfromXidianUniversitywithafive-yeartelecommunicationsengineeringmajor.

FromDecember1979toDecember1981,hewenttotheDepartmentofElectricalEngineering,UniversityofHawaiiasavisitingscholar.

InOctober1986,heservedasaprofessorintheSchoolofCommunicationEngineeringofXidianUniversity.

InOctober1992,hewasratedasadoctoralsupervisorincryptography.

Socialservice

1.FellowoftheChineseInstituteofElectronicsandtheChineseInstituteofCommunications.

2.HonorarydirectorofChinaCryptographySociety.

3.MemberofChinaNaturalFoundationResearchAssociation.

4.IEEEseniormember.

5.OnceservedasthedirectoroftheNationalCollegesandUniversitiesCommunicationandInformationEngineeringTeachingSteeringCommittee.

6.FormermemberoftheInformationTheorySocietyoftheChineseInstituteofElectronics.

7.OnceservedasthevicechairmanoftheShaanxiInstituteofElectronicsandthedirectoroftheacademiccommittee.

8.From1996to2000,heservedasthedirectoroftheNationalCollegesandUniversitiesCommunicationandInformationEngineeringTeachingSteeringCommittee.

9.Memberoftheeditorialboardof"ChinaCommunications"(English),memberoftheeditorialboardof"ZTETechnology"magazine,andmemberoftheeditorialboardof"InformationandCommunicationEngineering".

10."KeyLaboratoryofComputerNetworkandInformationSecurityoftheMinistryofEducation,XidianUniversity","KeyLaboratoryofInformationSecurityTechnologyofGuangdongProvince","KeyLaboratoryofCryptographyandInformationSecurityofShandongUniversity,MinistryofEducation","TsinghuaUniversityCryptographicTheoryandTechnologyResearchCenter"academiccommitteemember.

Scientificresearch

Researchdirection

Hehaslongbeenengagedinteachingandscientificresearchonthetheoryandapplicationofcommunication,informationtheory,coding,andcryptography.

Scientificresearchprojects

PresidedoveranumberofscientificresearchessuchastheNationalNaturalScienceFoundationofChina,theConfidentialCommunicationDevelopmentFund,theMilitaryElectronicPre-researchFund,andtheEighthFive-YearMilitaryCommunicationEquipmentDevelopment.

ScientificResearchAchievements

WonthesecondprizeofNationalTechnologyInventionAward,thesecondandthirdprizeofScienceandTechnologyAchievementoftheMinistryofElectronics,thesecondprizeofScienceandTechnologyProgressAwardoftheProvincialEducationCommission,andthesecondprizeofNationalTeachingAchievement.ThethirdprizeofGuanghuaFundandsoon.

Publishedbooks

    Thesismonograph

    Publishedmorethan200papersinacademicjournalsandconferencesathomeandabroad,publishedmonographsandtranslationsManybooks.

    Publishedmonographs:

    1."StillRandomSequencesandTheirApplications",NationalDefenseIndustryPress,1985.

    2,"Confidentiality:BasicsandApplications",XidianUniversityPress,1990.

    3,"TheSecurityofCommunicationNetworks-TheoryandTechnology"XidianUniversityPress1999(wonthefirstprizeofexcellenttextbooksforordinarycollegesanduniversitiesnationwide,andthepostgraduateteachingbooksrecommendedbythePostgraduateOfficeoftheMinistryofEducation).

    4,"NetworkSecurity:TechnologyandPractice"TsinghuaUniversityPress2005.

    5,"InformationTheoryandCodingTheory"HigherEducationPress2005(WonthefirstprizeofexcellenttextbooksforordinarycollegesanduniversitiesinShaanxiProvince).

    6,"InformationHiding:TheoryandTechnology"TsinghuaUniversityPress2006.

    7,"CryptographyandDataSecurity"(translation),NationalDefenseIndustryPress,1991.

    Publishedpapers

    1Alarge-capacityrobustdigitalwatermarkingschemebasedoncodedivisionmultipleaccessXuWenli;WangMingyu;WangYumin[Journal]JournalofJilinUniversity(EngineeringEdition)2011-03-15

    2AnanonymousbroadcastauthenticationprotocolforwirelesssensornetworksbasedonbilinearpairingDingYong;HuJian;LiYahui;WangYumin[Journal]JilinUniversityJournal(EngineeringEdition)2011-03-15

    3Provablysecureidentity-basedsignatureschemeunderthestandardmodelMingYang;ShenXiaoqin;PangLiaojun;WangYumin[Journal]JournalofBeijingUniversityofPostsandTelecommunications2011-02-15

    4Anidentity-basedsignatureschemewithintermediarySuWanli;ZhangXiaohong;YangJungang;WangYuminJournalofNorthUniversityofChina(NaturalScienceEdition)2010-12-15

    5Adaptivemulti-partynon-repudiationprotocolLiLei;WangYumin[Journal]NetworkSecurityTechnologyandApplication2010-03-15

    6DonotusetwolinesNon-certificateauthenticationprotocolforsexpairsZhuHui;LiHui;TanShichong;WangYumin[Journal]JournalofWuhanUniversity(InformationScienceEdition)2010-05-05

    7StandardsProvablysecuremulti-identitysingle-keydecryptionschemeunderthemodelMingYang;WangYumin;PangLiaojun[Journal]ComputerScience2010-03-15

    8Identity-basedkeylessescrowChameleonhashfunctionandsignatureZhanYang;TianHaibo;ChenXiaofeng;WangYumin[Journal]JournalofBeijingUniversityofTechnology2010-05-15

    9LinearshiftregistersinsecureRSAmodeResearchonApplicationofMathsJiangZhengtao;WangYong;WangYongbin;WangYumin[Journal]JournalofCommunications2010-05-25

    10Non-repudiationprotocolfairnessanalysisofextendedstringspacemethodLiLei;ChenJing;WangYumin[Journal]JournalofXi’anJiaotongUniversity2010-06-10

    11TheformationanddevelopmentofinformationspaceWangYuminXidianUniversitySchoolofCommunicationEngineering[Journal]ZTETechnology2010-10-10

    12AcertificatelesssigncryptionschemewithoutbilinearpairingZhuHui;LiHui;WangYumin【Journal】ComputerResearchandDevelopment2010-09-15

    13Anewwhole-diskencryptionschemebasedonlogicalpasswordlockZhaoFuxiang;PangLiaojun;WangYumin【Journal】ComputerScience2010-10-15

    14EfficientandsecureidentityauthenticationprotocolunderthestandardmodelLiYanping;WangYumin[Journal]JournalofCommunications2009-01-15

    15NewprovablysecurefastauthenticationprotocolZhuHui;LiHui;PangLiaojun;WangYumin[Journal]ElectronicsJournalofUniversityofScienceandTechnology2009-01-31

    16PCLProofofWAPIKeyManagementProtocolTieManxia;LiJiandong;WangYumin[Journal]JournalofElectronicsandInformation2009-02-15

    17AfastauthenticationprotocolundertheCanetti-KrawczykmodelZhuHui;LiHui;WangYumin[Journal]JournalofXidianUniversity2009-02-20

    18NewID-basedidentityauthenticationschemeLiYanping;SuWanli;WangYumin[Journal]JournalofHarbinEngineeringUniversity2009-01-15

    19Efficientanonymouspassword-basedTanShichong;PangLiaojun;SuWanli;WangYumin[Journal]JournalofCommunications2009-04-15

    20Identity-basedanonymouswirelessauthenticationschemeZhuHui;LiHui;SuWanli;WangYumin[Journal]JournalofCommunications2009-04-15

    21Provablysecuremulti-trustdomainauthenticationkeyagreementprotocolZhuHui;LiHui;WangYumin[Journal]JournalofHuazhongUniversityofScienceandTechnology(NaturalScienceEdition)2009-05-15

    22ResearchandAnalysisontheEffectivenessandWeakModelofRSAPopularizationCyclicAttackJiangZhengtao;HuaiJinPeng;WangYumin[Journal]JournalofCommunications2009-06-25

    23PartiallyblindsignaturewithoutcertificateSuWanli;TanShichong;LiYanping;WangYumin【Journal]JournalofJilinUniversity(EngineeringandTechnologyEdition)2009-07-15

    24SupportingtransparentofflineTTPmulti-partynon-repudiationprotocolLiLei;YangJiaxi;WangYumin[Journal]JournalofJilinUniversity(EngineeringEdition)2009-07-15

    25DirectedDiffusionProtocolSecurityAnalysisandImprovementPangLiaojun;LiHuixian;LiuYi;JiaoLicheng;WangYumin【Journal】SystemEngineeringandElectronicsTechnology2009-07-15

    26AneffectivecertificatelesssignatureschemeSuWanli;LiHui;ZhangYueyu;WangYumin[Journal]JournalofJiangsuUniversity(NaturalScienceEdition)2009-07-10

    27No-certificateblindsignatureschemeSuWanli;ZhangYueyu;ZhangXiaohong;WangYumin[Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2009-07-31

    28Designandanalysisofaprovablysecuremulti-receiverpublickeyencryptionschemePangLiaojun;LiHuixian;JiaoLicheng;WangYumin[Journal]JournalofSoftware2009-10-15

    29Commentson"NewProvablySecureDigitalSignatureScheme"LiYanping;WangYumin[Journal]JournalofHuaihaiInstituteofTechnology(NaturalScienceEdition)2009-09-15

    30secretKeychainmulti-partynon-repudiationprotocolLiLei;TanXinlian;WangYumin[Journal]ComputerScience2009-10-15

    31AkeymanagementschemesuitableforadhocnetworkswithoutasecurechannelLiHuixian;PangLiaojun;WangYumin[Journal]JournalofCommunications2010-01-25

    32AnelectronicauctionschemetoprotectbiddingsecurityQinBo;QinHui;WangShangping;WangYumin[Journal]ComputerResearchandDevelopment2006-01-30

    33Multi-secretsharingschemebasedongeneralaccessstructurePangLiaojun;JiangZhengtao;WangYumin[Journal]ComputerResearchAnddevelopment2006-01-30

    34AnimprovedsignaturesystembasedonbraidgroupDingYong;TianHaibo;WangYumin[Journal]JournalofXidianUniversity2006-02-20

    35AJPEGimagemaskingalgorithmthatpreserveshistogramcharacteristicsChenDan;LuoXin;WangYumin[Journal]JournalofElectronicsandInformationTechnology2006-02-28

    36ResearchonConstructingPublicKeyCryptosystemBasedonLFSRHigh-orderResidualProblemJiangZhengtao;LiuYi;WangYumin[Journal]JournalofElectronicsandInformation2006-03-30

    37IKEActiveModeGroupInconsistencyImprovementMethodGengHang;PengZhiwei;WangYumin[Journal]ComputerEngineering2006-02-20

    38AnewfairelectronicmoneysystemZhangJianhong;WangYumin[Journal]ComputerEngineering2006-03-20

    39AnovelcolorwatermarkimagegeometricdistortioncorrectionalgorithmYangXiaoyuan;JiChengli;WangYumin;ZhangChong[Journal]ComputerEngineering2006-03-20

    40AsecureAdHocOn-demandroutingprotocolDuXinjun;WangYing;GeJianhua;WangYumin【Journal]JournalofCircuitsandSystems2006-02-28

    41Aneffective(t,n)thresholdmultiplesecretsharingsystemPangLiaojun;LiuYi;WangYumin[Journal]JournalofElectronics2006-04-30

    42CryptographicAnalysisofTwoTraitorTrackingSchemesZhangXuejun;WangYumin[Journal]ComputerEngineeringandApplications2006-05-21

    43BasedonprincipalcomponentsAnalysisofPan-blindMaskingAnalysisSchemeChenDan;ZhangJianhong;WangYumin[Journal]JournalofImageandGraphics2006-03-30

    44AnewkindofnothirdpartyparticipationThebuyer-sellerwatermarkingagreementZhangXuejun;WangYumin[Journal]ComputerApplication2006-07-01

    45Amulti-service-orientedandrevocableasymmetricpublickeytraitortracingschemeZhangXuejun;WangYumin[Journal]ComputerApplication2006-08-01

    46ImprovementandAnalysisofG-PaillierEncryptionSystemJiangZhengtao;LiuYi;WangYumin【Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2006-08-20

    47ThresholdsecretsharingschemebasedonECCanditssecurityPangLiaojun;ZhanYang;WangYumin[Journal]XidianUniversityJournal(NaturalScienceEdition)2006-08-20

    48Apubliclyverifiableandforward-securesigncryptionschemeLiYanping;TanShichong;WangYumin[Journal]ComputerApplicationsResearch2006-09-01

    49Anewmulti-partyundeniableagreementLiYanping;SiGuangdong;WangYumin[Journal]ComputerScience2006-08-25

    50AnAnti-collusionAsymmetricPublicKeyTraitorTrackingSchemeZhangXuejun;ZhouLihua;WangYumin[Journal]ComputerScience2006-08-25

    51TwoCryptographicanalysisofproxysignatureschemeMingYang;WangYumin[Journal]ComputerScience2006-08-25

    52BlindsignatureandproxysignaturebasedonidentitywithouttrustedcenterZhangXuejun;WangYumin[Journal]ComputerApplication2006-10-01

    53AsafeandefficientM+1electronicauctionYangJiaxi;WangYumin[Journal]NetworkSecurityTechnologyandApplication2006-11-01

    54Fastalgorithmforsuperellipticcurvewithgenus3inprimenumberfieldHaoYanhua;TanShichong;WangYumin【Journal】ComputerScience2006-10-25

    55Multi-secretsharingschemebasedongeometricpropertiesandgeneralaccessstructurePangLiaojun;LiHuixian;WangYumin[Journal]ComputerScience2006-10-25

    56A(t,nthresholdsignature-(k,mthresholdverificationgroupsignatureProjectPangLiaojun;LiHuixian;WangYumin[Journal]ComputerScience2006-11-25

    57AFairandEffectiveElectronicPaymentProtocolPangLiaojun;LiShuhai;WangYumin[Journal]ComputerEngineering2006-11-20

    58Efficientidentity-basedproxyblindsignatureZhangXuejun;WangYumin[Journal]ComputerApplication2006-11-01

    59AnimprovedstrongproxysignatureschemeMingYang;JiangZhengtao;WangYumin[Journal]JournalofXidianUniversity2006-10-20

    60JointnamedproxysignatureschemeLeiQiang;WangYumin[Journal]JournalofXidianUniversity2006-10-20

    61ResearchontheComputationalReliabilityofFormalAttackerCapabilityDescriptionTianHaibo;DingYong;WangYumin[Journal]JournalofXidianUniversity2006-10-20

    62EfficientproofofcommitmentvalueinaspecificintervalZhangJingliang;MaLizhen;WangYumin[Journal】JournalofXidianUniversity2006-12-20

    63ImprovedTraitorTrackingSchemeBasedonBilinearMappingZhangXuejun;ZhouLihua;WangYumin[Journal]JournalofBeijingUniversityofPostsandTelecommunications2006-12-30

    64Securityanalysisofaproxymulti-signatureZhangJianhong;ZouJiancheng;WangYumin[Journal]JournalofHarbinInstituteofTechnology2006-11-30

    65Asafeandefficientthresholdmulti-secretsharingschemePangLiaojun;WangYumin[Journal]ComputerScience2006-01-25

    66Aboutconstructinganeasy-to-accessandsecuremanagementResearchonGridJiangZhengtao;YiPengchao;WangYumin[Journal]ComputerScience2006-04-25

    67SecretsharingschemebasedonLUCgeneralaccessstructureanditssecurityPangLiaojun;LiHuixian;WangYumin[Journal]ComputerScience2006-05-25

    68AnefficientgeneralizeddesignatedverifiersignatureverificationMingYang;LiShuhai;WangYumin

    b>[Journal]JournalofElectronics2006-12-15

    69Newidentity-basedblindsignatureandproxysignaturewithouttrustedcenterZhangXuejun;WangYumin[Journal]ComputerEngineeringandApplication2007-01-01

    70verifiable(t,n)thresholdsecretsharingschemeanditssecurityPangLiaojun;LiHuixian;WangYumin[Journal]JournalofSouthChinaUniversityofTechnology(sinceNaturalScienceEdition)2007-01-30

    71Efficientidentity-basedproxysigncryptionZhangXuejun;WangYumin[Journal]ComputerEngineeringandApplications2007-01-21

    72Anti-fraudsecretsharingschemebasedonLUCcryptosystemPangLiaojun;LiHuixian;WangYumin[Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2007-02-20

    73BifenyuanziImprovementofseveralresultsofelementrepresentationingroupJiangZhengtao;LiuJianwei;YuanPingzhi;WangYumin[Journal]JournalofCommunications2007-01-25

    74AnalternatingstructurebasedonchaoticmappingImageencryptionalgorithmZhangYiwei;WangYumin;ShenXubang[Journal]ScienceinChina(SeriesE:InformationScience)2007-02-28

    75Efficientidentity-basedpartialblindsignatureZhangXuejun;WangYumin[Journal]ComputerEngineeringandApplications2007-04-11

    76AnanonymousdigitalfingerprintingschemebasedongroupsignatureTanShichong;WangYumin

    b>[Journal]ComputerScience2007-03-25

    77AvideowatermarkingalgorithmagainstgeometricattacksYangXiaoyuan;NiuKe;WeiPing;WangYumin[Journal]ComputerEngineering2007-04-20

    78AFraudPrevention(t,n)ThresholdDigitalSignatureSchemePangLiaojun;TanShichong;WangYumin[Journal]JournalofElectronicsandInformation2007-04-30

    79ZhangJingliang,afastHarnsystemdevelopedbyn-adic;WangYumin[Journal]ComputerScience2007-05-25

    80SomeevidencesCryptographicAnalysisoftheSecureSignatureSchemeMingYang;WangYumin[Journal]ComputerScience2007-05-25

    81ImplementationofVRMLNetworkCommunicationFunctionBasedonJavaPangLiaojun;LiHuixian;WangLi;WangYumin[Journal]ComputerEngineering2007-06-05

    82ForwardSecurityAuthenticationandEncryptionSchemeLiYanping;YangWenjie;WangYumin[Journal]HuaihaiJournalofInstituteofTechnology(NaturalScienceEdition)2007-06-15

    83DesignofImage-basedInformationStealthDetectionSystemLiuJia;YangXiaoyuan;WangYumin;TangYuhua[Journal]ComputerEngineering2007-06-20

    84Parallelalgorithmforsuperellipticcurvedivisoradditionwithgenus3HaoYanhua;FanXinxin;WangYumin【Journal】ComputerScience2007-08-25

    85SpreadspectrumwatermarkingschemebasedonchaoticscramblingandhybridtransformdomainXuWenli;SuWanli;LiLei;WangYumin[Journal]ComputerScience2007-07-25

    86AnefficientLocalverifierrevocationgroupsignatureschemeZhangYueyu;PangLiaojun;SuWanli;WangYumin[Journal]JournalofXidianUniversity2007-10-15

    87AsafeandefficientaccessstructureSecretSharingSchemePangLiaojun;LiHuixian;WangYumin[Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2007-10-20

    88RestrictedGeneralizedDesignatedVerifierSignatureundertheStandardModelMingYang;ShenXiaoqin;WangYumin[Journal]JournalofJilinUniversity(EngineeringandTechnologyEdition)2007-11-15

    89AnewelectronicauctionbasedonHashchainYangJiaxi;LiYongjiang;WangYumin[Journal]ComputerEngineering2007-10-05

    90Chameleonsignatureschemebasedonbilinearpairing(English)DuXinjun;WangYing;GeJianhua;WangYumin【Journal]JournalofSoftware2007-10-15

    91CryptographicanalysisoftwoprovablysecureshortsignatureschemesMingYang;WangYumin【Journal】ComputerEngineering2007-11-20

    92Averifiablemulti-secretsharingschemesuitableforarbitraryaccessstructureZhangFutai;WangYumin[Journal]JournalofCommunications2007-11-15

    93OneIND-CCA2CompletelyAnonymousShortGroupSignatureZhangYueyu;ChenJie;SuWanli;WangYumin[Journal]JournalofComputerScience2007-10-15

    94AmobileagentdataresistanttotruncationattacksProtectionschemeLiuYi;ZhangLing;WangYumin[Journal]ComputerEngineering2007-12-05

    TheUsabilityAnalysisandImprovementof95WAPIProtocolTieManxia;LiJiandong;WangYumin[Journal]ComputerScience2007-10-15

    96ADisclosureMethodforProtectingSensitiveAttributeCertificatesJiangZhengtao;HuaiJinpeng;WangYumin[Journal]BeijingAirlinesJournalofUniversityofAstronautics2007-12-15

    97AquantumencryptionalgorithmbasedonkeyrecoveryLiShuhai;WangYumin【Journal】ComputerScience2007-11-25

    98AgeneralmaskinganalysistechniqueforadditiveairspacemaskingalgorithmsChenDan;WangYumin【Journal】JournalofSoutheastUniversity(NaturalScienceEdition)2007-09-20

    99Improvedforward-secureauthenticationandencryptionschemeLiYanping;ZhangJingliang;WangYumin[Journal]JournalofSoutheastUniversity(NaturalScienceEdition)2007-09-20

    100Encryption|n|+AnefficientpublickeyprobabilisticencryptionsystemforkbitplaintextJiangZhengtao;LiuJianwei;QinBo;WangYumin[Journal]JournalofBeijingUniversityofAeronauticsandAstronautics2008-01-15

    101Usingmulti-basechainsAnefficientalgorithmforcalculatingellipticcurvescalarmultiplicationHaoYanhua;LiLei;WangYumin[Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2008-11-30

    1021-out-of-ninadvertentlytransmittedTransformationandApplicationZhangJingliang;MaLizhen;WangYumin[Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2008-11-30

    103AnimprovedcertificatelesssignatureschemeMingYang;ZhanYang;WangYumin;PangLiaojun[Journal]JournalofXidianUniversity2008-12-15

    104Quantumkeydistributionprotocolonfour-dimensionalHilbertspaceLiShuhai;WangYumin【Journal】ComputerScience2008-01-25

    105AnanonymousandefficientM+1electronicauctionYangJiaxi;TanXinlian;WangYumin【Journal】ComputerScience2008-02-25

    106ApubliclyverifiablesecureelectronicauctionschemeYangJiaxi;LiLei;WangYumin[Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2008-01-30

    107NewpasswordauthenticationKeyAgreementProtocolTanShichong;ZhangNing;WangYumin[Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2008-01-30

    108SecureandefficientwatermarkauthenticationprotocolXuWenli;YuYeyun;WangYumin[Journal]ComputerResearchandDevelopment2008-03-15

    109ThedesignatedverifierproxysignatureschemewithoutrandomoracleMingyang;WangYumin[Journal]JournalofElectronicsandInformationTechnology2008-03-15

    110Paillier-PointchevalPublicKeyProbabilisticEncryptionSystemImprovementJiangZhengtao;LiuJianwei;WangYumin[Journal]ComputerEngineering2008-02-05

    111Robustdigitalwatermarkingschemeagainstnoise,geometricdistortionandJPEGcompressionattacksXuWenli;LiLei;WangYumin【Journal】JournalofElectronicsandInformationTechnology2008-04-15

    112RSAinZ[ω]ZhangJingliang;WangYumin[Journal]MathematicalPracticeandUnderstanding2008-04-23

    113ID-basedringsignatureschemeunderthestandardmodelZhangYueyu;LiHui;WangYumin[Journal]JournalofCommunications2008-04-15

    114MingYang,aneffectivecertificatelesssignaturescheme;WangYumin[Journal]JournalofUniversityofElectronicScienceandTechnologyofChina2008-03-30

    115NewandperfectWAPIprotocolsecurityanalysis(English)PangLiaojun;LiHuixian;WangYumin[Journal]JournalofSoutheastUniversity(EnglishEdition)2008-03-15

    116AdistributedautonomoustrustcomputingmodelZhanYang;PangLiaojun;ZhuXiaoyan;WangYumin[Journal]JournalofXidianUniversity2008-06-20

    117ResearchonanewpublickeycryptosystemequivalenttothedecompositionoflargeintegersJiangZhengtao;ZhangJingliang;WangYumin[Journal]JournalofElectronicsandInformationTechnology2008-06-15

    118Privacy-protectedvehicleauthenticationbasedongroupsignatureinvehiclenetworkZhangJingliang;ZhangYueyu;WangYumin[Journal]JournalofWuhanUniversityofTechnology(TransportationScienceandEngineeringEdition)2008-06-15

    119AfairandpubliclyverifiableelectronicauctionprotocolYangJiaxi;LiLei;ZhuHui;WangYumin[Journal]JournalofJilinUniversity(EngineeringandTechnologyEdition)2008-07-15

    120AsecureelectronicauctionschemebasedongroupsignaturesZhangYueyu;LiHui;WangYumin

    b>[Journal]JournalofXidianUniversity2008-08-20

    121DynamicThresholdMultipleSecretSharingSchemePangLiaojun;LiHuixian;WangYumin[Journal]ComputerEngineering2008-08-05

    122ApracticalAdhocnetworkauthenticationroutingprotocolAARPTieManxia;LiJiandong;WangYumin[Journal]ComputerScience2008-08-25

    123Averifiablethresholdmulti-secretsharingschemePangLiaojun;LiHuixian;LiZhijie;WangYumin[Journal]JournalofHarbinInstituteofTechnology2008-09-15

    124WirelessSensorNetworkNodesAuthenticationandKeyAgreementProtocolPangLiaojun;JiaoLicheng;WangYumin[Journal]JournalofSensorTechnology2008-08-15

    125WirelesssensornetworkbroadcastkeybasedonsecretsharingDistributionAgreementPangLiaojun;LiHuixian;JiaoLicheng;WangYumin【Journal】JournalofSensorTechnology2008-10-20

    126AnalysisandimprovementoftwoquantumkeydistributionprotocolsusingBellmeasurementbasesLiShuhai;MingYang;WangYumin[Journal]JournalofJilinUniversity(Engineering)Edition)2008-11-15

    127Multi-bankfairelectroniccashsystembasedonACJTgroupblindsignatureZhangJingliang;HuangHuawei;WangYumin[Journal]JournalofWuhanUniversityofTechnology(TransportationScienceandEngineeringEdition)2008-10-15

    128ID-basedthresholdmultiplesecretsharingschemePangLiaojun;PeiQingqi;JiaoLicheng;WangYumin[Journal]JournalofSoftware2008-10-15

    129Anidentity-basedanonymouswirelessauthenticationprotocolZhuHui;LiHui;WangYumin;LiuShuanggen[Journal]JournalofWuhanUniversity(ScienceEdition)2008-10-24

    130IdentityauthenticationschemebasedoncertificatelesspublickeycryptosystemLiYanping;WangYumin[Journal]JournalofWuhanUniversity(ScienceEdition)2008-10-24

    131YesShortgroupsignatureschemewithpartialverifierrevocationDomainAuthenticationProtocolZhuHui;LiHui;YangJiaxi;WangYumin[Journal]JournalofWuhanUniversity(InformationScienceEdition)2008-10-05

    133WirelessSensorNetworkSecurityRoutingProtocolDesignandAnalysisPangLiaojun;JiaoLicheng;WangYumin[Journal]JournalofSensorTechnology2008-09-15

    134Apracticaloff-linefairelectroniccashsystemGaoHuming;MaoJian;WangYumin[Journal]JournalofElectronics2003-02-25

    135AsecureelectronicvotingschemebasedonanonymouscommunicationchannelsChenXiaofeng;WangYumin[Journal]】ActaElectronica2003-03-25

    136DistributedkeygenerationbasedongeneralizedverifiablesecretsharingZhangFutai;WangYumin【Journal】ActaElectronica2003-04-25

    p>

    137AnimprovedsecurityanalysisofTSENG-JANgroupsignatureZhangJianhong;WangYumin;ZhangFutai[Journal]ElectronicJournal2003-04-25

    138AsecureSealedelectronicauctionschemeWangJilin;ChenXiaofeng;WangYumin[Journal]JournalofElectronics2003-10-25

    139Non-receiptelectronicvotingbasedonsemi-trustmodelChenXiaofeng;WangJilin;WangYumin[Journal]ChineseJournalofComputers2003-05-12

    140DigitaltimeauthenticationschemebasedonPKIsystemHanWei;FengFei;ChenXiaofeng;WangYumin[Journal]JournalofComputerScience2003-10-12

    141Anew(t,N-2)flexibleMixNetGaoHuming;ChenXiaofeng;WangYumin【Journal]ChineseJournalofComputers2003-10-12

    142TurbocodematrixdescriptionanditsinfluenceoninterleaverdesignWangYing;LiHui;WangYumin[Journal]JournalofComputers2003-10-12

    143AverifieddigitalsignatureschemebasedonDSAandRSAWangShangping;WangYumin;ZhangYaling[Journal]JournalofSoftware2003-03-23

    144UpdateOperatorSolutionforMemberDeletioninGroupSignatureWangShangping;WangYumin;WangXiaofeng;QinBo;HeCheng;ZouYoujiao[Journal]JournalofSoftware2003-11-23

    145AneffectiveOFDMtime-frequencysynchronizationsystemsuitableforRayleighfadingchannelsWangYali;HeFei;ZhangHailin;WangYumin[Journal]JournalofCommunications2003-01-25

    146Aproxyencryptionconversioninformationtransmissionschemebasedonmulti-partysecretsharingZhaoFuxiang;ZhaoHongyun;WangYumin;YangShiping[Journal]JournalofCommunications2003-04-25

    147RSA-basedMultipledigitalsignaturesZhangJianhong;WeiYongzhuang;WangYumin[Journal]JournalofCommunications2003-08-25

    148Forwardsecuredigitalsignatureschemebasedonzero-knowledgeproofWangShangping;WangYumin;WangXiaofeng;QinBo;ZhangYaling[Journal]JournalofCommunications2003-09-25

    149Afourth-ordermeanvalueformulasimilartoDedekindsumsChenXiaofeng;WangYumin;ZhangWenpeng[Journal]JournalofNorthwestUniversity(NaturalScienceEdition)2003-04-25

    150ResearchProgressofSecureElectronicAuctionsWangJilin;ChenXiaofeng;WangYumin[Journal]Xi'anElectronicTechnologyJournaloftheUniversity2003-02-25

    151Fullyanonymousandconvertiblemulti-certificateelectronicauctionZhangJianhong;WuQianhong;WangYumin[Journal]JournalofXidianUniversity2003-04-25

    152Keyagreementschemebasedonsecuretwo-partycalculationChenXiaofeng;WuQianhong;WangYumin[Journal]Xi’anElectronicsJournalofUniversityofScienceandTechnology2003-08-25

    153AnewelectronicauctionbasedonsecretsharingZhangJianhong;WuQianhong;WangYumin[Journal]JournalofXidianUniversity2003-10-25

    154AsafeM+1priceelectronicauctionschemeWangJilin;GaoHuming;WangYumin[Journal]JournalofXidianUniversity2003-10-25

    155SecuremobileagentbasedonproxysignaturechainZhangJianhong;WuQianhong;WangYumin[Journal]JournalofXidianUniversity2003-12-25

    156BasedonRSAFunction-basedpracticalelectronicauctionschemeWuQianhong;ZhuXiaoyan;WangYumin[Journal]JournalofXidianUniversity2003-12-25

    157SeveraladvancesininformationsecuritytheoryandtechnologySituationWangYumin[Journal]NationalScienceFoundation2003-04-23

    158WiMAXSecurityMechanismResearchPangLiaojun;WangYumin[Journal]ZTETechnology2005-04-10

    159OpenSSLprogramdesignYuanSuchun;WangYumin;LiGang[Journal]ComputerSecurity2005-06-05

    160Privacy-protecteddigitalproductsonlineTransactionplanMaoJian;YangBo;WangYumin[Journal]JournalofElectronics2005-06-25

    161AnefficientgroupsignatureZhangJianhong;WuQianhong;ZouJiancheng;WangYumin[Journal]ActaElectronica2005-06-25

    162WatermarkimagedistortioncorrectionalgorithmbasedongeometrictransformationfeaturesetYangXiaoyuan;JiChengli;WangYumin;QinQing[Journal]ComputerEngineeringandApplications2005-06-01

    163BasedonRSAcryptosystem(t,n)thresholdsecretsharingschemePangLiaojun;WangYumin[Journal]JournalofCommunications2005-06-25

    164UseeffectiveinversionalgorithmtoquicklycalculatehyperellipticcurvescalarmultiplicationHaoYanhua;JiangZhengtao;WangYumin[Journal]JournalofXidianUniversity2005-06-20

    165ThebestperiodicinterleavingmethodbasedonfinitefieldWangYing;WangYumin[Journal]JournalofXidianUniversity2005-06-20

    166ApplicationofSupportVectorMachineinImageStealthDetectionYangXiaoyuan;WangZhigang;WangYumin[Journal]JournalofXidianUniversity2005-06-20

    167MobileagentsecurepaymentprotocolbasedonverifiablesecretsharingLiuYi;XuWenli;WangYumin[Journal]JournalofSouthChinaUniversityofTechnology(NaturalScienceEdition)2005-06-28

    168BasedonChameleonSignatureSchemeBasedonBilinearPairsandIdentity(English)DuXinjun;WangYing;GeJianhua;WangYumin[Journal]JournalofSouthChinaUniversityofTechnology(NaturalScienceEdition)2005-06-28

    169Mobileagent-basedvariableroutingsecurityprotocolLiuYi;WuQianhong;WangYumin[Journal]ChineseJournalofComputers2005-07-12

    170ConstantComplexityHundredsThemillionaireagreementQinBo;QinHui;ZhouKefu;WangXiaofeng;WangYumin[Journal]JournalofXi'anUniversityofTechnology2005-06-30

    171WatermarkdetectionbasedonerrorcontrolcodingXuWenli;WangYumin[Journal]ElectronicsActa2005-07-25

    172Merkletree-basedsecuremobileagentroutingprotocolanditspromotionLiuYi;JiangZhengtao;WangYumin[Journal]ActaElectronica2005-07-25

    173AnewmaskinganalysistechniquebasedonimagecomplexityTianWei;ChenDan;WangYumin[Journal]InformationCommandandcontrolsystemandsimulationtechnology2005-08-15

    174AnefficientdirectedtransfersignatureschemeHuangZhenjie;HaoYanhua;WangYumin;ChenKefei[Journal]JournalofElectronics2005-08-25

    175FurtherresearchoncryptosystembasedoncubiclinearrecursivesequenceJiangZhengtao;SunXi;TianLei;WangYumin[Journal]JournalofCommunications2005-09-25

    176SecurityAnalysisofConstantinGroupSignatureZhangJianhong;WangYumin[Journal]JournalofNorthChinaUniversityofTechnology2005-09-30

    177Apan-blindcrypticforcolorimagesAnalysisschemeChenDan;ChenYuan;WangYumin[Journal]JournalofElectronicsandInformationTechnology2005-10-20

    178SecureMobileAgentRoutingBasedonHashFunctionCollisionLiuYi;JiangZhengtao;WangYumin[Journal]ComputerApplications2005-09-10

    179AnoptimizedpaymentprotocolbasedonmobileagentsLiuYi;PangLiaojun;WangYumin[Journal]ComputerResearchAnddevelopment2005-10-16

    180(t,n)thresholdsecretsharingschemebasedonLUCcryptosystemPangLiaojun;WangYumin[Journal]JournalofXidianUniversity2005-12-20

    181PowercontrolandcapacitysimulationinCDMA2000SongXin;WangYumin[Journal]ZTETechnology2005-12-10

    182Nyberg-RueppelmessagerecoverygeneralizationandimprovementofblindsignatureHuangZhenjie;WangYumin;ChenKefei[Journal]JournalofCommunications2005-12-25

    183BlindsignatureschemebasedonXTRsystemChenXiaofeng;GaoHuming;WangYumin[Journal]JournalofElectronicsandInformationTechnology2003-06-15

    184ArobustroutingprotocolbasedonmobileagentsLiuYi;WangYumin[Journal]ComputerResearchandDevelopment2005-12-16

    Afastcalculationmethodforscalarmultiplicationinthe185KoblitzcurveDingYong;LiXinguo;WangYumin

    b>[Journal]JournalofNorthwestUniversity(NaturalScienceEdition)2005-12-25

    186ModulardesignmethodoffairelectroniccontractagreementPangLiaojun;LiuYi;WangYumin[Journal]ComputerScience2005-03-23

    187Merkletree-basedsecuremobileagentroutingprotocolLiuYi;JiangZhengtao;WangYumin[Journal]ComputerScience2005-07-23

    188SecurityanalysisofanencryptionsystembasedonellipticcurveJiangZhengtao;HaoYanhua;WangYumin[Journal]ComputerScience2005-09-23

    189AkindofeliminationElectronicauctionwithoutauctionhouseZhangJianhong;WangYumin[Journal]ComputerEngineeringandDesign2003-08-28

    190XMLOverviewFuHaiying;LiHui;WangYumin[Journal]CommunicationTechnology2003-02-28

    191AnembeddedintrusiondetectionsystemforapplicationsFengFei;HanWei;WangYumin[Journal]CommunicationTechnology2003-02-28

    Theeffectivenessof192Turbocodeonnon-standardsource-channelWangYing;LiHui;WangYumin【Journal】CommunicationTechnology2003-03-30

    193ImageauthenticationandintegrityprotectiontechnologybasedonwatermarkChenDan;WangYumin[Journal]CommunicationTechnology2003-08-30

    194AkindofeliminationZhangJianhong;WangYumin[Journal]JournaloftheGraduateSchooloftheChineseAcademyofSciences2003-09-30

    195WLANSecurityImplementationMechanismTianHaibo;PengZhiwei;WangYumin[Journal]ZTETechnology2003-04-25

    AnalysisofEnhancedWLANSecurityTechnologyin196NiYuan;PengZhiwei;WangYumin[Journal]ZTETechnology2003-12-25

    197NewProgressinInformationSecurityTechnologyWangYumin[Journal]ZTETechnology2003-12-30

    198AschemeforenhancingthesecurityofAdhocnetworkroutingprotocolZhuXiaoyan;WangYumin[Journal]JournalofHuazhongUniversityofScienceandTechnology(NaturalScienceEdition)2003-12-30

    p>

    199AnalysisandResearchonActualIntrusionDetectionFengFei;WangYumin[Journal]NetworkSecurityTechnologyandApplication2003-04-15

    200RoutingProtocolSecurityResearchShiPeng;TianHaibo;WangYumin[Journal]NetworkSecurityTechnologyandApplication2003-07-15

    AnalysisandResearchon201IntrusionDetectionandResponseSystemShaoXianguo;ShiPeng;WangYumin[Journal]NetworkSecurityTechnologyandApplication2003-09-15

    202XMLandrelatedsecurityresearchprogressFuHaiying;LiHui;WangYumin【Journal】ComputerApplicationResearch2004-02-28

    203Zero-knowledgeproofwithRSAdigitalsignatureWangShangping;WangYumin;WangXiaofeng;QinBo[Journal]JournalofCommunications2004-01-25

    204PublicKeyCryptosystemandtheSecurityofSelectedCiphertextChenYuan;WangYumin;XiaoGuozhen[Journal]JournalofXidianUniversity2004-02-20

    205Abulletinboard-basedanti-rejectionagreementZhangJianhong;WangJilin;WangYumin[Journal]JournalofElectronicsandInformation2004-02-20

    206MobileAdhocNetworkSecurityStrategyZhuXiaoyan;WuQianhong;WangYumin[Journal]NetworkSecurityTechnologyandApplication2004-01-01

    207AsecurityelectronicauctionmodelbasedonBitPromisesWangJilin;YuBinxiao;WangYumin[Journal]JournalofComputerScience2004-03-12

    208TheconditionsanddesignofperfectingthesecretcryptosystemKangBaoyuan;WangYumin[Journal]CommunicationsJournal2004-02-25

    209Animprovedsignaturewithsubmarinechannel(English)ZhangJianhong;WuQianhong;WangJilin;WangYumin[Journal]PostgraduateofChineseAcademyofSciencesJournaloftheChineseAcademyofSciences2004-03-15

    210TheOptimalContractSigningSchemeWithoutForceChenXiaofeng;WangJilin;WangYumin[Journal]ElectronicJournal2004-03-25

    211Aclustersignatureschemebasedontheideaof​​ringsignatureWangJilin;ZhangJianhong;WangYumin[Journal]JournalofElectronics2004-03-25

    212IntroductiontotheTKIPprotocolanditssecurityanalysisZhuXiaoyan;TianHaibo;WangYumin[Journal]InformationSecurityandCommunicationSecrecy2004-04-10

    213TCPFloodAttacksandCountermeasuresunderDDoSSunXi;ZhuXiaoyan;WangYumin[Journal]NetworkSecurityTechnologyandApplication2004-04-01

    214ConditionsforaCompleteSecretSharingSchemeKangBaoyuan;WangYumin[Journal]JournalofEngineeringMathematics2004-04-30

    215AnunconditionallyanonymoussigncryptionalgorithmWangJilin;MaoJian;WangYumin[Journal]JournalofElectronicsandInformation2004-03-20

    216SignatureSchemeBasedonGeneralizedXTRSystemChenXiaofeng;WangJilin;WangYumin[Journal]JournalofElectronicsandInformationTechnology2004-04-20

    217AuthorizedGroupSignatureHuangZhenjie;HaoYanhua;WangYumin[Journal]JournalofElectronics2004-05-25

    218Zero-knowledgeproofofDSAdigitalsignatureWangShangping;WangYumin;WangXiaofeng;ZhangYaling;QinBo[Journal】ActaElectronica2004-05-25

    219AnelectronicvotingschemebasedonMixnetGaoHuming;WangJilin;WangYumin[Journal]ElectronicActa2004-06-25

    220SchnorrsignatureandringsignaturealgorithmbasedonXTRWangJilin;WuQianhong;GaoHuming;WangYumin[Journal]JournalofXidianUniversity2004-06-20

    221AmultiplesigncryptionmodelanditsapplicationZhangJianhong;WangJilin;WangYumin[Journal]JournalofXidianUniversity2004-06-20

    222AnewbroadcastchannelconferenceKeyAgreementProtocolMaoJian;GaoHuming;WangYumin[Journal]ActaElectronica2004-04-25

    223AnimprovedspatialLSBconcealmentalgorithmGaoMing;ChenDan;WangYumin[Journal]NetworkSecurityTechnologyandApplication2004-08-01

    Signatureof224CamenischGroupSchemeimprovementandmemberabolitionHuangZhenjie;NiuZhihua;WangYumin[Journal]JournalofComputerScience2004-08-12

    225VerifiablesecretsharingofinformationtheorysecurityonvectorspaceaccessstructureZhangFutaiShiJun;WangYumin[Journal]JournalofElectronicsandInformation2004-08-20

    226ADoSattacksecurityvulnerabilityintheIKEprotocolDingYong;PengZhiwei;WangYumin[Journal]ZTETechnology2004-08-10

    Thedesignof227short-frameTurbocodeinterleaverWangYing;LiHui;WangYumin【Journal】JournalofCircuitsandSystems2004-08-30

    228AgroupsignatureschemebasedontheChineseremaindertheoremChenZewen;ZhangLongjun;WangYumin;HuangJiwu;HuangDaren[Journal]JournalofElectronics2004-07-25

    229Simplyprovethatacommitmentvalueiswithinacertainintervalbeforethefirstred;ZhangJianhong;WangYumin[Journal]JournalofElectronics2004-07-25

    230ResearchandProgressofPublicKeyCryptographyChenXiaofeng;WangYumin[Journal]JournalofCommunications2004-08-25

    231AnefficientmatchingprotocolWuQianhong;ZhangJianhong;WangYumin[Journal]JournalofCommunications2004-08-25

    232Amobileagent-basedmicrosecurepaymentprotocolLiuYi;WangYumin[Journal]Xi’anElectronicsJournalofUniversityofScienceandTechnology2004-08-20

    233IKEActiveModeGroupInconsistencyImprovementMethodGengHang;PengZhiwei;WangYumin[Journal]ComputerSecurity2004-11-05

    Theapplicationresearchof234ellipticcurvecryptographyine-commercecashsystemYangXiaoyuan;ZhouXuanwu;WangYumin;ZhangMinqing[Journal]JournalofNavalUniversityofEngineering2004-10-30

    235ConvertiblePartiallyBlindSignatureofDesignatedVerifierHuangZhenjie;HaoYanhua;WangYumin[Journal]JournalofXidianUniversity2004-10-20

    236BattleofWirelessAccessTechnologyWangYumin[Journal]ZTETechnology2004-12-30

    237AnewdigitalimagedetectionschemeQinQing;YangXiaoyuan;WangYumin;WangZhigang【Journal】ComputerEngineeringandApplication2004-11-11

    238NominatedSignatureandNominatedAgencySignatureHuangZhenjie;HaoYanhua;WangYumin【Journal】ElectronicsJournalofInformationandInformationTechnology2004-12-20

    239AnAuthenticatedGroupKeyAgreementProtocolBasedonDLEProtocol——EAGKADingYong;TianHaibo;WangYumin[Journal]Xi’anElectronicTechnologyJournaloftheUniversity2004-12-20

    240RobustwatermarkauthenticationalgorithmusingvisualmaskingvalueChenDan;WuQianhong;WangYumin[Journal]JournalofXidianUniversity2004-12-20

    241AlgorithmdesignandsecurityanalysisofseveralpartialblindsignaturesZhangTong;WangYumin[Journal]JournalofXidianUniversity2004-12-20

    242AnalysisofPolynomialTransformationandBitSecurityofDHKeysJiangZhengtao;WuQianhong;WangYumin[Journal]JournalofCommunications2004-12-25

    243ClosedthresholdThetheoreticalmodelofthelowerchannelLiShuhai;WangYumin[Journal]JournalofSunYat-SenUniversity(NaturalScienceEdition)2004-12-30

    244Pan-blindmaskingbasedonprincipalcomponentanalysisandRBFnetworkChenDan;ZhangJianhong;WangYumin[Journal]JournalofSunYat-senUniversity(NaturalScienceEdition)2004-12-30

    245AfastandeffectivegeometricdistortioncorrectionofwatermarkedimagesAlgorithmYangXiaoyuan;JiChengli;WangYumin;ZhangMinqing[Journal]JournalofSunYat-SenUniversity(NaturalScienceEdition)2004-12-30

    246AnalysisandimprovementJiangZhengtao;YuanChunhua;XuWenli;WangYumin[Journal]JournalofCommunications2004-11-25

    247TwoID-basedring-likesignatureschemes(English)ZhangJianhong;WangJilin;WangYumin[Journal]JournaloftheGraduateSchooloftheChineseAcademyofSciences2005-01-15

    248ImageStealthDetectionAlgorithmBasedonWaveletPacketDecompositionandSupportVectorMachineWangZhigang;YangXiaoyuan;WangYumin;QinQing[Journal]ComputerEngineering2005-01-05

    Theefficientrealizationofmembercancellationinthe249ACJTgroupsignatureschemeChenZewen;WangJilin;HuangJiwu;WangYumin;HuangDaren[Journal]SoftwareJournal2005-01-30

    250​​ApubliclyverifiableM+1electronicauctionwithminimalleakageWuQianhong;JiangZhengtao;YuanSuchun;WangYumin[Journal]JournalofCommunications2005-01-25

    251ResearchprogressofanonymitytechnologyWangJilin;WuQianhong;ChenDeren;WangYumin[Journal]JournalofCommunications2005-02-25

    252AnalysisofInadvertentTransmissionProtocolJiangZhengtao;HaoYanhua;WangYumin[Journal]JournalofXidianUniversity2005-02-20

    253PubliclyverifiableElGamal/RSAencryptionWuQianhong;WangJilin;YuanSuchun;WangYumin[Journal]JournalofElectronicsandInformationTechnology2005-04-20

    254AnefficientalternativeEncryptionsystemtoverifyintegrityandmessagesourceJiangZhengtao;PangLiaojun;WangYumin[Journal]JournalofElectronicsandInformationTechnology2005-04-20

    255Blockcipher-basedfrequencyhoppingsequencefamilyconstructionLiZan;ChangYilin;CaiJueping;WangYumin[Journal]ActaElectronica2005-04-25

    256OFDMfrequencyoffsetcorrectionsystembasedontimedomainoversamplingWangYali;LuJunzhe;WangYumin[Journal]JournalofElectronics2005-04-25

    257NewThoughtsonTrapdoorOne-wayFunctionEncryptionModelChenYuan;XiaoGuozhen;WangYumin

    b>[Journal]ActaElectronica2005-04-25

    258ResearchandDevelopmentofDigitalImageStealthDetectionSystemQinQing;YangXiaoyuan;WangYumin[Journal]ComputerEngineering2005-04-05

    259A(t,n)multiplesecretsharingschemebasedongeometricpropertiesPangLiaojun;WangYumin[Journal]JournalofXi’anJiaotongUniversity2005-04-10

    260KeyAgreementSchemeforWirelessMobileNetworksQinBo;ZhouKefu;QinHui;WangShangping;WangYumin[Journal]JournalofXi’anUniversityofTechnology2005-03-30

    261Akey-basedimageconcealmentalgorithmShiPeng;ChenDan;WangYumin[Journal]ComputerScience2004-09-25

    262withjudgmentfeedbackBlindMaximumLikelihoodSequenceEstimationXuJinbiao;WangYumin;DuLimin[Journal]ActaElectronica1999-04-25

    263KeyEscrowSchemeinMobileCommunicationSunXiaorong;LiuJianwei;WangYumin[Journal]ElectronicJournal1999-04-25

    264AnelectronicpaymentsystemwithrevocableanonymityusingSmartcardsYangBo;LiuShengli;WangYumin【Journal]ActaElectronica1999-10-25

    265UnconditionalSecurityKeyExtractionLiuShengli;WangYumin[Journal]ActaElectronica1999-10-25

    266MCJofTMNprotocolModelanalysisZhengDong;WangYumin[Journal]JournalofElectronics1999-10-25

    267Arealizationofanti-activeattackconfidentialityenhancementLiuShengli;TianJianbo;WangYuminb>[Journal]ActaElectronica1999-11-25

    268ResearchonAuthenticationandKeyDistributioninComputerDistributedEnvironmentSunXiaorong;WangYumin[Journal]ChineseJournalofComputers1999-06-12

    269AFairPaymentSystemUsingElectronicWalletYangBo;WangYumin[Journal]ChineseJournalofComputers1999-08-12

    270UnconditionalsecurekeyagreementResearchonauthenticationissuesinChinaLiuShengli;WangYumin[Journal]JournalofComputerScience1999-11-12

    271ConferenceKeyDistributionSchemeBasedonPCNAuthenticationArchitectureSunXiaorong;LiuJianwei;WangYumin[Journal]JournalofCommunications1999-12-30

    272PublicKeyAuthenticationinDistributedEnvironmentSunXiaorong;LiuJianwei;WangYumin[Journal]JournalofCommunications1999-12-30

    273MobileuserauthenticationschemebasedonmodifiedElGamalsignatureLiuJianwei;WangYumin;XiaoGuozhen[Journal]JournalofXidianUniversity1999-02-20

    274ATypeofBelief-ReducibleAuthenticationProtocolLiuShengli;TianJianbo;WangYumin[Journal]JournalofXidianUniversity1999-04-20

    275BasedonRabinencryptionalgorithmYangBo;ZhengDong;WangYumin[Journal]JournalofXidianUniversity1999-04-20

    276Theconstructionofpseudo-randomsynthesizerbasedonellipticcurveZhengDongYangBo;WangYumin[Journal]JournalofXidianUniversity1999-06-20

    277AnelectronicpaymentsystemwithrevocableanonymityYangBo;LiuShengli;WangYumin[Journal]JournalofXidianUniversity1999-08-20

    278UnconditionalsecuritysecretkeylengthextractedbypublicnegotiationLiuShengli;WangYumin[Journal]Xi’anElectronicsJournalofUniversityofScienceandTechnology1999-08-20

    279AmessageauthenticationcodebasedonlatticeproblemZhengDong;WangYumin[Journal]JournalofXidianUniversity1999-10-20

    Thecascadestructureof280inputvariable-lengthmessageauthenticationcodeZhengDong;YangBo;WangYumin[Journal]JournalofXidianUniversity1999-12-20

    281Asecureandefficientgeneralverifiablesecretsharingprotocol(English)ZhangFutai;ZhangFangguo;WangYumin[Journal]JournalofSoftware2002-07-23

    282ApplicationandDevelopmentofMicroelectronicPaymentProtocolZhaoFuxiang;ZhangFutai;WangYumin[Journal]JournalofCommunications2002-01-25

    283AuthenticationandPaymentResearchJiDongyao;WangYumin[Journal]JournalofCommunications2002-02-25

    284AnalysisofWeilDescentAlgebraicAttackonHyperellipticCurveDiscreteLogarithmZhangFangguo;WangYumin[Journal]JournalofCommunications2002-03-25

    285ResearchonSeveralMethodsofClosingSubliminalChannelsZhangTong;YangBo;WangYumin;LiZhenfu[Journal]JournalofCommunications2002-04-25

    286signcryptionthresholdgenerationprotocolZhangFutai;JiDongyao;WangYumin[Journal]JournalofCommunications2002-05-25

    287ElectronicsResearchStatusandProgressofAuctionChenXiaofeng;WangYumin[Journal]JournalofCommunications2002-12-25

    288ApubliclyverifiablesecretsharingschemebasedondiscretelogarithmZhangFutai;JiDongyao;WangYumin[Journal]JournalofXidianUniversity2002-02-25

    Thecomplexityanalysisofpseudo-randomsequences~∞and?~∞on289GF(2)WangShangPing;GaoHuming;WangYumin[Journal]JournalofXidianUniversity2002-02-25

    290SharedverificationsignatureschemebasedonverifiablesecretsharingZhangFutai;ZhaoFuxiang;WangYumin[Journal]JournalofXidianUniversity2002-04-25

    HonorAward

    1."CommunicationNetworkSecurity-TheoryandTechnology"2002Wonthefirstprizeforexcellenttextbooksofordinarycollegesanduniversitiesnationwide,andrecommendedpostgraduatetextbooksnationwide.

    2,"BroadbandWirelessNetworkWAPISecurityTechnology"wonthesecondprizeofNationalTechnologyInventionin2005.

    ThecontentofBaiduEncyclopediaisco-editedbynetizens.Ifyoufindthatthecontentofyourentryisinaccurateorimperfect,welcometousemyentryeditingservice(free)toparticipateinthecorrection.Gonow>>

    Latest: Doctrine

    Next: Computer surfing