default search action
Pengwei Wang 0006
Person information
- affiliation: University of Calgary, Calgary, Canada
Other persons with the same name
- Pengwei Wang (aka: PengWei Wang, Peng-Wei Wang, Wang Peng Wei) — disambiguation page
- Pengwei Wang 0001 — Donghua University, Shanghai, China
- Pengwei Wang 0002 — Shandong University of Technology, School of Transportation and Vehicle Engineering, Zibo, China
- Pengwei Wang 0003 — Chinese Academy of Sciences, Shanghai Institute of Optics and Fine Mechanics, Shanghai, China (and 1 more)
- Pengwei Wang 0004 — South China University of Technology, Guangzhou, China
- Pengwei Wang 0005 — Alibaba, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c11]Reihaneh Safavi-Naini, Pengwei Wang:
Secure Key Agreement over Partially Corrupted Channels. ISIT 2018: 2649-2653 - 2017
- [c10]Pengwei Wang, Reihaneh Safavi-Naini:
Interactive message transmission over adversarial wiretap channel II. INFOCOM 2017: 1-9 - 2016
- [j2]Pengwei Wang, Reihaneh Safavi-Naini:
A Model for Adversarial Wiretap Channels. IEEE Trans. Inf. Theory 62(2): 970-983 (2016) - [c9]Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang:
Codes for Detection of Limited View Algebraic Tampering. Inscrypt 2016: 309-320 - [c8]Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang:
Detecting Algebraic Manipulation in Leaky Storage Systems. ICITS 2016: 129-150 - [i7]Reihaneh Safavi-Naini, Pengwei Wang:
Information-theoretically Secure Key Agreement over Partially Corrupted Channels. CoRR abs/1604.03824 (2016) - [i6]Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang:
Detecting Algebraic Manipulation in Leaky Storage Systems. CoRR abs/1607.00089 (2016) - 2015
- [j1]Reihaneh Safavi-Naini, Pengwei Wang:
A Model for Adversarial Wiretap Channels and its Applications. J. Inf. Process. 23(5): 554-561 (2015) - [c7]Pengwei Wang, Reihaneh Safavi-Naini, Fuchun Lin:
Erasure adversarial wiretap channels. Allerton 2015: 1061-1068 - [c6]Pengwei Wang, Reihaneh Safavi-Naini:
Adversarial wiretap channel with public discussion. CNS 2015: 281-289 - [c5]Pengwei Wang, Reihaneh Safavi-Naini:
Limited View Adversary Codes: Bounds, Constructions and Applications. ICITS 2015: 214-235 - 2014
- [c4]Pengwei Wang, Reihaneh Safavi-Naini:
An efficient code for Adversarial Wiretap channel. ITW 2014: 40-44 - [i5]Pengwei Wang, Reihaneh Safavi-Naini:
Efficient Codes for Adversarial Wiretap Channels. CoRR abs/1401.4633 (2014) - [i4]Pengwei Wang, Reihaneh Safavi-Naini:
Adversarial Wiretap Channel with Public Discussion. CoRR abs/1403.5598 (2014) - 2013
- [c3]Reihaneh Safavi-Naini, Pengwei Wang:
Efficient codes for Limited View adversarial channels. CNS 2013: 215-223 - [c2]Reihaneh Safavi-Naini, Pengwei Wang:
Codes for limited view adversarial channels. ISIT 2013: 266-270 - [i3]Reihaneh Safavi-Naini, Pengwei Wang:
Efficient Codes for Limited View Adversarial Channels. CoRR abs/1303.2735 (2013) - [i2]Pengwei Wang, Reihaneh Safavi-Naini:
A Model for Adversarial Wiretap Channel. CoRR abs/1312.6457 (2013) - 2012
- [c1]Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Pengwei Wang:
A General Construction for 1-Round δ-RMT and (0, δ)-SMT. ACNS 2012: 344-362 - [i1]Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Pengwei Wang:
A General Construction for 1-round δ-RMT and (0, δ)-SMT. IACR Cryptol. ePrint Arch. 2012: 231 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint