default search action
Ping Wang 0005
Person information
- affiliation: Shenzhen University, College of Information Engineering, China
- affiliation (PhD 2012): Sun Yat-sen University, Guangzhou, China
Other persons with the same name
- Ping Wang (aka: Wang Ping) — disambiguation page
- Ping Wang 0001 — York University, Department of Electrical Engineering and Computer Science, Toronto, Canada (and 2 more)
- Ping Wang 0002 — PLA University of Science and Technology, College of Defense Engineering, Nanjing, China
- Ping Wang 0003 — Peking University, School of Software and Microelectronics / National Engineering Research Center for Software Engineering, Beijing, China
- Ping Wang 0004 — Tongji University, Department of Information and Communication Engineering, Shanghai, China (and 1 more)
- Ping Wang 0006 — Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore (and 2 more)
- Ping Wang 0007 — Kun Shan University, Department of Information Management, Taiwan (and 1 more)
- Ping Wang 0008 — Chongqing University of Posts and Telecommunications, Key Laboratory of Industrial Internet of Things and Networked Control, China (and 1 more)
- Ping Wang 0009 — Xi'an Jiaotong University, School of Electronic and Information Engineering, China
- Ping Wang 0010 — Zhengzhou Science and Technology Institute, China
- Ping Wang 0011 — Jilin University, Department of Control Science and Engineering, Changchun, China
- Ping Wang 0012 — Georgia Institute of Technology, Atlanta, GA, USA
- Ping Wang 0013 — University of Southampton, UK
- Ping Wang 0014 — Chinese Academy of Sciences, Institute of Electrical Engineering, Key Laboratory of Power Electronics and Electric Drive, Beijing, China
- Ping Wang 0015 — Tianjin University, School of Electrical and Information Engineering, China
- Ping Wang 0016 — Shandong University of Finance and Economics, Department of Computer Science and Technology, Jinan, China
- Ping Wang 0017 — Sun Yat-sen University, Shenzhen, China (and 4 more)
- Ping Wang 0018 — National University of Defense Technology, Intelligence Science College, Changsha, China
- Ping Wang 0019 — North China Electric Power University, Hebei Provincial Key Laboratory of Power Transmission Equipment Security Defense, Baoding, China
- Ping Wang 0020 — Chinese Academy of Sciences, Institute of Geographic Sciences and Natural Resources Research, Beijing, China
- Ping Wang 0021 — Xidian University, School of Telecommunications Engineering, State Key Laboratory of Integrated Service Networks, Xi'an, China
- Ping Wang 0022 — Texas A&M University, Deptartment of Electrical and Computer Engineering; TX, USA
- Ping Wang 0023 — St. Francis Xavier University, Department of Mathematics, Statistics and Computer Science, Antigonish, NS, Canada
- Ping Wang 0024 — Stevens Institute of Technology, Hoboken, NJ, USA (and 1 more)
- Ping Wang 0025 — University of Queensland, Brisbane, Australia (and 2 more)
- Ping Wang 0026 — Zhejiang University, Department of Biomedical Engineering, Cancer Center, Hangzhou, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j16]Ping Wang, Weiqian Chen, Songlian Lin, Liyan Liu, Zhiwei Sun, Fangguo Zhang:
Consensus algorithm based on verifiable quantum random numbers. Int. J. Intell. Syst. 37(10): 6857-6876 (2022) - [j15]Ping Wang, Weiqian Chen, Zhiwei Sun:
Consensus algorithm based on verifiable randomness. Inf. Sci. 608: 844-857 (2022) - [j14]Ping Wang, Rui Zhang, Zhiwei Sun:
BB84. Quantum Inf. Comput. 22(3&4): 241-250 (2022) - [j13]Ping Wang, Xiaohong Chen, Zhiwei Sun:
Semi-quantum secure direct communication against collective-dephasing noise. Quantum Inf. Process. 21(10): 352 (2022) - [i5]Ping Wang, Yiting Su, Fangguo Zhang:
Secure Quantum Bit Commitment. IACR Cryptol. ePrint Arch. 2022: 1238 (2022) - 2020
- [j12]Ping Wang, Shengping Tian, Zhiwei Sun, Ning Xie:
Quantum algorithms for hash preimage attacks. Quantum Eng. 2(2) (2020)
2010 – 2019
- 2019
- [c6]Fangguo Zhang, Zhijie Liu, Ping Wang, Haibo Tian:
Improving ECDLP Computation in Characteristic 2. Inscrypt 2019: 535-550 - 2018
- [j11]Long Hai, Qinghua Gao, Jie Wang, He Zhuang, Ping Wang:
Delay-Optimal Back-Pressure Routing Algorithm for Multihop Wireless Networks. IEEE Trans. Veh. Technol. 67(3): 2617-2630 (2018) - 2017
- [j10]Steven D. Galbraith, Ping Wang, Fangguo Zhang:
Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm. Adv. Math. Commun. 11(3): 453-469 (2017) - [j9]Ping Wang, Zhiwei Sun, Xiaoqiang Sun:
Multi-party quantum key agreement protocol secure against collusion attacks. Quantum Inf. Process. 16(7): 170 (2017) - [j8]Long Hai, Jie Wang, Ping Wang, Hongyu Wang, Tingting Yang:
High-Throughput Network Coding Aware Routing in Time-Varying Multihop Networks. IEEE Trans. Veh. Technol. 66(7): 6299-6309 (2017) - [c5]Ping Wang, DongDong Shang:
A New Lattice Sieving Algorithm Base on Angular Locality-Sensitive Hashing. Inscrypt 2017: 65-80 - [c4]Liu Wu, Zhiwei Sun, Kai Zhang, Genghui Li, Ping Wang:
Multi-population Based Search Strategy Ensemble Artificial Bee Colony Algorithm with a Novel Resource Allocation Mechanism. ICONIP (4) 2017: 336-345 - [c3]Ping Wang, DongDong Shang, Zhiwei Sun:
Sphere Decoding Algorithm Based on a New Radius Definition. SmartCom 2017: 1-10 - 2016
- [j7]Zhiwei Sun, Jianping Yu, Ping Wang:
Efficient multi-party quantum key agreement by cluster states. Quantum Inf. Process. 15(1): 373-384 (2016) - [j6]Zhiwei Sun, Jiwu Huang, Ping Wang:
Efficient multiparty quantum key agreement protocol based on commutative encryption. Quantum Inf. Process. 15(5): 2101-2111 (2016) - [i4]Zhiwei Sun, Xiaoqiang Sun, Ping Wang:
Multiparty quantum key agreement protocol secure against collusion attacks. CoRR abs/1604.01112 (2016) - 2015
- [j5]Zhiwei Sun, Jianping Yu, Ping Wang, Lingling Xu, Chun-Hui Wu:
Quantum private comparison with a malicious third party. Quantum Inf. Process. 14(6): 2125-2133 (2015) - [i3]Steven D. Galbraith, Ping Wang, Fangguo Zhang:
Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm. IACR Cryptol. ePrint Arch. 2015: 605 (2015) - 2013
- [j4]Fangguo Zhang, Ping Wang:
Speeding up elliptic curve discrete logarithm computations with point halving. Des. Codes Cryptogr. 67(2): 197-208 (2013) - [c2]Ping Wang, Fangguo Zhang:
Improving the Parallelized Pollard Rho Method for Computing Elliptic Curve Discrete Logarithms. EIDWT 2013: 285-291 - 2012
- [j3]Ping Wang, Fangguo Zhang:
Computing elliptic curve discrete logarithms with the negation map. Inf. Sci. 195: 277-286 (2012) - [j2]Ping Wang, Fangguo Zhang:
An Efficient Collision Detection Method for Computing Discrete Logarithms with Pollard's Rho. J. Appl. Math. 2012: 635909:1-635909:15 (2012) - [j1]Ping Wang, Fangguo Zhang:
Improved Pollard rho method for computing discrete logarithms over finite extension fields. J. Comput. Appl. Math. 236(17): 4336-4343 (2012) - 2011
- [c1]Fangguo Zhang, Ping Wang:
On Relationship of Computational Diffie-Hellman Problem and Computational Square-Root Exponent Problem. IWCC 2011: 283-293 - [i2]Ping Wang, Fangguo Zhang:
Computing Elliptic Curve Discrete Logarithms with the Negation Map. IACR Cryptol. ePrint Arch. 2011: 8 (2011) - [i1]Fangguo Zhang, Ping Wang:
Speeding Up Elliptic Curve Discrete Logarithm Computations with Point Halving. IACR Cryptol. ePrint Arch. 2011: 461 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint