


Остановите войну!
for scientists:
Yongge Wang
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [c50]Yongge Wang:
The Adversary Capabilities in Practical Byzantine Fault Tolerance. STM 2021: 20-39 - [i37]Yongge Wang:
Implementing Automated Market Makers with Constant Circle. CoRR abs/2103.03699 (2021) - [i36]Yongge Wang:
The Adversary Capabilities In Practical Byzantine Fault Tolerance. IACR Cryptol. ePrint Arch. 2021: 1248 (2021) - 2020
- [j36]Omar Abou Selo, Maan Haj Rachid
, Abdullatif Shikfa
, Yongge Wang, Qutaibah M. Malluhi:
Private Function Evaluation Using Intel's SGX. Secur. Commun. Networks 2020: 3042642:1-3042642:10 (2020) - [c49]Israa Alsarsour, Qutaibah M. Malluhi, Yongge Wang:
Free Chain: Enabling Freedom of Expression through Public Blockchains. DependSys 2020: 33-40 - [c48]Yongge Wang, Jingwen Sun, Xin Wang, Yunchuan Wei, Hao Wu, Zhou Yu, Gillian Chu:
Sperax: An Approach To Defeat Long Range Attacks In Blockchains. INFOCOM Workshops 2020: 574-579 - [i35]Yongge Wang:
Deterministic Blockchain BFT Protocol XP for Complete Asynchronous Networks. CoRR abs/2005.04309 (2020) - [i34]Yongge Wang:
Automated Market Makers for Decentralized Finance (DeFi). CoRR abs/2009.01676 (2020) - [i33]Yongge Wang:
Another Look at CBC Casper Consensus Protocol. IACR Cryptol. ePrint Arch. 2020: 362 (2020)
2010 – 2019
- 2019
- [j35]Yongge Wang, Qutaibah M. Malluhi:
The limit of blockchains: infeasibility of a smart Obama-Trump contract. Commun. ACM 62(5): 64-69 (2019) - [j34]Yongge Wang, Khaled M. Khan:
Matrix Barcode Based Secure Authentication without Trusting Third Party. IT Prof. 21(3): 41-48 (2019) - [j33]Jingang Liu, Yongge Wang, Zongxiang Yi, Zhiqiang Lin
:
polarRLCE: A New Code-Based Cryptosystem Using Polar Codes. Secur. Commun. Networks 2019: 3086975:1-3086975:10 (2019) - [c47]Yongge Wang, Qutaibah M. Malluhi:
Reusable Garbled Turing Machines Without FHE. C2SI 2019: 381-398 - [c46]Gretchen L. Matthews
, Yongge Wang:
Quantum Resistant Public Key Encryption Scheme HermitianRLCE. CBC 2019: 1-10 - [c45]Haoyu Li, Renzhang Liu, Qutaibah M. Malluhi, Yanbin Pan, Yongge Wang, Tianyuan Xie:
Breaking HK17 in Practice. ISIT 2019: 1877-1881 - [i32]Yongge Wang:
Another Look at ALGORAND. CoRR abs/1905.04463 (2019) - [i31]Yongge Wang:
Another Look at Byzantine Fault Tolerance. IACR Cryptol. ePrint Arch. 2019: 864 (2019) - [i30]Yongge Wang:
Byzantine Fault Tolerance in Partially Connected Asynchronous Networks. IACR Cryptol. ePrint Arch. 2019: 1460 (2019) - 2018
- [c44]Mohiuddin Ahmed, Jinpeng Wei, Yongge Wang, Ehab Al-Shaer:
A Poisoning Attack Against Cryptocurrency Mining Pools. DPM/CBT@ESORICS 2018: 140-154 - [c43]Khaled M. Khan, Mahboob Shaheen, Yongge Wang:
Using Sparse Matrices to Prevent Information Leakage in Cloud Computing. FiCloud 2018: 444-447 - [i29]Yongge Wang, Qutaibah M. Malluhi:
The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract. IACR Cryptol. ePrint Arch. 2018: 252 (2018) - 2017
- [j32]Wei Yu, Jiping Zheng, Haixiang Wang, Yongge Wang, Jialiang Chen, Shunqing Jiang:
空间Skyline查询处理: 应用、研究与挑战 (Spatial Skyline Queries: Applications, Research and Challenges). 计算机科学 44(2): 1-16 (2017) - [c42]Mayur Punekar, Qutaibah M. Malluhi, Yongge Wang, Yvo Desmedt:
Candidate MDS Array Codes for Tolerating Three Disk Failures in RAID-7 Architectures. BDCAT 2017: 33-42 - [c41]Mayur Punekar, Qutaibah M. Malluhi, Yvo Desmedt, Yongge Wang:
Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin. CANS 2017: 470-481 - [c40]Khaled M. Khan, Mahboob Shaheen, Yongge Wang:
Data confidentiality in cloud-based pervasive system. ICC 2017: 185:1-185:6 - [i28]Yongge Wang:
Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Schemes. CoRR abs/1702.07737 (2017) - [i27]Yongge Wang, Qutaibah M. Malluhi:
Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy. IACR Cryptol. ePrint Arch. 2017: 41 (2017) - [i26]Yongge Wang:
Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes. IACR Cryptol. ePrint Arch. 2017: 206 (2017) - [i25]Yongge Wang:
Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Scheme. IACR Cryptol. ePrint Arch. 2017: 733 (2017) - [i24]Yongge Wang, Qutaibah M. Malluhi:
Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project. IACR Cryptol. ePrint Arch. 2017: 1258 (2017) - 2016
- [j31]Maura B. Paterson
, Douglas R. Stinson, Yongge Wang:
On encoding symbol degrees of array BP-XOR codes. Cryptogr. Commun. 8(1): 19-32 (2016) - [j30]Yongge Wang
, Qutaibah M. Malluhi, Khaled Md. Khan:
Garbled computation in cloud. Future Gener. Comput. Syst. 62: 54-65 (2016) - [c39]Yongge Wang:
Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems. CyberICPS@ESORICS 2016: 103-120 - [c38]Yongge Wang, Qutaibah M. Malluhi:
Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes. ESORICS (1) 2016: 301-323 - [c37]Zhiming Zhang, Jiping Zheng
, Yongge Wang:
UC-PSkyline: Probabilistic Skyline Queries Over Uncertain Contexts. ICIC (3) 2016: 616-628 - [c36]Yongge Wang:
Quantum resistant random linear code based public key encryption scheme RLCE. ISIT 2016: 2519-2523 - 2015
- [j29]Yongge Wang
, Tony Nicol:
On statistical distance based testing of pseudo random sequences and experiments with PHP and Debian OpenSSL. Comput. Secur. 53: 44-64 (2015) - [j28]Jiping Zheng
, Baoli Song, Yongge Wang, Haixiang Wang:
Adaptive Filter Updating for Energy-Efficient Top-k Queries in Wireless Sensor Networks Using Gaussian Process Regression. Int. J. Distributed Sens. Networks 11: 304198:1-304198:14 (2015) - [j27]Yongge Wang:
Privacy-Preserving Data Storage in CloudUsing Array BP-XOR Codes. IEEE Trans. Cloud Comput. 3(4): 425-435 (2015) - [c35]Jiping Zheng
, Yongge Wang, Haixiang Wang, Wei Yu:
Asymptotic-Efficient Algorithms for Skyline Query Processing over Uncertain Contexts. IDEAS 2015: 106-115 - [i23]Yongge Wang:
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE. CoRR abs/1512.08454 (2015) - [i22]Yongge Wang:
Secure Random Linear Code Based Public Key Encryption Scheme RLCE. IACR Cryptol. ePrint Arch. 2015: 298 (2015) - [i21]Yongge Wang:
Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping. IACR Cryptol. ePrint Arch. 2015: 519 (2015) - 2014
- [j26]Haixiang Wang, Jiping Zheng
, Baoli Song, Yongge Wang:
Histogram Estimation for Optimal Filter Skyline Query Processing in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j25]Jiping Zheng
, Hui Zhang, Baoli Song, Haixiang Wang, Yongge Wang:
Prediction-Based Filter Updating Policies for Top-k Monitoring Queries in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [c34]Yongge Wang, Tony Nicol:
Statistical Properties of Pseudo Random Sequences and Experiments with PHP and Debian OpenSSL. ESORICS (1) 2014: 454-471 - [c33]Yongge Wang, Yvo Desmedt:
Efficient secret sharing schemes achieving optimal information rate. ITW 2014: 516-520 - [i20]Yongge Wang:
On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results. CoRR abs/1401.3307 (2014) - [i19]Yongge Wang:
On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results. IACR Cryptol. ePrint Arch. 2014: 31 (2014) - 2013
- [j24]Mehmet Engin Tozal, Yongge Wang, Ehab Al-Shaer, Kamil Saraç, Bhavani Thuraisingham, Bei-tseng Chu:
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications. Mob. Networks Appl. 18(5): 697-711 (2013) - [j23]Yongge Wang:
Efficient Identity-Based and Authenticated Key Agreement Protocol. Trans. Comput. Sci. 17: 172-197 (2013) - [c32]Qi Duan, Yongge Wang, Fadi Mohsen, Ehab Al-Shaer:
Private and Anonymous Data Storage and Distribution in Cloud. IEEE SCC 2013: 264-271 - [c31]Yongge Wang:
Array BP-XOR codes for reliable cloud storage systems. ISIT 2013: 326-330 - 2012
- [j22]Jinyue Xia, Yongge Wang:
Secure Key Distribution for the Smart Grid. IEEE Trans. Smart Grid 3(3): 1437-1443 (2012) - [c30]Yongge Wang:
Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks. SEC 2012: 489-500 - [i18]Yongge Wang:
sSCADA: Securing SCADA Infrastructure Communications. CoRR abs/1207.5434 (2012) - [i17]Yongge Wang:
Efficient Identity-Based and Authenticated Key Agreement Protocol. CoRR abs/1207.5438 (2012) - [i16]Yongge Wang, Yvo Desmedt:
Edge-Colored Graphs with Applications To Homogeneous Faults. CoRR abs/1207.5439 (2012) - [i15]Zhu Zhao, Zhongqi Dong, Yongge Wang:
Security Analysis of a Password-Based Authentication Protocol Proposed to IEEE 1363. CoRR abs/1207.5442 (2012) - [i14]Yongge Wang:
Using mobile agent results to create hard-to-detect computer viruses. CoRR abs/1207.5444 (2012) - [i13]Yongge Wang:
Public Key Cryptography Standards: PKCS. CoRR abs/1207.5446 (2012) - [i12]Yongge Wang, Xintao Wu:
Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and Approximation. CoRR abs/1207.5466 (2012) - [i11]Yongge Wang:
Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks. CoRR abs/1207.5497 (2012) - [i10]Yongge Wang:
LT Codes For Efficient and Reliable Distributed Storage Systems Revisited. CoRR abs/1207.5542 (2012) - [i9]Yongge Wang:
Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks. IACR Cryptol. ePrint Arch. 2012: 120 (2012) - 2011
- [j21]Yongge Wang:
sSCADA: securing SCADA infrastructure communications. Int. J. Commun. Networks Distributed Syst. 6(1): 59-78 (2011) - [j20]Yongge Wang, Yvo Desmedt:
Edge-colored graphs with applications to homogeneous faults. Inf. Process. Lett. 111(13): 634-641 (2011) - [c29]Yongge Wang, Yvo Desmedt:
Homogeneous Faults, Colored Edge Graphs, and Cover Free Families. ICITS 2011: 58-72 - 2010
- [c28]Mohammed Boujettif, Yongge Wang:
Constructivist Approach to Information Security Awareness in the Middle East. BWCCA 2010: 192-199 - [c27]Nuo Wang, Yongge Wang:
An image reconstruction algorithm based on compressed sensing using conjugate gradient. IUCS 2010: 374-377 - [i8]Yongge Wang:
Insecure "Provably Secure Network Coding" and Homomorphic Authentication Schemes for Network Coding. IACR Cryptol. ePrint Arch. 2010: 60 (2010)
2000 – 2009
- 2009
- [i7]Yongge Wang:
Insecure "Provable Secure Network Coding". IACR Cryptol. ePrint Arch. 2009: 504 (2009) - 2008
- [j19]Yongge Wang, Yvo Desmedt:
Perfectly Secure Message Transmission Revisited. IEEE Trans. Inf. Theory 54(6): 2582-2595 (2008) - 2007
- [j18]Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng:
Privacy Preserving Database Generation for Database Application Testing. Fundam. Informaticae 78(4): 595-612 (2007) - 2006
- [j17]Qiaofang Lian, Yongge Wang, Dunyan Yan:
A characterization of Lp(R) by local trigonometric bases with 1<p<infinity. Adv. Comput. Math. 25(1-3): 91-104 (2006) - [j16]Zhu Zhao, Zhongqi Dong, Yongge Wang:
Security analysis of a password-based authentication protocol proposed to IEEE 1363. Theor. Comput. Sci. 352(1-3): 280-287 (2006) - [c26]Yvo Desmedt, Yongge Wang, Mike Burmester:
Revisiting Colored Networks and Privacy Preserving Censorship. CRITIS 2006: 140-150 - 2005
- [c25]Yvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, Huaxiong Wang:
Radio Networks with Reliable Communication. COCOON 2005: 156-166 - [c24]Yongge Wang, Xintao Wu
:
Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and Approximation. ICDM 2005: 482-489 - [c23]Xintao Wu
, Chintan Sanghvi, Yongge Wang, Yuliang Zheng
:
Privacy Aware Data Generation for Testing Database Applications. IDEAS 2005: 317-326 - [c22]Yvo Desmedt, Yongge Wang, Mike Burmester:
A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback. ISAAC 2005: 277-287 - [c21]Xintao Wu
, Yongge Wang, Yuliang Zheng
:
Statistical Database Modeling for Privacy Preserving Database Generation. ISMIS 2005: 382-390 - [c20]Xintao Wu
, Ying Wu, Yongge Wang, Yingjiu Li:
Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining. SDM 2005: 103-114 - [c19]Yuliang Zheng
, Yongge Wang:
Efficient and provably secure ciphers for storage device block level encryption. StorageSS 2005: 103-107 - [i6]Yongge Wang:
Efficient Identity-Based and Authenticated Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2005: 108 (2005) - [i5]Simon Blake-Wilson, Gregor Karlinger, Tetsutaro Kobayashi, Yongge Wang:
Using the Elliptic Curve Signature Algorithm (ECDSA) for XML Digital Signatures. RFC 4050: 1-19 (2005) - 2004
- [j15]Lizhong Peng, Yongge Wang:
Construction of compactly supported orthonormal wavelets with beautiful structure. Sci. China Ser. F Inf. Sci. 47(3): 372-383 (2004) - [j14]Yvo Desmedt, Yongge Wang:
Analyzing Vulnerabilities Of Critical Infrastructures Using Flows And Critical Vertices In And/Or Graphs. Int. J. Found. Comput. Sci. 15(1): 107-125 (2004) - [j13]Yongge Wang:
Robust key establishment in sensor networks. SIGMOD Rec. 33(1): 14-19 (2004) - [c18]Yongge Wang, Xintao Wu
, Yuliang Zheng
:
Privacy Preserving Data Generation for Database Application Performance Testing. TrustBus 2004: 142-151 - [i4]Yongge Wang, Bei-tseng Chu:
sSCADA: Securing SCADA Infrastructure Communications. IACR Cryptol. ePrint Arch. 2004: 265 (2004) - 2003
- [c17]Zhaoyu Liu, Yongge Wang:
A Secure Agent Architecture for Sensor Networks. IC-AI 2003: 10-16 - [c16]Yongge Wang, Yuliang Zheng, Bei-tseng Chu:
Efficient and Secure Storage Systems Based on Peer-to-Peer Systems. IC-AI 2003: 17-22 - [c15]Yongge Wang, Yuliang Zheng
:
Fast and Secure Magnetic WORM Storage Systems. IEEE Security in Storage Workshop 2003: 11-19 - [c14]Xintao Wu
, Yongge Wang, Yuliang Zheng
:
Privacy preserving database application testing. WPES 2003: 118-128 - 2002
- [j12]Yongge Wang:
The algebraic structure of the isomorphic types of tally, polynomial time computable sets. Arch. Math. Log. 41(3): 215-244 (2002) - [j11]Yongge Wang:
A comparison of two approaches to pseudorandomness. Theor. Comput. Sci. 276(1-2): 449-459 (2002) - [c13]Yvo Desmedt, Yongge Wang:
Maximum Flows and Critical Vertices in AND/OR Graphs. COCOON 2002: 238-248 - [c12]Yvo Desmedt, Yongge Wang:
Perfectly Secure Message Transmission Revisited. EUROCRYPT 2002: 502-517 - [c11]Yvo Desmedt, Yongge Wang:
Efficient Zero-Knowledge Proofs for Some Practical Graph Problems. SCN 2002: 290-302 - [i3]Yvo Desmedt, Yongge Wang:
Perfectly Secure Message Transmission Revisited. CoRR cs.CR/0208041 (2002) - [i2]Yvo Desmedt, Yongge Wang:
Perfectly Secure Message Transmission Revisited. IACR Cryptol. ePrint Arch. 2002: 128 (2002) - 2001
- [j10]Yongge Wang, Yvo Desmedt:
Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question. J. Cryptol. 14(2): 121-135 (2001) - [j9]Wolfgang Merkle, Yongge Wang:
Separations by Random Oracles and "Almost" Classes for Generalized Reducibilities. Math. Log. Q. 47(2): 249-269 (2001) - [j8]Cristian Calude
, Peter Hertling, Bakhadyr Khoussainov, Yongge Wang:
Recursively enumerable reals and Chaitin Omega numbers. Theor. Comput. Sci. 255(1-2): 125-149 (2001) - 2000
- [j7]Yongge Wang, Yvo Desmedt, Mike Burmester:
Models For Dependable Computation with Multiple Inputs and Some Hardness Results. Fundam. Informaticae 42(1): 61-73 (2000) - [j6]Yongge Wang:
Resource bounded randomness and computational complexity. Theor. Comput. Sci. 237(1-2): 33-55 (2000) - [c10]Yongge Wang:
Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses. SEC 2000: 161-170
1990 – 1999
- 1999
- [j5]Yongge Wang:
A Separation of Two Randomness Concepts. Inf. Process. Lett. 69(3): 115-118 (1999) - [j4]Yongge Wang:
Randomness, Stochasticity, and Approximations. Theory Comput. Syst. 32(5): 517-529 (1999) - [c9]Yvo Desmedt, Yongge Wang:
Approximation Hardness and Secure Communication in Broadcast Channels. ASIACRYPT 1999: 247-257 - [c8]Yongge Wang:
Linear Complexity versus Pseudorandomness: On Beth and Dai's Result. ASIACRYPT 1999: 288-298 - [c7]Yongge Wang, Yvo Desmedt:
Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question. EUROCRYPT 1999: 446-458 - 1998
- [j3]Yongge Wang:
Genericity, Randomness, and Polynomial-Time Approximations. SIAM J. Comput. 28(2): 394-408 (1998) - [c6]Mike Burmester, Yvo Desmedt, Yongge Wang:
Using Approximation Hardness to Achieve Dependable Computation. RANDOM 1998: 172-186 - [c5]Cristian Calude
, Peter Hertling, Bakhadyr Khoussainov, Yongge Wang:
Recursively Enumerable Reals and Chaitin Omega Numbers. STACS 1998: 596-606 - 1997
- [j2]Yongge Wang:
NP-Hard Sets are Superterse Unless NP is Small. Inf. Process. Lett. 61(1): 1-6 (1997) - [j1]Peter Hertling, Yongge Wang:
Invariance Properties of Random Sequences. J. Univers. Comput. Sci. 3(11): 1241-1249 (1997) - [c4]Yongge Wang:
Randomness, Stochasticity and Approximations. RANDOM 1997: 213-225 - 1996
- [c3]Yongge Wang:
The Law of the Iterated Logarithm for p-Random Sequences. Computational Complexity Conference 1996: 180-189 - [c2]Klaus Ambos-Spies, Elvira Mayordomo, Yongge Wang, Xizhong Zheng:
Resource-Bounded Balanced Genericity, Stochasticity and Weak Randomness. STACS 1996: 63-74 - [i1]Yongge Wang:
NP-hard Sets Are Superterse unless NP Is Small. Electron. Colloquium Comput. Complex. 3(21) (1996) - 1995
- [c1]Wolfgang Merkle, Yongge Wang:
Separations by Random Oracles and "Almost" Classes for Generalized Reducibilities. MFCS 1995: 179-190