Weidong Kou

According to our database1, Weidong Kou authored at least 48 papers between 1984 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Modified particle swarm optimization-based multilevel thresholding for image segmentation.
Soft Comput., 2015

2013
Secure and Oblivious Information Hiding in Binary Image.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2011
Self-generated-certificate public key encryption without pairing and its application.
Inf. Sci., 2011

2010
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks.
IEEE Trans. Wirel. Commun., 2010

New Constructions for Identity-Based Unidirectional Proxy Re-Encryption.
J. Comput. Sci. Technol., 2010

Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol.
Inf. Sci., 2010

A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges.
Inf. Sci., 2010

Efficient CCA-Secure PKE from Identity-Based Techniques.
Proceedings of the Topics in Cryptology, 2010

2009
Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks.
IEEE Trans. Veh. Technol., 2009

RSA-Based Certificateless Public Key Encryption.
Proceedings of the Information Security Practice and Experience, 2009

2008
Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks.
Comput. Commun., 2008

2007
Watermarking protocol of secure verification.
J. Electronic Imaging, 2007

Mobile ip registration in certificateless public key infrastructure.
IET Inf. Secur., 2007

Efficient ID-based Signature Without Trusted PKG.
IACR Cryptol. ePrint Arch., 2007

The security analyses of RosettaNet in Grid.
Comput. Stand. Interfaces, 2007

Self-Generated-Certificate Public Key Encryption Without Pairing.
Proceedings of the Public Key Cryptography, 2007

Design of Secure Watermarking Scheme for Watermarking Protocol.
Proceedings of the Advances in Multimedia Information Processing, 2007

A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Adaptive Encrypted Information Hiding Scheme for Images.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
An Attack on a Certificateless Signature Scheme.
IACR Cryptol. ePrint Arch., 2006

Fair E-Commerce Protocols without a Third Party.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

An Traceable Electronic Cash Model Based on Group Signature.
Proceedings of the 2006 International Conference on E-Learning, 2006

An Efficient Anonymous Registration Scheme for Mobile IPv4.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Design and Analysis of High Speed WLAN Systems with Adaptive Margin Technology.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

The Security Analyses of RosettaNet in Grid.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Fair e-payment protocols.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005

QoS-Oriented Hybrid Admission Control in IEEE 802.11 WLAN.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

A New Look at Coding and Decoding Algorithm for SFC-OFDM System.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

An Improved Scheme for Unilateral Asymmetric Smart Card Authentication.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
A family of FH sequences based on 3DES block cipher for FHMA communications.
Proceedings of IEEE International Conference on Communications, 2004

A Secure M-Commerce Model Based On Wireless Local Area Network.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

A Secure Steganography Scheme Based on (N, t) Threshold.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

ID-Based Proxy Blind Signature.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
The Unlinkability of Randomization-Enhanced Chaum's Blind Signature Scheme.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

Payment technologies for e-commerce.
Springer, ISBN: 978-3-540-44007-9, 2003

2002
Editorial.
Int. J. Digit. Libr., 2002

An Investigation on Multiple e-Payments and Micro-Payment - A Technical and Market View.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

2001
Online Auction Protocols: A Comparative Study.
Proceedings of the Topics in Electronic Commerce, Second International Symposium, 2001

Active Page Generation via Customizing XML for Data Beans in E-Commerce Applications.
Proceedings of the Topics in Electronic Commerce, Second International Symposium, 2001

2000
End-to-end E-commerce Application Development Based on XML Tools.
IEEE Data Eng. Bull., 2000

Performance Analysis of Secure Web Server Based on SSL.
Proceedings of the Information Security, Third International Workshop, 2000

1991
Fast computation of transform coefficients for a subadjacent block for a transform family.
IEEE Trans. Signal Process., 1991

A direct computation of DCT coefficients for a signal block taken from two adjacent blocks.
IEEE Trans. Signal Process., 1991

Vector-adaptive vector quantization with application to speech coding.
IEEE Trans. Commun., 1991

1989
A new look at DCT-type transforms.
IEEE Trans. Acoust. Speech Signal Process., 1989

1988
Wideband transform product code vector quantization speech coder with short delays.
Proceedings of the 9th International Conference on Pattern Recognition, 1988

1984
CH transform.
Int. J. Parallel Program., 1984


  Loading...