Wenping Ma

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2023
Semi-supervised classifier ensemble model for high-dimensional data.
Inf. Sci., 2023

2021
A new upper bound and optimal constructions of equi-difference conflict-avoiding codes on constant weight.
CoRR, 2021

2019
Balanced quaternary sequences of even period with optimal autocorrelation.
IET Commun., 2019

Noninteractive Zero Knowledge Proof System for NP from Ring LWE.
IACR Cryptol. ePrint Arch., 2019

2018
WSN中基于非线性自适应PSO的分簇策略 (Clustering Method in Wireless Sensor Networks Using Nonlinear Adaptive PSO Algorithm).
计算机科学, 2018

2017
Quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom.
Quantum Inf. Process., 2017

A Key Predistribution Scheme Based on Mixed-level Orthogonal Arrays.
Ad Hoc Sens. Wirel. Networks, 2017

A Broadcast-enhanced Key Predistribution Scheme Using Combinatorial KPSs Based on Orthogonal Arrays for the Temporal Layer.
Ad Hoc Sens. Wirel. Networks, 2017

2016
Two-party authenticated key exchange protocol using lattice-based cryptography.
IACR Cryptol. ePrint Arch., 2016

2015
Strongly Secure Authenticated Key Exchange from Ideal Lattices.
IACR Cryptol. ePrint Arch., 2015

2013
Newmultivariate hash function quadratic polynomials multiplying linear polynomials.
IET Inf. Secur., 2013

An Effective Fuzzy Keyword Search Scheme in Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Secure Attribute-based Threshold Signature without a Trusted Central Authority.
J. Comput., 2012

2011
Analysis and Improvement of the BAN Modified Andrew Secure RPC Protocol.
J. Networks, 2011

New designs of frequency hopping sequences with low hit zone.
Des. Codes Cryptogr., 2011

New Quadriphase Sequences families with Larger Linear Span and Size
CoRR, 2011

A New Multivariate Hash Function with HAIFA Construction.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
New Methods to Construct Golay Complementary Sequences Over the QAM Constellation.
IACR Cryptol. ePrint Arch., 2010

Golay Complementary Sequences Over the QAM Constellation.
IACR Cryptol. ePrint Arch., 2010

New Class of Optimal Frequency-Hopping Sequences by Polynomial Residue Class Rings
CoRR, 2010

Improved hill-climbing methods in the design of bijective S-boxes.
Proceedings of the Sixth International Conference on Natural Computation, 2010

2008
On the Gray Image of Cyclic Codes over Finite Chain Rings.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Fair Exchange Signature Schemes.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
New Traitor Tracing Scheme against Anonymous Attack.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006


  Loading...