Xiuyuan Yu

According to our database1, Xiuyuan Yu authored at least 8 papers between 2004 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network.
Wirel. Pers. Commun., 2014

2008
The rational approximations of a class of continued fractions.
Proceedings of the International Conference on Theoretical and Mathematical Foundations of Computer Science, 2008

A Novel User Authentication Scheme Using Smart Cards.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

ThreshoWeb Security and Data Managementld Signature Scheme Based on Modular Secret Sharing.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2006
Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes.
Int. J. Netw. Secur., 2006

2005
An attack on hash function HAVAL-128.
Sci. China Ser. F Inf. Sci., 2005

Cryptanalysis of the Hash Functions MD4 and RIPEMD.
Proceedings of the Advances in Cryptology, 2005

2004
Cryptanalysis of Tseng et al.'s authenticated encryption schemes.
Appl. Math. Comput., 2004


  Loading...