Yumin Wang

Orcid: 0000-0002-4739-0419

According to our database1, Yumin Wang authored at least 122 papers between 1995 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2025
Exploring the potential mechanism of action of Wutou-Guizhi decoction in the treatment of rheumatoid arthritis through network pharmacology analysis.
Comput. Biol. Chem., 2025

2024
Signal-interference-based quasi-reflectionless bandpass filter for wideband and high-selectivity.
Int. J. Circuit Theory Appl., July, 2024

2023
Underground Anomaly Detection in GPR Data by Learning in the C3 Model Space.
IEEE Trans. Geosci. Remote. Sens., 2023

Research on Improved Algorithm of UAV Swarm Target Search Strategy Based on Freshness and Target Density.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

2022
Protecting the Intellectual Property of Speaker Recognition Model by Black-Box Watermarking in the Frequency Domain.
Symmetry, 2022

2021
Factors Affectting Customer's Behavior Intention.
Proceedings of the IPEC 2021: 2nd Asia-Pacific Conference on Image Processing, 2021

The Teaching System of IT Support Course Group of Economics and Management Majors Based on Big Data Technology.
Proceedings of the Cyber Security Intelligence and Analytics, 2021

Generating Watermarked Speech Adversarial Examples.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021

2019
The threshold of stochastic Gilpin-Ayala model subject to general Lévy jumps.
J. Appl. Math. Comput., June, 2019

Coupling effect of regional industrial cluster and innovation based on complex system metric and fuzzy mathematics.
J. Intell. Fuzzy Syst., 2019

Design of computer interactive system for sports training based on artificial intelligence and improved support vector.
J. Intell. Fuzzy Syst., 2019

Human-computer interactive teaching model based on fuzzy set and BP neural network.
J. Intell. Fuzzy Syst., 2019

Health Risk Assessment Model of Drinking Water Sources Based on Combination of Bayesian and Triangle Fuzzy Number.
Proceedings of the ICAIP 2019: 3rd International Conference on Advances in Image Processing, 2019

2018
Certificateless Proxy Signature Scheme in the Standard Model.
Fundam. Informaticae, 2018

2017
Directed proxy signature with fast revocation proven secure in the standard model.
IET Inf. Secur., 2017

2016
Cryptanalysis of an Identity Based Signcryption Scheme in the Standard Model.
Int. J. Netw. Secur., 2016

Cooperative downloading with privacy preservation and access control for value-added services in VANETs.
Int. J. Grid Util. Comput., 2016

Identity based broadcast encryption with group of prime order.
Int. Arab J. Inf. Technol., 2016

2015
Proxy signcryption scheme in the standard model.
Secur. Commun. Networks, 2015

On the Security of Three Public Auditing Schemes in Cloud Computing.
Int. J. Netw. Secur., 2015

A GAA-based batch authentication and key agreement for LTE networks.
Int. J. Embed. Syst., 2015

Anonymous multi-receiver ID-based signcryption scheme.
IET Inf. Secur., 2015

2014
Toward quantum-resistant strong designated verifier signature.
Int. J. Grid Util. Comput., 2014

Versatile identity-based signatures for authentication in multi-user settings.
Int. J. Grid Util. Comput., 2014

Secure and efficient lightweight RFID authentication protocol based on fast tag indexing.
Int. J. Commun. Syst., 2014

2013
Improvement on Meshram et al.'s ID-based cryptographic mechanism.
Inf. Process. Lett., 2013

A Trusted Network Access Protocol for WLAN Mesh Networks.
IEICE Trans. Inf. Syst., 2013

Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Privacy-Preserving Cooperative Downloading for Value-Added Services in VANETs.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Hadoop-RINS - A Hadoop Accelerated Pipeline for Rapid Nonhuman Sequence Identification.
Proceedings of the BIOINFORMATICS 2013 - Proceedings of the International Conference on Bioinformatics Models, Methods and Algorithms, Barcelona, Spain, 11, 2013

2012
Comparison of trends in the quantity and variety of Science Citation Index (SCI) literature on human pathogens between China and the United States.
Scientometrics, 2012

Verification of Trusted Network Access Protocols in the Strand Space Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

End-to-End Security Scheme for Machine Type Communication Based on Generic Authentication Architecture.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Toward Quantum-Resistant Strong Designated Verifier Signature from Isogenies.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

An Efficient Probably CP-CM-Secure Identity-Based Signature Scheme Applicable to Authentication in Multiuser Settings.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Numerical solutions of quantile hedging for guaranteed minimum death benefits under a regime-switching jump-diffusion formulation.
J. Comput. Appl. Math., 2011

Multi-receiver Identity-Based Signcryption Scheme in the Standard Model.
Proceedings of the Information Computing and Applications, 2011

2010
How to secure multi-domain wireless mesh networks.
Wirel. Networks, 2010

Improved Identity Based Online/Offline Signature Scheme.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

2009
A batched network coding scheme for wireless networks.
Wirel. Networks, 2009

Throughput and Delay in Cooperative Wireless Networks With Partial Infrastructure.
IEEE Trans. Veh. Technol., 2009

An Efficient Verifiably Encrypted Signature Scheme without Random Oracles.
Int. J. Netw. Secur., 2009

Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model.
Intell. Inf. Manag., 2009

An Efficient Fast Authentication Protocol.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Some Notes on Password Authenticated Key Exchange Based on RSA.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

C and M: A New Network Coding Scheme for Wireless Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Deep Copy Protection Framework for Electronic Devices within Home.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Efficient Certificate-Based Signature Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles.
J. Comput. Sci. Technol., 2008

More Efficient VLR Group Signature Satisfying Exculpability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

The Design of Optimal Period Interleaver.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
A New Public-Key Encryption Scheme.
J. Comput. Sci. Technol., 2007

Short Group Signatures Without Random Oracles.
J. Comput. Sci. Technol., 2007

Exploiting randomness on continuous sets.
Inf. Sci., 2007

Group Decryption.
IACR Cryptol. ePrint Arch., 2007

A chaos-based image encryption algorithm using alternate structure.
Sci. China Ser. F Inf. Sci., 2007

A Three-Level-Module Adaptive Intrusion Detection System.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007

Dynamic Fair Electronic Cash Model without Trustees.
Proceedings of the Integration and Innovation Orient to E-Society, 2007

2006
Provably Secure Convertible User Designating Confirmer Partially Blind Signatures.
Informatica, 2006

Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes.
IACR Cryptol. ePrint Arch., 2006

Efficient Doubling on Genus 3 Curves over Binary Fields.
Proceedings of the Topics in Cryptology, 2006

Security Analysis of the Digital Transmission Copy Protection Specification.
Proceedings of the 2006 International Conference on Security & Management, 2006

Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Improved Secret Sharing with Access Structures in a Hierarchy.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006

2005
Analysis of host authentication mechanism in current POD copy protection system.
IEEE Trans. Consumer Electron., 2005

An ID-based broadcast encryption scheme for key distribution.
IEEE Trans. Broadcast., 2005

Extended Methodology of RS Design and Instances Based on GIP.
J. Comput. Sci. Technol., 2005

On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key.
Informatica (Slovenia), 2005

An improved signature scheme without using one-way Hash functions.
Appl. Math. Comput., 2005

Two provably secure k-out-of-n oblivious transfer schemes.
Appl. Math. Comput., 2005

On the security of a convertible authenticated encryption.
Appl. Math. Comput., 2005

On the security of Miyaji et al. group signature scheme.
Appl. Math. Comput., 2005

Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences.
Appl. Math. Comput., 2005

A research on new public-key encryption schemes.
Appl. Math. Comput., 2005

Security analysis and improvement of a double-trapdoor encryption scheme.
Appl. Math. Comput., 2005

An Improved Group Signature Scheme.
Proceedings of the Trust, 2005

Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

<i>t</i>-Out-of-<i>n</i> String/Bit Oblivious Transfers Revisited.
Proceedings of the Information Security Practice and Experience, 2005

A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A Virtual Bridge Certificate Authority Model.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Ring-Based Anonymous Fingerprinting Scheme.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Efficient Identity-Based Signatures and Blind Signatures.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Convertible Undeniable Partially Blind Signatures.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environments.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
A New Efficient Group Signature With Forward Security.
Informatica (Slovenia), 2004

Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves.
IACR Cryptol. ePrint Arch., 2004

Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group.
Proceedings of the Information Security, 7th International Conference, 2004

How to conduct a sealed bargain on the internet.
Proceedings of the 3rd International Conference on Information Security, 2004

A family of FH sequences based on 3DES block cipher for FHMA communications.
Proceedings of IEEE International Conference on Communications, 2004

Publicly Verifiable Auctions with Minimal Leakage.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

An Improved Nominative Proxy Signature Scheme for Mobile Communication.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Use of Cryptographic Technologies for Privacy Protection of Watermarks in Internet Retails of Digital Contents.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Provably Secure and ID-Based Group Signature Scheme.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Convertible Nominative Signatures.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Secure Web Transaction with Anonymous Mobile Agent over Internet.
J. Comput. Sci. Technol., 2003

An Improved ID-based Authenticated Group Key Agreement Scheme.
IACR Cryptol. ePrint Arch., 2003

ID-based Authenticated Two Round Multi-Party Key Agreement.
IACR Cryptol. ePrint Arch., 2003

Chameleon Signature from Bilinear Pairing.
IACR Cryptol. ePrint Arch., 2003

A New Approach to Prevent Blackmailing in E-Cash.
IACR Cryptol. ePrint Arch., 2003

Security analysis of the improved group signature.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

Secure Double Auction Protocols with Full Privacy Protection.
Proceedings of the Information Security and Cryptology, 2003

An Efficient Revocation Algorithm in Group Signatures.
Proceedings of the Information Security and Cryptology, 2003

A Novel Efficient Group Signature Scheme with Forward Security.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Practical t-out-n Oblivious Transfer and Its Applications.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

A Group Key Establishment Scheme for Ad Hoc Networks.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

A Method for Security Enhancements in AODV Protocol .
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

New Key Improvements and Its Application to XTR System.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
An anonymity-revoking e-payment system with a smart card.
Int. J. Digit. Libr., 2002

Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield.
J. Comput. Sci. Technol., 2002

Fair Electronic Cash Based on Double Signatur.
J. Comput. Sci. Technol., 2002

An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet.
Informatica (Slovenia), 2002

two attacks on xia-you Group Signature.
IACR Cryptol. ePrint Arch., 2002

SAWT: A New System for Secure and Anonymous Web Transactions over the Internet.
J. Res. Pract. Inf. Technol., 2002

2001
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves.
Proceedings of the Information and Communications Security, Third International Conference, 2001

Unconditionally-Secure Oblivious Transfer.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
Fair Electronic Cash Systems with Multiple Banks.
Proceedings of the Information Security for Global Information Infrastructures, 2000

1999
An Authetnication Scheme over Non-Authentic Public Channel in Information-Theoretic Secret-Key Agreement.
Proceedings of the Applied Algebra, 1999

1996
Authentication of mobile users in personal communication system.
Proceedings of the 7th IEEE International Symposium on Personal, 1996

1995
A user authentication protocol for digital mobile communication network.
Proceedings of the 6th IEEE International Symposium on Personal, 1995


  Loading...