Daoshun Wang

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A perfect secret sharing scheme for general access structures
Information Sciences
2024-02-28Paper
Image universal steganalysis based on best wavelet packet decomposition
Science China Information Sciences
2022-10-28Paper
A collaborative secret sharing scheme based on the Chinese remainder theorem
Mathematical Biosciences and Engineering
2022-08-03Paper
Protocols for secure test on relationship on number axis
 
2021-04-26Paper
A new threshold changeable secret sharing scheme based on the Chinese remainder theorem
Information Sciences
2020-09-22Paper
Private social-willing detection
 
2020-08-12Paper
Homomorphic encryption scheme and a protocol on secure computing a line by two private points
 
2018-07-18Paper
Randomized coding of plaintext encryption scheme
 
2017-10-20Paper
scientific article; zbMATH DE number 6741946 (Why is no real title available?)
 
2017-07-11Paper
A discussion on the relationship between probabilistic visual cryptography and random grid
Information Sciences
2017-02-02Paper
Secure set computing in cloud environment
 
2017-01-06Paper
A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle
Theoretical Computer Science
2015-12-08Paper
Solutions to polynomial generalized Bers-Vekua equations in Clifford analysis
Complex Analysis and Operator Theory
2013-10-10Paper
Half Dirichlet problem for the Hölder continuous matrix functions in Hermitian Clifford analysis
Complex Variables and Elliptic Equations
2013-10-10Paper
Riemann boundary value problems on the sphere in Clifford analysis
Advances in Applied Clifford Algebras
2013-01-28Paper
\((2,n)\) secret sharing scheme for gray and color images based on Boolean operation
Science China Information Sciences
2012-08-17Paper
scientific article; zbMATH DE number 6001594 (Why is no real title available?)
 
2012-01-27Paper
Some properties of holomorphic Cliffordian functions in complex Clifford analysis
Acta Mathematica Scientia. Series B. (English Edition)
2011-07-19Paper
Probabilistic visual secret sharing schemes for grey-scale images and color images
Information Sciences
2011-06-22Paper
Solutions to the polynomial Dirac equations on unbounded domains in Clifford analysis
Mathematical Methods in the Applied Sciences
2011-03-08Paper
Multiple participants enrollment in a publicly verifiable secret sharing scheme
 
2011-02-05Paper
Half Dirichlet problem for matrix functions on the unit ball in Hermitian Clifford analysis
Journal of Mathematical Analysis and Applications
2010-11-22Paper
Zero-knowledge proof protocol of the roots of polynomial functions
 
2010-11-05Paper
On generalization of Martinelli-Bochner integral formula using Clifford analysis
Advances in Applied Clifford Algebras
2010-09-21Paper
Szeg$\ddot{o}$ projection and matrix Hilbert transform in Hermitean Clifford analysis
 
2010-07-02Paper
Probability method for cryptanalysis of general multivariate modular linear equation
Science in China. Series F
2010-03-03Paper
Symmetric cryptographic protocols for extended millionaires' problem
Science in China. Series F
2010-02-26Paper
Cryptanalysis of RSA for a special case with \(d > e\)
Science in China. Series F
2010-02-26Paper
On general construction for extended visual cryptography schemes
Pattern Recognition
2009-07-29Paper
Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images
Information Security and Cryptology
2009-02-10Paper
Cryptanalysis of General Lu-Lee Type Systems
Information Security and Cryptology
2009-02-10Paper
A review on blind detection for image steganography
Signal Processing
2009-01-20Paper
Comparing two sets without disclosing them
Science in China. Series F
2008-10-16Paper
scientific article; zbMATH DE number 5283568 (Why is no real title available?)
 
2008-06-03Paper
Steganalysis of LSB replacement based on wavelet transform
 
2008-04-04Paper
Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations
Information Sciences
2008-01-11Paper
LTSB Steganalysis Based on Quartic Equation
Transactions on Data Hiding and Multimedia Security II
2007-11-13Paper
A secure multi-party computation solution to intersection problems of sets and rectangles
Progress in Natural Science
2007-10-26Paper
Two secret sharing schemes based on Boolean operations
Pattern Recognition
2007-07-11Paper
Weak-keys in public key cryptosystems based on discrete logarithms
Tsinghua Science and Technology
2007-01-19Paper
Partial blind-signature scheme based on bundling homomorphism
 
2006-11-09Paper
Multi secret image color visual cryptography schemes for general access structures\(^{*}\)
Progress in Natural Science
2006-08-28Paper
Shift visual cryptography scheme of two secret images.
Progress in Natural Science
2004-01-25Paper
A minimum pixels scheme of 2 out of 2-visual cryptography
Journal of Sichuan University. Natural Science Edition
2001-07-04Paper


Research outcomes over time


This page was built for person: Daoshun Wang