| Publication | Date of Publication | Type |
|---|
A perfect secret sharing scheme for general access structures Information Sciences | 2024-02-28 | Paper |
Image universal steganalysis based on best wavelet packet decomposition Science China Information Sciences | 2022-10-28 | Paper |
A collaborative secret sharing scheme based on the Chinese remainder theorem Mathematical Biosciences and Engineering | 2022-08-03 | Paper |
Protocols for secure test on relationship on number axis | 2021-04-26 | Paper |
A new threshold changeable secret sharing scheme based on the Chinese remainder theorem Information Sciences | 2020-09-22 | Paper |
Private social-willing detection | 2020-08-12 | Paper |
Homomorphic encryption scheme and a protocol on secure computing a line by two private points | 2018-07-18 | Paper |
Randomized coding of plaintext encryption scheme | 2017-10-20 | Paper |
scientific article; zbMATH DE number 6741946 (Why is no real title available?) | 2017-07-11 | Paper |
A discussion on the relationship between probabilistic visual cryptography and random grid Information Sciences | 2017-02-02 | Paper |
Secure set computing in cloud environment | 2017-01-06 | Paper |
A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle Theoretical Computer Science | 2015-12-08 | Paper |
Solutions to polynomial generalized Bers-Vekua equations in Clifford analysis Complex Analysis and Operator Theory | 2013-10-10 | Paper |
Half Dirichlet problem for the Hölder continuous matrix functions in Hermitian Clifford analysis Complex Variables and Elliptic Equations | 2013-10-10 | Paper |
Riemann boundary value problems on the sphere in Clifford analysis Advances in Applied Clifford Algebras | 2013-01-28 | Paper |
\((2,n)\) secret sharing scheme for gray and color images based on Boolean operation Science China Information Sciences | 2012-08-17 | Paper |
scientific article; zbMATH DE number 6001594 (Why is no real title available?) | 2012-01-27 | Paper |
Some properties of holomorphic Cliffordian functions in complex Clifford analysis Acta Mathematica Scientia. Series B. (English Edition) | 2011-07-19 | Paper |
Probabilistic visual secret sharing schemes for grey-scale images and color images Information Sciences | 2011-06-22 | Paper |
Solutions to the polynomial Dirac equations on unbounded domains in Clifford analysis Mathematical Methods in the Applied Sciences | 2011-03-08 | Paper |
Multiple participants enrollment in a publicly verifiable secret sharing scheme | 2011-02-05 | Paper |
Half Dirichlet problem for matrix functions on the unit ball in Hermitian Clifford analysis Journal of Mathematical Analysis and Applications | 2010-11-22 | Paper |
Zero-knowledge proof protocol of the roots of polynomial functions | 2010-11-05 | Paper |
On generalization of Martinelli-Bochner integral formula using Clifford analysis Advances in Applied Clifford Algebras | 2010-09-21 | Paper |
Szeg$\ddot{o}$ projection and matrix Hilbert transform in Hermitean Clifford analysis | 2010-07-02 | Paper |
Probability method for cryptanalysis of general multivariate modular linear equation Science in China. Series F | 2010-03-03 | Paper |
Symmetric cryptographic protocols for extended millionaires' problem Science in China. Series F | 2010-02-26 | Paper |
Cryptanalysis of RSA for a special case with \(d > e\) Science in China. Series F | 2010-02-26 | Paper |
On general construction for extended visual cryptography schemes Pattern Recognition | 2009-07-29 | Paper |
Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images Information Security and Cryptology | 2009-02-10 | Paper |
Cryptanalysis of General Lu-Lee Type Systems Information Security and Cryptology | 2009-02-10 | Paper |
A review on blind detection for image steganography Signal Processing | 2009-01-20 | Paper |
Comparing two sets without disclosing them Science in China. Series F | 2008-10-16 | Paper |
scientific article; zbMATH DE number 5283568 (Why is no real title available?) | 2008-06-03 | Paper |
Steganalysis of LSB replacement based on wavelet transform | 2008-04-04 | Paper |
Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations Information Sciences | 2008-01-11 | Paper |
LTSB Steganalysis Based on Quartic Equation Transactions on Data Hiding and Multimedia Security II | 2007-11-13 | Paper |
A secure multi-party computation solution to intersection problems of sets and rectangles Progress in Natural Science | 2007-10-26 | Paper |
Two secret sharing schemes based on Boolean operations Pattern Recognition | 2007-07-11 | Paper |
Weak-keys in public key cryptosystems based on discrete logarithms Tsinghua Science and Technology | 2007-01-19 | Paper |
Partial blind-signature scheme based on bundling homomorphism | 2006-11-09 | Paper |
Multi secret image color visual cryptography schemes for general access structures\(^{*}\) Progress in Natural Science | 2006-08-28 | Paper |
Shift visual cryptography scheme of two secret images. Progress in Natural Science | 2004-01-25 | Paper |
A minimum pixels scheme of 2 out of 2-visual cryptography Journal of Sichuan University. Natural Science Edition | 2001-07-04 | Paper |