Yu-Min Wang

From MaRDI portal
(Redirected from Person:1979549)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Optimal VIX-linked structure for the target benefit pension plan
ASTIN Bulletin
2024-04-30Paper
Evaluation of water quality reliability based on entropy in water distribution system
Physica A
2022-03-01Paper
Using high-dimensional features for high-accuracy pulse diagnosis
Mathematical Biosciences and Engineering
2021-09-03Paper
The threshold of stochastic Gilpin-Ayala model subject to general Lévy jumps
Journal of Applied Mathematics and Computing
2019-08-14Paper
Certificateless proxy signature scheme in the Standard Model
Fundamenta Informaticae
2018-10-26Paper
nMIBAS: a novel multi-receiver ID-based anomymous signcryption with decryption fairness2018-04-05Paper
scientific article; zbMATH DE number 6499890 (Why is no real title available?)2015-10-28Paper
Improvement on Meshram et al.'s ID-based cryptographic mechanism
Information Processing Letters
2014-04-14Paper
Directed proxy signature in the standard model
Journal of Shanghai Jiaotong University (Science)
2014-03-27Paper
Quantile hedging for guaranteed minimum death benefits with regime switching
Stochastic Analysis and Applications
2012-11-09Paper
Quantile hedging for guaranteed minimum death benefits
Insurance Mathematics & Economics
2012-02-10Paper
An ID-based chameleon hash scheme and signature without key escrow2011-07-19Paper
Numerical solutions of quantile hedging for guaranteed minimum death benefits under a regime-switching jump-diffusion formulation
Journal of Computational and Applied Mathematics
2011-03-09Paper
An identity (ID)-based threshold multi-secret sharing scheme2010-02-12Paper
A new ID-based identification scheme2010-02-12Paper
A verifiable threshold multi-secret sharing scheme2009-11-11Paper
RSA cryptosystem in the domain \(Z[\omega\)]2009-03-06Paper
A chaos-based image encryption algorithm using alternate structure
Science in China. Series F
2007-10-12Paper
Provably secure convertible user designating confirmer partially blind signatures2007-09-18Paper
scientific article; zbMATH DE number 5184351 (Why is no real title available?)2007-08-29Paper
An efficient and secure multi-secret sharing scheme with general access structures
Wuhan University Journal of Natural Sciences
2007-06-01Paper
A new forward-secure authenticated encryption scheme with message linkages
Wuhan University Journal of Natural Sciences
2007-06-01Paper
Existence of nontrivial antiperiodic solutions for nonlinear second order difference equations2007-03-20Paper
Exploiting randomness on continuous sets
Information Sciences
2007-02-16Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Calculating formulas and convergence of roots for equation of 5th order2007-02-02Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
A method for the efficient computation of scalar multiplication in Koblitz curve2006-05-24Paper
Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences
Applied Mathematics and Computation
2006-05-18Paper
scientific article; zbMATH DE number 2243081 (Why is no real title available?)2006-01-03Paper
scientific article; zbMATH DE number 2243084 (Why is no real title available?)2006-01-03Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
An improved signature scheme without using one-way hash functions
Applied Mathematics and Computation
2005-11-22Paper
Security analysis and improvement of a double-trapdoor encryption scheme
Applied Mathematics and Computation
2005-11-16Paper
A research on new public-key encryption schemes
Applied Mathematics and Computation
2005-11-16Paper
On the security of a convertible authenticated encryption
Applied Mathematics and Computation
2005-11-14Paper
Two provably secure \(k\)-out-of-\(n\) oblivious transfer schemes
Applied Mathematics and Computation
2005-11-14Paper
scientific article; zbMATH DE number 2222195 (Why is no real title available?)2005-11-02Paper
On the security of Miyaji et al. group signature scheme
Applied Mathematics and Computation
2005-10-28Paper
A new \((t,n)\) multi-secret sharing scheme based on Shamir's secret sharing
Applied Mathematics and Computation
2005-10-28Paper
A \(w\)-NNAF method for the efficient computation of scalar multiplication in elliptic curve cryptography
Applied Mathematics and Computation
2005-10-28Paper
Information Security Practice and Experience
Lecture Notes in Computer Science
2005-09-13Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
scientific article; zbMATH DE number 2197692 (Why is no real title available?)2005-08-23Paper
scientific article; zbMATH DE number 2150387 (Why is no real title available?)2005-03-30Paper
scientific article; zbMATH DE number 2144118 (Why is no real title available?)2005-03-11Paper
scientific article; zbMATH DE number 2111173 (Why is no real title available?)2004-10-28Paper
scientific article; zbMATH DE number 2112355 (Why is no real title available?)2004-10-28Paper
scientific article; zbMATH DE number 2080678 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2080673 (Why is no real title available?)2004-08-04Paper
Selection of secure hyperelliptic curves of \textit{g=2} based on a subfield
Journal of Computer Science and Technology
2004-07-01Paper
Secure Web transaction with anonymous mobile agent over Internet
Journal of Computer Science and Technology
2003-08-13Paper
scientific article; zbMATH DE number 1504674 (Why is no real title available?)2002-07-16Paper
scientific article; zbMATH DE number 1539486 (Why is no real title available?)2001-01-07Paper
scientific article; zbMATH DE number 1474817 (Why is no real title available?)2000-07-11Paper
scientific article; zbMATH DE number 880660 (Why is no real title available?)1997-06-23Paper
scientific article; zbMATH DE number 858208 (Why is no real title available?)1997-02-16Paper
scientific article; zbMATH DE number 883164 (Why is no real title available?)1996-06-02Paper
scientific article; zbMATH DE number 3989812 (Why is no real title available?)1986-01-01Paper


Research outcomes over time


This page was built for person: Yu-Min Wang