Daoshun Wang

From MaRDI portal
(Redirected from Person:506703)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A perfect secret sharing scheme for general access structures
Information Sciences
2024-02-28Paper
Image universal steganalysis based on best wavelet packet decomposition
Science China Information Sciences
2022-10-28Paper
A collaborative secret sharing scheme based on the Chinese remainder theorem
Mathematical Biosciences and Engineering
2022-08-03Paper
Protocols for secure test on relationship on number axis2021-04-26Paper
A new threshold changeable secret sharing scheme based on the Chinese remainder theorem
Information Sciences
2020-09-22Paper
Private social-willing detection2020-08-12Paper
Homomorphic encryption scheme and a protocol on secure computing a line by two private points2018-07-18Paper
Randomized coding of plaintext encryption scheme2017-10-20Paper
scientific article; zbMATH DE number 6741946 (Why is no real title available?)2017-07-11Paper
A discussion on the relationship between probabilistic visual cryptography and random grid
Information Sciences
2017-02-02Paper
Secure set computing in cloud environment2017-01-06Paper
A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle
Theoretical Computer Science
2015-12-08Paper
Solutions to polynomial generalized Bers-Vekua equations in Clifford analysis
Complex Analysis and Operator Theory
2013-10-10Paper
Half Dirichlet problem for the Hölder continuous matrix functions in Hermitian Clifford analysis
Complex Variables and Elliptic Equations
2013-10-10Paper
Riemann boundary value problems on the sphere in Clifford analysis
Advances in Applied Clifford Algebras
2013-01-28Paper
\((2,n)\) secret sharing scheme for gray and color images based on Boolean operation
Science China Information Sciences
2012-08-17Paper
scientific article; zbMATH DE number 6001594 (Why is no real title available?)2012-01-27Paper
Some properties of holomorphic Cliffordian functions in complex Clifford analysis
Acta Mathematica Scientia. Series B. (English Edition)
2011-07-19Paper
Probabilistic visual secret sharing schemes for grey-scale images and color images
Information Sciences
2011-06-22Paper
Solutions to the polynomial Dirac equations on unbounded domains in Clifford analysis
Mathematical Methods in the Applied Sciences
2011-03-08Paper
Multiple participants enrollment in a publicly verifiable secret sharing scheme2011-02-05Paper
Half Dirichlet problem for matrix functions on the unit ball in Hermitian Clifford analysis
Journal of Mathematical Analysis and Applications
2010-11-22Paper
Zero-knowledge proof protocol of the roots of polynomial functions2010-11-05Paper
On generalization of Martinelli-Bochner integral formula using Clifford analysis
Advances in Applied Clifford Algebras
2010-09-21Paper
Szeg$\ddot{o}$ projection and matrix Hilbert transform in Hermitean Clifford analysis2010-07-02Paper
Probability method for cryptanalysis of general multivariate modular linear equation
Science in China. Series F
2010-03-03Paper
Symmetric cryptographic protocols for extended millionaires' problem
Science in China. Series F
2010-02-26Paper
Cryptanalysis of RSA for a special case with \(d > e\)
Science in China. Series F
2010-02-26Paper
On general construction for extended visual cryptography schemes
Pattern Recognition
2009-07-29Paper
Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images
Information Security and Cryptology
2009-02-10Paper
Cryptanalysis of General Lu-Lee Type Systems
Information Security and Cryptology
2009-02-10Paper
A review on blind detection for image steganography
Signal Processing
2009-01-20Paper
Comparing two sets without disclosing them
Science in China. Series F
2008-10-16Paper
scientific article; zbMATH DE number 5283568 (Why is no real title available?)2008-06-03Paper
Steganalysis of LSB replacement based on wavelet transform2008-04-04Paper
Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations
Information Sciences
2008-01-11Paper
LTSB Steganalysis Based on Quartic Equation
Transactions on Data Hiding and Multimedia Security II
2007-11-13Paper
A secure multi-party computation solution to intersection problems of sets and rectangles
Progress in Natural Science
2007-10-26Paper
Two secret sharing schemes based on Boolean operations
Pattern Recognition
2007-07-11Paper
Weak-keys in public key cryptosystems based on discrete logarithms
Tsinghua Science and Technology
2007-01-19Paper
Partial blind-signature scheme based on bundling homomorphism2006-11-09Paper
Multi secret image color visual cryptography schemes for general access structures\(^{*}\)
Progress in Natural Science
2006-08-28Paper
Shift visual cryptography scheme of two secret images.
Progress in Natural Science
2004-01-25Paper
A minimum pixels scheme of 2 out of 2-visual cryptography
Journal of Sichuan University. Natural Science Edition
2001-07-04Paper


Research outcomes over time


This page was built for person: Daoshun Wang