The following pages link to Wei-Pang Yang (Q556119):
Displayed 34 items.
- A new blind signature based on the discrete logarithm problem for untraceability (Q556120) (← links)
- Hierarchical spanning trees and distributing on incomplete hypercubes (Q808225) (← links)
- Designing a classifier by a layered multi-population genetic programming approach (Q882254) (← links)
- Concurrent operations in linear hashing (Q918680) (← links)
- Amortized analysis of some disk scheduling algorithms: SSTF, SCAN, and \(N\)-step SCAN (Q1195936) (← links)
- The worst case analysis of algorithm on multiple stacks manipulation (Q1201875) (← links)
- Manipulating multiple stacks with ordered-heap (Q1310924) (← links)
- Concurrent operations in multi-attribute linear hashing (Q1310946) (← links)
- Authenticated encryption schemes with message linkage (Q1352011) (← links)
- Using multilevel hierarchical registration strategy for mobility management (Q1364485) (← links)
- Some properties of optimal cartesian product files for orthogonal range queries (Q1369170) (← links)
- An improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing scheme (Q1774928) (← links)
- Learning effective classifiers with \(Z\)-value measure based on genetic programming (Q1887801) (← links)
- Analysis of the multigroup method for manipulating multiple stacks (Q2365927) (← links)
- Finding a complete matching with the maximum product on weighted bipartite graphs (Q2365954) (← links)
- Simple authenticated key agreement and protected password change protocol (Q2485500) (← links)
- (Q3355286) (← links)
- 2d random filter and analysis<sup>∗</sup> (Q3989750) (← links)
- (Q4008392) (← links)
- Random filter and its analysis* (Q4009760) (← links)
- Performance analysis of stack space allocation based upon random walk model (Q4016901) (← links)
- Integration of relations with conflicting schema structures in heterogeneous database systems (Q4224363) (← links)
- (Q4285044) (← links)
- Refining imprecise data by integrity constraints (Q4307633) (← links)
- Multilevel secure database encryption with subkeys (Q4398754) (← links)
- (Q4415280) (← links)
- (Q4432963) (← links)
- (Q4443980) (← links)
- PARALLEL COMPUTATION OF THE MODULAR CASCADE EXPONENTIATION (Q4820119) (← links)
- (Q4835779) (← links)
- Some properties of vectorial addition chains<sup>†</sup> (Q4844555) (← links)
- (Q4925072) (← links)
- Some active attacks on fast server-aided secret computation protocols for modular exponentiation (Q5235424) (← links)
- (Q5505881) (← links)