The following pages link to Li-Cheng Wang (Q655112):
Displaying 50 items.
- (Q433017) (redirect page) (← links)
- Discrete logarithm based additively homomorphic encryption and secure data aggregation (Q433021) (← links)
- Certificate-based proxy decryption systems with revocability in the standard model (Q497594) (← links)
- Minimal logarithmic signatures for the unitary group \(U_n(q)\) (Q499665) (← links)
- Provably secure and efficient proxy signature with untrustworthy proxy signer (Q655114) (← links)
- All exceptional groups of Lie type have minimal logarithmic signatures (Q744024) (← links)
- The braid-based bit commitment protocol (Q849940) (← links)
- Simulatability and security of certificateless threshold signatures (Q865909) (← links)
- Construction of DNA codes by using algebraic number theory (Q897343) (← links)
- New designing of cryptosystems based on quadratic fields (Q954438) (← links)
- A new impossible differential attack on SAFER ciphers (Q962614) (← links)
- STP-LWE: A variant of learning with error for a flexible encryption (Q1718158) (← links)
- Probability-dependent static output feedback control for discrete-time nonlinear stochastic systems with missing measurements (Q1955089) (← links)
- New assumptions and efficient cryptosystems from the \(e\)-th power residue symbol (Q2030881) (← links)
- Distributed set-membership filtering for discrete-time systems subject to denial-of-service attacks and fading measurements: a zonotopic approach (Q2056273) (← links)
- Leveraging the hardness of dihedral coset problem for quantum cryptography (Q2104711) (← links)
- Event-based state estimation under constrained bit rate: an encoding-decoding approach (Q2158978) (← links)
- On quantized \(\mathcal{H}_\infty\) filtering for multi-rate systems under stochastic communication protocols: the finite-horizon case (Q2198108) (← links)
- Variance-constrained \(H_\infty\) state estimation for time-varying multi-rate systems with redundant channels: the finite-horizon case (Q2224812) (← links)
- Regularity and Green's relations for finite \(E\)-order-preserving transformations semigroups. (Q2267780) (← links)
- Deconvolution filtering for nonlinear stochastic systems with randomly occurring sensor delays via probability-dependent method (Q2319138) (← links)
- Fairness analysis for multiparty nonrepudiation protocols based on improved strand space (Q2321532) (← links)
- Minimal logarithmic signatures for one type of classical groups (Q2358423) (← links)
- A lattice-based signcryption scheme without random oracles (Q2515427) (← links)
- Multi-use and unidirectional identity-based proxy re-encryption schemes (Q2638201) (← links)
- Event-based joint state and fault estimation: the envelope-constrained \(H_\infty\) criterion (Q2668342) (← links)
- Quantum algorithms for typical hard problems: a perspective of cryptanalysis (Q2677252) (← links)
- Event-based distributed set-membership filtering for a class of time-varying non-linear systems over sensor networks with saturation effects (Q2817108) (← links)
- (Q2951365) (← links)
- New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems (Q3019912) (← links)
- New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks (Q3059661) (← links)
- Distributed resilient filtering of large-scale systems with channel scheduling (Q3297105) (← links)
- (Q4000655) (← links)
- Star-Topological Encryption: Talking to the Sever but Hiding Identities to Others* (Q4637887) (← links)
- An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption Based on (Semi)group Factorization Problems* (Q4637888) (← links)
- Event-triggered control for discrete-time systems with unknown nonlinearities: an interval observer-based approach (Q5026736) (← links)
- (Q5032715) (← links)
- Recursive Filtering With Measurement Fading: A Multiple Description Coding Scheme (Q5033809) (← links)
- Conjugate adjoining problem in braid groups and new design of braid-based signatures (Q5046382) (← links)
- Secure network coding in the presence of eavesdroppers (Q5046389) (← links)
- Non-fragile <i>l</i><sub>2</sub>-<i>l</i><sub>∞</sub> state estimation for time-delayed artificial neural networks: an adaptive event-triggered approach (Q5097806) (← links)
- (Q5160390) (← links)
- Reliable<i>H</i><sub>∞</sub>filtering for discrete piecewise linear systems with infinite distributed delays (Q5415776) (← links)
- Transitive Signatures from Braid Groups (Q5458209) (← links)
- Proxy Re-signature Schemes Without Random Oracles (Q5458210) (← links)
- Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups (Q5747090) (← links)
- Developing semantic business model for VO construction on semantic grid (Q5899458) (← links)
- Finite-Horizon $H_{\infty }$ Filtering via a High-Rate Network With the FlexRay Protocol (Q6056419) (← links)
- Joint estimation of state, parameter, and unknown input for nonlinear systems: A composite estimation scheme (Q6082388) (← links)
- Pinning synchronization control for a class of dynamical networks with coupled time-varying delays: an interval-observer-based approach (Q6135554) (← links)