Yu-Min Wang

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Optimal VIX-linked structure for the target benefit pension plan
ASTIN Bulletin
2024-04-30Paper
Evaluation of water quality reliability based on entropy in water distribution system
Physica A
2022-03-01Paper
Using high-dimensional features for high-accuracy pulse diagnosis
Mathematical Biosciences and Engineering
2021-09-03Paper
The threshold of stochastic Gilpin-Ayala model subject to general Lévy jumps
Journal of Applied Mathematics and Computing
2019-08-14Paper
Certificateless proxy signature scheme in the Standard Model
Fundamenta Informaticae
2018-10-26Paper
nMIBAS: a novel multi-receiver ID-based anomymous signcryption with decryption fairness
 
2018-04-05Paper
scientific article; zbMATH DE number 6499890 (Why is no real title available?)
 
2015-10-28Paper
Improvement on Meshram et al.'s ID-based cryptographic mechanism
Information Processing Letters
2014-04-14Paper
Directed proxy signature in the standard model
Journal of Shanghai Jiaotong University (Science)
2014-03-27Paper
Quantile hedging for guaranteed minimum death benefits with regime switching
Stochastic Analysis and Applications
2012-11-09Paper
Quantile hedging for guaranteed minimum death benefits
Insurance Mathematics & Economics
2012-02-10Paper
An ID-based chameleon hash scheme and signature without key escrow
 
2011-07-19Paper
Numerical solutions of quantile hedging for guaranteed minimum death benefits under a regime-switching jump-diffusion formulation
Journal of Computational and Applied Mathematics
2011-03-09Paper
An identity (ID)-based threshold multi-secret sharing scheme
 
2010-02-12Paper
A new ID-based identification scheme
 
2010-02-12Paper
A verifiable threshold multi-secret sharing scheme
 
2009-11-11Paper
RSA cryptosystem in the domain \(Z[\omega\)]
 
2009-03-06Paper
A chaos-based image encryption algorithm using alternate structure
Science in China. Series F
2007-10-12Paper
Provably secure convertible user designating confirmer partially blind signatures
 
2007-09-18Paper
scientific article; zbMATH DE number 5184351 (Why is no real title available?)
 
2007-08-29Paper
An efficient and secure multi-secret sharing scheme with general access structures
Wuhan University Journal of Natural Sciences
2007-06-01Paper
A new forward-secure authenticated encryption scheme with message linkages
Wuhan University Journal of Natural Sciences
2007-06-01Paper
Existence of nontrivial antiperiodic solutions for nonlinear second order difference equations
 
2007-03-20Paper
Exploiting randomness on continuous sets
Information Sciences
2007-02-16Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Calculating formulas and convergence of roots for equation of 5th order
 
2007-02-02Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
A method for the efficient computation of scalar multiplication in Koblitz curve
 
2006-05-24Paper
Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences
Applied Mathematics and Computation
2006-05-18Paper
scientific article; zbMATH DE number 2243081 (Why is no real title available?)
 
2006-01-03Paper
scientific article; zbMATH DE number 2243084 (Why is no real title available?)
 
2006-01-03Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
An improved signature scheme without using one-way hash functions
Applied Mathematics and Computation
2005-11-22Paper
Security analysis and improvement of a double-trapdoor encryption scheme
Applied Mathematics and Computation
2005-11-16Paper
A research on new public-key encryption schemes
Applied Mathematics and Computation
2005-11-16Paper
On the security of a convertible authenticated encryption
Applied Mathematics and Computation
2005-11-14Paper
Two provably secure \(k\)-out-of-\(n\) oblivious transfer schemes
Applied Mathematics and Computation
2005-11-14Paper
scientific article; zbMATH DE number 2222195 (Why is no real title available?)
 
2005-11-02Paper
On the security of Miyaji et al. group signature scheme
Applied Mathematics and Computation
2005-10-28Paper
A new \((t,n)\) multi-secret sharing scheme based on Shamir's secret sharing
Applied Mathematics and Computation
2005-10-28Paper
A \(w\)-NNAF method for the efficient computation of scalar multiplication in elliptic curve cryptography
Applied Mathematics and Computation
2005-10-28Paper
Information Security Practice and Experience
Lecture Notes in Computer Science
2005-09-13Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
scientific article; zbMATH DE number 2197692 (Why is no real title available?)
 
2005-08-23Paper
scientific article; zbMATH DE number 2150387 (Why is no real title available?)
 
2005-03-30Paper
scientific article; zbMATH DE number 2144118 (Why is no real title available?)
 
2005-03-11Paper
scientific article; zbMATH DE number 2111173 (Why is no real title available?)
 
2004-10-28Paper
scientific article; zbMATH DE number 2112355 (Why is no real title available?)
 
2004-10-28Paper
scientific article; zbMATH DE number 2080678 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2080673 (Why is no real title available?)
 
2004-08-04Paper
Selection of secure hyperelliptic curves of \textit{g=2} based on a subfield
Journal of Computer Science and Technology
2004-07-01Paper
Secure Web transaction with anonymous mobile agent over Internet
Journal of Computer Science and Technology
2003-08-13Paper
scientific article; zbMATH DE number 1504674 (Why is no real title available?)
 
2002-07-16Paper
scientific article; zbMATH DE number 1539486 (Why is no real title available?)
 
2001-01-07Paper
scientific article; zbMATH DE number 1474817 (Why is no real title available?)
 
2000-07-11Paper
scientific article; zbMATH DE number 880660 (Why is no real title available?)
 
1997-06-23Paper
scientific article; zbMATH DE number 858208 (Why is no real title available?)
 
1997-02-16Paper
scientific article; zbMATH DE number 883164 (Why is no real title available?)
 
1996-06-02Paper
scientific article; zbMATH DE number 3989812 (Why is no real title available?)
 
1986-01-01Paper


Research outcomes over time


This page was built for person: Yu-Min Wang