WorldCat Identities

Wang, Huaxiong

Overview
Works: 6 works in 21 publications in 1 language and 485 library holdings
Genres: Conference proceedings 
Roles: Creator, Other
Classifications: QA268, 003.54
Publication Timeline
Key
Publications about  Huaxiong Wang Publications about Huaxiong Wang
Publications by  Huaxiong Wang Publications by Huaxiong Wang
Most widely held works by Huaxiong Wang
Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings by Huaxiong Wang ( Book )
7 editions published in 2004 in English and held by 283 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 9th Australasian Conference on Information Security and Privacy, ACISP 2004, held in Sydney, Australia in July 2004. The 41 revised full papers presented were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on broadcast encryption and traitor tracing, private information retrieval and oblivious transfer, trust and secret sharing, cryptanalysis, digital signatures, cryptosystems, fast computation, mobile agents security, protocols, security management, and access control and authorization
Algebraic curves in cryptography by San Ling ( )
5 editions published in 2013 in English and held by 143 WorldCat member libraries worldwide
"The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sharing, frameproof codes, and broadcast encryption. Suitable for researchers and graduate students in mathematics and computer science, this self-contained book is one of the first to focus on many topics in cryptography involving algebraic curves. After supplying the necessary background on algebraic curves, the authors discuss error-correcting codes, including algebraic geometry codes, and provide an introduction to elliptic curves. Each chapter in the remainder of the book deals with a selected topic in cryptography (other than elliptic curve cryptography). The topics covered include secret sharing schemes, authentication codes, frameproof codes, key distribution schemes, broadcast encryption, and sequences. Chapters begin with introductory material before featuring the application of algebraic curves. "--
Coding and cryptology second international workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009 : proceedings by Yeow Meng Chee ( )
5 editions published in 2009 in English and held by 50 WorldCat member libraries worldwide
Information security and privacy : 9th Australasian conference ; proceedings ( )
1 edition published in 2004 in English and held by 6 WorldCat member libraries worldwide
Coding and cryptology : second international workshop, IWCC 2009, Zhangjiajie, China, June 2009, proceedings by Yeow Meng Chee ( )
2 editions published in 2009 in English and held by 2 WorldCat member libraries worldwide
Coding and cryptology proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 by 2007> International Workshop on Coding and Cryptology. <1 ( Book )
1 edition published in 2008 in English and held by 1 WorldCat member library worldwide
Over the past years, the rapid growth of the Internet and World Wide Web has provided great opportunities for online commercial activities, business transactions and government services over open computer and communication networks. However, such developments are only possible if communications can be conducted in a secure and reliable manner. The mathematical theory and practice of coding theory and cryptology underpin the provision of effective security and reliability for data communication, processing and storage. Theoretical and practical advances in these fields are therefore a key factor in facilitating the growth of data communications and data networks. The aim of the International Workshop on Coding and Cryptology 2007 was to bring together experts from coding theory, cryptology and their related areas for a fruitful exchange of ideas in order to stimulate further research and collaboration among mathematicians, computer scientists, practical cryptographers and engineers. This post-proceedings of the workshop consists of 20 selected papers on a wide range of topics in coding theory and cryptology, including theory, techniques, applications, and practical experiences. They cover significant advances in these areas and contain very useful surveys
 
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.83 (from 0.37 for Coding and ... to 1.00 for Coding and ...)
Languages
English (21)
Covers