WorldCat Identities

Wang, Huaxiong

Overview
Works: 21 works in 54 publications in 1 language and 684 library holdings
Genres: Conference proceedings 
Roles: Editor, Thesis advisor, Creator, Contributor, Other
Classifications: QA76.9.A25, 005.8
Publication Timeline
Key
Publications about  Huaxiong Wang Publications about Huaxiong Wang
Publications by  Huaxiong Wang Publications by Huaxiong Wang
Most widely held works by Huaxiong Wang
Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings by Australasian Conference on Information Security and Privacy ( Book )
5 editions published in 2004 in English and held by 261 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 9th Australasian Conference on Information Security and Privacy, ACISP 2004, held in Sydney, Australia in July 2004. The 41 revised full papers presented were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on broadcast encryption and traitor tracing, private information retrieval and oblivious transfer, trust and secret sharing, cryptanalysis, digital signatures, cryptosystems, fast computation, mobile agents security, protocols, security management, and access control and authorization
Algebraic curves in cryptography by San Ling ( )
8 editions published in 2013 in English and held by 167 WorldCat member libraries worldwide
"The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sharing, frameproof codes, and broadcast encryption. Suitable for researchers and graduate students in mathematics and computer science, this self-contained book is one of the first to focus on many topics in cryptography involving algebraic curves. After supplying the necessary background on algebraic curves, the authors discuss error-correcting codes, including algebraic geometry codes, and provide an introduction to elliptic curves. Each chapter in the remainder of the book deals with a selected topic in cryptography (other than elliptic curve cryptography). The topics covered include secret sharing schemes, authentication codes, frameproof codes, key distribution schemes, broadcast encryption, and sequences. Chapters begin with introductory material before featuring the application of algebraic curves. "--
Cryptology and network security 4th international conference, CANS 2005, Xiamen, China, December 14-16, 2005 : proceedings by D Hutchison ( Book )
8 editions published between 2005 and 2007 in English and held by 63 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques
Coding and cryptology second international workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009 : proceedings by David Hutchison ( )
5 editions published in 2009 in English and held by 48 WorldCat member libraries worldwide
Coding and Cryptology third international workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011 : proceedings by Yeow Meng Chee ( )
1 edition published in 2011 in English and held by 38 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2011. The 19 revised full technical papers are contributed by the invited speakers of the workshop. The papers were carefully reviewed and cover a broad range of foundational and methodological as well as applicative issues in coding and cryptology, as well as related areas such as combinatorics
Information Security and Privacy 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings by Huaxiong Wang ( )
4 editions published in 2004 in English and held by 35 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 9th Australasian Conference on Information Security and Privacy, ACISP 2004, held in Sydney, Australia in July 2004. The 41 revised full papers presented were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on broadcast encryption and traitor tracing, private information retrieval and oblivious transfer, trust and secret sharing, cryptanalysis, digital signatures, cryptosystems, fast computation, mobile agents security, protocols, security management, and access control and authorization
Cryptology and Network Security (vol. # 3810) 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings by Yvo Desmedt ( )
4 editions published in 2005 in English and held by 28 WorldCat member libraries worldwide
Cryptography and computational number theory by Kwok Yan Lam ( )
1 edition published in 2001 in English and held by 13 WorldCat member libraries worldwide
The fields of cryptography and computational number theory have recently witnessed a rapid development, which was the subject of the CCNT workshop in Singapore in November 1999. Its aim was to stimulate further research in information and computer security as well as the design and implementation of number theoretic cryptosystems and other related areas. Another achievement of the meeting was the collaboration of mathematicians, computer scientists, practical cryptographers and engineers in academia, industry and government. The present volume comprises a selection of refereed papers originating from this event, presenting either a survey of some area or original and new results. They concern many different aspects of the field such as theory, techniques, applications and practical experience. It provides a state-of-the-art report on some number theoretical issues of significance to cryptography
Information security and privacy : 9th Australasian conference ; proceedings ( Book )
2 editions published in 2004 in English and held by 12 WorldCat member libraries worldwide
Information security and privacy : 9th Australasian conference, ACISP 2004 by ACISP 2003 ( Book )
3 editions published in 2004 in English and held by 6 WorldCat member libraries worldwide
Coding and cryptology third international workshop ; proceedings ( Book )
1 edition published in 2011 in English and held by 3 WorldCat member libraries worldwide
Cryptography and computational number theory Proceedings of the workshop on Cryptography and Computational Number Theory, CCNT'99 ( Book )
1 edition published in 2001 in English and held by 2 WorldCat member libraries worldwide
Unconditionally secure schemes for distributed authentication systems by Huaxiong Wang ( )
1 edition published in 2001 in English and held by 1 WorldCat member library worldwide
New results on cryptanalysis of stream ciphers by Joo Yeon Cho ( )
1 edition published in 2007 in English and held by 1 WorldCat member library worldwide
Information security and privacy : 9th Australian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings ( Book )
2 editions published in 2004 in English and held by 1 WorldCat member library worldwide
Analysis of modern dedicated cryptographic hash functions by Krystian Matusiewicz ( )
1 edition published in 2007 in English and held by 1 WorldCat member library worldwide
Authentication for multicast communication by Christophe Maurice Andre Tartary ( Book )
1 edition published in 2007 in English and held by 1 WorldCat member library worldwide
On the Security of PAS (Predicate-Based Authentication Service) by Shujun Li ( )
1 edition published in 2009 in English and held by 1 WorldCat member library worldwide
Coding and Cryptology Second International Workshop, IWCC 2009 by Yeow Meng Chee ( )
2 editions published in 2009 in English and held by 1 WorldCat member library worldwide
Coding and cryptology proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 by 2007> International Workshop on Coding and Cryptology. <1 ( Book )
1 edition published in 2008 in English and held by 1 WorldCat member library worldwide
Over the past years, the rapid growth of the Internet and World Wide Web has provided great opportunities for online commercial activities, business transactions and government services over open computer and communication networks. However, such developments are only possible if communications can be conducted in a secure and reliable manner. The mathematical theory and practice of coding theory and cryptology underpin the provision of effective security and reliability for data communication, processing and storage. Theoretical and practical advances in these fields are therefore a key factor in facilitating the growth of data communications and data networks. The aim of the International Workshop on Coding and Cryptology 2007 was to bring together experts from coding theory, cryptology and their related areas for a fruitful exchange of ideas in order to stimulate further research and collaboration among mathematicians, computer scientists, practical cryptographers and engineers. This post-proceedings of the workshop consists of 20 selected papers on a wide range of topics in coding theory and cryptology, including theory, techniques, applications, and practical experiences. They cover significant advances in these areas and contain very useful surveys
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.77 (from 0.00 for Coding and ... to 0.88 for Informatio ...)
Alternative Names
Huaxiong Wang.
Wang, Hua Xiong.
Languages
English (53)
Covers