WorldCat Identities

Wang, Huaxiong

Overview
Works: 19 works in 73 publications in 2 languages and 827 library holdings
Genres: Conference papers and proceedings 
Roles: Author, Editor, Other, Thesis advisor, Contributor
Classifications: QA76.9.A25, 005.8
Publication Timeline
.
Most widely held works by Huaxiong Wang
Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings by Huaxiong Wang( Book )

17 editions published in 2004 in English and held by 180 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 9th Australasian Conference on Information Security and Privacy, ACISP 2004, held in Sydney, Australia in July 2004. The 41 revised full papers presented were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on broadcast encryption and traitor tracing, private information retrieval and oblivious transfer, trust and secret sharing, cryptanalysis, digital signatures, cryptosystems, fast computation, mobile agents security, protocols, security management, and access control and authorization
Algebraic curves in cryptography by San Ling( Book )

15 editions published in 2013 in English and held by 86 WorldCat member libraries worldwide

"The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sharing, frameproof codes, and broadcast encryption. Suitable for researchers and graduate students in mathematics and computer science, this self-contained book is one of the first to focus on many topics in cryptography involving algebraic curves. After supplying the necessary background on algebraic curves, the authors discuss error-correcting codes, including algebraic geometry codes, and provide an introduction to elliptic curves. Each chapter in the remainder of the book deals with a selected topic in cryptography (other than elliptic curve cryptography). The topics covered include secret sharing schemes, authentication codes, frameproof codes, key distribution schemes, broadcast encryption, and sequences. Chapters begin with introductory material before featuring the application of algebraic curves."--
Coding and Cryptology Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings by Yeow Meng Chee( )

12 editions published between 2009 and 2011 in English and held by 34 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the Second International Workshop on Coding and Cryptology, IWCC 2009, held in Zhangjiajie, China, in June 2009. The 21 revised full technical papers, except one, are contributed by the invited speakers of the workshop. The papers were carefully selected during two rounds of reviewing and improvement for inclusion in the volume and address all aspects of coding theory, cryptology and related areas - such as combinatorics - theoretical or applied. Topics addressed are coding theory, secure codes, hash functions, combinatorics, boolean functions, authentication, cryptography, protocols, sequences, and secure communications
Cryptology and network security : 4th international conference, CANS 2005, Xiamen, China, December 14-16, 2005 : proceedings by Feng Bao( Book )

9 editions published between 2005 and 2007 in English and held by 34 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques
Yu rong ji qi zhi pin de zhi liang yu jian yan( Book )

2 editions published in 2000 in Chinese and held by 4 WorldCat member libraries worldwide

Ben shu cong jie shao wo guo yu rong xing ye de fa zhan li shi ji xian zhuang ru shou,Fen bie jie shao yu mao rong de te xing,Yu rong ji qi zhi pin de sheng chan,Jia gong,Bao zhuang yu jian yan
Chong ya mu ju jie gou yu zhi zao shi xun( Book )

1 edition published in 2013 in Chinese and held by 2 WorldCat member libraries worldwide

Cryptography and computational number theory by Kwok Yan Lam( Book )

2 editions published in 2001 in English and held by 2 WorldCat member libraries worldwide

The fields of cryptography and computational number theory have recently witnessed a rapid development, which was the subject of the CCNT workshop in Singapore in November 1999. Its aim was to stimulate further research in information and computer security as well as the design and implementation of number theoretic cryptosystems and other related areas. Another achievement of the meeting was the collaboration of mathematicians, computer scientists, practical cryptographers and engineers in academia, industry and government. The present volume comprises a selection of refereed papers originating from this event, presenting either a survey of some area or original and new results. They concern many different aspects of the field such as theory, techniques, applications and practical experience. It provides a state-of-the-art report on some number theoretical issues of significance to cryptography
Theory and practice of cryptography solutions for secure information systems( Book )

1 edition published in 2013 in English and held by 1 WorldCat member library worldwide

"This book explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources"--
New results on cryptanalysis of stream ciphers by Joo Yeon Cho( )

1 edition published in 2007 in English and held by 1 WorldCat member library worldwide

Authentication for multicast communication by Christophe Maurice Andre Tartary( Book )

1 edition published in 2007 in English and held by 1 WorldCat member library worldwide

Analysis of modern dedicated cryptographic hash functions by Krystian Matusiewicz( )

1 edition published in 2007 in English and held by 1 WorldCat member library worldwide

Unconditionally secure schemes for distributed authentication systems by Huaxiong Wang( )

1 edition published in 2001 in English and held by 1 WorldCat member library worldwide

Coding and cryptology : proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 by 2007> International Workshop on Coding and Cryptology. <1( Book )

1 edition published in 2008 in English and held by 1 WorldCat member library worldwide

Over the past years, the rapid growth of the Internet and World Wide Web has provided great opportunities for online commercial activities, business transactions and government services over open computer and communication networks. However, such developments are only possible if communications can be conducted in a secure and reliable manner. The mathematical theory and practice of coding theory and cryptology underpin the provision of effective security and reliability for data communication, processing and storage. Theoretical and practical advances in these fields are therefore a key factor in facilitating the growth of data communications and data networks. The aim of the International Workshop on Coding and Cryptology 2007 was to bring together experts from coding theory, cryptology and their related areas for a fruitful exchange of ideas in order to stimulate further research and collaboration among mathematicians, computer scientists, practical cryptographers and engineers. This post-proceedings of the workshop consists of 20 selected papers on a wide range of topics in coding theory and cryptology, including theory, techniques, applications, and practical experiences. They cover significant advances in these areas and contain very useful surveys
CODING AND CRYPTOLOGY - PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP by Huaxiong Wang( )

1 edition published in 2008 in English and held by 0 WorldCat member libraries worldwide

Cryptology and Network Security (vol. # 3810) by Yvo Desmedt( )

4 editions published in 2005 in English and held by 0 WorldCat member libraries worldwide

Cryptology and network security 6th international conference, CANS 2007, Singapore, December 8-10, 2007 : proceedings by International Conference on Cryptology and Network Security( )

1 edition published in 2007 in English and held by 0 WorldCat member libraries worldwide

Cryptology and Network Security (vol. [3810) : 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings by Yvo Desmedt( )

1 edition published in 2005 in English and held by 0 WorldCat member libraries worldwide

Coding and Cryptology : Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings( )

1 edition published in 2011 in English and held by 0 WorldCat member libraries worldwide

Algebraic geometry in cryptography by San Ling( )

1 edition published in 2011 in English and held by 0 WorldCat member libraries worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.62 (from 0.01 for Coding and ... to 1.00 for Algebraic ...)

WorldCat IdentitiesRelated Identities
Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings
Alternative Names
Huaxiong Wang.

Wang, Hua Xiong.

Languages
Covers
Coding and Cryptology Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. ProceedingsCryptology and network security : 4th international conference, CANS 2005, Xiamen, China, December 14-16, 2005 : proceedingsCryptography and computational number theoryCoding and cryptology : proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007