BibTeX records: Daoshun Wang

download as .bib file

@article{DBLP:journals/isci/JiaGLWZ22,
  author       = {Xingxing Jia and
                  Yusheng Guo and
                  Xiangyang Luo and
                  Daoshun Wang and
                  Chaoyang Zhang},
  title        = {A perfect secret sharing scheme for general access structures},
  journal      = {Inf. Sci.},
  volume       = {595},
  pages        = {54--69},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ins.2022.02.016},
  doi          = {10.1016/J.INS.2022.02.016},
  timestamp    = {Wed, 13 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/JiaGLWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiuWLW22,
  author       = {Pei Liu and
                  Hao Wu and
                  Lan Luo and
                  Daoshun Wang},
  title        = {{DT} {CWT} and Schur decomposition based robust watermarking algorithm
                  to geometric attacks},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {2},
  pages        = {2637--2679},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-021-11532-5},
  doi          = {10.1007/S11042-021-11532-5},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/LiuWLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmihi/TanW20,
  author       = {Gefei Tan and
                  Daoshun Wang},
  title        = {Deep Learning Approach Applied to Prediction of Bone Age Based on
                  Computed Tomography Orthopedic Image Processing},
  journal      = {J. Medical Imaging Health Informatics},
  volume       = {10},
  number       = {5},
  pages        = {1242--1248},
  year         = {2020},
  url          = {https://doi.org/10.1166/jmihi.2020.3053},
  doi          = {10.1166/JMIHI.2020.3053},
  timestamp    = {Wed, 24 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmihi/TanW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GongWZLW19,
  author       = {Linming Gong and
                  Mingming Wang and
                  Xiangjian Zuo and
                  Shundong Li and
                  Daoshun Wang},
  title        = {Using Transposition Padding to Get {CCA2} Security From Any Deterministic
                  Encryption Schemes},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {6765--6773},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2891075},
  doi          = {10.1109/ACCESS.2019.2891075},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GongWZLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhouYCW19,
  author       = {Zhili Zhou and
                  Ching{-}Nung Yang and
                  Song{-}Ruei Cai and
                  Daoshun Wang},
  title        = {Boolean Operation Based Visual Cryptography},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {165496--165508},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2951722},
  doi          = {10.1109/ACCESS.2019.2951722},
  timestamp    = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhouYCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/JiaWNLS19,
  author       = {Xingxing Jia and
                  Daoshun Wang and
                  Daxin Nie and
                  Xiangyang Luo and
                  Jonathan Zheng Sun},
  title        = {A new threshold changeable secret sharing scheme based on the Chinese
                  Remainder Theorem},
  journal      = {Inf. Sci.},
  volume       = {473},
  pages        = {13--30},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2018.09.024},
  doi          = {10.1016/J.INS.2018.09.024},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/JiaWNLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/JiaWCC19,
  author       = {Xingxing Jia and
                  Daoshun Wang and
                  Qimeng Chu and
                  Zhenhua Chen},
  title        = {An efficient XOR-based verifiable visual cryptographic scheme},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {7},
  pages        = {8207--8223},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-6779-6},
  doi          = {10.1007/S11042-018-6779-6},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/JiaWCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GongLWW18,
  author       = {Linming Gong and
                  Shundong Li and
                  Chunying Wu and
                  Daoshun Wang},
  title        = {Secure "Ratio" Computation and Efficient Protocol for General
                  Secure Two-Party Comparison},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {25532--25542},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2827025},
  doi          = {10.1109/ACCESS.2018.2827025},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GongLWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/JiaWNZ18,
  author       = {Xingxing Jia and
                  Daoshun Wang and
                  Daxin Nie and
                  Chaoyang Zhang},
  title        = {Collaborative Visual Cryptography Schemes},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {28},
  number       = {5},
  pages        = {1056--1070},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCSVT.2016.2631404},
  doi          = {10.1109/TCSVT.2016.2631404},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/JiaWNZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/YangWYWK17,
  author       = {Ching{-}Nung Yang and
                  Chihi{-}Han Wu and
                  Zong{-}Xuan Yeh and
                  Daoshun Wang and
                  Cheonshik Kim},
  title        = {A new sharing digital image scheme with clearer shadow images},
  journal      = {Comput. Stand. Interfaces},
  volume       = {51},
  pages        = {118--131},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.csi.2016.11.015},
  doi          = {10.1016/J.CSI.2016.11.015},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/YangWYWK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/YangLW17,
  author       = {Ching{-}Nung Yang and
                  Jung{-}Kuo Liao and
                  Daoshun Wang},
  title        = {New privilege-based visual cryptography with arbitrary privilege levels},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {42},
  pages        = {121--131},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jvcir.2016.10.014},
  doi          = {10.1016/J.JVCIR.2016.10.014},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/YangLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbcas/PengTKLYW17,
  author       = {Haipeng Peng and
                  Ye Tian and
                  J{\"{u}}rgen Kurths and
                  Lixiang Li and
                  Yixian Yang and
                  Daoshun Wang},
  title        = {Secure and Energy-Efficient Data Transmission System Based on Chaotic
                  Compressive Sensing in Body-to-Body Networks},
  journal      = {{IEEE} Trans. Biomed. Circuits Syst.},
  volume       = {11},
  number       = {3},
  pages        = {558--573},
  year         = {2017},
  url          = {https://doi.org/10.1109/TBCAS.2017.2665659},
  doi          = {10.1109/TBCAS.2017.2665659},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbcas/PengTKLYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/GaoHHW16,
  author       = {Qian Gao and
                  Zhen Han and
                  Yong{-}Zhong He and
                  Daoshun Wang},
  title        = {Two image encryption methods with hiding effect based on moir{\'{e}}
                  pattern},
  journal      = {Int. J. High Perform. Comput. Netw.},
  volume       = {9},
  number       = {5/6},
  pages        = {382--393},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJHPCN.2016.10001325},
  doi          = {10.1504/IJHPCN.2016.10001325},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpcn/GaoHHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/GongLMWD16,
  author       = {Linming Gong and
                  Shundong Li and
                  Qing Mao and
                  Daoshun Wang and
                  Jiawei Dou},
  title        = {A homomorphic encryption scheme with adaptive chosen ciphertext security
                  but without random oracle},
  journal      = {Theor. Comput. Sci.},
  volume       = {609},
  pages        = {253--261},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.tcs.2015.10.001},
  doi          = {10.1016/J.TCS.2015.10.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/GongLMWD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YangWW14,
  author       = {Ching{-}Nung Yang and
                  Chih{-}Cheng Wu and
                  Daoshun Wang},
  title        = {A discussion on the relationship between probabilistic visual cryptography
                  and random grid},
  journal      = {Inf. Sci.},
  volume       = {278},
  pages        = {141--173},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.03.033},
  doi          = {10.1016/J.INS.2014.03.033},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/YangWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiWWD14,
  author       = {Shundong Li and
                  Chunying Wu and
                  Daoshun Wang and
                  Yiqi Dai},
  title        = {Secure multiparty computation of solid geometric problems and their
                  applications},
  journal      = {Inf. Sci.},
  volume       = {282},
  pages        = {401--413},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.04.004},
  doi          = {10.1016/J.INS.2014.04.004},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiWWD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuoYHLW14,
  author       = {Xiangyang Luo and
                  Lin Yang and
                  Dai Hao and
                  Fenlin Liu and
                  Daoshun Wang},
  title        = {On Data and Virtualization Security Risks and Solutions of Cloud Computing},
  journal      = {J. Networks},
  volume       = {9},
  number       = {3},
  pages        = {571--581},
  year         = {2014},
  url          = {https://doi.org/10.4304/jnw.9.3.571-581},
  doi          = {10.4304/JNW.9.3.571-581},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LuoYHLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/YangW14,
  author       = {Ching{-}Nung Yang and
                  Daoshun Wang},
  title        = {Property Analysis of XOR-Based Visual Cryptography},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {24},
  number       = {2},
  pages        = {189--197},
  year         = {2014},
  url          = {https://doi.org/10.1109/TCSVT.2013.2276708},
  doi          = {10.1109/TCSVT.2013.2276708},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/YangW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangYY14,
  author       = {Daoshun Wang and
                  Feng Yi and
                  Ching{-}Nung Yang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Visual Cryptography Scheme with Autostereogram},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {364--375},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_27},
  doi          = {10.1007/978-3-319-19321-2\_27},
  timestamp    = {Thu, 28 May 2020 12:51:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangYY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/WangLLL13,
  author       = {Daoshun Wang and
                  Song Liu and
                  Xiangyang Luo and
                  Shundong Li},
  title        = {A transcoding-resistant video watermarking algorithm based on corners
                  and singular value decomposition},
  journal      = {Telecommun. Syst.},
  volume       = {54},
  number       = {3},
  pages        = {359--371},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11235-013-9739-5},
  doi          = {10.1007/S11235-013-9739-5},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/WangLLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangSDY13,
  author       = {Daoshun Wang and
                  Tao Song and
                  Lin Dong and
                  Ching{-}Nung Yang},
  title        = {Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {12},
  pages        = {2059--2072},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2281108},
  doi          = {10.1109/TIFS.2013.2281108},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangSDY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/XuWLY13,
  author       = {Xing{-}Fu Xu and
                  Daoshun Wang and
                  Shundong Li and
                  Ching{-}Nung Yang},
  editor       = {Kebin Jia and
                  Jeng{-}Shyang Pan and
                  Yao Zhao and
                  Lakhmi C. Jain},
  title        = {An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes},
  booktitle    = {Ninth International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing, {IIH-MSP} 2013, Beijing, China, October
                  16-18, 2013},
  pages        = {369--372},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/IIH-MSP.2013.99},
  doi          = {10.1109/IIH-MSP.2013.99},
  timestamp    = {Wed, 01 Apr 2020 17:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/iih-msp/XuWLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1305-1146,
  author       = {Daoshun Wang and
                  Ziwei Ye and
                  Xiaobo Li},
  title        = {How to Collaborate between Threshold Schemes},
  journal      = {CoRR},
  volume       = {abs/1305.1146},
  year         = {2013},
  url          = {http://arxiv.org/abs/1305.1146},
  eprinttype    = {arXiv},
  eprint       = {1305.1146},
  timestamp    = {Wed, 31 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1305-1146.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/DongWLD12,
  author       = {Lin Dong and
                  Daoshun Wang and
                  Shundong Li and
                  Yiqi Dai},
  title        = {(2, n) secret sharing scheme for gray and color images based on Boolean
                  operation},
  journal      = {Sci. China Inf. Sci.},
  volume       = {55},
  number       = {5},
  pages        = {1151--1161},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11432-011-4302-z},
  doi          = {10.1007/S11432-011-4302-Z},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/DongWLD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LuoLYLW12,
  author       = {Xiangyang Luo and
                  Fenlin Liu and
                  Chunfang Yang and
                  Shiguo Lian and
                  Daoshun Wang},
  title        = {On {F5} Steganography in Images},
  journal      = {Comput. J.},
  volume       = {55},
  number       = {4},
  pages        = {447--456},
  year         = {2012},
  url          = {https://doi.org/10.1093/comjnl/bxr092},
  doi          = {10.1093/COMJNL/BXR092},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LuoLYLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YangLLLW12,
  author       = {Chunfang Yang and
                  Fenlin Liu and
                  Shiguo Lian and
                  Xiangyang Luo and
                  Daoshun Wang},
  title        = {Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit
                  Plane},
  journal      = {Comput. J.},
  volume       = {55},
  number       = {6},
  pages        = {717--727},
  year         = {2012},
  url          = {https://doi.org/10.1093/comjnl/bxr112},
  doi          = {10.1093/COMJNL/BXR112},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YangLLLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/ChenWWL12,
  author       = {Zhenhua Chen and
                  Chunying Wu and
                  Daoshun Wang and
                  Shundong Li},
  editor       = {Michael Chau and
                  G. Alan Wang and
                  Wei Thoo Yue and
                  Hsinchun Chen},
  title        = {Conjunctive Keywords Searchable Encryption with Efficient Pairing,
                  Constant Ciphertext and Short Trapdoor},
  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7299},
  pages        = {176--189},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30428-6\_15},
  doi          = {10.1007/978-3-642-30428-6\_15},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/ChenWWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-6123,
  author       = {Daoshun Wang and
                  Tao Song and
                  Lin Dong and
                  Ching{-}Nung Yang},
  title        = {Optimal Contrast Greyscale Visual Cryptography Schemes with Reversing},
  journal      = {CoRR},
  volume       = {abs/1210.6123},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.6123},
  eprinttype    = {arXiv},
  eprint       = {1210.6123},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-6123.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangYL11,
  author       = {Daoshun Wang and
                  Feng Yi and
                  Xiaobo Li},
  title        = {Probabilistic visual secret sharing schemes for grey-scale images
                  and color images},
  journal      = {Inf. Sci.},
  volume       = {181},
  number       = {11},
  pages        = {2189--2208},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ins.2011.01.019},
  doi          = {10.1016/J.INS.2011.01.019},
  timestamp    = {Wed, 31 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangYL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LuoLYW10,
  author       = {Xiangyang Luo and
                  Fenlin Liu and
                  Chunfang Yang and
                  Daoshun Wang},
  title        = {Image universal steganalysis based on best wavelet packet decomposition},
  journal      = {Sci. China Inf. Sci.},
  volume       = {53},
  number       = {3},
  pages        = {634--647},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11432-010-0044-6},
  doi          = {10.1007/S11432-010-0044-6},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/LuoLYW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/WangY10,
  author       = {Daoshun Wang and
                  Feng Yi},
  title        = {On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2010},
  year         = {2010},
  url          = {https://doi.org/10.1155/2010/782438},
  doi          = {10.1155/2010/782438},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejasp/WangY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DongWKD10,
  author       = {Lin Dong and
                  Daoshun Wang and
                  Min Ku and
                  Yiqi Dai},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {(2, n) Secret Image Sharing Scheme with Ideal Contrast},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {421--424},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.97},
  doi          = {10.1109/CIS.2010.97},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DongWKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1004-2364,
  author       = {Daoshun Wang and
                  Lin Dong and
                  Xiaobo Li},
  title        = {Towards Shift Tolerant Visual Secret Sharing Schemes},
  journal      = {CoRR},
  volume       = {abs/1004.2364},
  year         = {2010},
  url          = {http://arxiv.org/abs/1004.2364},
  eprinttype    = {arXiv},
  eprint       = {1004.2364},
  timestamp    = {Wed, 31 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1004-2364.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LuoZWD09,
  author       = {Ping Luo and
                  Haijian Zhou and
                  Daoshun Wang and
                  Yiqi Dai},
  title        = {Cryptanalysis of {RSA} for a special case with \emph{d} {\textgreater}
                  \emph{e}},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {52},
  number       = {4},
  pages        = {609--616},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11432-009-0014-z},
  doi          = {10.1007/S11432-009-0014-Z},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/LuoZWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiWD09,
  author       = {Shundong Li and
                  Daoshun Wang and
                  Yiqi Dai},
  title        = {Symmetric cryptographic protocols for extended millionaires' problem},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {52},
  number       = {6},
  pages        = {974--982},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11432-009-0109-6},
  doi          = {10.1007/S11432-009-0109-6},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhouLWD09,
  author       = {Haijian Zhou and
                  Ping Luo and
                  Daoshun Wang and
                  Yiqi Dai},
  title        = {Probability method for cryptanalysis of general multivariate modular
                  linear equation},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {52},
  number       = {10},
  pages        = {1792--1800},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11432-009-0159-9},
  doi          = {10.1007/S11432-009-0159-9},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhouLWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iim/LiWD09,
  author       = {Shundong Li and
                  Daoshun Wang and
                  Yiqi Dai},
  title        = {Secure Signature Protocol},
  journal      = {Intell. Inf. Manag.},
  volume       = {1},
  number       = {3},
  pages        = {174--179},
  year         = {2009},
  url          = {https://doi.org/10.4236/iim.2009.13026},
  doi          = {10.4236/IIM.2009.13026},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iim/LiWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/WangYL09,
  author       = {Daoshun Wang and
                  Feng Yi and
                  Xiaobo Li},
  title        = {On general construction for extended visual cryptography schemes},
  journal      = {Pattern Recognit.},
  volume       = {42},
  number       = {11},
  pages        = {3071--3082},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.patcog.2009.02.015},
  doi          = {10.1016/J.PATCOG.2009.02.015},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pr/WangYL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csie/ZhouLWD09,
  author       = {Haijian Zhou and
                  Ping Luo and
                  Daoshun Wang and
                  Yiqi Dai},
  editor       = {Mark Burgin and
                  Masud H. Chowdhury and
                  Chan H. Ham and
                  Simone A. Ludwig and
                  Weilian Su and
                  Sumanth Yenduri},
  title        = {Remarks on Cryptanalysis of {RSA} Using Lattice Basis Reduction},
  booktitle    = {{CSIE} 2009, 2009 {WRI} World Congress on Computer Science and Information
                  Engineering, March 31 - April 2, 2009, Los Angeles, California, USA,
                  7 Volumes},
  pages        = {125--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSIE.2009.890},
  doi          = {10.1109/CSIE.2009.890},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csie/ZhouLWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/LuoZWD09,
  author       = {Ping Luo and
                  Haijian Zhou and
                  Daoshun Wang and
                  Yiqi Dai},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi},
  title        = {Cryptanalysis of {RSA} with Constrained Low Public Exponent},
  booktitle    = {Proceedings of the 2009 International Conference on Security {\&}
                  Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {136--142},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Wed, 04 Nov 2009 14:56:55 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/LuoZWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/his/LeiSWL09,
  author       = {Ming Lei and
                  Yankui Sun and
                  Daoshun Wang and
                  Peng Li},
  editor       = {Ge Yu and
                  Mario K{\"{o}}ppen and
                  Shyi{-}Ming Chen and
                  Xiamu Niu},
  title        = {Automated Thickness Measurements of Pearl from Optical Coherence Tomography
                  Images},
  booktitle    = {9th International Conference on Hybrid Intelligent Systems {(HIS}
                  2009), August 12-14, 2009, Shenyang, China},
  pages        = {247--251},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/HIS.2009.56},
  doi          = {10.1109/HIS.2009.56},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/his/LeiSWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/his/XueSWL09,
  author       = {Chengkun Xue and
                  Yankui Sun and
                  Daoshun Wang and
                  Peng Li},
  editor       = {Ge Yu and
                  Mario K{\"{o}}ppen and
                  Shyi{-}Ming Chen and
                  Xiamu Niu},
  title        = {Automated Thickness Measurement of Nacreous Layer of Seawater Pearls
                  Based on Optical Coherence Tomography},
  booktitle    = {9th International Conference on Hybrid Intelligent Systems {(HIS}
                  2009), August 12-14, 2009, Shenyang, China},
  pages        = {332--337},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/HIS.2009.72},
  doi          = {10.1109/HIS.2009.72},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/his/XueSWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiDWL08,
  author       = {Shundong Li and
                  Yiqi Dai and
                  Daoshun Wang and
                  Ping Luo},
  title        = {Comparing two sets without disclosing them},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {51},
  number       = {9},
  pages        = {1231--1238},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11432-008-0112-3},
  doi          = {10.1007/S11432-008-0112-3},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiDWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShundongDYP08,
  author       = {Shundong Li and
                  Daoshun Wang and
                  Yiqi Dai and
                  Ping Luo},
  title        = {Symmetric cryptographic solution to Yao's millionaires' problem and
                  an evaluation of secure multiparty computations},
  journal      = {Inf. Sci.},
  volume       = {178},
  number       = {1},
  pages        = {244--255},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ins.2007.07.015},
  doi          = {10.1016/J.INS.2007.07.015},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ShundongDYP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiuLW08,
  author       = {Hongjun Liu and
                  Ping Luo and
                  Daoshun Wang},
  title        = {A scalable authentication model based on public keys},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {31},
  number       = {4},
  pages        = {375--386},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jnca.2008.03.001},
  doi          = {10.1016/J.JNCA.2008.03.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LiuLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiuLW08a,
  author       = {Hongjun Liu and
                  Ping Luo and
                  Daoshun Wang},
  title        = {A distributed expansible authentication model based on Kerberos},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {31},
  number       = {4},
  pages        = {472--486},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jnca.2007.12.003},
  doi          = {10.1016/J.JNCA.2007.12.003},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LiuLW08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/LuoWWL08,
  author       = {Xiangyang Luo and
                  Daoshun Wang and
                  Ping Wang and
                  Fenlin Liu},
  title        = {A review on blind detection for image steganography},
  journal      = {Signal Process.},
  volume       = {88},
  number       = {9},
  pages        = {2138--2157},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.sigpro.2008.03.016},
  doi          = {10.1016/J.SIGPRO.2008.03.016},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/LuoWWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/WangZML07,
  author       = {Daoshun Wang and
                  Lei Zhang and
                  Ning Ma and
                  Xiaobo Li},
  title        = {Two secret sharing schemes based on Boolean operations},
  journal      = {Pattern Recognit.},
  volume       = {40},
  number       = {10},
  pages        = {2776--2785},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.patcog.2006.11.018},
  doi          = {10.1016/J.PATCOG.2006.11.018},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pr/WangZML07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/LuoYWL07,
  author       = {Xiangyang Luo and
                  Chunfang Yang and
                  Daoshun Wang and
                  Fenlin Liu},
  title        = {{LTSB} Steganalysis Based on Quartic Equation},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {2},
  pages        = {68--90},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73092-7\_4},
  doi          = {10.1007/978-3-540-73092-7\_4},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/LuoYWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangLY08,
  author       = {Daoshun Wang and
                  Xiaobo Li and
                  Feng Yi},
  editor       = {Dingyi Pei and
                  Moti Yung and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images},
  booktitle    = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
                  2007, Xining, China, August 31 - September 5, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4990},
  pages        = {192--200},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-79499-8\_16},
  doi          = {10.1007/978-3-540-79499-8\_16},
  timestamp    = {Wed, 31 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhouLWD08,
  author       = {Haijian Zhou and
                  Ping Luo and
                  Daoshun Wang and
                  Yiqi Dai},
  editor       = {Dingyi Pei and
                  Moti Yung and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {Cryptanalysis of General Lu-Lee Type Systems},
  booktitle    = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
                  2007, Xining, China, August 31 - September 5, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4990},
  pages        = {412--426},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-79499-8\_32},
  doi          = {10.1007/978-3-540-79499-8\_32},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhouLWD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/YiWLD07,
  author       = {Feng Yi and
                  Daoshun Wang and
                  Xiaobo Li and
                  Yiqi Dai},
  editor       = {Selim Aissi and
                  Hamid R. Arabnia},
  title        = {Colored Probabilistic Visual Cryptography Scheme with Reversing},
  booktitle    = {Proceedings of the 2007 International Conference on Security {\&}
                  Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007},
  pages        = {138--141},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Wed, 31 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/YiWLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LuoWWL07,
  author       = {Xiangyang Luo and
                  Daoshun Wang and
                  Ping Wang and
                  Fenlin Liu},
  title        = {Secret Key Estimation for Image Sequential Steganograph in Transform
                  Domain},
  booktitle    = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM}
                  '07, Washington, DC, USA, 26-30 November 2007},
  pages        = {538--542},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/GLOCOM.2007.106},
  doi          = {10.1109/GLOCOM.2007.106},
  timestamp    = {Fri, 26 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/LuoWWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0712-4183,
  author       = {Daoshun Wang and
                  Feng Yi and
                  Xiaobo Li},
  title        = {Probabilistic Visual Secret Sharing Schemes for Gray-scale images
                  and Color images},
  journal      = {CoRR},
  volume       = {abs/0712.4183},
  year         = {2007},
  url          = {http://arxiv.org/abs/0712.4183},
  eprinttype    = {arXiv},
  eprint       = {0712.4183},
  timestamp    = {Wed, 31 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0712-4183.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdim/ShundongYDP06,
  author       = {Shundong Li and
                  Yiqi Dai and
                  Daoshun Wang and
                  Ping Luo},
  title        = {Symmetric Encryption Solutions to Millionaire's Problem and Its Extension},
  booktitle    = {First {IEEE} International Conference on Digital Information Management
                  (ICDIM), December 6-8, 2006, Christ College, Bangalore, India, Proceedings},
  pages        = {531--537},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICDIM.2007.369247},
  doi          = {10.1109/ICDIM.2007.369247},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icdim/ShundongYDP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0610172,
  author       = {Daoshun Wang and
                  Feng Yi and
                  Xiaobo Li and
                  Ping Luo and
                  Yiqi Dai},
  title        = {On the Analysis and Generalization of Extended Visual Cryptography
                  Schemes},
  journal      = {CoRR},
  volume       = {abs/cs/0610172},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0610172},
  eprinttype    = {arXiv},
  eprint       = {cs/0610172},
  timestamp    = {Wed, 31 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0610172.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YiWD06,
  author       = {Feng Yi and
                  Daoshun Wang and
                  Yiqi Dai},
  title        = {Visual secret sharing scheme with autostereogram},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {295},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/295},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YiWD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZMH05,
  author       = {Daoshun Wang and
                  Lei Zhang and
                  Ning Ma and
                  Lian{-}Sheng Huang},
  title        = {Secret color images sharing schemes based on {XOR} operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {372},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/372},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZMH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics