Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Daoshun Wang
@article{DBLP:journals/isci/JiaGLWZ22, author = {Xingxing Jia and Yusheng Guo and Xiangyang Luo and Daoshun Wang and Chaoyang Zhang}, title = {A perfect secret sharing scheme for general access structures}, journal = {Inf. Sci.}, volume = {595}, pages = {54--69}, year = {2022}, url = {https://doi.org/10.1016/j.ins.2022.02.016}, doi = {10.1016/J.INS.2022.02.016}, timestamp = {Wed, 13 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/JiaGLWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiuWLW22, author = {Pei Liu and Hao Wu and Lan Luo and Daoshun Wang}, title = {{DT} {CWT} and Schur decomposition based robust watermarking algorithm to geometric attacks}, journal = {Multim. Tools Appl.}, volume = {81}, number = {2}, pages = {2637--2679}, year = {2022}, url = {https://doi.org/10.1007/s11042-021-11532-5}, doi = {10.1007/S11042-021-11532-5}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/LiuWLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmihi/TanW20, author = {Gefei Tan and Daoshun Wang}, title = {Deep Learning Approach Applied to Prediction of Bone Age Based on Computed Tomography Orthopedic Image Processing}, journal = {J. Medical Imaging Health Informatics}, volume = {10}, number = {5}, pages = {1242--1248}, year = {2020}, url = {https://doi.org/10.1166/jmihi.2020.3053}, doi = {10.1166/JMIHI.2020.3053}, timestamp = {Wed, 24 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmihi/TanW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GongWZLW19, author = {Linming Gong and Mingming Wang and Xiangjian Zuo and Shundong Li and Daoshun Wang}, title = {Using Transposition Padding to Get {CCA2} Security From Any Deterministic Encryption Schemes}, journal = {{IEEE} Access}, volume = {7}, pages = {6765--6773}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2891075}, doi = {10.1109/ACCESS.2019.2891075}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GongWZLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhouYCW19, author = {Zhili Zhou and Ching{-}Nung Yang and Song{-}Ruei Cai and Daoshun Wang}, title = {Boolean Operation Based Visual Cryptography}, journal = {{IEEE} Access}, volume = {7}, pages = {165496--165508}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2951722}, doi = {10.1109/ACCESS.2019.2951722}, timestamp = {Thu, 19 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhouYCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/JiaWNLS19, author = {Xingxing Jia and Daoshun Wang and Daxin Nie and Xiangyang Luo and Jonathan Zheng Sun}, title = {A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem}, journal = {Inf. Sci.}, volume = {473}, pages = {13--30}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2018.09.024}, doi = {10.1016/J.INS.2018.09.024}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/JiaWNLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/JiaWCC19, author = {Xingxing Jia and Daoshun Wang and Qimeng Chu and Zhenhua Chen}, title = {An efficient XOR-based verifiable visual cryptographic scheme}, journal = {Multim. Tools Appl.}, volume = {78}, number = {7}, pages = {8207--8223}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6779-6}, doi = {10.1007/S11042-018-6779-6}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/JiaWCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GongLWW18, author = {Linming Gong and Shundong Li and Chunying Wu and Daoshun Wang}, title = {Secure "Ratio" Computation and Efficient Protocol for General Secure Two-Party Comparison}, journal = {{IEEE} Access}, volume = {6}, pages = {25532--25542}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2827025}, doi = {10.1109/ACCESS.2018.2827025}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GongLWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/JiaWNZ18, author = {Xingxing Jia and Daoshun Wang and Daxin Nie and Chaoyang Zhang}, title = {Collaborative Visual Cryptography Schemes}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {28}, number = {5}, pages = {1056--1070}, year = {2018}, url = {https://doi.org/10.1109/TCSVT.2016.2631404}, doi = {10.1109/TCSVT.2016.2631404}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/JiaWNZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/YangWYWK17, author = {Ching{-}Nung Yang and Chihi{-}Han Wu and Zong{-}Xuan Yeh and Daoshun Wang and Cheonshik Kim}, title = {A new sharing digital image scheme with clearer shadow images}, journal = {Comput. Stand. Interfaces}, volume = {51}, pages = {118--131}, year = {2017}, url = {https://doi.org/10.1016/j.csi.2016.11.015}, doi = {10.1016/J.CSI.2016.11.015}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/YangWYWK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/YangLW17, author = {Ching{-}Nung Yang and Jung{-}Kuo Liao and Daoshun Wang}, title = {New privilege-based visual cryptography with arbitrary privilege levels}, journal = {J. Vis. Commun. Image Represent.}, volume = {42}, pages = {121--131}, year = {2017}, url = {https://doi.org/10.1016/j.jvcir.2016.10.014}, doi = {10.1016/J.JVCIR.2016.10.014}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/YangLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbcas/PengTKLYW17, author = {Haipeng Peng and Ye Tian and J{\"{u}}rgen Kurths and Lixiang Li and Yixian Yang and Daoshun Wang}, title = {Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks}, journal = {{IEEE} Trans. Biomed. Circuits Syst.}, volume = {11}, number = {3}, pages = {558--573}, year = {2017}, url = {https://doi.org/10.1109/TBCAS.2017.2665659}, doi = {10.1109/TBCAS.2017.2665659}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbcas/PengTKLYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpcn/GaoHHW16, author = {Qian Gao and Zhen Han and Yong{-}Zhong He and Daoshun Wang}, title = {Two image encryption methods with hiding effect based on moir{\'{e}} pattern}, journal = {Int. J. High Perform. Comput. Netw.}, volume = {9}, number = {5/6}, pages = {382--393}, year = {2016}, url = {https://doi.org/10.1504/IJHPCN.2016.10001325}, doi = {10.1504/IJHPCN.2016.10001325}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpcn/GaoHHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/GongLMWD16, author = {Linming Gong and Shundong Li and Qing Mao and Daoshun Wang and Jiawei Dou}, title = {A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle}, journal = {Theor. Comput. Sci.}, volume = {609}, pages = {253--261}, year = {2016}, url = {https://doi.org/10.1016/j.tcs.2015.10.001}, doi = {10.1016/J.TCS.2015.10.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/GongLMWD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/YangWW14, author = {Ching{-}Nung Yang and Chih{-}Cheng Wu and Daoshun Wang}, title = {A discussion on the relationship between probabilistic visual cryptography and random grid}, journal = {Inf. Sci.}, volume = {278}, pages = {141--173}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.03.033}, doi = {10.1016/J.INS.2014.03.033}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/YangWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiWWD14, author = {Shundong Li and Chunying Wu and Daoshun Wang and Yiqi Dai}, title = {Secure multiparty computation of solid geometric problems and their applications}, journal = {Inf. Sci.}, volume = {282}, pages = {401--413}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.04.004}, doi = {10.1016/J.INS.2014.04.004}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiWWD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LuoYHLW14, author = {Xiangyang Luo and Lin Yang and Dai Hao and Fenlin Liu and Daoshun Wang}, title = {On Data and Virtualization Security Risks and Solutions of Cloud Computing}, journal = {J. Networks}, volume = {9}, number = {3}, pages = {571--581}, year = {2014}, url = {https://doi.org/10.4304/jnw.9.3.571-581}, doi = {10.4304/JNW.9.3.571-581}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LuoYHLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/YangW14, author = {Ching{-}Nung Yang and Daoshun Wang}, title = {Property Analysis of XOR-Based Visual Cryptography}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {24}, number = {2}, pages = {189--197}, year = {2014}, url = {https://doi.org/10.1109/TCSVT.2013.2276708}, doi = {10.1109/TCSVT.2013.2276708}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/YangW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/WangYY14, author = {Daoshun Wang and Feng Yi and Ching{-}Nung Yang}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Ching{-}Nung Yang}, title = {Visual Cryptography Scheme with Autostereogram}, booktitle = {Digital-Forensics and Watermarking - 13th International Workshop, {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9023}, pages = {364--375}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-19321-2\_27}, doi = {10.1007/978-3-319-19321-2\_27}, timestamp = {Thu, 28 May 2020 12:51:40 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/WangYY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/WangLLL13, author = {Daoshun Wang and Song Liu and Xiangyang Luo and Shundong Li}, title = {A transcoding-resistant video watermarking algorithm based on corners and singular value decomposition}, journal = {Telecommun. Syst.}, volume = {54}, number = {3}, pages = {359--371}, year = {2013}, url = {https://doi.org/10.1007/s11235-013-9739-5}, doi = {10.1007/S11235-013-9739-5}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/WangLLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangSDY13, author = {Daoshun Wang and Tao Song and Lin Dong and Ching{-}Nung Yang}, title = {Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {12}, pages = {2059--2072}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2281108}, doi = {10.1109/TIFS.2013.2281108}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangSDY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/XuWLY13, author = {Xing{-}Fu Xu and Daoshun Wang and Shundong Li and Ching{-}Nung Yang}, editor = {Kebin Jia and Jeng{-}Shyang Pan and Yao Zhao and Lakhmi C. Jain}, title = {An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes}, booktitle = {Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2013, Beijing, China, October 16-18, 2013}, pages = {369--372}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/IIH-MSP.2013.99}, doi = {10.1109/IIH-MSP.2013.99}, timestamp = {Wed, 01 Apr 2020 17:00:41 +0200}, biburl = {https://dblp.org/rec/conf/iih-msp/XuWLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1305-1146, author = {Daoshun Wang and Ziwei Ye and Xiaobo Li}, title = {How to Collaborate between Threshold Schemes}, journal = {CoRR}, volume = {abs/1305.1146}, year = {2013}, url = {http://arxiv.org/abs/1305.1146}, eprinttype = {arXiv}, eprint = {1305.1146}, timestamp = {Wed, 31 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1305-1146.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/DongWLD12, author = {Lin Dong and Daoshun Wang and Shundong Li and Yiqi Dai}, title = {(2, n) secret sharing scheme for gray and color images based on Boolean operation}, journal = {Sci. China Inf. Sci.}, volume = {55}, number = {5}, pages = {1151--1161}, year = {2012}, url = {https://doi.org/10.1007/s11432-011-4302-z}, doi = {10.1007/S11432-011-4302-Z}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/DongWLD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LuoLYLW12, author = {Xiangyang Luo and Fenlin Liu and Chunfang Yang and Shiguo Lian and Daoshun Wang}, title = {On {F5} Steganography in Images}, journal = {Comput. J.}, volume = {55}, number = {4}, pages = {447--456}, year = {2012}, url = {https://doi.org/10.1093/comjnl/bxr092}, doi = {10.1093/COMJNL/BXR092}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LuoLYLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangLLLW12, author = {Chunfang Yang and Fenlin Liu and Shiguo Lian and Xiangyang Luo and Daoshun Wang}, title = {Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane}, journal = {Comput. J.}, volume = {55}, number = {6}, pages = {717--727}, year = {2012}, url = {https://doi.org/10.1093/comjnl/bxr112}, doi = {10.1093/COMJNL/BXR112}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YangLLLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/ChenWWL12, author = {Zhenhua Chen and Chunying Wu and Daoshun Wang and Shundong Li}, editor = {Michael Chau and G. Alan Wang and Wei Thoo Yue and Hsinchun Chen}, title = {Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor}, booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7299}, pages = {176--189}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30428-6\_15}, doi = {10.1007/978-3-642-30428-6\_15}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/paisi/ChenWWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-6123, author = {Daoshun Wang and Tao Song and Lin Dong and Ching{-}Nung Yang}, title = {Optimal Contrast Greyscale Visual Cryptography Schemes with Reversing}, journal = {CoRR}, volume = {abs/1210.6123}, year = {2012}, url = {http://arxiv.org/abs/1210.6123}, eprinttype = {arXiv}, eprint = {1210.6123}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-6123.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangYL11, author = {Daoshun Wang and Feng Yi and Xiaobo Li}, title = {Probabilistic visual secret sharing schemes for grey-scale images and color images}, journal = {Inf. Sci.}, volume = {181}, number = {11}, pages = {2189--2208}, year = {2011}, url = {https://doi.org/10.1016/j.ins.2011.01.019}, doi = {10.1016/J.INS.2011.01.019}, timestamp = {Wed, 31 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangYL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LuoLYW10, author = {Xiangyang Luo and Fenlin Liu and Chunfang Yang and Daoshun Wang}, title = {Image universal steganalysis based on best wavelet packet decomposition}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {3}, pages = {634--647}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-0044-6}, doi = {10.1007/S11432-010-0044-6}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/LuoLYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/WangY10, author = {Daoshun Wang and Feng Yi}, title = {On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2010}, year = {2010}, url = {https://doi.org/10.1155/2010/782438}, doi = {10.1155/2010/782438}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/WangY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DongWKD10, author = {Lin Dong and Daoshun Wang and Min Ku and Yiqi Dai}, editor = {Muren Liu and Yuping Wang and Ping Guo}, title = {(2, n) Secret Image Sharing Scheme with Ideal Contrast}, booktitle = {2010 International Conference on Computational Intelligence and Security, {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December 11-14, 2010}, pages = {421--424}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIS.2010.97}, doi = {10.1109/CIS.2010.97}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/DongWKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1004-2364, author = {Daoshun Wang and Lin Dong and Xiaobo Li}, title = {Towards Shift Tolerant Visual Secret Sharing Schemes}, journal = {CoRR}, volume = {abs/1004.2364}, year = {2010}, url = {http://arxiv.org/abs/1004.2364}, eprinttype = {arXiv}, eprint = {1004.2364}, timestamp = {Wed, 31 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1004-2364.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LuoZWD09, author = {Ping Luo and Haijian Zhou and Daoshun Wang and Yiqi Dai}, title = {Cryptanalysis of {RSA} for a special case with \emph{d} {\textgreater} \emph{e}}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {52}, number = {4}, pages = {609--616}, year = {2009}, url = {https://doi.org/10.1007/s11432-009-0014-z}, doi = {10.1007/S11432-009-0014-Z}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/LuoZWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LiWD09, author = {Shundong Li and Daoshun Wang and Yiqi Dai}, title = {Symmetric cryptographic protocols for extended millionaires' problem}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {52}, number = {6}, pages = {974--982}, year = {2009}, url = {https://doi.org/10.1007/s11432-009-0109-6}, doi = {10.1007/S11432-009-0109-6}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/LiWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhouLWD09, author = {Haijian Zhou and Ping Luo and Daoshun Wang and Yiqi Dai}, title = {Probability method for cryptanalysis of general multivariate modular linear equation}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {52}, number = {10}, pages = {1792--1800}, year = {2009}, url = {https://doi.org/10.1007/s11432-009-0159-9}, doi = {10.1007/S11432-009-0159-9}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ZhouLWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iim/LiWD09, author = {Shundong Li and Daoshun Wang and Yiqi Dai}, title = {Secure Signature Protocol}, journal = {Intell. Inf. Manag.}, volume = {1}, number = {3}, pages = {174--179}, year = {2009}, url = {https://doi.org/10.4236/iim.2009.13026}, doi = {10.4236/IIM.2009.13026}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iim/LiWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/WangYL09, author = {Daoshun Wang and Feng Yi and Xiaobo Li}, title = {On general construction for extended visual cryptography schemes}, journal = {Pattern Recognit.}, volume = {42}, number = {11}, pages = {3071--3082}, year = {2009}, url = {https://doi.org/10.1016/j.patcog.2009.02.015}, doi = {10.1016/J.PATCOG.2009.02.015}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/WangYL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csie/ZhouLWD09, author = {Haijian Zhou and Ping Luo and Daoshun Wang and Yiqi Dai}, editor = {Mark Burgin and Masud H. Chowdhury and Chan H. Ham and Simone A. Ludwig and Weilian Su and Sumanth Yenduri}, title = {Remarks on Cryptanalysis of {RSA} Using Lattice Basis Reduction}, booktitle = {{CSIE} 2009, 2009 {WRI} World Congress on Computer Science and Information Engineering, March 31 - April 2, 2009, Los Angeles, California, USA, 7 Volumes}, pages = {125--129}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSIE.2009.890}, doi = {10.1109/CSIE.2009.890}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csie/ZhouLWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/LuoZWD09, author = {Ping Luo and Haijian Zhou and Daoshun Wang and Yiqi Dai}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {Cryptanalysis of {RSA} with Constrained Low Public Exponent}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {136--142}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Wed, 04 Nov 2009 14:56:55 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/LuoZWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/his/LeiSWL09, author = {Ming Lei and Yankui Sun and Daoshun Wang and Peng Li}, editor = {Ge Yu and Mario K{\"{o}}ppen and Shyi{-}Ming Chen and Xiamu Niu}, title = {Automated Thickness Measurements of Pearl from Optical Coherence Tomography Images}, booktitle = {9th International Conference on Hybrid Intelligent Systems {(HIS} 2009), August 12-14, 2009, Shenyang, China}, pages = {247--251}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/HIS.2009.56}, doi = {10.1109/HIS.2009.56}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/his/LeiSWL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/his/XueSWL09, author = {Chengkun Xue and Yankui Sun and Daoshun Wang and Peng Li}, editor = {Ge Yu and Mario K{\"{o}}ppen and Shyi{-}Ming Chen and Xiamu Niu}, title = {Automated Thickness Measurement of Nacreous Layer of Seawater Pearls Based on Optical Coherence Tomography}, booktitle = {9th International Conference on Hybrid Intelligent Systems {(HIS} 2009), August 12-14, 2009, Shenyang, China}, pages = {332--337}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/HIS.2009.72}, doi = {10.1109/HIS.2009.72}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/his/XueSWL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LiDWL08, author = {Shundong Li and Yiqi Dai and Daoshun Wang and Ping Luo}, title = {Comparing two sets without disclosing them}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {51}, number = {9}, pages = {1231--1238}, year = {2008}, url = {https://doi.org/10.1007/s11432-008-0112-3}, doi = {10.1007/S11432-008-0112-3}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/LiDWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ShundongDYP08, author = {Shundong Li and Daoshun Wang and Yiqi Dai and Ping Luo}, title = {Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations}, journal = {Inf. Sci.}, volume = {178}, number = {1}, pages = {244--255}, year = {2008}, url = {https://doi.org/10.1016/j.ins.2007.07.015}, doi = {10.1016/J.INS.2007.07.015}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ShundongDYP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiuLW08, author = {Hongjun Liu and Ping Luo and Daoshun Wang}, title = {A scalable authentication model based on public keys}, journal = {J. Netw. Comput. Appl.}, volume = {31}, number = {4}, pages = {375--386}, year = {2008}, url = {https://doi.org/10.1016/j.jnca.2008.03.001}, doi = {10.1016/J.JNCA.2008.03.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiuLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiuLW08a, author = {Hongjun Liu and Ping Luo and Daoshun Wang}, title = {A distributed expansible authentication model based on Kerberos}, journal = {J. Netw. Comput. Appl.}, volume = {31}, number = {4}, pages = {472--486}, year = {2008}, url = {https://doi.org/10.1016/j.jnca.2007.12.003}, doi = {10.1016/J.JNCA.2007.12.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiuLW08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/LuoWWL08, author = {Xiangyang Luo and Daoshun Wang and Ping Wang and Fenlin Liu}, title = {A review on blind detection for image steganography}, journal = {Signal Process.}, volume = {88}, number = {9}, pages = {2138--2157}, year = {2008}, url = {https://doi.org/10.1016/j.sigpro.2008.03.016}, doi = {10.1016/J.SIGPRO.2008.03.016}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/LuoWWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/WangZML07, author = {Daoshun Wang and Lei Zhang and Ning Ma and Xiaobo Li}, title = {Two secret sharing schemes based on Boolean operations}, journal = {Pattern Recognit.}, volume = {40}, number = {10}, pages = {2776--2785}, year = {2007}, url = {https://doi.org/10.1016/j.patcog.2006.11.018}, doi = {10.1016/J.PATCOG.2006.11.018}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/WangZML07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/LuoYWL07, author = {Xiangyang Luo and Chunfang Yang and Daoshun Wang and Fenlin Liu}, title = {{LTSB} Steganalysis Based on Quartic Equation}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {2}, pages = {68--90}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73092-7\_4}, doi = {10.1007/978-3-540-73092-7\_4}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/LuoYWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangLY08, author = {Daoshun Wang and Xiaobo Li and Feng Yi}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {192--200}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_16}, doi = {10.1007/978-3-540-79499-8\_16}, timestamp = {Wed, 31 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhouLWD08, author = {Haijian Zhou and Ping Luo and Daoshun Wang and Yiqi Dai}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Cryptanalysis of General Lu-Lee Type Systems}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {412--426}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_32}, doi = {10.1007/978-3-540-79499-8\_32}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhouLWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/YiWLD07, author = {Feng Yi and Daoshun Wang and Xiaobo Li and Yiqi Dai}, editor = {Selim Aissi and Hamid R. Arabnia}, title = {Colored Probabilistic Visual Cryptography Scheme with Reversing}, booktitle = {Proceedings of the 2007 International Conference on Security {\&} Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007}, pages = {138--141}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Wed, 31 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csreaSAM/YiWLD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LuoWWL07, author = {Xiangyang Luo and Daoshun Wang and Ping Wang and Fenlin Liu}, title = {Secret Key Estimation for Image Sequential Steganograph in Transform Domain}, booktitle = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM} '07, Washington, DC, USA, 26-30 November 2007}, pages = {538--542}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/GLOCOM.2007.106}, doi = {10.1109/GLOCOM.2007.106}, timestamp = {Fri, 26 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/LuoWWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0712-4183, author = {Daoshun Wang and Feng Yi and Xiaobo Li}, title = {Probabilistic Visual Secret Sharing Schemes for Gray-scale images and Color images}, journal = {CoRR}, volume = {abs/0712.4183}, year = {2007}, url = {http://arxiv.org/abs/0712.4183}, eprinttype = {arXiv}, eprint = {0712.4183}, timestamp = {Wed, 31 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0712-4183.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdim/ShundongYDP06, author = {Shundong Li and Yiqi Dai and Daoshun Wang and Ping Luo}, title = {Symmetric Encryption Solutions to Millionaire's Problem and Its Extension}, booktitle = {First {IEEE} International Conference on Digital Information Management (ICDIM), December 6-8, 2006, Christ College, Bangalore, India, Proceedings}, pages = {531--537}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICDIM.2007.369247}, doi = {10.1109/ICDIM.2007.369247}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icdim/ShundongYDP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0610172, author = {Daoshun Wang and Feng Yi and Xiaobo Li and Ping Luo and Yiqi Dai}, title = {On the Analysis and Generalization of Extended Visual Cryptography Schemes}, journal = {CoRR}, volume = {abs/cs/0610172}, year = {2006}, url = {http://arxiv.org/abs/cs/0610172}, eprinttype = {arXiv}, eprint = {cs/0610172}, timestamp = {Wed, 31 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0610172.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YiWD06, author = {Feng Yi and Daoshun Wang and Yiqi Dai}, title = {Visual secret sharing scheme with autostereogram}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {295}, year = {2006}, url = {http://eprint.iacr.org/2006/295}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YiWD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangZMH05, author = {Daoshun Wang and Lei Zhang and Ning Ma and Lian{-}Sheng Huang}, title = {Secret color images sharing schemes based on {XOR} operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {372}, year = {2005}, url = {http://eprint.iacr.org/2005/372}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangZMH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.