BibTeX records: Daoshun Wang

download as .bib file

@article{DBLP:journals/access/GongWZLW19,
  author    = {Linming Gong and
               Mingming Wang and
               Xiangjian Zuo and
               Shundong Li and
               Daoshun Wang},
  title     = {Using Transposition Padding to Get {CCA2} Security From Any Deterministic
               Encryption Schemes},
  journal   = {{IEEE} Access},
  volume    = {7},
  pages     = {6765--6773},
  year      = {2019},
  url       = {https://doi.org/10.1109/ACCESS.2019.2891075},
  doi       = {10.1109/ACCESS.2019.2891075},
  timestamp = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/access/GongWZLW19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/JiaWNLS19,
  author    = {Xingxing Jia and
               Daoshun Wang and
               Daxin Nie and
               Xiangyang Luo and
               Jonathan Zheng Sun},
  title     = {A new threshold changeable secret sharing scheme based on the Chinese
               Remainder Theorem},
  journal   = {Inf. Sci.},
  volume    = {473},
  pages     = {13--30},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.ins.2018.09.024},
  doi       = {10.1016/j.ins.2018.09.024},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/isci/JiaWNLS19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GongLWW18,
  author    = {Linming Gong and
               Shundong Li and
               Chunying Wu and
               Daoshun Wang},
  title     = {Secure "Ratio" Computation and Efficient Protocol for General
               Secure Two-Party Comparison},
  journal   = {{IEEE} Access},
  volume    = {6},
  pages     = {25532--25542},
  year      = {2018},
  url       = {https://doi.org/10.1109/ACCESS.2018.2827025},
  doi       = {10.1109/ACCESS.2018.2827025},
  timestamp = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/access/GongLWW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/JiaWNZ18,
  author    = {Xingxing Jia and
               Daoshun Wang and
               Daxin Nie and
               Chaoyang Zhang},
  title     = {Collaborative Visual Cryptography Schemes},
  journal   = {{IEEE} Trans. Circuits Syst. Video Techn.},
  volume    = {28},
  number    = {5},
  pages     = {1056--1070},
  year      = {2018},
  url       = {https://doi.org/10.1109/TCSVT.2016.2631404},
  doi       = {10.1109/TCSVT.2016.2631404},
  timestamp = {Tue, 15 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tcsv/JiaWNZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/YangWYWK17,
  author    = {Ching{-}Nung Yang and
               Chihi{-}Han Wu and
               Zong{-}Xuan Yeh and
               Daoshun Wang and
               Cheonshik Kim},
  title     = {A new sharing digital image scheme with clearer shadow images},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {51},
  pages     = {118--131},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.csi.2016.11.015},
  doi       = {10.1016/j.csi.2016.11.015},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/csi/YangWYWK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/YangLW17,
  author    = {Ching{-}Nung Yang and
               Jung{-}Kuo Liao and
               Daoshun Wang},
  title     = {New privilege-based visual cryptography with arbitrary privilege levels},
  journal   = {J. Visual Communication and Image Representation},
  volume    = {42},
  pages     = {121--131},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.jvcir.2016.10.014},
  doi       = {10.1016/j.jvcir.2016.10.014},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jvcir/YangLW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbcas/PengTKLYW17,
  author    = {Haipeng Peng and
               Ye Tian and
               J{\"{u}}rgen Kurths and
               Lixiang Li and
               Yixian Yang and
               Daoshun Wang},
  title     = {Secure and Energy-Efficient Data Transmission System Based on Chaotic
               Compressive Sensing in Body-to-Body Networks},
  journal   = {{IEEE} Trans. Biomed. Circuits and Systems},
  volume    = {11},
  number    = {3},
  pages     = {558--573},
  year      = {2017},
  url       = {https://doi.org/10.1109/TBCAS.2017.2665659},
  doi       = {10.1109/TBCAS.2017.2665659},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tbcas/PengTKLYW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/GaoHHW16,
  author    = {Qian Gao and
               Zhen Han and
               Yong{-}Zhong He and
               Daoshun Wang},
  title     = {Two image encryption methods with hiding effect based on moir{\'{e}}
               pattern},
  journal   = {{IJHPCN}},
  volume    = {9},
  number    = {5/6},
  pages     = {382--393},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJHPCN.2016.10001325},
  doi       = {10.1504/IJHPCN.2016.10001325},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijhpcn/GaoHHW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/GongLMWD16,
  author    = {Linming Gong and
               Shundong Li and
               Qing Mao and
               Daoshun Wang and
               Jiawei Dou},
  title     = {A homomorphic encryption scheme with adaptive chosen ciphertext security
               but without random oracle},
  journal   = {Theor. Comput. Sci.},
  volume    = {609},
  pages     = {253--261},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.tcs.2015.10.001},
  doi       = {10.1016/j.tcs.2015.10.001},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tcs/GongLMWD16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YangWW14,
  author    = {Ching{-}Nung Yang and
               Chih{-}Cheng Wu and
               Daoshun Wang},
  title     = {A discussion on the relationship between probabilistic visual cryptography
               and random grid},
  journal   = {Inf. Sci.},
  volume    = {278},
  pages     = {141--173},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.ins.2014.03.033},
  doi       = {10.1016/j.ins.2014.03.033},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/YangWW14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiWWD14,
  author    = {Shundong Li and
               Chunying Wu and
               Daoshun Wang and
               Yiqi Dai},
  title     = {Secure multiparty computation of solid geometric problems and their
               applications},
  journal   = {Inf. Sci.},
  volume    = {282},
  pages     = {401--413},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.ins.2014.04.004},
  doi       = {10.1016/j.ins.2014.04.004},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/LiWWD14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuoYHLW14,
  author    = {Xiangyang Luo and
               Lin Yang and
               Dai Hao and
               Fenlin Liu and
               Daoshun Wang},
  title     = {On Data and Virtualization Security Risks and Solutions of Cloud Computing},
  journal   = {{JNW}},
  volume    = {9},
  number    = {3},
  pages     = {571--581},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.571-581},
  doi       = {10.4304/jnw.9.3.571-581},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jnw/LuoYHLW14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/YangW14,
  author    = {Ching{-}Nung Yang and
               Daoshun Wang},
  title     = {Property Analysis of XOR-Based Visual Cryptography},
  journal   = {{IEEE} Trans. Circuits Syst. Video Techn.},
  volume    = {24},
  number    = {2},
  pages     = {189--197},
  year      = {2014},
  url       = {https://doi.org/10.1109/TCSVT.2013.2276708},
  doi       = {10.1109/TCSVT.2013.2276708},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tcsv/YangW14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangYY14,
  author    = {Daoshun Wang and
               Feng Yi and
               Ching{-}Nung Yang},
  title     = {Visual Cryptography Scheme with Autostereogram},
  booktitle = {Digital-Forensics and Watermarking - 13th International Workshop,
               {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  pages     = {364--375},
  year      = {2014},
  crossref  = {DBLP:conf/iwdw/2014},
  url       = {https://doi.org/10.1007/978-3-319-19321-2\_27},
  doi       = {10.1007/978-3-319-19321-2\_27},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwdw/WangYY14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/WangLLL13,
  author    = {Daoshun Wang and
               Song Liu and
               Xiangyang Luo and
               Shundong Li},
  title     = {A transcoding-resistant video watermarking algorithm based on corners
               and singular value decomposition},
  journal   = {Telecommunication Systems},
  volume    = {54},
  number    = {3},
  pages     = {359--371},
  year      = {2013},
  url       = {https://doi.org/10.1007/s11235-013-9739-5},
  doi       = {10.1007/s11235-013-9739-5},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/telsys/WangLLL13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangSDY13,
  author    = {Daoshun Wang and
               Tao Song and
               Lin Dong and
               Ching{-}Nung Yang},
  title     = {Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {8},
  number    = {12},
  pages     = {2059--2072},
  year      = {2013},
  url       = {https://doi.org/10.1109/TIFS.2013.2281108},
  doi       = {10.1109/TIFS.2013.2281108},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/WangSDY13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/XuWLY13,
  author    = {Xing{-}Fu Xu and
               Daoshun Wang and
               Shundong Li and
               Ching{-}Nung Yang},
  title     = {An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes},
  booktitle = {Ninth International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing, {IIH-MSP} 2013, Beijing, China, October
               16-18, 2013},
  pages     = {369--372},
  year      = {2013},
  crossref  = {DBLP:conf/iih-msp/2013},
  url       = {https://doi.org/10.1109/IIH-MSP.2013.99},
  doi       = {10.1109/IIH-MSP.2013.99},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iih-msp/XuWLY13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1305-1146,
  author    = {Daoshun Wang and
               Ziwei Ye and
               Xiaobo Li},
  title     = {How to Collaborate between Threshold Schemes},
  journal   = {CoRR},
  volume    = {abs/1305.1146},
  year      = {2013},
  url       = {http://arxiv.org/abs/1305.1146},
  archivePrefix = {arXiv},
  eprint    = {1305.1146},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1305-1146},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/DongWLD12,
  author    = {Lin Dong and
               Daoshun Wang and
               Shundong Li and
               Yiqi Dai},
  title     = {(2, n) secret sharing scheme for gray and color images based on Boolean
               operation},
  journal   = {{SCIENCE} {CHINA} Information Sciences},
  volume    = {55},
  number    = {5},
  pages     = {1151--1161},
  year      = {2012},
  url       = {https://doi.org/10.1007/s11432-011-4302-z},
  doi       = {10.1007/s11432-011-4302-z},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/chinaf/DongWLD12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LuoLYLW12,
  author    = {Xiangyang Luo and
               Fenlin Liu and
               Chunfang Yang and
               Shiguo Lian and
               Daoshun Wang},
  title     = {On {F5} Steganography in Images},
  journal   = {Comput. J.},
  volume    = {55},
  number    = {4},
  pages     = {447--456},
  year      = {2012},
  url       = {https://doi.org/10.1093/comjnl/bxr092},
  doi       = {10.1093/comjnl/bxr092},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cj/LuoLYLW12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YangLLLW12,
  author    = {Chunfang Yang and
               Fenlin Liu and
               Shiguo Lian and
               Xiangyang Luo and
               Daoshun Wang},
  title     = {Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit
               Plane},
  journal   = {Comput. J.},
  volume    = {55},
  number    = {6},
  pages     = {717--727},
  year      = {2012},
  url       = {https://doi.org/10.1093/comjnl/bxr112},
  doi       = {10.1093/comjnl/bxr112},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cj/YangLLLW12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/ChenWWL12,
  author    = {Zhenhua Chen and
               Chunying Wu and
               Daoshun Wang and
               Shundong Li},
  title     = {Conjunctive Keywords Searchable Encryption with Efficient Pairing,
               Constant Ciphertext and Short Trapdoor},
  booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
               2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings},
  pages     = {176--189},
  year      = {2012},
  crossref  = {DBLP:conf/paisi/2012},
  url       = {https://doi.org/10.1007/978-3-642-30428-6\_15},
  doi       = {10.1007/978-3-642-30428-6\_15},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/paisi/ChenWWL12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-6123,
  author    = {Daoshun Wang and
               Tao Song and
               Lin Dong and
               Ching{-}Nung Yang},
  title     = {Optimal Contrast Greyscale Visual Cryptography Schemes with Reversing},
  journal   = {CoRR},
  volume    = {abs/1210.6123},
  year      = {2012},
  url       = {http://arxiv.org/abs/1210.6123},
  archivePrefix = {arXiv},
  eprint    = {1210.6123},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1210-6123},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangYL11,
  author    = {Daoshun Wang and
               Feng Yi and
               Xiaobo Li},
  title     = {Probabilistic visual secret sharing schemes for grey-scale images
               and color images},
  journal   = {Inf. Sci.},
  volume    = {181},
  number    = {11},
  pages     = {2189--2208},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.ins.2011.01.019},
  doi       = {10.1016/j.ins.2011.01.019},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/WangYL11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LuoLYW10,
  author    = {Xiangyang Luo and
               Fenlin Liu and
               Chunfang Yang and
               Daoshun Wang},
  title     = {Image universal steganalysis based on best wavelet packet decomposition},
  journal   = {{SCIENCE} {CHINA} Information Sciences},
  volume    = {53},
  number    = {3},
  pages     = {634--647},
  year      = {2010},
  url       = {https://doi.org/10.1007/s11432-010-0044-6},
  doi       = {10.1007/s11432-010-0044-6},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/chinaf/LuoLYW10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/WangY10,
  author    = {Daoshun Wang and
               Feng Yi},
  title     = {On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme},
  journal   = {{EURASIP} J. Adv. Sig. Proc.},
  volume    = {2010},
  year      = {2010},
  url       = {https://doi.org/10.1155/2010/782438},
  doi       = {10.1155/2010/782438},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ejasp/WangY10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DongWKD10,
  author    = {Lin Dong and
               Daoshun Wang and
               Min Ku and
               Yiqi Dai},
  title     = {(2, n) Secret Image Sharing Scheme with Ideal Contrast},
  booktitle = {2010 International Conference on Computational Intelligence and Security,
               {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
               11-14, 2010},
  pages     = {421--424},
  year      = {2010},
  crossref  = {DBLP:conf/cis/2010},
  url       = {https://doi.org/10.1109/CIS.2010.97},
  doi       = {10.1109/CIS.2010.97},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cis/DongWKD10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1004-2364,
  author    = {Daoshun Wang and
               Lin Dong and
               Xiaobo Li},
  title     = {Towards Shift Tolerant Visual Secret Sharing Schemes},
  journal   = {CoRR},
  volume    = {abs/1004.2364},
  year      = {2010},
  url       = {http://arxiv.org/abs/1004.2364},
  archivePrefix = {arXiv},
  eprint    = {1004.2364},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1004-2364},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LuoZWD09,
  author    = {Ping Luo and
               Haijian Zhou and
               Daoshun Wang and
               Yiqi Dai},
  title     = {Cryptanalysis of {RSA} for a special case with \emph{d} {\textgreater}
               \emph{e}},
  journal   = {Science in China Series {F:} Information Sciences},
  volume    = {52},
  number    = {4},
  pages     = {609--616},
  year      = {2009},
  url       = {https://doi.org/10.1007/s11432-009-0014-z},
  doi       = {10.1007/s11432-009-0014-z},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/chinaf/LuoZWD09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiWD09,
  author    = {Shundong Li and
               Daoshun Wang and
               Yiqi Dai},
  title     = {Symmetric cryptographic protocols for extended millionaires' problem},
  journal   = {Science in China Series {F:} Information Sciences},
  volume    = {52},
  number    = {6},
  pages     = {974--982},
  year      = {2009},
  url       = {https://doi.org/10.1007/s11432-009-0109-6},
  doi       = {10.1007/s11432-009-0109-6},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/chinaf/LiWD09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhouLWD09,
  author    = {Haijian Zhou and
               Ping Luo and
               Daoshun Wang and
               Yiqi Dai},
  title     = {Probability method for cryptanalysis of general multivariate modular
               linear equation},
  journal   = {Science in China Series {F:} Information Sciences},
  volume    = {52},
  number    = {10},
  pages     = {1792--1800},
  year      = {2009},
  url       = {https://doi.org/10.1007/s11432-009-0159-9},
  doi       = {10.1007/s11432-009-0159-9},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/chinaf/ZhouLWD09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iim/LiWD09,
  author    = {Shundong Li and
               Daoshun Wang and
               Yiqi Dai},
  title     = {Secure Signature Protocol},
  journal   = {Intelligent Information Management},
  volume    = {1},
  number    = {3},
  pages     = {174--179},
  year      = {2009},
  url       = {https://doi.org/10.4236/iim.2009.13026},
  doi       = {10.4236/iim.2009.13026},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iim/LiWD09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/WangYL09,
  author    = {Daoshun Wang and
               Feng Yi and
               Xiaobo Li},
  title     = {On general construction for extended visual cryptography schemes},
  journal   = {Pattern Recognition},
  volume    = {42},
  number    = {11},
  pages     = {3071--3082},
  year      = {2009},
  url       = {https://doi.org/10.1016/j.patcog.2009.02.015},
  doi       = {10.1016/j.patcog.2009.02.015},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/pr/WangYL09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csie/ZhouLWD09,
  author    = {Haijian Zhou and
               Ping Luo and
               Daoshun Wang and
               Yiqi Dai},
  title     = {Remarks on Cryptanalysis of {RSA} Using Lattice Basis Reduction},
  booktitle = {{CSIE} 2009, 2009 {WRI} World Congress on Computer Science and Information
               Engineering, March 31 - April 2, 2009, Los Angeles, California, USA,
               7 Volumes},
  pages     = {125--129},
  year      = {2009},
  crossref  = {DBLP:conf/csie/2009},
  url       = {https://doi.org/10.1109/CSIE.2009.890},
  doi       = {10.1109/CSIE.2009.890},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csie/ZhouLWD09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/LuoZWD09,
  author    = {Ping Luo and
               Haijian Zhou and
               Daoshun Wang and
               Yiqi Dai},
  title     = {Cryptanalysis of {RSA} with Constrained Low Public Exponent},
  booktitle = {Proceedings of the 2009 International Conference on Security {\&}
               Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
               Volumes},
  pages     = {136--142},
  year      = {2009},
  crossref  = {DBLP:conf/csreaSAM/2009},
  timestamp = {Wed, 04 Nov 2009 14:56:55 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/csreaSAM/LuoZWD09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/his/LeiSWL09,
  author    = {Ming Lei and
               Yankui Sun and
               Daoshun Wang and
               Peng Li},
  title     = {Automated Thickness Measurements of Pearl from Optical Coherence Tomography
               Images},
  booktitle = {9th International Conference on Hybrid Intelligent Systems {(HIS}
               2009), August 12-14, 2009, Shenyang, China},
  pages     = {247--251},
  year      = {2009},
  crossref  = {DBLP:conf/his/2009},
  url       = {https://doi.org/10.1109/HIS.2009.56},
  doi       = {10.1109/HIS.2009.56},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/his/LeiSWL09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/his/XueSWL09,
  author    = {Chengkun Xue and
               Yankui Sun and
               Daoshun Wang and
               Peng Li},
  title     = {Automated Thickness Measurement of Nacreous Layer of Seawater Pearls
               Based on Optical Coherence Tomography},
  booktitle = {9th International Conference on Hybrid Intelligent Systems {(HIS}
               2009), August 12-14, 2009, Shenyang, China},
  pages     = {332--337},
  year      = {2009},
  crossref  = {DBLP:conf/his/2009},
  url       = {https://doi.org/10.1109/HIS.2009.72},
  doi       = {10.1109/HIS.2009.72},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/his/XueSWL09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiDWL08,
  author    = {Shundong Li and
               Yiqi Dai and
               Daoshun Wang and
               Ping Luo},
  title     = {Comparing two sets without disclosing them},
  journal   = {Science in China Series {F:} Information Sciences},
  volume    = {51},
  number    = {9},
  pages     = {1231--1238},
  year      = {2008},
  url       = {https://doi.org/10.1007/s11432-008-0112-3},
  doi       = {10.1007/s11432-008-0112-3},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/chinaf/LiDWL08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShundongDYP08,
  author    = {Shundong Li and
               Daoshun Wang and
               Yiqi Dai and
               Ping Luo},
  title     = {Symmetric cryptographic solution to Yao's millionaires' problem and
               an evaluation of secure multiparty computations},
  journal   = {Inf. Sci.},
  volume    = {178},
  number    = {1},
  pages     = {244--255},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.ins.2007.07.015},
  doi       = {10.1016/j.ins.2007.07.015},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/ShundongDYP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiuLW08,
  author    = {Hongjun Liu and
               Ping Luo and
               Daoshun Wang},
  title     = {A scalable authentication model based on public keys},
  journal   = {J. Network and Computer Applications},
  volume    = {31},
  number    = {4},
  pages     = {375--386},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.jnca.2008.03.001},
  doi       = {10.1016/j.jnca.2008.03.001},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jnca/LiuLW08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiuLW08a,
  author    = {Hongjun Liu and
               Ping Luo and
               Daoshun Wang},
  title     = {A distributed expansible authentication model based on Kerberos},
  journal   = {J. Network and Computer Applications},
  volume    = {31},
  number    = {4},
  pages     = {472--486},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.jnca.2007.12.003},
  doi       = {10.1016/j.jnca.2007.12.003},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jnca/LiuLW08a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/LuoWWL08,
  author    = {Xiangyang Luo and
               Daoshun Wang and
               Ping Wang and
               Fenlin Liu},
  title     = {A review on blind detection for image steganography},
  journal   = {Signal Processing},
  volume    = {88},
  number    = {9},
  pages     = {2138--2157},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.sigpro.2008.03.016},
  doi       = {10.1016/j.sigpro.2008.03.016},
  timestamp = {Fri, 26 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/sigpro/LuoWWL08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/WangZML07,
  author    = {Daoshun Wang and
               Lei Zhang and
               Ning Ma and
               Xiaobo Li},
  title     = {Two secret sharing schemes based on Boolean operations},
  journal   = {Pattern Recognition},
  volume    = {40},
  number    = {10},
  pages     = {2776--2785},
  year      = {2007},
  url       = {https://doi.org/10.1016/j.patcog.2006.11.018},
  doi       = {10.1016/j.patcog.2006.11.018},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/pr/WangZML07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/LuoYWL07,
  author    = {Xiangyang Luo and
               Chunfang Yang and
               Daoshun Wang and
               Fenlin Liu},
  title     = {{LTSB} Steganalysis Based on Quartic Equation},
  journal   = {Trans. Data Hiding and Multimedia Security},
  volume    = {2},
  pages     = {68--90},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-73092-7\_4},
  doi       = {10.1007/978-3-540-73092-7\_4},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tdhms/LuoYWL07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangLY08,
  author    = {Daoshun Wang and
               Xiaobo Li and
               Feng Yi},
  title     = {Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images},
  booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
               2007, Xining, China, August 31 - September 5, 2007, Revised Selected
               Papers},
  pages     = {192--200},
  year      = {2007},
  crossref  = {DBLP:conf/cisc/2008},
  url       = {https://doi.org/10.1007/978-3-540-79499-8\_16},
  doi       = {10.1007/978-3-540-79499-8\_16},
  timestamp = {Sat, 24 Nov 2018 11:59:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/WangLY08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhouLWD08,
  author    = {Haijian Zhou and
               Ping Luo and
               Daoshun Wang and
               Yiqi Dai},
  title     = {Cryptanalysis of General Lu-Lee Type Systems},
  booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
               2007, Xining, China, August 31 - September 5, 2007, Revised Selected
               Papers},
  pages     = {412--426},
  year      = {2007},
  crossref  = {DBLP:conf/cisc/2008},
  url       = {https://doi.org/10.1007/978-3-540-79499-8\_32},
  doi       = {10.1007/978-3-540-79499-8\_32},
  timestamp = {Sat, 24 Nov 2018 11:59:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/ZhouLWD08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/YiWLD07,
  author    = {Feng Yi and
               Daoshun Wang and
               Xiaobo Li and
               Yiqi Dai},
  title     = {Colored Probabilistic Visual Cryptography Scheme with Reversing},
  booktitle = {Proceedings of the 2007 International Conference on Security {\&}
               Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007},
  pages     = {138--141},
  year      = {2007},
  crossref  = {DBLP:conf/csreaSAM/2007},
  timestamp = {Wed, 12 Dec 2007 16:45:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/csreaSAM/YiWLD07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LuoWWL07,
  author    = {Xiangyang Luo and
               Daoshun Wang and
               Ping Wang and
               Fenlin Liu},
  title     = {Secret Key Estimation for Image Sequential Steganograph in Transform
               Domain},
  booktitle = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM}
               '07, Washington, DC, USA, 26-30 November 2007},
  pages     = {538--542},
  year      = {2007},
  crossref  = {DBLP:conf/globecom/2007},
  url       = {https://doi.org/10.1109/GLOCOM.2007.106},
  doi       = {10.1109/GLOCOM.2007.106},
  timestamp = {Fri, 26 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/LuoWWL07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0712-4183,
  author    = {Daoshun Wang and
               Feng Yi and
               Xiaobo Li},
  title     = {Probabilistic Visual Secret Sharing Schemes for Gray-scale images
               and Color images},
  journal   = {CoRR},
  volume    = {abs/0712.4183},
  year      = {2007},
  url       = {http://arxiv.org/abs/0712.4183},
  archivePrefix = {arXiv},
  eprint    = {0712.4183},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-0712-4183},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdim/ShundongYDP06,
  author    = {Shundong Li and
               Yiqi Dai and
               Daoshun Wang and
               Ping Luo},
  title     = {Symmetric Encryption Solutions to Millionaire's Problem and Its Extension},
  booktitle = {First {IEEE} International Conference on Digital Information Management
               (ICDIM), December 6-8, 2006, Christ College, Bangalore, India, Proceedings},
  pages     = {531--537},
  year      = {2006},
  crossref  = {DBLP:conf/icdim/2006},
  url       = {https://doi.org/10.1109/ICDIM.2007.369247},
  doi       = {10.1109/ICDIM.2007.369247},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdim/ShundongYDP06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0610172,
  author    = {Daoshun Wang and
               Feng Yi and
               Xiaobo Li and
               Ping Luo and
               Yiqi Dai},
  title     = {On the Analysis and Generalization of Extended Visual Cryptography
               Schemes},
  journal   = {CoRR},
  volume    = {abs/cs/0610172},
  year      = {2006},
  url       = {http://arxiv.org/abs/cs/0610172},
  archivePrefix = {arXiv},
  eprint    = {cs/0610172},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-cs-0610172},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YiWD06,
  author    = {Feng Yi and
               Daoshun Wang and
               Yiqi Dai},
  title     = {Visual secret sharing scheme with autostereogram},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {295},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/295},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/YiWD06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZMH05,
  author    = {Daoshun Wang and
               Lei Zhang and
               Ning Ma and
               Lian{-}Sheng Huang},
  title     = {Secret color images sharing schemes based on {XOR} operation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {372},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/372},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/WangZMH05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2014,
  editor    = {Yun{-}Qing Shi and
               Hyoung{-}Joong Kim and
               Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
               Ching{-}Nung Yang},
  title     = {Digital-Forensics and Watermarking - 13th International Workshop,
               {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9023},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-19321-2},
  doi       = {10.1007/978-3-319-19321-2},
  isbn      = {978-3-319-19320-5},
  timestamp = {Sun, 21 May 2017 00:19:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwdw/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iih-msp/2013,
  editor    = {Kebin Jia and
               Jeng{-}Shyang Pan and
               Yao Zhao and
               Lakhmi C. Jain},
  title     = {Ninth International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing, {IIH-MSP} 2013, Beijing, China, October
               16-18, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6845398},
  isbn      = {978-0-7695-5120-3},
  timestamp = {Wed, 18 May 2016 12:52:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iih-msp/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/paisi/2012,
  editor    = {Michael Chau and
               G. Alan Wang and
               Wei Thoo Yue and
               Hsinchun Chen},
  title     = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
               2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7299},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-30428-6},
  doi       = {10.1007/978-3-642-30428-6},
  isbn      = {978-3-642-30427-9},
  timestamp = {Sun, 21 May 2017 00:19:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/paisi/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cis/2010,
  editor    = {Muren Liu and
               Yuping Wang and
               Ping Guo},
  title     = {2010 International Conference on Computational Intelligence and Security,
               {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
               11-14, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5692951},
  isbn      = {978-1-4244-9114-8},
  timestamp = {Wed, 29 Mar 2017 16:45:26 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cis/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csie/2009,
  editor    = {Mark Burgin and
               Masud H. Chowdhury and
               Chan H. Ham and
               Simone A. Ludwig and
               Weilian Su and
               Sumanth Yenduri},
  title     = {{CSIE} 2009, 2009 {WRI} World Congress on Computer Science and Information
               Engineering, March 31 - April 2, 2009, Los Angeles, California, USA,
               7 Volumes},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5170260},
  isbn      = {978-0-7695-3507-4},
  timestamp = {Wed, 06 Aug 2014 18:21:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csie/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csreaSAM/2009,
  editor    = {Hamid R. Arabnia and
               Kevin Daimi},
  title     = {Proceedings of the 2009 International Conference on Security {\&}
               Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
               Volumes},
  publisher = {{CSREA} Press},
  year      = {2009},
  isbn      = {1-60132-126-0},
  timestamp = {Wed, 04 Nov 2009 14:56:55 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/csreaSAM/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/his/2009,
  editor    = {Ge Yu and
               Mario K{\"{o}}ppen and
               Shyi{-}Ming Chen and
               Xiamu Niu},
  title     = {9th International Conference on Hybrid Intelligent Systems {(HIS}
               2009), August 12-14, 2009, Shenyang, China},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5254288},
  isbn      = {978-0-7695-3745-0},
  timestamp = {Fri, 17 Apr 2015 14:17:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/his/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2008,
  editor    = {Dingyi Pei and
               Moti Yung and
               Dongdai Lin and
               Chuankun Wu},
  title     = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
               2007, Xining, China, August 31 - September 5, 2007, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4990},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-79499-8},
  doi       = {10.1007/978-3-540-79499-8},
  isbn      = {978-3-540-79498-1},
  timestamp = {Sat, 24 Nov 2018 11:59:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csreaSAM/2007,
  editor    = {Selim Aissi and
               Hamid R. Arabnia},
  title     = {Proceedings of the 2007 International Conference on Security {\&}
               Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007},
  publisher = {{CSREA} Press},
  year      = {2007},
  isbn      = {1-60132-048-5},
  timestamp = {Wed, 12 Dec 2007 16:45:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/csreaSAM/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/globecom/2007,
  title     = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM}
               '07, Washington, DC, USA, 26-30 November 2007},
  publisher = {{IEEE}},
  year      = {2007},
  timestamp = {Wed, 18 Mar 2009 14:08:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdim/2006,
  title     = {First {IEEE} International Conference on Digital Information Management
               (ICDIM), December 6-8, 2006, Christ College, Bangalore, India, Proceedings},
  publisher = {{IEEE}},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4221856},
  isbn      = {1-4244-0682-X},
  timestamp = {Fri, 15 Jan 2016 12:16:46 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdim/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier