default search action
Mingqiang Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Lidong Xu, Mingqiang Wang, Jing Qin:
Quantum Bit Commitment Without Quantum Memory. Comput. J. 67(3): 1163-1170 (2024) - [j25]Yang Wang, Yanmin Zhao, Mingqiang Wang:
Lattice-based key private PREs with HRA security and PCS security. Comput. Stand. Interfaces 87: 103778 (2024) - [j24]Radha Krishna Jana, Dharmpal Singh, Saikat Maity, Hrithik Paul, Ankush Mallick, Sayani Ghatak, Saurav Mallik, Mingqiang Wang:
Public perception analysis on COVID-19 tweets using hybridised method. Int. J. Comput. Biol. Drug Des. 16(1): 19-41 (2024) - [j23]Han Jiang, Qiuliang Xu, Changyuan Liu, Zhihua Zheng, Yi Tang, Mingqiang Wang:
Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption. J. Ambient Intell. Humaniz. Comput. 15(2): 1327-1337 (2024) - [j22]Hao Lin, Mingqiang Wang, Jincheng Zhuang, Yang Wang:
Hardness of Entropic Module-LWE. Theor. Comput. Sci. 999: 114553 (2024) - [j21]Mingqiang Wang, Lei Zhang, Zhiqiang Zhang, Zhenpo Wang:
An Enabling Decision-Making Scheme by Considering Trajectory Prediction and Motion Uncertainty. IEEE Trans. Intell. Veh. 9(5): 4946-4961 (2024) - [c25]Xu Liu, Mingqiang Wang:
QCCA Security of Fujisaki-Okamoto Transformation in the Quantum Random Oracle Model. AFRICACRYPT 2024: 239-259 - 2023
- [j20]Hao Lin, Shi-Feng Sun, Mingqiang Wang, Joseph K. Liu, Weijia Wang:
Shorter Linkable Ring Signature Based on Middle-Product Learning with Errors Problem. Comput. J. 66(12): 2974-2989 (2023) - [j19]Zhiqiang Zhang, Lei Zhang, Junjun Deng, Mingqiang Wang, Zhenpo Wang, Dongpu Cao:
An Enabling Trajectory Planning Scheme for Lane Change Collision Avoidance on Highways. IEEE Trans. Intell. Veh. 8(1): 147-158 (2023) - [j18]Mingqiang Wang, Lei Zhang, Zhiqiang Zhang, Zhenpo Wang:
A Hybrid Trajectory Planning Strategy for Intelligent Vehicles in On-Road Dynamic Scenarios. IEEE Trans. Veh. Technol. 72(3): 2832-2847 (2023) - [j17]Zhiqiang Zhang, Lei Zhang, Cong Wang, Mingqiang Wang, Dongpu Cao, Zhenpo Wang:
Integrated Decision Making and Motion Control for Autonomous Emergency Avoidance Based on Driving Primitives Transition. IEEE Trans. Veh. Technol. 72(4): 4207-4221 (2023) - [c24]Lu Li, Mingqiang Wang, Weijia Wang:
Implementing Lattice-Based PQC on Resource-Constrained Processors: - A Case Study for Kyber/Saber's Polynomial Multiplication on ARM Cortex-M0/M0+\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$+$$\end{document}. INDOCRYPT (2) 2023: 153-176 - 2022
- [j16]Hao Lin, Mingqiang Wang:
Repudiable ring signature: Stronger security and logarithmic-size. Comput. Stand. Interfaces 80: 103562 (2022) - [j15]Yang Wang, Mingqiang Wang:
On the hardness of NTRU problems. Frontiers Comput. Sci. 16(6): 166822 (2022) - [j14]Lidong Xu, Mingqiang Wang:
A QDS scheme based on superdense teleportation. Quantum Inf. Process. 21(6): 220 (2022) - [j13]Zhiguo Wan, Tong Zhang, Weizhuang Liu, Mingqiang Wang, Liehuang Zhu:
Decentralized Privacy-Preserving Fair Exchange Scheme for V2G Based on Blockchain. IEEE Trans. Dependable Secur. Comput. 19(4): 2442-2456 (2022) - [c23]Lidong Xu, Mingqiang Wang:
Efficient Post Quantum Random Oblivious Transfer Based on Lattice. WASA (1) 2022: 491-499 - [c22]Xiaolei Wang, Yang Wang, Mingqiang Wang:
Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability. WASA (1) 2022: 535-544 - 2021
- [j12]Fei Meng, Leixiao Cheng, Mingqiang Wang:
Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city. EURASIP J. Wirel. Commun. Netw. 2021(1): 20 (2021) - [j11]Fei Meng, Leixiao Cheng, Mingqiang Wang:
ABDKS: attribute-based encryption with dynamic keyword search in fog computing. Frontiers Comput. Sci. 15(5): 155810 (2021) - [c21]Yating Yin, Guo-Zheng Li, Yi-guo Wang, Qiming Zhang, Mingqiang Wang, Lei Zhang:
Study on construction and application of knowledge graph of TCM diagnosis and treatment of viral hepatitis B. BIBM 2021: 3906-3911 - [c20]Yating Yin, Guo-Zheng Li, Yi-guo Wang, Qiming Zhang, Mingqiang Wang, Lei Zhang:
Analysis of the characteristics of hepatitis B in various regions of China from 2009 to 2011 and the analysis of TCM diagnosis and treatment plans. BIBM 2021: 3912-3918 - [c19]Xu Liu, Mingqiang Wang:
QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model. Public Key Cryptography (1) 2021: 3-26 - [i17]Xu Liu, Mingqiang Wang:
QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2021: 196 (2021) - [i16]Yukun Wang, Mingqiang Wang:
Watermarking PRFs from Lattices: Public Extract and Collusion Resistant. IACR Cryptol. ePrint Arch. 2021: 441 (2021) - [i15]Yang Wang, Yanmin Zhao, Mingqiang Wang:
PREs with HRA Security and Key Privacy Based on Standard LWE Assumptions. IACR Cryptol. ePrint Arch. 2021: 1424 (2021) - 2020
- [j10]Zhiyuan Yang, Mingqiang Wang, Xi Zeng, Angel Tsz-Yau Wan, Stephen Kwok-Wing Tsui:
In silico analysis of proteins and microRNAs related to human African trypanosomiasis in tsetse fly. Comput. Biol. Chem. 88: 107347 (2020) - [j9]Mingqiang Wang, Drew Vecchio, Chunyan Wang, Ahmet Emre, Xiongye Xiao, Zaixing Jiang, Paul Bogdan, Yudong Huang, Nicholas A. Kotov:
Biomorphic structural batteries for robotics. Sci. Robotics 5(45): 1912 (2020) - [c18]Yukun Wang, Mingqiang Wang:
A New Efficient Quantum Digital Signature Scheme for Multi-bit Messages. Inscrypt 2020: 385-394 - [c17]Yukun Wang, Mingqiang Wang:
A New Fully Homomorphic Signatures from Standard Lattices. WASA (1) 2020: 494-506 - [i14]Hao Lin, Yang Wang, Mingqiang Wang:
Hardness of Module-LWE and Ring-LWE on General Entropic Distributions. IACR Cryptol. ePrint Arch. 2020: 1238 (2020)
2010 – 2019
- 2019
- [j8]Ashok Krishnan, Yi Shyh Eddy Foo, Hoay Beng Gooi, Mingqiang Wang, Cheah Peng Huat:
Optimal Load Management in a Shipyard Drydock. IEEE Trans. Ind. Informatics 15(6): 3277-3288 (2019) - [j7]Yang Wang, Mingqiang Wang, Jingdan Zou, Jin Xu, Jing Wang:
Provably Secure Identity-Based Encryption and Signature over Cyclotomic Fields. Wirel. Commun. Mob. Comput. 2019: 1742386:1-1742386:13 (2019) - [c16]Fang Li, Mingqiang Wang, Huy Anh Pham, Yang Xiang, Muhammad Tuan Amith, Cui Tao, Jingcheng Du, Guozheng Rao:
Systematic Design of Drug Repurposing-Oriented Alzheimer's Disease Ontology. ICHI 2019: 1-5 - [i13]Fei Meng, Mingqiang Wang:
ABFKS: Attribute-Based Encryption with Functional Keyword Search in Fog Computing. IACR Cryptol. ePrint Arch. 2019: 874 (2019) - [i12]Yang Wang, Mingqiang Wang:
Module-LWE versus Ring-LWE, Revisited. IACR Cryptol. ePrint Arch. 2019: 930 (2019) - [i11]Hao Lin, Mingqiang Wang:
Repudiable Ring Signature: Stronger Security and Logarithmic-Size. IACR Cryptol. ePrint Arch. 2019: 1269 (2019) - [i10]Fei Meng, Mingqiang Wang:
Reverse Outsource: Reduce the Cloud's Workload in Outsourced Attribute-Based Encryption Scheme. IACR Cryptol. ePrint Arch. 2019: 1437 (2019) - 2018
- [j6]Yumin Zhang, Xueshan Han, Bo Xu, Mingqiang Wang, Pingfeng Ye, Younan Pei:
Risk-Based Admissibility Analysis of Wind Power Integration into Power System With Energy Storage System. IEEE Access 6: 57400-57413 (2018) - [j5]Mingqiang Wang, Xue Wang, Tao Zhan:
Unconditionally secure multi-party quantum commitment scheme. Quantum Inf. Process. 17(2): 31 (2018) - [j4]Mingqiang Wang, Xue Wang, Tao Zhan:
An efficient quantum digital signature for classical messages. Quantum Inf. Process. 17(10): 275 (2018) - [c15]Yang Wang, Mingqiang Wang:
Provably Secure NTRUEncrypt over Any Cyclotomic Field. SAC 2018: 391-417 - [i9]Yang Wang, Mingqiang Wang:
CRPSF and NTRU Signatures over cyclotomic fields. IACR Cryptol. ePrint Arch. 2018: 445 (2018) - 2017
- [j3]Bingxin Zhu, Puwen Wei, Mingqiang Wang:
Adaptive Security of Broadcast Encryption, Revisited. Secur. Commun. Networks 2017: 1404279:1-1404279:16 (2017) - [c14]Jingshan Wang, Ke-Jun Li, Mingqiang Wang, Ying Sun, Zahid Javid:
A decentralized technique based protection and control scheme for distribution network with high DER penetration. IAS 2017: 1-6 - [c13]Jingguo Bi, Mingqiang Wang, Wei Wei:
An Improved Algorithm to Solve the Systems of Univariate Modular Equations. WISA 2017: 51-60 - [i8]Yang Wang, Mingqiang Wang:
Efficient provable-secure NTRUEncrypt over any cyclotomic field. IACR Cryptol. ePrint Arch. 2017: 1104 (2017) - [i7]Mingqiang Wang, Xue Wang, Tao Zhan:
Unconditionally secure multi-party quantum commitment scheme. IACR Cryptol. ePrint Arch. 2017: 1207 (2017) - 2016
- [c12]Xiaoyan Yu, Ke-Jun Li, Mingqiang Wang, Zhuo-di Wang, Kaiqi Sun, Jie Lou:
A multi-step dynamic equivalent method for urban power grid based on district-dividing. IAS 2016: 1-8 - 2015
- [c11]Jun Zhang, Kejun Li, Mingqiang Wang, Wei-Jen Lee, Hongxia Gao:
A bi-level program for the planning of an islanded microgrid including CAES. IAS 2015: 1-8 - [c10]Mingqiang Wang, Tao Zhan, Haibin Zhang:
Bit Security of the CDH Problems over Finite Fields. SAC 2015: 441-461 - 2014
- [j2]Mingqiang Wang, Haiyang Xue, Tao Zhan:
Fault attacks on hyperelliptic curve discrete logarithm problem over binary field. Sci. China Inf. Sci. 57(3): 1-17 (2014) - [c9]Ran Li, Qingqing Liu, Mingqiang Wang, Xianglin We:
A Novel Framework for Application of Cloud Computing in Wireless Mesh Networks. 3PGCIC 2014: 448-452 - [c8]Mingqiang Wang, Mengting Liu, Shi Feng, Daling Wang, Yifei Zhang:
A Novel Calibrated Label Ranking Based Method for Multiple Emotions Detection in Chinese Microblogs. NLPCC 2014: 238-250 - [i6]Mingqiang Wang, Tao Zhan, Haibin Zhang:
Bits Security of the CDH Problems over Finite Fields. IACR Cryptol. ePrint Arch. 2014: 685 (2014) - 2011
- [j1]Mingqiang Wang, Tao Zhan:
Analysis of the Fault Attack ECDLP over Prime Field. J. Appl. Math. 2011: 580749:1-580749:11 (2011) - [c7]Xiaobo Feng, Mingqiang Wang:
Attack on the Cryptosystem Based on DLP. CIS 2011: 896-899 - [i5]Mingqiang Wang, Xiaoyun Wang, Tao Zhan:
Attack Cryptosystems Based on HCDLP. IACR Cryptol. ePrint Arch. 2011: 253 (2011) - [i4]Mingqiang Wang, Xiaoyun Wang, Tao Zhan:
The Fault Attack ECDLP Revisited. IACR Cryptol. ePrint Arch. 2011: 283 (2011) - 2010
- [c6]He Shang, Mingqiang Wang:
Some New Optimal Pairings. CIS 2010: 390-393 - [i3]Mingqiang Wang, Xiaoyun Wang, Tao Zhan, Yuliang Zheng:
Skew-Frobenius map on twisted Edwards curve. IACR Cryptol. ePrint Arch. 2010: 5 (2010)
2000 – 2009
- 2009
- [c5]Mingqiang Wang, Leibo Li:
A Note on Twin Diffie-Hellman Problem. CIS (1) 2009: 451-454 - [i2]Mingqiang Wang, Puwen Wei, Haifeng Zhang, Yuliang Zheng:
Optimal pairing revisited. IACR Cryptol. ePrint Arch. 2009: 564 (2009) - [i1]Leibo Li, Mingqiang Wang, Zhanjiang Xia:
New Addition Operation and Its Application for Scalar Multiplication on Hessian Curves over Prime Fields. IACR Cryptol. ePrint Arch. 2009: 573 (2009) - 2008
- [c4]Lingling Xu, Mingqiang Wang:
New ID-Based Signatures without Trusted PKG. WKDD 2008: 589-593 - 2007
- [c3]Qiang Zhang, Xueshan Han, Mingqiang Wang:
An effective method for total transfer capability calculation. IEEE Congress on Evolutionary Computation 2007: 2931-2935 - [c2]Puwen Wei, Mingqiang Wang, Wei Wang:
A Note on Shacham and Waters Ring Signatures. CIS 2007: 652-656 - [c1]Chunyan Song, Jianliang Xu, Shenhua Li, Mingqiang Wang:
A Role-Based Secure Workflow Model. GCC 2007: 764-774
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint