default search action
Victor K.-W. Wei
Person information
- affiliation: Chinese University of Hong Kong
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2009
- [j44]Yuen-Yan Chan, Victor K.-W. Wei:
Teaching for Conceptual Change in Security Awareness: A Case Study in Higher Education. IEEE Secur. Priv. 7(1): 68-71 (2009) - 2008
- [j43]Yuen-Yan Chan, Victor K. Wei:
Teaching for Conceptual Change in Security Awareness. IEEE Secur. Priv. 6(6): 67-69 (2008) - 2007
- [c17]Victor K. Wei:
Invisible designated confirmer signatures without random oracles. AsiaCCS 2007: 356-358 - 2006
- [c16]Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Liu, Tsz Hon Yuen:
Ring signatures without random oracles. AsiaCCS 2006: 297-302 - [i18]Victor K. Wei, Tsz Hon Yuen:
(Hierarchical Identity-Based) Threshold Ring Signatures. IACR Cryptol. ePrint Arch. 2006: 193 (2006) - [i17]Victor K. Wei:
Invisible Designated Confirmer Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2006: 325 (2006) - 2005
- [c15]Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang:
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based. ACISP 2005: 468-480 - [c14]Tsz Hon Yuen, Victor K. Wei:
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. CT-RSA 2005: 305-322 - [c13]Patrick P. Tsang, Victor K. Wei:
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. ISPEC 2005: 48-60 - [c12]Victor K. Wei:
Tracing-by-Linking Group Signatures. ISC 2005: 149-163 - [i16]Victor K. Wei:
Tight Reductions among Strong Di e-Hellman Assumptions. IACR Cryptol. ePrint Arch. 2005: 57 (2005) - [i15]Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang:
Group Signature where Group Manager, Members and Open Authority are Identity-Based. IACR Cryptol. ePrint Arch. 2005: 188 (2005) - [i14]Sherman S. M. Chow, Joseph K. Liu, Victor K. Wei, Tsz Hon Yuen:
Ring Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2005: 317 (2005) - [i13]Victor K. Wei:
Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows. IACR Cryptol. ePrint Arch. 2005: 410 (2005) - [i12]Victor K. Wei:
More Compact E-Cash with Efficient Coin Tracing. IACR Cryptol. ePrint Arch. 2005: 411 (2005) - [i11]Tsz Hon Yuen, Victor K. Wei:
Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles. IACR Cryptol. ePrint Arch. 2005: 412 (2005) - [i10]Victor K. Wei:
Signature from a New Subgroup Assumption. IACR Cryptol. ePrint Arch. 2005: 429 (2005) - [i9]Victor K. Wei, Tsz Hon Yuen:
More short signatures without random oracles. IACR Cryptol. ePrint Arch. 2005: 463 (2005) - 2004
- [j42]Lusheng Chen, Fang-Wei Fu, Victor K.-W. Wei:
On the constructions and nonlinearity of binary vector-output correlation-immune functions. J. Complex. 20(2-3): 266-283 (2004) - [j41]Fang-Wei Fu, A. J. Han Vinck, Victor K. Wei, Raymond W. Yeung:
On the capacity of write-unidirectional memories with nonperiodic codes. IEEE Trans. Inf. Theory 50(4): 649-656 (2004) - [c11]Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). ACISP 2004: 325-335 - [c10]Tony K. Chan, Karyin Fung, Joseph K. Liu, Victor K. Wei:
Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups. ESAS 2004: 82-94 - [c9]Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong:
Separable Linkable Threshold Ring Signatures. INDOCRYPT 2004: 384-398 - [c8]Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Custodian-Hiding Verifiable Encryption. WISA 2004: 51-64 - [i8]Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups. IACR Cryptol. ePrint Arch. 2004: 27 (2004) - [i7]Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Custodian-Hiding Verifiable Encryption. IACR Cryptol. ePrint Arch. 2004: 28 (2004) - [i6]Victor K. Wei:
A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups. IACR Cryptol. ePrint Arch. 2004: 39 (2004) - [i5]Tsz Hon Yuen, Victor K. Wei:
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. IACR Cryptol. ePrint Arch. 2004: 121 (2004) - [i4]Man Ho Au, Victor K. Wei:
ID-based Cryptography from Composite Degree Residuosity. IACR Cryptol. ePrint Arch. 2004: 164 (2004) - [i3]Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong:
Separable Linkable Threshold Ring Signatures. IACR Cryptol. ePrint Arch. 2004: 267 (2004) - [i2]Patrick P. Tsang, Victor K. Wei:
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. IACR Cryptol. ePrint Arch. 2004: 281 (2004) - [i1]Victor K. Wei:
Tracing-by-Linking Group Signautres. IACR Cryptol. ePrint Arch. 2004: 370 (2004) - 2003
- [j40]Fang-Wei Fu, Torleiv Kløve, Luo Yuan, Victor K. Wei:
On Equidistant Constant Weight Codes. Discret. Appl. Math. 128(1): 157-164 (2003) - [j39]Fang-Wei Fu, Torleiv Kløve, Victor K.-W. Wei:
On the undetected error probability for binary codes. IEEE Trans. Inf. Theory 49(2): 382-390 (2003) - [c7]Duncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei:
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. ICICS 2003: 34-46 - [c6]Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
A Separable Threshold Ring Signature Scheme. ICISC 2003: 12-26 - 2002
- [j38]Fang-Wei Fu, Victor K. Wei:
elf-Complementary Balanced Codes and Quasi-Symmetric Designs. Des. Codes Cryptogr. 27(3): 271-279 (2002) - [j37]Cunsheng Ding, Fang-Wei Fu, Torleiv Kløve, Victor K.-W. Wei:
Constructions of permutation arrays. IEEE Trans. Inf. Theory 48(4): 977-980 (2002) - [c5]Jeff S. L. Cheng, Victor K. Wei:
Defenses against the Truncation of Computation Results of Free-Roaming Agents. ICICS 2002: 1-12 - [c4]K. Shum, Victor K. Wei:
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection. WETICE 2002: 55-56 - [c3]T. C. Lam, Victor K. Wei:
A Mobile Agent Clone Detection System with Itinerary Privacy. WETICE 2002: 68-76 - [c2]P. C. Chan, Victor K. Wei:
Preemptive Distributed Intrusion Detection Using Mobile Agents. WETICE 2002: 103-108 - 2001
- [j36]Fang-Wei Fu, Victor K. Wei, Raymond W. Yeung:
On the minimum average distance of binary codes: linear programming approach. Discret. Appl. Math. 111(3): 263-281 (2001) - [j35]Fang-Wei Fu, Torleiv Kløve, Yuan Luo, Victor K. Wei:
On Equidistant Constant Weight Codes. Electron. Notes Discret. Math. 6: 187-194 (2001) - [j34]Lusheng Chen, Fang-Wei Fu, Victor K. Wei:
On the constructions of highly nonlinear zigzag functions and unbiased functions. Inf. Process. Lett. 79(3): 135-140 (2001) - [j33]Fang-Wei Fu, Torleiv Kløve, Luo Yuan, Victor K. Wei:
On the Svanström bound for ternary constant-weight codes. IEEE Trans. Inf. Theory 47(5): 2061-2064 (2001) - 2000
- [j32]Luo Yuan, Fang-Wei Fu, Victor K.-W. Wei:
On the depth distribution of linear codes. IEEE Trans. Inf. Theory 46(6): 2197-2203 (2000)
1990 – 1999
- 1997
- [j31]Zhen Zhang, En-Hui Yang, Victor K. Wei:
The redundancy of source coding with a fidelity criterion: 1. Known statistics. IEEE Trans. Inf. Theory 43(1): 71-91 (1997) - 1996
- [j30]Zhen Zhang, Victor K.-W. Wei:
An on-line universal lossy data compression algorithm via continuous codebook refinement - Part I: Basic results. IEEE Trans. Inf. Theory 42(3): 803-821 (1996) - 1995
- [j29]Tuvi Etzion, Victor K. Wei, Zhen Zhang:
Bounds on the Sizes of Constant Weight Covering Codes. Des. Codes Cryptogr. 5(3): 217-239 (1995) - [j28]Gilles Lachaud, Michael A. Tsfasman, Jørn Justesen, Victor K.-W. Wei:
Introduction to the special issue on algebraic geometry codes. IEEE Trans. Inf. Theory 41(6): 1545-1547 (1995) - [c1]Dennis Grinberg, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan, Victor K. Wei:
Splay Trees for Data Compression. SODA 1995: 522-530 - 1994
- [j27]Venkat Anantharam, Michael L. Honig, U. Madhov, Victor K. Wei:
Optimization of a Database Hierarchy for Mobility Tracking in a Personal Communications Network. Perform. Evaluation 20(1-3): 278-300 (1994) - [j26]T. V. Lakshman, Victor K. Wei:
Distributed Computing on Regular Networks with Anonymous Nodes. IEEE Trans. Computers 43(2): 211-218 (1994) - [j25]Victor K.-W. Wei, Gui Liang Feng:
Improved lower bounds on the sizes of error-correcting codes for list decoding. IEEE Trans. Inf. Theory 40(2): 558-563 (1994) - [j24]Gui Liang Feng, Victor K.-W. Wei, Thammavarapu R. N. Rao, Kenneth K. Tzeng:
Simplified understanding and efficient decoding of a class of algebraic-geometric codes. IEEE Trans. Inf. Theory 40(4): 981-1002 (1994) - 1993
- [j23]Sergio Verdú, Victor K.-W. Wei:
Explicit construction of optimal constant-weight codes for identification via channels. IEEE Trans. Inf. Theory 39(1): 30-36 (1993) - [j22]Victor K.-W. Wei, Kyeongcheol Yang:
On the generalized Hamming weights of product codes. IEEE Trans. Inf. Theory 39(5): 1709-1713 (1993) - 1992
- [j21]Gui Liang Feng, Kenneth K. Tzeng, Victor K.-W. Wei:
On the generalized Hamming weights of several classes of cyclic codes. IEEE Trans. Inf. Theory 38(3): 1125-1130 (1992) - [j20]Fan R. K. Chung, Jawad A. Salehi, Victor K.-W. Wei:
Correction to 'Optical orthogonal codes: Design, analysis, and applications' (May 89 595-604). IEEE Trans. Inf. Theory 38(4): 1429- (1992) - [j19]P. Vijay Kumar, Victor K.-W. Wei:
Minimum distance of logarithmic and fractional partial m-sequences. IEEE Trans. Inf. Theory 38(5): 1474-1482 (1992) - 1991
- [j18]Victor K.-W. Wei:
Generalized Hamming weights for linear codes. IEEE Trans. Inf. Theory 37(5): 1412-1418 (1991) - 1990
- [j17]Clyde L. Monma, Alexander Schrijver, Michael J. Todd, Victor K.-W. Wei:
Convex Resource Allocation Problems on Directed Acyclic Graphs: Duality, Complexity, Special Cases, and Extensions. Math. Oper. Res. 15(4): 736-748 (1990)
1980 – 1989
- 1989
- [j16]Fan R. K. Chung, Jawad A. Salehi, Victor K. Wei:
Optical orthogonal codes: Design, analysis, and applications. IEEE Trans. Inf. Theory 35(3): 595-604 (1989) - 1988
- [j15]Victor K. Wei:
A connection between a convex programming problem and the LYM property on perfect graphs. J. Graph Theory 12(4): 571-587 (1988) - 1987
- [j14]Abbas A. El Gamal, Lane A. Hemachandra, Itzhak Shperling, Victor K.-W. Wei:
Using simulated annealing to design good codes. IEEE Trans. Inf. Theory 33(1): 116-123 (1987) - 1986
- [j13]Jon Louis Bentley, Daniel Dominic Sleator, Robert Endre Tarjan, Victor K. Wei:
A Locally Adaptive Data Compression Scheme. Commun. ACM 29(4): 320-330 (1986) - [j12]János Körner, Victor K. Wei:
Addendum to "odd and even hamming spheres also have minimum boundary". Discret. Math. 62(1): 105-106 (1986) - [j11]Fan R. K. Chung, Peter C. Fishburn, Victor K. Wei:
Monotone subsequences in (0, 1)-matrices. Graphs Comb. 2(1): 31-36 (1986) - [j10]Clyde L. Monma, Victor K.-W. Wei:
Intersection graphs of paths in a tree. J. Comb. Theory B 41(2): 141-181 (1986) - [j9]Shu Lin, Victor K.-W. Wei:
Nonhomogeneous Trellis codes for the Quasi-Synchronous Multiple-Access Binary adder channel with Two Users. IEEE Trans. Inf. Theory 32(6): 787-796 (1986) - 1985
- [j8]A. Robert Calderbank, James E. Mazo, Victor K. Wei:
Asymptotic Upper Bounds on the Minimum Distance of Trellis Codes. IEEE Trans. Commun. 33(4): 305-309 (1985) - [j7]Tadao Kasami, Shu Lin, Victor K.-W. Wei, Saburo Yamamura:
Coding for the binary symmetric broadcast channel with two receivers. IEEE Trans. Inf. Theory 31(5): 616-625 (1985) - 1984
- [j6]János Körner, Victor K. Wei:
Odd and even hamming spheres also have minimum boundary. Discret. Math. 51(2): 147-165 (1984) - [j5]Frank K. Hwang, János Körner, Victor K.-W. Wei:
Selecting Non-consecutive Balls Arranged in Many Lines. J. Comb. Theory A 37(3): 327-336 (1984) - [j4]Victor K.-W. Wei:
An error-trapping decoder for nonbinary cyclic codes. IEEE Trans. Inf. Theory 30(3): 538-541 (1984) - 1983
- [j3]Frank K. Hwang, Victor K.-W. Wei:
A partition identity. Discret. Math. 46(3): 323-326 (1983) - [j2]Tadao Kasami, Shu Lin, Victor K.-W. Wei, Saburo Yamamura:
Graph theoretic approaches to the code construction for the two-user multiple- access binary adder channel. IEEE Trans. Inf. Theory 29(1): 114-130 (1983) - 1980
- [j1]Edward A. Bertram, Victor K. Wei:
Decomposing a Permutation into Two Large Cycles: An Enumeration. SIAM J. Algebraic Discret. Methods 1(4): 450-461 (1980)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint