关注
Libo Wang
Libo Wang
University of Hyogo, Japan
在 mails.ucas.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
PPRU: A privacy-preserving reputation updating scheme for cloud-assisted vehicular networks
Z Liu, L Wan, J Guo, F Huang, X Feng, L Wang, J Ma
IEEE Transactions on Vehicular Technology, 2023
382023
Further results on generalized bent functions and their complete characterization
S Mesnager, C Tang, Y Qi, L Wang, B Wu, K Feng
IEEE Transactions on Information Theory 64 (7), 5441-5452, 2018
252018
On the fundamental limit of orthogonal matching pursuit for multiple measurement vector
H Li, L Wang, X Zhan, DK Jain
Ieee Access 7, 48860-48866, 2019
222019
Further results on permutation polynomials of the form (xpm− x+ δ) s+ L (x) over Fp2m
L Wang, B Wu, Z Liu
Finite Fields and Their Applications 44, 92-112, 2017
202017
Coefficient grouping: Breaking chaghri and more
F Liu, R Anand, L Wang, W Meier, T Isobe
Annual International Conference on the Theory and Applications of …, 2023
182023
General constructions of permutation polynomials of the form (x2m+ x+ δ) i (2m− 1)+ 1+ x over F22m
L Wang, B Wu
Finite Fields and Their Applications 52, 137-155, 2018
172018
An RIP condition for exact support recovery with covariance-assisted matching pursuit
H Ge, L Wang, J Wen, J Xian
IEEE Signal Processing Letters 26 (3), 520-524, 2019
112019
Three new infinite families of bent functions
L Wang, B Wu, Z Liu, D Lin
Science China Information Sciences 61, 1-14, 2018
102018
Sparse recovery with block multiple measurement vectors algorithm
Y Shi, L Wang, R Luo
IEEE Access 7, 9470-9475, 2019
92019
Antitampering scheme of evidence transfer information in judicial system based on blockchain
J Guo, X Wei, Y Zhang, J Ma, H Gao, L Wang, Z Liu
Security and Communication Networks 2022, 2022
72022
Efficient Anonymous Authentication and Privacy-Preserving Reliability Evaluation for Mobile Crowdsensing in Vehicular Networks
Y Cheng, J Ma, Z Liu, L Wang, Z Ying, X Chen
IEEE Internet of Things Journal 10 (17), 14925-14939, 2023
52023
Further results on permutation trinomials with Niho exponents
L Wang, B Wu, X Yue, Y Zheng
Cryptography and Communications 11, 1057-1068, 2019
52019
On inverses of some permutation polynomials over finite fields of characteristic three
Y Zheng, F Wang, L Wang, W Wei
Finite Fields and Their Applications 66, 101670, 2020
32020
Revisiting the Boomerang Attack from a Perspective of 3-differential
L Wang, L Song, B Wu, M Rahman, T Isobe
IEEE Transactions on Information Theory, 2023
22023
A new class of generalized almost perfect nonlinear power function
L Wang, L Wang, B Zhang
Finite Fields and Their Applications 82, 102051, 2022
22022
Secure transmissions in wireless multiuser networks using message correlation
H He, L Wang
China Communications 19 (2), 186-200, 2022
22022
A Trusted and Privacy-Preserving Carpooling Matching Scheme in Vehicular Networks
H Sun, L Wei, L Wang, J Yin, W Ma
Journal of Information Security 13 (1), 1-22, 2022
22022
Two Physics-Based Schwarz Preconditioners for Three-Temperature Radiation Diffusion Equations in High Dimensions
X Yue, J He, X Xu, S Shu, L Wang
Communications in Computational Physics 32 (3), 829-849, 2022
12022
A New Relaxed Splitting Preconditioner for Multidimensional Multi-Group Radiation Diffusion Equations
X Yue, C Wang, X Xu, L Wang, S Shu
EAST ASIAN JOURNAL ON APPLIED MATHEMATICS 12 (1), 163-184, 2022
12022
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery
Q Yang, L Song, N Zhang, D Shi, L Wang, J Zhao, L Hu, J Weng
Journal of Cryptology 37 (2), 1-62, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20