Journal Papers

  1. S. Ling, F. Özbudak. (2007). Constructions and bounds on linear error-block codes. Designs Codes and Cryptography, 45, 297-316.

  2. L. Pu, H. Shen, J. Ma, S. Ling. (2007). Cycle systems in the complete bipartite graph plus one factor. SIAM Journal on Discrete Mathematics, 21(4), 1083-1092.

  3. C. Tartary, H. Wang. (2007). Efficient Multicast Stream Authentication for the Fully Adversarial Network. International Journal of Security and Network, 2(3/4), 175 - 191.

  4. C. Xing. (2007). Zeta functions of algebraic curves of genus 2. J. Algebra, 308, 734-741.

  5. C. Xing, S. L. Yeo. (2007). Algebraic curves with many points over the binary field. J. Algebra, 311, 775-780.

  6. C. Xing. (2007). Diagonal lattice space-time codes from number fields and asymptotic bounds. IEEE Transactions on Information Theory, 53, 3921-3926.

  7. C. Xing, S. L. Yeo. (2007). New Linear Codes and Algebraic Function Fields over Finite Fields. IEEE Transactions on Information Theory, 53, 4822-4825.

  8. Y. M. Chee, A. C. H. Ling. (2007). On extremal k-graphs without repeated copies of 2-intersecting edges. SIAM Journal on Discrete Mathematics, 21(3), 805-821.

  9. Y. M. Chee, A. C. H. Ling, S. Ling, H. Shen. (2007). The PBD-closure of constant-composition codes. IEEE Transactions on Information Theory, 53(8), 2685-2692.

  10. R. Steinfeld, J. Pieprzyk, H. Wang. (2007). Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. IEEE Transactions on Information Theory, 53(7), 2542-2559.

  11. H. van Tilborg, J. Pieprzyk, R. Steinfeld, H. Wang. (2007). New constructions of anonymous membership broadcasting schemes.  Advances in Mathematics of Communications, 1(1), 29-44.

  12. Y. M. Chee. (2007). A new lower bound for A(17,6,6). Ars Combinatoria, 83, 361-363.

  13. Y. M. Chee, S. Ling. (2007). Constructions for q-ary constant-weight codes. IEEE Transactions on Information Theory, 53(1), 135-146.

Conference Papers

  1. P. Wang, H. Wang, J. Pieprzyk. (2007). Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. 4th VLDB Workshop on Secure Data Management, (SDM 2007). Lecture Notes in Computer Science, vol. 4721, pp. 108 - 123, Springer-Verlag.

  2. C. Tartary, H. Wang, J. Pieprzyk. (2007). An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. International Conference on Provable Security 2007, Lecture Notes in Computer Science, vol. 4784, pp. 17 - 34, Springer-Verlag.

  3. Y. Desmedt, J. Pieprzyk, R. Steinfeld, H. Wang. (2007). On Secure Multi-Party Computation in Black Box Groups. Crypto 2007, Lecture Notes in Computer Science, vol. 4622, pp. 591 - 612, Springer-Verlag.

  4. C. Tartary, H. Wang. (2007). Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. 12th Australasian Conference on Information Security and Privacy (ACISP 2007), Lecture Notes in Computer Science, vol. 4586, pp. 293 - 307, Springer-Verlag.

  5. C. Tartary, J. Pieprzyk, H. Wang. (2007). Verifiable Multi-Secret Sharing Schemes for Multiple Threshold Access Structures. 3rd SKLOIS Conference on Information Security and Cryptology (INSCRYPT 2007), Lecture Notes in Computer Science, vol. 4990, pp. 167 - 181, Springer-Verlag.

  6. R. Steinfeld, J. Pieprzyk, H. Wang. (2007). How to Strengthen any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. CT-RSA 2007, Lecture Notes in Computer Science, vol. 4371, pp. 357 - 371, Springer-Verlag.

  7. Y. M. Chee, D. L. Kreher. (2007). Graphical designs, CRC Handbook of Combinatorial Designs (2nd edition), pp. 490-493, CRC Press.

  8. S. Ling, H. Wang, C. Xing. (2007). Cover-free families and their applications, Security in Distributed and Networking Systems, pp. 75-98, World Scientific.

  9. H. Niederreiter, H. Wang, C. Xing. (2007). Function Fields over Finite Fields and Their Applications to Cryptography Topics in Geometry, Coding Theory and Cryptograph by Aenaldo Garcia and Henning Stichtenoth, pp. 59 – 104, Springer-Verlag.

Book Editorial

  1. F. Bao, S. Ling, T. Okamoto, H. Wang, C. Xing (Eds.). (2007). Cryptology and Network Security.  Proceedings of 6th International Conference, CANS, Lecture Notes in Computer Science, vol. 4856, Springer.