Miao Ying

Researcher's full information

Articles
  • Separable Codes
    Cheng Minquan; Ji Lijun; Miao Ying
    IEEE TRANSACTIONS ON INFORMATION THEORY/58(3)/pp.1791-1803, 2012-03
  • On Anti-Collusion Codes and Detection Algorithms for Multimedia Fingerprinting
    Cheng Minquan; Miao Ying
    IEEE TRANSACTIONS ON INFORMATION THEORY/57(7)/pp.4843-4851, 2011-07
  • Perfect Difference Families, Perfect Difference Matrices, and Related Combinatorial Structures
    Ge Gennian; Miao Ying; Sun Xianwei
    JOURNAL OF COMBINATORIAL DESIGNS/18(6)/pp.415-449, 2010-11
  • MONOTONIC DIRECTED DESIGNS
    Ge Gennian; Huang Dawei; Miao Ying
    SIAM JOURNAL ON DISCRETE MATHEMATICS/24(1)/pp.218-238, 2010-01
  • Ideal secret sharing schemes: combinatorial characterizations, certain access structures, and related geometric problems
    R. Fuji-Hara; Y. Fujiwara; Y. Miao
    Journal of Statistics and Applications/4(2-3)/p.379-396, 2009-12
  • Optimal Frequency Hopping Sequences: Auto- and Cross-Correlation Properties
    Ge Gennian; Miao Ying; Yao Zhongxiang
    IEEE TRANSACTIONS ON INFORMATION THEORY/55(2)/pp.867-879, 2009-02
  • ON BLOCK SEQUENCES OF STEINER QUADRUPLE SYSTEMS WITH ERROR CORRECTING CONSECUTIVE UNIONS
    Ge Gennian; Miao Ying; Zhang Xiande
    SIAM JOURNAL ON DISCRETE MATHEMATICS/23(2)/pp.940-958, 2009-01
  • A TWOOA construction for multi-receiver multi-message authentication codes
    R. Fuji-Hara; X. Li; Y. Miao; D. Wu
    Journal of Mathematical Cryptology/2(1)/p.9-28, 2008-12
  • A systematic construction for radar arrays
    Ge Gennian; Ling Alan C. H.; Miao Ying
    IEEE TRANSACTIONS ON INFORMATION THEORY/54(1)/pp.410-414, 2008-01
  • An ID-SP-M4M scheme and its security analysis
    Wang Lihua; Okamoto Eiji; Miao Ying; Okamoto Takeshi; Doi...
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES/E90A(1)/pp.91-100, 2007-01
  • On algorithms for searching a consistent set of shares in a threshold scheme and the related covering problem
    R. Tso; Y. Miao; E. Okamoto
    The Journal of Combinatorial Mathematics and Combinatorial Computing/60/p.47-63, 2007-01
  • Combinatorial characterizations of one-coincidence frequency-hopping sequences
    Cao Zhenfu; Ge Gennian; Miao Ying
    DESIGNS CODES AND CRYPTOGRAPHY/41(2)/pp.177-184, 2006-11
  • Further combinatorial constructions for optimal frequency-hopping sequences
    Ge Gennian; Fuji-Hara Ryoh; Miao Ying
    JOURNAL OF COMBINATORIAL THEORY SERIES A/113(8)/pp.1699-1718, 2006-11
  • GOB designs for authentication codes with arbitration
    Ge Gennian; Miao Ying; Zhu L.
    DESIGNS CODES AND CRYPTOGRAPHY/40(3)/pp.303-317, 2006-09
  • ID-based series-parallel multisignature schemes for multi-messages from bilinear maps
    L. Wang Z. Cao E. Okamoto Y. Miao and T. Okamoto
    The International Workshop on Coding and Cryptography – WCC’2005, Lecture Notes in Computer Science/3969/pp.291-303, 2006
  • Authorization-limited transformation-free proxy cryptosystems and their security analyses
    Wang LH; Cao ZF; Okamoto T; Miao Y; Okamoto E
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES/E89A(1)/pp.106-114, 2006-01
  • How to Verify the Threshold t of Shamir's (t, n)-Threshold Scheme(Security Infrastructure, Research on Computer Security Characterized in the Context of Social Responsibilities)
    TSO RAYLIN; MIAO YING; OKAMOTO TAKESHI; OKAMOTO EIJI
    Transactions of Information Processing Society of Japan/46(8)/pp.1824-1833, 2005-08
  • A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment(Security Infrastructure, Research on Computer Security Characterized in the Context of Social Responsibilities)
    TSO RAYLIN; MIAO YING; OKAMOTO TAKESHI; OKAMOTO EIJI
    Transactions of Information Processing Society of Japan/46(8)/pp.1880-1888, 2005-08
  • Combinatorial constructions for optimal splitting authentication codes
    Ge GN; Miao Y; Wang LH
    SIAM JOURNAL ON DISCRETE MATHEMATICS/18(4)/pp.663-678, 2005-01
  • Optimal frequency hopping sequences: A combinatorial approach
    Fuji-Hara R; Y. Miao; Mishima M
    IEEE TRANSACTIONS ON INFORMATION THEORY/50(10)/pp.2408-2420, 2004-10
  • A new algorithm for searching a consistent set of shares in a threshold scheme with cheaters
    R. Tso Y. Miao and E. Okamoto
    Proceedings of the 6th Annual International Conference on Information Security and Cryptology – ICISC 2003, Lecture Notes in Computer Science/pp.377-385, 2004
  • Transformation-free proxy cryptosystems and their applications to electronic commerce
    L. Wang; Z. Cao; E. Okamoto; Y. Miao; T. Okamoto
    Proc. of 3rd International Conference on Information Security/p.92-98, 2004-01
  • Combinatorial constructions of optimal optical orthogonal codes with weight 4
    Y. Chang; R. Fuji-Hara; Y. Miao
    IEEE Transactions on Information Theory/49/p.1283-1292, 2003-03
  • A combinatorial characterization of regular anonymous perfect threshold schemes
    Y. Miao
    Information Processing Letters/85/p.131-135, 2003-01
  • Constructions for optimal optical orthogonal codes
    Y. Chang; Y. Miao
    Discrete Mathematics/261/p.127-139, 2003-01
  • more...