default search action
Ruizhong Wei
Person information
- affiliation: Lakehead University Thunder Bay, ON, Canada
- affiliation: University of Nebraska-Lincoln, Lincoln, NE, USA
- affiliation: Suzhou University, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c23]Sai Swaroop Madugula, Ruizhong Wei:
Improvement of Passkey Entry Protocol for Secure Simple Pairing. CyberC 2023: 347-356 - [i15]Ruizhong Wei:
Combinatorial Analysis of Coded Caching Schemes. CoRR abs/2311.15178 (2023) - 2022
- [j45]Ruizhong Wei:
Maximum parallel classes in 3-packings. Discret. Math. 345(9): 112947 (2022) - [c22]Jingtian Zhao, Will Zhao, Yimin Yang, Amin Safaei, Ruizhong Wei:
To Mask or Not To Mask? A Machine Learning Approach to Covid News Coverage Attitude Prediction Based on Time Series and Text Content. CSE 2022: 59-64 - 2021
- [j44]Xi Zhong, Minquan Cheng, Ruizhong Wei:
Coded Caching Schemes With Linear Subpacketizations. IEEE Trans. Commun. 69(6): 3628-3637 (2021) - [j43]Minquan Cheng, Jie Li, Xiaohu Tang, Ruizhong Wei:
Linear Coded Caching Scheme for Centralized Networks. IEEE Trans. Inf. Theory 67(3): 1732-1742 (2021) - [i14]Sai Swaroop Madugula, Ruizhong Wei:
An Enhanced Passkey Entry Protocol for Secure Simple Pairing in Bluetooth. CoRR abs/2101.09381 (2021) - 2020
- [j42]Peizhi Yan, Salimur Choudhury, Ruizhong Wei:
A Machine Learning Auxiliary Approach for the Distributed Dense RFID Readers Arrangement Algorithm. IEEE Access 8: 42270-42284 (2020) - [j41]Zhengjun Cao, Zhen Chen, Ruizhong Wei, Lihua Liu:
Run-based Modular Reduction Method. Int. J. Netw. Secur. 22(2): 331-336 (2020) - [j40]Minquan Cheng, Yiqun Li, Xi Zhong, Ruizhong Wei:
Improved Constructions of Coded Caching Schemes for Combination Networks. IEEE Trans. Commun. 68(10): 5965-5975 (2020) - [i13]Minquan Cheng, Dequan Liang, Ruizhong Wei:
On Secure Coded Caching via Combinatorial Method. CoRR abs/2005.01043 (2020) - [i12]Xi Zhong, Minquan Cheng, Ruizhong Wei:
A Framework for Constructing Centralized Coded Caching Schemes via Hamming Distance. CoRR abs/2005.06126 (2020)
2010 – 2019
- 2019
- [c21]Peizhi Yan, Salimur Choudhury, Ruizhong Wei:
A Distributed Graph-Based Dense RFID Readers Arrangement Algorithm. ICC 2019: 1-6 - [i11]Minquan Cheng, Yiqun Li, Xi Zhong, Ruizhong Wei:
Improved Constructions of Coded Caching Schemes for Combination Networks. CoRR abs/1910.10861 (2019) - 2018
- [j39]Douglas R. Stinson, Ruizhong Wei:
Combinatorial repairability for threshold schemes. Des. Codes Cryptogr. 86(1): 195-210 (2018) - [j38]Jingjun Bao, Lijun Ji, Ruizhong Wei, Yong Zhang:
New existence and nonexistence results for strong external difference families. Discret. Math. 341(6): 1798-1805 (2018) - [c20]Minquan Cheng, Qiaoling Zhang, Jing Jiang, Ruizhong Wei:
Reduced Transmission in Multi-server Coded Caching. IDCS 2018: 75-86 - [i10]Minquan Cheng, Jie Li, Xiaohu Tang, Ruizhong Wei:
Linear Coded Caching Scheme for Centralized Networks. CoRR abs/1810.06017 (2018) - 2017
- [j37]Yong Zhang, Wen Li, Ruizhong Wei:
Yang Hui type magic squares with t-powered sum. Ars Comb. 134: 379-401 (2017) - 2016
- [j36]Kejun Chen, Wen Li, Guangzhou Chen, Ruizhong Wei:
Regular sparse anti-magic squares with maximum density. Ars Comb. 127: 167-183 (2016) - [i9]Douglas R. Stinson, Ruizhong Wei:
Combinatorial Repairability for Threshold Schemes. CoRR abs/1609.01240 (2016) - [i8]Douglas R. Stinson, Ruizhong Wei:
Combinatorial Repairability for Threshold Schemes. IACR Cryptol. ePrint Arch. 2016: 855 (2016) - 2015
- [c19]Kun Hou, Ruizhong Wei:
Indoor location based on WiFi. CSCWD 2015: 331-336 - [c18]Xiaochuan Lin, Ruizhong Wei:
Vector signature for face recognition. CSCWD 2015: 413-418 - 2014
- [c17]Fabian Nkemneme, Ruizhong Wei:
A multi-queue algorithm for DDoS attacks. CSCWD 2014: 118-123 - [i7]Zhengjun Cao, Ruizhong Wei, Xiaodong Lin:
A Fast Modular Reduction Method. IACR Cryptol. ePrint Arch. 2014: 40 (2014) - 2013
- [j35]Kejun Chen, Guangzhou Chen, Wen Li, Ruizhong Wei:
Super-simple balanced incomplete block designs with block size 5 and index 3. Discret. Appl. Math. 161(16-17): 2396-2404 (2013) - [c16]Emil Jimenez, Ruizhong Wei:
Indoor localization of ubiquitous heterogeneous devices. CSCWD 2013: 698-703 - 2012
- [j34]Kejun Chen, Ruizhong Wei:
On Super-simple Cyclic 2-designs. Ars Comb. 103: 257-277 (2012) - [j33]Lei Wang, Ruizhong Wei, Zi Hong Tian:
Cluster based node scheduling method for wireless sensor networks. Sci. China Inf. Sci. 55(4): 755-764 (2012) - [j32]Jeffrey H. Dinitz, Maura B. Paterson, Douglas R. Stinson, Ruizhong Wei:
Constructions for retransmission permutation arrays. Des. Codes Cryptogr. 65(3): 325-351 (2012) - 2011
- [j31]Xiaomiao Wang, Yanxun Chang, Ruizhong Wei:
Existence of cyclic (3, λ)-GDD of type gv having prescribed number of short orbits. Discret. Math. 311(8-9): 663-675 (2011) - [c15]Shih-Ying Hsu, Ruizhong Wei:
The complexity of a data privacy protection algorithm. CSCWD 2011: 61-68 - 2010
- [j30]Lei Wang, Ruizhong Wei:
Reputation Model based Dynamic Pair-wise Key Establishment Scheme for Sensor Networks. Ad Hoc Sens. Wirel. Networks 9(3-4): 163-177 (2010) - [j29]Zi Hong Tian, Ruizhong Wei:
Decomposing triples into cyclic designs. Discret. Math. 310(4): 700-713 (2010) - [j28]Lei Wang, Ruizhong Wei, Yaping Lin, Bo Wang:
A clique base node scheduling method for wireless sensor networks. J. Netw. Comput. Appl. 33(4): 383-396 (2010) - [i6]Ruizhong Wei, Z. Zeng:
KIST: A new encryption algorithm based on splay. IACR Cryptol. ePrint Arch. 2010: 425 (2010)
2000 – 2009
- 2009
- [j27]Maura B. Paterson, Douglas R. Stinson, Ruizhong Wei:
Combinatorial batch codes. Adv. Math. Commun. 3(1): 13-27 (2009) - [j26]Haitao Cao, Jeffrey H. Dinitz, Donald L. Kreher, Douglas R. Stinson, Ruizhong Wei:
On orthogonal generalized equitable rectangles. Des. Codes Cryptogr. 51(3): 225-230 (2009) - [j25]Haitao Cao, L. Wang, Ruizhong Wei:
The existence of HGDDs with block size four and its application to double frames. Discret. Math. 309(4): 945-949 (2009) - [j24]Haitao Cao, Kejun Chen, Ruizhong Wei:
Super-simple balanced incomplete block designs with block size 4 and index 5. Discret. Math. 309(9): 2808-2814 (2009) - [j23]Jiang Wu, Ruizhong Wei:
Comments on "Distributed symmetric key management for mobile ad hoc networks". Inf. Process. Lett. 109(14): 822-824 (2009) - [j22]Haitao Cao, Ruizhong Wei:
Combinatorial Constructions for Optimal Two-Dimensional Optical Orthogonal Codes. IEEE Trans. Inf. Theory 55(3): 1387-1394 (2009) - [c14]Bo Wang, Ruizhong Wei:
Zero-knowledge trust negotiation. CSCWD 2009: 390-395 - 2008
- [j21]Douglas R. Stinson, Ruizhong Wei, Kejun Chen:
On generalized separating hash families. J. Comb. Theory A 115(1): 105-120 (2008) - [c13]Z. Liang, Ruizhong Wei:
Efficient K-anonymization for privacy preservation. CSCWD 2008: 737-742 - [c12]F. Tang, Ruizhong Wei:
Implement privacy for an OMS. CSCWD 2008: 749-753 - [c11]Ruizhong Wei, Zhiwei Mao, Kewei Yuan:
Aperiodic Correlation of Complex Sequences from Difference Sets. ICC 2008: 1190-1194 - [i5]Maura B. Paterson, Douglas R. Stinson, Ruizhong Wei:
Combinatorial batch codes. IACR Cryptol. ePrint Arch. 2008: 306 (2008) - 2007
- [j20]Kejun Chen, Ruizhong Wei:
Super-simple (v, 5, 4) designs. Discret. Appl. Math. 155(8): 904-913 (2007) - [j19]D. Deng, Douglas R. Stinson, Pak Ching Li, G. H. John van Rees, Ruizhong Wei:
Constructions and bounds for (m, t)-splitting systems. Discret. Math. 307(1): 18-37 (2007) - [j18]Brian J. Cacic, Ruizhong Wei:
Improving Indirect Key Management Scheme of Access Hierarchies. Int. J. Netw. Secur. 4(2): 128-137 (2007) - [j17]Douglas R. Stinson, Ruizhong Wei:
Some results on query processes and reconstruction functions for unconditionally secure 2-server 1-round binary private information retrieval protocols. J. Math. Cryptol. 1(1): 33-46 (2007) - [c10]Ruizhong Wei, K. Wu:
Exception Resolution Service for RBAC systems. CSCWD 2007: 840-845 - 2006
- [j16]Kejun Chen, Ruizhong Wei:
A Few More Cyclic Steiner 2-Designs. Electron. J. Comb. 13(1) (2006) - [j15]Kejun Chen, Ruizhong Wei:
Super-simple (nu, 5, 5) Designs. Des. Codes Cryptogr. 39(2): 173-187 (2006) - [c9]Atef Mohamed, Ruizhong Wei:
Context Dependent Controller by Overlapped Neural Networks for Performance Metrics Revision. IEEE ICCI 2006: 507-516 - [c8]Akbar Siami Namin, Ruizhong Wei, Weiming Shen, Hamada H. Ghenniwa:
An Efficient Trust Model for Multi-Agent Systems. CSCWD 2006: 659-664 - 2005
- [c7]Akbar Siami Namin, Ruizhong Wei, Weiming Shen, Hamada H. Ghenniwa:
Applying secret sharing schemes to service reputation. CSCWD (2) 2005: 696-703 - [c6]Xue Ying Chen, Ruizhong Wei:
A Dynamic Method for Handling the Inference Problem in Multilevel Secure Databases. ITCC (1) 2005: 751-756 - [c5]Xue Ying Chen, Ruizhong Wei:
A Scheme for Inference Problems Using Rough Sets and Entropy. RSFDGrC (2) 2005: 558-567 - [c4]Jiang Wu, Ruizhong Wei:
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security. Selected Areas in Cryptography 2005: 221-232 - [i4]Jiang Wu, Ruizhong Wei:
Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004. IACR Cryptol. ePrint Arch. 2005: 8 (2005) - 2004
- [j14]D. Deng, Douglas R. Stinson, Ruizhong Wei:
The Lovász Local Lemma and Its Applications to some Combinatorial Arrays. Des. Codes Cryptogr. 32(1-3): 121-134 (2004) - [j13]X. Ma, Ruizhong Wei:
On a Bound of Cover-Free Families. Des. Codes Cryptogr. 32(1-3): 303-321 (2004) - [j12]Frank E. Bennett, Charles J. Colbourn, Ruizhong Wei, Jianxing Yin:
Preface. Discret. Math. 279(1-3): 1-2 (2004) - [j11]Douglas R. Stinson, Ruizhong Wei:
Generalized cover-free families. Discret. Math. 279(1-3): 463-477 (2004) - [c3]Ruizhong Wei, Jiang Wu:
Product Construction of Key Distribution Schemes for Sensor Networks. Selected Areas in Cryptography 2004: 280-293 - [i3]Jiang Wu, Ruizhong Wei:
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security. IACR Cryptol. ePrint Arch. 2004: 295 (2004) - 2002
- [j10]Carlo Blundo, Barbara Masucci, Douglas R. Stinson, Ruizhong Wei:
Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes. Des. Codes Cryptogr. 26(1-3): 97-110 (2002) - [j9]Ruizhong Wei:
Cyclic BSEC of block size 3. Discret. Math. 250(1-3): 291-298 (2002) - 2001
- [j8]Jessica Staddon, Douglas R. Stinson, Ruizhong Wei:
Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inf. Theory 47(3): 1042-1049 (2001) - 2000
- [j7]Douglas R. Stinson, Ruizhong Wei, Lie Zhu:
Some New Bounds for Cover-Free Families. J. Comb. Theory A 90(1): 224-234 (2000) - [i2]Jessica Staddon, Douglas R. Stinson, Ruizhong Wei:
Combinatorial Properties of Frameproof and Traceability Codes. IACR Cryptol. ePrint Arch. 2000: 4 (2000) - [i1]Carlo Blundo, Barbara Masucci, Douglas R. Stinson, Ruizhong Wei:
Constructions and Bounds for Unconditionally Secure Commitment Schemes. IACR Cryptol. ePrint Arch. 2000: 43 (2000)
1990 – 1999
- 1999
- [j6]Rolf S. Rees, Douglas R. Stinson, Ruizhong Wei, G. H. John van Rees:
An application of covering designs: determining the maximum consistent set of shares in a threshold scheme. Ars Comb. 53 (1999) - [j5]Ahmed M. Assaf, Ruizhong Wei:
Modified group divisible designs with block size 4 and lambda = 1. Discret. Math. 195(1-3): 15-25 (1999) - [j4]Douglas R. Stinson, Ruizhong Wei:
An Application of Ramp Schemes to Broadcast Encryption. Inf. Process. Lett. 69(3): 131-135 (1999) - [c2]Douglas R. Stinson, Ruizhong Wei:
Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures. Selected Areas in Cryptography 1999: 200-214 - 1998
- [j3]Douglas R. Stinson, Ruizhong Wei:
Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes. SIAM J. Discret. Math. 11(1): 41-53 (1998) - [c1]Douglas R. Stinson, Ruizhong Wei:
Key Preassigned Traceability Schemes for Broadcast Encryption. Selected Areas in Cryptography 1998: 144-156 - 1997
- [j2]Frank E. Bennett, Ruizhong Wei:
The existence of Schröder designs with equal-sized holes. Discret. Math. 170(1-3): 15-28 (1997)
1980 – 1989
- 1989
- [j1]Ruizhong Wei, Lie Zhu:
Embeddings of S(2, 4, v). Eur. J. Comb. 10(2): 201-206 (1989)
Coauthor Index
aka: Douglas R. Stinson
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 19:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint