Chai, Q. ., & Gong, G. . (2012). Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. Ottawa, Canada. (Original work published 2012)
Publications
Filter by:
Gong, G. ., Helleseth, T. ., & Hu, H. . (2012). A three-valued Walsh transform from decimations of Helleseth-Gong sequences. IEEE Transactions on Information Theory, 58, 1158-1162. (Original work published 2012)
Gong, G. ., Huo, F. ., & Yang, Y. . (2012). Large zero autocorrelation zone of Golay sequences. Cambridge, MA, USA.
Li, Z. ., & Gong, G. . (2012). HB^C entity authentication for low-cost pervasive devices. IET Information Security.
Mandal, K. ., Fan, X. ., & Gong, G. . (2012). Warbler: a lightweight pseudorandom number generator gor EPC C1 Gen2 RFID tags. Amsterdam, Netherlands: IOS Press.
Yang, Y. ., Huo, F. ., & Gong, G. . (2012). Large zero odd periodic autocorrelation zone of Golay sequences and QAM Golay sequences. Cambridge, MA, USA.
Gong, G. ., Huo, F. ., & Yang, Y. . (2012). Large zero autocorrelation zones of Golay sequences and their applications. IEEE Transactions on Communication. (Original work published 2012)
Fan, X. ., & Gong, G. . (2012). Accelerating signature-based broadcast authentication for wireless sensor networks. Journal of Ad Hoc Networks, 10, 723-736. (Original work published 2012)
Fan, X. ., & Gong, G. . (2012). LPKM: A lightweight polynomial-based key management protocol for distributed wireless sensor networks. (Original work published 2012)
Wang, Z. ., Gong, G. ., & Yu, N. . (2012). New polyphase sequence families with low correlation derived from the Weil bound of exponential sums. IEEE Transactions on Information Theory. (Original work published 2012)