default search action
Yimin Guo 0001
Person information
- affiliation: Zhongnan University of Economics and Law, School of Information and Safety Engineering, Wuhan, China
- affiliation: Chinese Academy of Sciences, Trusted Computing and Information Assurance Laboratory, Institute of Software, Beijing, China
Other persons with the same name
- Yimin Guo — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Huan Yang, Yajun Guo, Yimin Guo:
Blockchain-based cloud-fog collaborative smart home authentication scheme. Comput. Networks 242: 110240 (2024) - [j21]Yimin Guo, Zhenfeng Zhang, Yajun Guo, Ping Xiong:
BSRA: Blockchain-Based Secure Remote Authentication Scheme for Fog-Enabled Internet of Things. IEEE Internet Things J. 11(2): 3348-3361 (2024) - [j20]Yimin Guo, Yajun Guo, Ping Xiong, Fan Yang, Chengde Zhang:
A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things. Pervasive Mob. Comput. 98: 101877 (2024) - [j19]Yimin Guo, Yajun Guo, Ping Xiong, Fan Yang, Chengde Zhang:
Deeper Insight Into Why Authentication Schemes in IoT Environments Fail to Achieve the Desired Security. IEEE Trans. Inf. Forensics Secur. 19: 4615-4627 (2024) - [j18]Xinrui Duan, Yajun Guo, Yimin Guo:
Design of anonymous authentication scheme for vehicle fog services using blockchain. Wirel. Networks 30(1): 193-207 (2024) - 2023
- [j17]Xianbin Xu, Yajun Guo, Yimin Guo:
Fog-enabled private blockchain-based identity authentication scheme for smart home. Comput. Commun. 205: 58-68 (2023) - [j16]Huan Yang, Yajun Guo, Yimin Guo:
A puf-based three-party authentication key establishment scheme for fog-enabled smart home. Pervasive Mob. Comput. 95: 101843 (2023) - [j15]Anmulin Wu, Yajun Guo, Yimin Guo:
A decentralized lightweight blockchain-based authentication mechanism for Internet of Vehicles. Peer Peer Netw. Appl. 16(3): 1340-1353 (2023) - [j14]Yimin Guo, Yajun Guo:
CS-LAKA: A Lightweight Authenticated Key Agreement Protocol With Critical Security Properties for IoT Environments. IEEE Trans. Serv. Comput. 16(6): 4102-4114 (2023) - 2022
- [j13]Yimin Guo, Zhenfeng Zhang, Yajun Guo:
SecFHome: Secure remote authentication in fog-enabled smart home environment. Comput. Networks 207: 108818 (2022) - [j12]Yimin Guo, Zhenfeng Zhang, Yajun Guo:
Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing. IEEE Trans. Mob. Comput. 21(8): 2718-2731 (2022) - [j11]Xiaowei Shao, Yajun Guo, Yimin Guo:
A PUF-based anonymous authentication protocol for wireless medical sensor networks. Wirel. Networks 28(8): 3753-3770 (2022) - 2021
- [j10]Yimin Guo, Zhenfeng Zhang, Yajun Guo:
Superword: A honeyword system for achieving higher security goals. Comput. Secur. 103: 101689 (2021) - [j9]Yimin Guo, Yajun Guo:
FogHA: An efficient handover authentication for mobile devices in fog computing. Comput. Secur. 108: 102358 (2021) - [j8]Yimin Guo, Zhenfeng Zhang, Yajun Guo:
Fog-Centric Authenticated Key Agreement Scheme Without Trusted Parties. IEEE Syst. J. 15(4): 5057-5066 (2021) - 2020
- [j7]Yimin Guo, Zhenfeng Zhang, Yajun Guo, Xiaowei Guo:
Nudging personalized password policies by understanding users' personality. Comput. Secur. 94: 101801 (2020) - [j6]Yimin Guo, Zhenfeng Zhang:
Corrigendum to "LPSE: Lightweight password-strength estimation for password meters" [Computers & Security, Volume 73, 2018, Pages 507-518]. Comput. Secur. 94: 101879 (2020) - [j5]Yimin Guo, Zhenfeng Zhang, Yajun Guo:
Corrigendum to "Optiwords: A new password policy for creating memorable and strong password" [Computers & Security, Volume 85, 2019, Pages 423-435]. Comput. Secur. 94: 101880 (2020) - [j4]Xinyu Liang, Yajun Guo, Yimin Guo:
A Global Optimal Model for Protecting Privacy. Wirel. Pers. Commun. 112(3): 1451-1478 (2020)
2010 – 2019
- 2019
- [j3]Yimin Guo, Zhenfeng Zhang, Yajun Guo:
Optiwords: A new password policy for creating memorable and strong passwords. Comput. Secur. 85: 423-435 (2019) - 2018
- [j2]Yimin Guo, Zhenfeng Zhang:
LPSE: Lightweight password-strength estimation for password meters. Comput. Secur. 73: 507-518 (2018) - 2016
- [j1]Yimin Guo, Shundong Li, Jiawei Dou, Sufang Zhou:
Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems. IET Inf. Secur. 10(1): 28-32 (2016) - 2014
- [c3]Zhenhua Chen, Shundong Li, Yimin Guo, Yilei Wang, Yunjie Chu:
A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing. NSS 2014: 82-95 - 2011
- [c2]Yimin Guo, Yajun Guo:
Reusable Pseudonym Privacy Protection in Pervasive Computing. CSISE (2) 2011: 201-205 - [c1]Yimin Guo, Yajun Guo, Fei Peng, Huidan Gao:
The Intrinsic Relationship between Security Mechanisms and Trust Mechanisms. ICAIC (1) 2011: 566-572
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint