default search action
Guomin Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j115]Yangguang Tian, Yingjiu Li, Robert H. Deng, Guomin Yang, Nan Li:
Policy-Based Remote User Authentication From Multi-Biometrics. Comput. J. 67(5): 1814-1825 (2024) - [j114]Yunbo Yang, Yiwei Hu, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Guomin Yang, Robert H. Deng:
OpenSE: Efficient Verifiable Searchable Encryption With Access and Search Pattern Hidden for Cloud-IoT. IEEE Internet Things J. 11(8): 13793-13809 (2024) - [j113]Tong Wu, Xiaochen Ma, Chuan Zhang, Ximeng Liu, Guomin Yang, Liehuang Zhu:
Toward Fine-Grained Task Allocation With Bilateral Access Control for Intelligent Transportation Systems. IEEE Internet Things J. 11(8): 14814-14828 (2024) - [j112]Duni Hu, Guomin Yang, Hailong Wang:
Reinsurance contracts under Stackelberg game and market equilibrium. RAIRO Oper. Res. 58(5): 3675-3696 (2024) - [j111]Xiaoguo Li, Zixi Huang, Bowen Zhao, Guomin Yang, Tao Xiang, Robert H. Deng:
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network. IEEE Trans. Inf. Forensics Secur. 19: 1440-1454 (2024) - [j110]Chuan Zhang, Haojun Xuan, Tong Wu, Ximeng Liu, Guomin Yang, Liehuang Zhu:
Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing Storage. IEEE Trans. Inf. Forensics Secur. 19: 1979-1993 (2024) - [j109]Yang Yang, Wenyi Xue, Jianfei Sun, Guomin Yang, Yingjiu Li, HweeHwa Pang, Robert H. Deng:
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication. IEEE Trans. Inf. Forensics Secur. 19: 6097-6112 (2024) - [j108]Qing Wang, Donghui Hu, Meng Li, Guomin Yang:
Secure and Flexible Wildcard Queries. IEEE Trans. Inf. Forensics Secur. 19: 7374-7388 (2024) - [j107]Yunbo Yang, Xiang Chen, Yuhao Pan, Jiachen Shen, Zhenfu Cao, Xiaolei Dong, Xiaoguo Li, Jianfei Sun, Guomin Yang, Robert H. Deng:
OpenVFL: A Vertical Federated Learning Framework With Stronger Privacy-Preserving. IEEE Trans. Inf. Forensics Secur. 19: 9670-9681 (2024) - [j106]Zhenhua Chen, Luqi Huang, Guomin Yang, Willy Susilo, Xingbing Fu, Xingxing Jia:
Attribute-Hiding Fuzzy Encryption for Privacy-Preserving Data Evaluation. IEEE Trans. Serv. Comput. 17(3): 789-803 (2024) - [c80]Luqi Huang, Willy Susilo, Guomin Yang, Fuchun Guo:
Key Cooperative Attribute-Based Encryption. ACISP (1) 2024: 241-260 - [c79]Changsong Jiang, Chunxiang Xu, Guomin Yang:
Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication. ESORICS (4) 2024: 396-413 - [c78]Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng:
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications. NDSS 2024 - [c77]Xiaoguo Li, Guomin Yang, Tao Xiang, Shengmin Xu, Bowen Zhao, HweeHwa Pang, Robert H. Deng:
Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption. SP 2024: 3109-3127 - [i26]Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng:
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications. IACR Cryptol. ePrint Arch. 2024: 1783 (2024) - 2023
- [j105]Yudi Zhang, Fuchun Guo, Willy Susilo, Guomin Yang:
Balancing Privacy and Flexibility of Cloud-Based Personal Health Records Sharing System. IEEE Trans. Cloud Comput. 11(3): 2420-2430 (2023) - [j104]Lei Zhou, Anmin Fu, Guomin Yang, Yansong Gao, Shui Yu, Robert H. Deng:
Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices. IEEE Trans. Dependable Secur. Comput. 20(5): 4325-4342 (2023) - [j103]Xueqiao Liu, Guomin Yang, Willy Susilo, Kai He, Robert H. Deng, Jian Weng:
Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits. IEEE Trans. Inf. Forensics Secur. 18: 4929-4943 (2023) - [j102]Yudi Zhang, Willy Susilo, Fuchun Guo, Guomin Yang:
PPDF: A Privacy-Preserving Cloud-Based Data Distribution System With Filtering. IEEE Trans. Serv. Comput. 16(6): 3920-3930 (2023) - [c76]Jia-Chng Loh, Fuchun Guo, Willy Susilo, Guomin Yang:
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM. ACISP 2023: 199-219 - [i25]Xiaoguo Li, Bowen Zhao, Guomin Yang, Tao Xiang, Jian Weng, Robert H. Deng:
A Survey of Secure Computation Using Trusted Execution Environments. CoRR abs/2302.12150 (2023) - 2022
- [j101]Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe Lin Jiang, Siu-Ming Yiu, Hao Wang:
Generic server-aided secure multi-party computation in cloud computing. Comput. Stand. Interfaces 79: 103552 (2022) - [j100]Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe Lin Jiang, Junyi Li, Xueqiao Liu:
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security. Comput. Stand. Interfaces 80: 103570 (2022) - [j99]Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe Lin Jiang, Hao Wang, Tong Wu:
Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks. Comput. Stand. Interfaces 80: 103571 (2022) - [j98]Jianchang Lai, Fuchun Guo, Willy Susilo, Peng Jiang, Guomin Yang, Xinyi Huang:
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts. Inf. Sci. 613: 966-981 (2022) - [j97]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Xiaojiang Du, Mohsen Guizani:
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT. IEEE Trans. Dependable Secur. Comput. 19(1): 119-130 (2022) - [j96]Lei Zhou, Anmin Fu, Guomin Yang, Huaqun Wang, Yuqing Zhang:
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics. IEEE Trans. Dependable Secur. Comput. 19(2): 1118-1132 (2022) - [j95]Willy Susilo, Peng Jiang, Jianchang Lai, Fuchun Guo, Guomin Yang, Robert H. Deng:
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers. IEEE Trans. Dependable Secur. Comput. 19(3): 2138-2148 (2022) - [j94]Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang, Xiaorong Ke, Yining Liu:
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key. IEEE Trans. Dependable Secur. Comput. 19(5): 2934-2951 (2022) - [j93]Xueqiao Liu, Guomin Yang, Willy Susilo, Joseph Tonien, Rongmao Chen, Xixiang Lv:
Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage. IEEE Trans. Serv. Comput. 15(3): 1664-1677 (2022) - [c75]Khoa Nguyen, Fuchun Guo, Willy Susilo, Guomin Yang:
Multimodal Private Signatures. CRYPTO (2) 2022: 792-822 - [c74]Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu:
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. ESORICS (1) 2022: 89-109 - [e2]Khoa Nguyen, Guomin Yang, Fuchun Guo, Willy Susilo:
Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings. Lecture Notes in Computer Science 13494, Springer 2022, ISBN 978-3-031-22300-6 [contents] - [i24]Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu:
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. IACR Cryptol. ePrint Arch. 2022: 627 (2022) - [i23]Khoa Nguyen, Fuchun Guo, Willy Susilo, Guomin Yang:
Multimodal Private Signatures. IACR Cryptol. ePrint Arch. 2022: 1008 (2022) - 2021
- [j92]Qingwen Guo, Qiong Huang, Sha Ma, Meiyan Xiao, Guomin Yang, Willy Susilo:
Functional signatures: new definition and constructions. Sci. China Inf. Sci. 64(12) (2021) - [j91]Yangguang Tian, Yingjiu Li, Yi Mu, Guomin Yang:
Unlinkable and Revocable Secret Handshake. Comput. J. 64(8): 1303-1314 (2021) - [j90]Willy Susilo, Joseph Tonien, Guomin Yang:
Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA. Comput. Stand. Interfaces 74: 103470 (2021) - [j89]Tong Wu, Guomin Yang, Liehuang Zhu, Yulin Wu:
Privacy-preserving voluntary-tallying leader election for internet of things. Inf. Sci. 574: 461-472 (2021) - [j88]Yangguang Tian, Yingjiu Li, Robert H. Deng, Binanda Sengupta, Guomin Yang:
Lattice-based remote user authentication from reusable fuzzy signature. J. Comput. Secur. 29(3): 273-298 (2021) - [j87]Tong Wu, Guomin Yang, Yi Mu, Fuchun Guo, Robert H. Deng:
Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model. IEEE Trans. Dependable Secur. Comput. 18(2): 563-575 (2021) - [j86]Yannan Li, Guomin Yang, Willy Susilo, Yong Yu, Man Ho Au, Dongxi Liu:
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. IEEE Trans. Dependable Secur. Comput. 18(2): 679-691 (2021) - [j85]Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe Lin Jiang, Qian Chen, Peng Xu:
Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing. IEEE Trans. Dependable Secur. Comput. 18(6): 2820-2834 (2021) - [j84]Jiannan Wei, Tran Viet Xuan Phuong, Guomin Yang:
An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things. IEEE Trans. Ind. Informatics 17(1): 617-626 (2021) - [j83]Xueqiao Liu, Guomin Yang, Willy Susilo, Joseph Tonien, Ximeng Liu, Jian Shen:
Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems. IEEE Trans. Parallel Distributed Syst. 32(3): 561-574 (2021) - [c73]Xueqiao Liu, Kai He, Guomin Yang, Willy Susilo, Joseph Tonien, Qiong Huang:
Broadcast Authenticated Encryption with Keyword Search. ACISP 2021: 193-213 - [c72]Yannan Li, Willy Susilo, Guomin Yang, Tran Viet Xuan Phuong, Yong Yu, Dongxi Liu:
Concise Mercurial Subvector Commitments: Definitions and Constructions. ACISP 2021: 353-371 - [c71]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Tran Viet Xuan Phuong, Dongxi Liu:
Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual. AsiaCCS 2021: 859-871 - [c70]Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung:
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved. CRYPTO (4) 2021: 270-300 - [c69]Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jongkil Kim, Yang-Wai Chow, Dongxi Liu:
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments. ESORICS (2) 2021: 106-126 - [c68]Yuanhao Wang, Qiong Huang, Hongbo Li, Meiyan Xiao, Jianye Huang, Guomin Yang:
Public Key Encryption with Fuzzy Matching. ProvSec 2021: 39-62 - [i22]Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung:
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved. IACR Cryptol. ePrint Arch. 2021: 862 (2021) - 2020
- [j82]Yuanhao Wang, Yuzhao Cui, Qiong Huang, Hongbo Li, Jianye Huang, Guomin Yang:
Attribute-Based Equality Test Over Encrypted Data Without Random Oracles. IEEE Access 8: 32891-32903 (2020) - [j81]Zhichao Yang, Rongmao Chen, Chao Li, Longjiang Qu, Guomin Yang:
On the Security of LWE Cryptosystem against Subversion Attacks. Comput. J. 63(4): 495-507 (2020) - [j80]Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Guomin Yang, Zheng Yang:
A New Construction for Linkable Secret Handshake. Comput. J. 63(4): 536-548 (2020) - [j79]Zhichao Yang, Dung Hoang Duong, Willy Susilo, Guomin Yang, Chao Li, Rongmao Chen:
Hierarchical Identity-Based Signature in Polynomial Rings. Comput. J. 63(10): 1490-1499 (2020) - [j78]Tong Wu, Guomin Yang, Yi Mu, Rongmao Chen, Shengmin Xu:
Privacy-enhanced remote data integrity checking with updatable timestamp. Inf. Sci. 527: 210-226 (2020) - [j77]Willy Susilo, Joseph Tonien, Guomin Yang:
A generalised bound for the Wiener attack on RSA. J. Inf. Secur. Appl. 53: 102531 (2020) - [j76]Ke Huang, Xiaosong Zhang, Xiaofen Wang, Yi Mu, Fatemeh Rezaeibagha, Guangquan Xu, Hao Wang, Xi Zheng, Guomin Yang, Qi Xia, Xiaojiang Du:
HUCDO: A Hybrid User-centric Data Outsourcing Scheme. ACM Trans. Cyber Phys. Syst. 4(3): 35:1-35:23 (2020) - [j75]Hui Ma, Rui Zhang, Guomin Yang, Zishuai Song, Kai He, Yuting Xiao:
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices. IEEE Trans. Dependable Secur. Comput. 17(5): 1026-1038 (2020) - [j74]Xueqiao Liu, Guomin Yang, Yi Mu, Robert H. Deng:
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 17(6): 1322-1332 (2020) - [j73]Yunhui Zhuang, Anjia Yang, Gerhard P. Hancke, Duncan S. Wong, Guomin Yang:
Energy-Efficient Distance-Bounding with Residual Charge Computation. IEEE Trans. Emerg. Top. Comput. 8(2): 365-376 (2020) - [j72]Yong Yu, Yannan Li, Bo Yang, Willy Susilo, Guomin Yang, Jian Bai:
Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage. IEEE Trans. Emerg. Top. Comput. 8(2): 377-390 (2020) - [c67]Wenling Liu, Zhen Liu, Khoa Nguyen, Guomin Yang, Yu Yu:
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. ESORICS (2) 2020: 357-377
2010 – 2019
- 2019
- [j71]Yuanhao Wang, Qiong Huang, Hongbo Li, Jianye Huang, Guomin Yang, Willy Susilo:
Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups. IEEE Access 7: 135999-136011 (2019) - [j70]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang:
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification. Comput. J. 62(8): 1166-1177 (2019) - [j69]Guomin Yang, Rongmao Chen, Yi Mu, Willy Susilo, Fuchun Guo, Jie Li:
Strongly leakage resilient authenticated key exchange, revisited. Des. Codes Cryptogr. 87(12): 2885-2911 (2019) - [j68]Shengmin Xu, Guomin Yang, Yi Mu, Ximeng Liu:
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Future Gener. Comput. Syst. 97: 284-294 (2019) - [j67]Yong Yu, Guomin Yang, Huaxiong Wang:
Preface: Special Issue Cryptography and Provable Security. Int. J. Found. Comput. Sci. 30(4): 489-492 (2019) - [j66]Boyu Kuang, Anmin Fu, Shui Yu, Guomin Yang, Mang Su, Yuqing Zhang:
ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms. IEEE Internet Things J. 6(5): 8372-8383 (2019) - [j65]Peng Jiang, Jianchang Lai, Fuchun Guo, Willy Susilo, Man Ho Au, Guomin Yang, Yi Mu, Rongmao Chen:
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters. Inf. Sci. 472: 35-52 (2019) - [j64]Shengmin Xu, Guomin Yang, Yi Mu:
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Inf. Sci. 479: 116-134 (2019) - [j63]Hongbo Li, Qiong Huang, Jian Shen, Guomin Yang, Willy Susilo:
Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Inf. Sci. 481: 330-343 (2019) - [j62]Yangguang Tian, Yingjiu Li, Guomin Yang, Willy Susilo, Yi Mu, Hui Cui, Yinghui Zhang:
DABKE: Secure deniable attribute-based key exchange framework. J. Comput. Secur. 27(2): 259-275 (2019) - [j61]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Xiaojiang Du, Dongxi Liu, Nadra Guizani:
Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies. IEEE Netw. 33(5): 111-117 (2019) - [j60]Ke Huang, Xiaosong Zhang, Yi Mu, Xiaofen Wang, Guomin Yang, Xiaojiang Du, Fatemeh Rezaeibagha, Qi Xia, Mohsen Guizani:
Building Redactable Consortium Blockchain for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 15(6): 3670-3679 (2019) - [c66]Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jun Yan, Dongxi Liu:
Location Based Encryption. ACISP 2019: 21-38 - [c65]Willy Susilo, Joseph Tonien, Guomin Yang:
The Wiener Attack on RSA Revisited: A Quest for the Exact Bound. ACISP 2019: 381-398 - [c64]Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu:
Puncturable Proxy Re-Encryption Supporting to Group Messaging Service. ESORICS (1) 2019: 215-233 - [c63]Zhen Liu, Khoa Nguyen, Guomin Yang, Huaxiong Wang, Duncan S. Wong:
A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses. ESORICS (1) 2019: 726-746 - [c62]Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang:
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. EuroS&P 2019: 215-230 - [c61]Xueqiao Liu, Hongbo Li, Guomin Yang, Willy Susilo, Joseph Tonien, Qiong Huang:
Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search. ProvSec 2019: 113-129 - [c60]Duc-Phong Le, Guomin Yang, Ali A. Ghorbani:
A New Multisignature Scheme with Public Key Aggregation for Blockchain. PST 2019: 1-7 - [c59]Shengmin Xu, Yinghui Zhang, Yingjiu Li, Ximeng Liu, Guomin Yang:
Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy. SecureComm (2) 2019: 184-204 - [i21]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Mohsen Guizani:
A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT. CoRR abs/1902.03710 (2019) - [i20]Yangguang Tian, Yingjiu Li, Robert H. Deng, Binanda Sengupta, Guomin Yang:
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature. IACR Cryptol. ePrint Arch. 2019: 743 (2019) - [i19]Duc-Phong Le, Guomin Yang, Ali A. Ghorbani:
DDH-based Multisignatures with Public Key Aggregation. IACR Cryptol. ePrint Arch. 2019: 771 (2019) - [i18]Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu:
Puncturable Proxy Re-Encryption supporting to Group Messaging Service. IACR Cryptol. ePrint Arch. 2019: 1078 (2019) - 2018
- [j59]Jiannan Wei, Xiaojie Wang, Nan Li, Guomin Yang, Yi Mu:
A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks. IEEE Access 6: 43776-43784 (2018) - [j58]Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo:
Criteria-Based Encryption. Comput. J. 61(4): 512-525 (2018) - [j57]Qingwen Guo, Qiong Huang, Guomin Yang:
Authorized Function Homomorphic Signature. Comput. J. 61(12): 1897-1908 (2018) - [j56]Anmin Fu, Yiming Zhu, Guomin Yang, Shui Yu, Yan Yu:
Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server. Clust. Comput. 21(4): 1933-1947 (2018) - [j55]Anjia Yang, Yunhui Zhuang, Jian Weng, Gerhard P. Hancke, Duncan S. Wong, Guomin Yang:
Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models. Future Gener. Comput. Syst. 82: 315-326 (2018) - [j54]Willy Susilo, Guomin Yang, Fuchun Guo, Qiong Huang:
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. Inf. Sci. 429: 349-360 (2018) - [j53]Shengmin Xu, Guomin Yang, Yi Mu:
A New Revocable and Re-Delegable Proxy Signature and Its Application. J. Comput. Sci. Technol. 33(2): 380-399 (2018) - [j52]Yang-Wai Chow, Willy Susilo, Joseph Tonien, Elena Vlahu-Gjorgievska, Guomin Yang:
Cooperative Secret Sharing Using QR Codes and Symmetric Keys. Symmetry 10(4): 95 (2018) - [j51]Shengmin Xu, Guomin Yang, Yi Mu, Robert H. Deng:
Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud. IEEE Trans. Inf. Forensics Secur. 13(8): 2101-2113 (2018) - [j50]Weiwei Liu, Yi Mu, Guomin Yang, Yangguang Tian:
Strong Identity-Based Proxy Signature Schemes, Revisited. Wirel. Commun. Mob. Comput. 2018: 6925019:1-6925019:11 (2018) - [c58]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang:
Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test. Inscrypt 2018: 448-467 - [c57]Hui Ma, Rui Zhang, Guomin Yang, Zishuai Song, Shuzhou Sun, Yuting Xiao:
Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines. ESORICS (2) 2018: 507-526 - [c56]Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li, Guomin Yang, Yong Yu:
DSH: Deniable Secret Handshake Framework. ISPEC 2018: 341-353 - [c55]Weiwei Liu, Yinghui Zhang, Yi Mu, Guomin Yang, Yangguang Tian:
Efficient Traceable Oblivious Transfer and Its Applications. ISPEC 2018: 610-621 - [c54]Shengmin Xu, Guomin Yang, Yi Mu, Ximeng Liu:
Efficient Attribute-Based Encryption with Blackbox Traceability. ProvSec 2018: 182-200 - [e1]Willy Susilo, Guomin Yang:
Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings. Lecture Notes in Computer Science 10946, Springer 2018, ISBN 978-3-319-93637-6 [contents] - [i17]Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang:
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. IACR Cryptol. ePrint Arch. 2018: 956 (2018) - [i16]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang:
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification. IACR Cryptol. ePrint Arch. 2018: 1058 (2018) - 2017
- [j49]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1): 145-173 (2017) - [j48]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Zheng Yang:
A note on the strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1): 175-178 (2017) - [j47]Yiteng Feng, Guomin Yang, Joseph K. Liu:
A new public remote integrity checking scheme with user and data privacy. Int. J. Appl. Cryptogr. 3(3): 196-209 (2017) - [j46]Jiannan Wei, Guomin Yang, Yi Mu:
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange. Int. J. Comput. Math. 94(5): 946-961 (2017) - [j45]Yangguang Tian, Guomin Yang, Yi Mu, Shiwei Zhang, Kaitai Liang, Yong Yu:
One-Round Attribute-Based Key Exchange in the Multi-Party Setting. Int. J. Found. Comput. Sci. 28(6): 725-742 (2017) - [j44]Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Fuchun Guo, Qiong Huang:
Sequence aware functional encryption and its application in searchable encryption. J. Inf. Secur. Appl. 35: 106-118 (2017) - [j43]Jorge Munilla, Mike Burmester, Alberto Peinado, Guomin Yang, Willy Susilo:
RFID Ownership Transfer with Positive Secrecy Capacity Channels. Sensors 17(1): 53 (2017) - [j42]Weiwei Liu, Yi Mu, Guomin Yang, Yong Yu:
Efficient E-coupon systems with strong user privacy. Telecommun. Syst. 64(4): 695-708 (2017) - [j41]Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu, Yi Mu:
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. IEEE Trans. Inf. Forensics Secur. 12(12): 3110-3122 (2017) - [j40]Yangguang Tian, Guomin Yang, Yi Mu:
Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting. Wirel. Pers. Commun. 94(3): 1017-1034 (2017) - [j39]Jiannan Wei, Guomin Yang, Yi Mu:
Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications. Wirel. Pers. Commun. 97(2): 3017-3030 (2017) - [c53]Shiwei Zhang, Yi Mu, Guomin Yang, Xiaofen Wang:
Hierarchical Functional Encryption for Linear Transformations. ACISP (1) 2017: 23-43 - [c52]Shengmin Xu, Guomin Yang, Yi Mu, Willy Susilo:
Mergeable and Revocable Identity-Based Encryption. ACISP (1) 2017: 147-167 - [c51]Yangguang Tian, Shiwei Zhang, Guomin Yang, Yi Mu, Yong Yu:
Privacy-Preserving k-time Authenticated Secret Handshakes. ACISP (2) 2017: 281-300 - [c50]Yang-Wai Chow, Willy Susilo, Guomin Yang:
Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts. CDVE 2017: 65-72 - [c49]Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample. CRYPTO (2) 2017: 517-547 - [c48]Zhongyuan Yao, Yi Mu, Guomin Yang:
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking. ISPEC 2017: 186-203 - [c47]Shengke Zeng, Yi Mu, Guomin Yang, Mingxing He:
Deniable Ring Authentication Based on Projective Hash Functions. ProvSec 2017: 127-143 - [i15]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strong Authenticated Key Exchange with Auxiliary Inputs. IACR Cryptol. ePrint Arch. 2017: 418 (2017) - [i14]Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample. IACR Cryptol. ePrint Arch. 2017: 499 (2017) - 2016
- [j38]Jiannan Wei, Guomin Yang, Yi Mu, Kaitai Liang:
Anonymous Proxy Signature with Hierarchical Traceability. Comput. J. 59(4): 559-569 (2016) - [j37]Guomin Yang, Willy Susilo, Yi Mu:
Message from the Guest Editors. Int. J. Inf. Sec. 15(2): 223-224 (2016) - [j36]Yangguang Tian, Guomin Yang, Yi Mu:
Privacy-preserving grouping proof with key exchange in the multiple-party setting. Secur. Commun. Networks 9(16): 3239-3250 (2016) - [j35]Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo:
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions. IEEE Trans. Inf. Forensics Secur. 11(1): 35-45 (2016) - [j34]Yong Yu, Yannan Li, Jianbing Ni, Guomin Yang, Yi Mu, Willy Susilo:
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification". IEEE Trans. Inf. Forensics Secur. 11(3): 658-659 (2016) - [j33]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang:
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 11(4): 789-798 (2016) - [j32]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang, Xiaofen Wang, Yongjun Wang:
Server-Aided Public Key Encryption With Keyword Search. IEEE Trans. Inf. Forensics Secur. 11(12): 2833-2842 (2016) - [j31]Hoon Wei Lim, Guomin Yang:
Authenticated Key Exchange Protocols for Parallel Network File Systems. IEEE Trans. Parallel Distributed Syst. 27(1): 92-105 (2016) - [j30]Jiannan Wei, Guomin Yang, Yi Mu:
Comments on "Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks". IEEE Trans. Wirel. Commun. 15(4): 3097-3099 (2016) - [c46]Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, Mingwu Zhang:
One-Round Strong Oblivious Signature-Based Envelope. ACISP (2) 2016: 3-20 - [c45]Shengmin Xu, Guomin Yang, Yi Mu, Sha Ma:
Proxy Signature with Revocation. ACISP (2) 2016: 21-36 - [c44]Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Kaitai Liang:
Edit Distance Based Encryption and Its Application. ACISP (2) 2016: 103-119 - [c43]Shiwei Zhang, Guomin Yang, Yi Mu:
Linear Encryption with Keyword Search. ACISP (2) 2016: 187-203 - [c42]Yang-Wai Chow, Willy Susilo, Guomin Yang, James G. Phillips, Ilung Pranata, Ari Moesriami Barmawi:
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing. ACISP (1) 2016: 409-425 - [c41]Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang:
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. ASIACRYPT (2) 2016: 745-776 - [c40]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang:
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. ASIACRYPT (1) 2016: 844-876 - [c39]Willy Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu, Yang-Wai Chow:
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext. AsiaCCS 2016: 201-210 - [c38]Shiwei Zhang, Yi Mu, Guomin Yang:
Achieving IND-CCA Security for Functional Encryption for Inner Products. Inscrypt 2016: 119-139 - [c37]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strongly Leakage-Resilient Authenticated Key Exchange. CT-RSA 2016: 19-36 - [c36]Zhongyuan Yao, Yi Mu, Guomin Yang:
A Privacy Preserving Source Verifiable Encryption Scheme. ISPEC 2016: 182-193 - [c35]Yangguang Tian, Guomin Yang, Yi Mu, Kaitai Liang, Yong Yu:
One-Round Attribute-Based Key Exchange in the Multi-party Setting. ProvSec 2016: 227-243 - [c34]Yang-Wai Chow, Willy Susilo, Guomin Yang, Man Ho Au, Cong Wang:
Authentication and Transaction Verification Using QR Codes with a Mobile Device. SpaCCS 2016: 437-451 - [i13]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strongly Leakage-Resilient Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2016: 308 (2016) - [i12]Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang:
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. IACR Cryptol. ePrint Arch. 2016: 872 (2016) - [i11]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang:
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. IACR Cryptol. ePrint Arch. 2016: 873 (2016) - 2015
- [j29]Xinyu Fan, Guomin Yang, Yi Mu, Yong Yu:
On Indistinguishability in Remote Data Integrity Checking. Comput. J. 58(4): 823-830 (2015) - [j28]Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang:
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Future Gener. Comput. Syst. 52: 95-108 (2015) - [j27]Qiong Huang, Guomin Yang:
A Summary of the Special Issue "Cybersecurity and Cryptography". Inf. 6(4): 833-835 (2015) - [j26]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Ambiguous optimistic fair exchange: Definition and constructions. Theor. Comput. Sci. 562: 177-193 (2015) - [j25]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo:
BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication. IEEE Trans. Inf. Forensics Secur. 10(12): 2643-2652 (2015) - [j24]Fengtong Wen, Willy Susilo, Guomin Yang:
Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards. Wirel. Pers. Commun. 80(4): 1747-1760 (2015) - [c33]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang:
A New General Framework for Secure Public Key Encryption with Keyword Search. ACISP 2015: 59-76 - [c32]Yiteng Feng, Yi Mu, Guomin Yang, Joseph K. Liu:
A New Public Remote Integrity Checking Scheme with User Privacy. ACISP 2015: 377-394 - [c31]Shiwei Zhang, Yi Mu, Guomin Yang:
Threshold Broadcast Encryption with Keyword Search. Inscrypt 2015: 322-337 - [c30]Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Xiaofeng Chen:
Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key. ESORICS (2) 2015: 252-269 - 2014
- [j23]Man Ho Au, Guomin Yang, Willy Susilo, Yunmei Zhang:
(Strong) multidesignated verifiers signatures secure against rogue key attack. Concurr. Comput. Pract. Exp. 26(8): 1574-1592 (2014) - [j22]Yong Yu, Lei Niu, Guomin Yang, Yi Mu, Willy Susilo:
On the security of auditing mechanisms for secure cloud storage. Future Gener. Comput. Syst. 30: 127-132 (2014) - [j21]Fengtong Wen, Willy Susilo, Guomin Yang:
A robust smart card-based anonymous user authentication protocol for wireless communications. Secur. Commun. Networks 7(6): 987-993 (2014) - [j20]Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo, Duncan S. Wong:
Identity based identification from algebraic coding theory. Theor. Comput. Sci. 520: 51-61 (2014) - [j19]Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong, Qi Xie:
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. IEEE Trans. Inf. Forensics Secur. 9(10): 1667-1680 (2014) - [j18]Liqun Chen, Hoon Wei Lim, Guomin Yang:
Cross-Domain Password-Based Authenticated Key Exchange Revisited. ACM Trans. Inf. Syst. Secur. 16(4): 15 (2014) - [c29]Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo:
POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption. CCS 2014: 1490-1492 - [c28]Weiwei Liu, Yi Mu, Guomin Yang:
An Efficient Privacy-Preserving E-coupon System. Inscrypt 2014: 3-15 - [c27]Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo:
Efficient Hidden Vector Encryption with Constant-Size Ciphertext. ESORICS (1) 2014: 472-487 - [c26]Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu:
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. ISPEC 2014: 448-461 - [c25]Weiwei Liu, Yi Mu, Guomin Yang:
Attribute-Based Signing Right Delegation. NSS 2014: 323-334 - [c24]Jiannan Wei, Guomin Yang, Yi Mu:
Anonymous Proxy Signature with Restricted Traceability. TrustCom 2014: 575-581 - [i10]Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo:
Efficient Hidden Vector Encryption with Constant-Size Ciphertext. IACR Cryptol. ePrint Arch. 2014: 503 (2014) - 2013
- [j17]Fengtong Wen, Willy Susilo, Guomin Yang:
A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 73(3): 993-1004 (2013) - [c23]Liqun Chen, Hoon Wei Lim, Guomin Yang:
Cross-domain password-based authenticated key exchange revisited. INFOCOM 2013: 1052-1060 - [c22]Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong:
Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model. ISPEC 2013: 204-217 - [c21]Yunhui Zhuang, Anjia Yang, Duncan S. Wong, Guomin Yang, Qi Xie:
A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation. NSS 2013: 451-464 - [c20]Anjia Yang, Yunhui Zhuang, Duncan S. Wong, Guomin Yang:
A New Unpredictability-Based RFID Privacy Model. NSS 2013: 479-492 - [c19]Weiwei Liu, Guomin Yang, Yi Mu, Jiannan Wei:
k-time Proxy Signature: Formal Definition and Efficient Construction. ProvSec 2013: 154-164 - [i9]Jorge Munilla, Alberto Peinado, Guomin Yang, Willy Susilo:
Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model. IACR Cryptol. ePrint Arch. 2013: 187 (2013) - 2012
- [j16]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
A new efficient optimistic fair exchange protocol without random oracles. Int. J. Inf. Sec. 11(1): 53-63 (2012) - [c18]Yunmei Zhang, Man Ho Au, Guomin Yang, Willy Susilo:
(Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack. NSS 2012: 334-347 - [i8]Liqun Chen, Hoon Wei Lim, Guomin Yang:
Cross-Domain Password-Based Authenticated Key Exchange Revisited. IACR Cryptol. ePrint Arch. 2012: 397 (2012) - 2011
- [j15]Qiong Huang, Duncan S. Wong, Guomin Yang:
Heterogeneous Signcryption with Key Privacy. Comput. J. 54(4): 525-536 (2011) - [j14]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability. Int. J. Inf. Sec. 10(6): 373-385 (2011) - [j13]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Identity-based strong designated verifier signature revisited. J. Syst. Softw. 84(1): 120-129 (2011) - [j12]Guomin Yang, Chik How Tan:
Certificateless public key encryption: A new generic construction and two pairing-free schemes. Theor. Comput. Sci. 412(8-10): 662-674 (2011) - [j11]Guomin Yang, Chik How Tan:
Certificateless cryptography with KGC trust level 3. Theor. Comput. Sci. 412(39): 5446-5457 (2011) - [j10]Guomin Yang:
Comments on "An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks". IEEE Trans. Wirel. Commun. 10(6): 2015-2016 (2011) - [c17]Guomin Yang, Chik How Tan:
Strongly secure certificateless key exchange without pairing. AsiaCCS 2011: 71-79 - [c16]Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang:
Authenticated Key Exchange under Bad Randomness. Financial Cryptography 2011: 113-126 - [i7]Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang:
Authenticated Key Exchange under Bad Randomness. IACR Cryptol. ePrint Arch. 2011: 688 (2011) - 2010
- [j9]Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow:
An efficient signcryption scheme with key privacy and its extension to ring signcryption. J. Comput. Secur. 18(3): 451-473 (2010) - [j8]Chik How Tan, Guomin Yang:
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting". IEEE Trans. Inf. Theory 56(11): 5887-5888 (2010) - [j7]Guomin Yang, Qiong Huang, Duncan S. Wong, Xiaotie Deng:
Universal authentication protocols for anonymous wireless communications. IEEE Trans. Wirel. Commun. 9(1): 168-174 (2010) - [c15]Guomin Yang, Chik How Tan:
Dynamic Group Key Exchange Revisited. CANS 2010: 261-277 - [c14]Guomin Yang, Chik How Tan, Qiong Huang, Duncan S. Wong:
Probabilistic Public Key Encryption with Equality Test. CT-RSA 2010: 119-131
2000 – 2009
- 2009
- [c13]Tsz Hon Yuen, Qiong Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Guomin Yang:
Efficient Non-interactive Range Proof. COCOON 2009: 138-147 - [i6]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability. IACR Cryptol. ePrint Arch. 2009: 518 (2009) - 2008
- [j6]Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng:
Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7): 1160-1172 (2008) - [j5]Guomin Yang, Duncan S. Wong, Xiaotie Deng:
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension. J. Univers. Comput. Sci. 14(3): 441-462 (2008) - [j4]Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang:
A new framework for the design and analysis of identity-based identification schemes. Theor. Comput. Sci. 407(1-3): 370-388 (2008) - [c12]Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang:
Traceable and Retrievable Identity-Based Encryption. ACNS 2008: 94-110 - [c11]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Ambiguous Optimistic Fair Exchange. ASIACRYPT 2008: 74-89 - [c10]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. CT-RSA 2008: 106-120 - 2007
- [j3]Wei He, Ronghong Jin, Junping Geng, Guomin Yang:
Wideband 3/4 Elliptical Ring Patch for Millimeter-Wave Communication. IEICE Trans. Commun. 90-B(12): 3742-3744 (2007) - [j2]Robert W. Zhu, Guomin Yang, Duncan S. Wong:
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices. Theor. Comput. Sci. 378(2): 198-207 (2007) - [j1]Guomin Yang, Duncan S. Wong, Xiaotie Deng:
Anonymous and Authenticated Key Exchange for Roaming Networks. IEEE Trans. Wirel. Commun. 6(9): 3461-3472 (2007) - [c9]Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang:
A More Natural Way to Construct Identity-Based Identification Schemes. ACNS 2007: 307-322 - [c8]Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow:
An Efficient Signcryption Scheme with Key Privacy. EuroPKI 2007: 78-93 - [c7]Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng:
Time Capsule Signature: Efficient and Provably Secure Constructions. EuroPKI 2007: 126-142 - [i5]Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng:
Time Capsule Signature: Efficient and Provably Secure Constructions. IACR Cryptol. ePrint Arch. 2007: 146 (2007) - [i4]Guomin Yang, Duncan S. Wong, Qiong Huang, Xiaotie Deng:
A New Security Definition for Public Key Encryption Schemes and Its Applications. IACR Cryptol. ePrint Arch. 2007: 319 (2007) - 2006
- [c6]Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng:
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). ICICS 2006: 82-91 - [c5]Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang:
Anonymous Signature Schemes. Public Key Cryptography 2006: 347-363 - [i3]Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, Guomin Yang:
Malicious KGC Attacks in Certificateless Cryptography. IACR Cryptol. ePrint Arch. 2006: 255 (2006) - [i2]Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng:
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme. IACR Cryptol. ePrint Arch. 2006: 270 (2006) - 2005
- [c4]Guomin Yang, Duncan S. Wong, Xiaotie Deng:
Deposit-Case Attack Against Secure Roaming. ACISP 2005: 417-428 - [c3]Guomin Yang, Duncan S. Wong, Xiaotie Deng:
Efficient Anonymous Roaming and Its Security Analysis. ACNS 2005: 334-349 - [c2]Guomin Yang, Duncan S. Wong, Xiaotie Deng:
Analysis and Improvement of a Signcryption Scheme with Key Privacy. ISC 2005: 218-232 - [c1]Robert W. Zhu, Guomin Yang, Duncan S. Wong:
An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices. WINE 2005: 500-509 - [i1]Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang:
Anonymous Signature Schemes. IACR Cryptol. ePrint Arch. 2005: 407 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint