Seguir
Guomin Yang
Guomin Yang
Associate Professor of Computer Science, Singapore Management University
Dirección de correo verificada de smu.edu.sg
Título
Citado por
Citado por
Año
Probabilistic public key encryption with equality test
G Yang, CH Tan, Q Huang, DS Wong
Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010
3032010
Malicious KGC attacks in certificateless cryptography
MH Au, J Chen, JK Liu, Y Mu, DS Wong, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2902007
Dual-server public-key encryption with keyword search for secure cloud storage
R Chen, Y Mu, G Yang, F Guo, X Wang
IEEE transactions on information forensics and security 11 (4), 789-798, 2015
2722015
Two-factor mutual authentication based on smart cards and passwords
G Yang, DS Wong, H Wang, X Deng
Journal of computer and system sciences 74 (7), 1160-1172, 2008
2492008
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1782015
Hidden ciphertext policy attribute-based encryption under standard assumptions
TVX Phuong, G Yang, W Susilo
IEEE transactions on information forensics and security 11 (1), 35-45, 2015
1772015
Universal authentication protocols for anonymous wireless communications
G Yang, Q Huang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 9 (1), 168-174, 2010
1712010
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1582014
BL-MLE: Block-level message-locked encryption for secure large file deduplication
R Chen, Y Mu, G Yang, F Guo
IEEE Transactions on Information Forensics and Security 10 (12), 2643-2652, 2015
1452015
Server-aided public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Huang, X Wang, Y Wang
IEEE Transactions on Information Forensics and Security 11 (12), 2833-2842, 2016
1392016
Traceable monero: Anonymous cryptocurrency with enhanced accountability
Y Li, G Yang, W Susilo, Y Yu, MH Au, D Liu
IEEE Transactions on Dependable and Secure Computing 18 (2), 679-691, 2019
1122019
Designated-server identity-based authenticated encryption with keyword search for encrypted emails
H Li, Q Huang, J Shen, G Yang, W Susilo
Information Sciences 481, 330-343, 2019
1092019
Secure fine-grained access control and data sharing for dynamic groups in the cloud
S Xu, G Yang, Y Mu, RH Deng
IEEE Transactions on Information Forensics and Security 13 (8), 2101-2113, 2018
1062018
A new general framework for secure public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Wang
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
1012015
Building redactable consortium blockchain for industrial Internet-of-Things
K Huang, X Zhang, Y Mu, X Wang, G Yang, X Du, F Rezaeibagha, Q Xia, ...
IEEE Transactions on Industrial Informatics 15 (6), 3670-3679, 2019
992019
Anonymous and authenticated key exchange for roaming networks
G Yang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 6 (9), 3461-3472, 2007
932007
Attribute-based cloud data integrity auditing for secure outsourced storage
Y Yu, Y Li, B Yang, W Susilo, G Yang, J Bai
IEEE Transactions on Emerging Topics in Computing 8 (2), 377-390, 2017
922017
A blockchain-based self-tallying voting protocol in decentralized IoT
Y Li, W Susilo, G Yang, Y Yu, D Liu, X Du, M Guizani
IEEE Transactions on Dependable and Secure Computing 19 (1), 119-130, 2020
882020
Strongly secure certificateless key exchange without pairing
G Yang, CH Tan
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
882011
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
F Wen, W Susilo, G Yang
Wireless personal communications 73, 993-1004, 2013
832013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20