Obserwuj
Guomin Yang
Guomin Yang
Associate Professor of Computer Science, University of Wollongong
Zweryfikowany adres z uow.edu.au
Tytuł
Cytowane przez
Cytowane przez
Rok
Malicious KGC attacks in certificateless cryptography
MH Au, J Chen, JK Liu, Y Mu, DS Wong, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2772007
Two-factor mutual authentication based on smart cards and passwords
G Yang, DS Wong, H Wang, X Deng
Journal of computer and system sciences 74 (7), 1160-1172, 2008
2362008
Probabilistic public key encryption with equality test
G Yang, CH Tan, Q Huang, DS Wong
Cryptographers’ track at the RSA conference, 119-131, 2010
2262010
Dual-server public-key encryption with keyword search for secure cloud storage
R Chen, Y Mu, G Yang, F Guo, X Wang
IEEE transactions on information forensics and security 11 (4), 789-798, 2015
2022015
Universal authentication protocols for anonymous wireless communications
G Yang, Q Huang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 9 (1), 168-174, 2010
1622010
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1412014
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1382015
Hidden ciphertext policy attribute-based encryption under standard assumptions
TVX Phuong, G Yang, W Susilo
IEEE transactions on information forensics and security 11 (1), 35-45, 2015
1272015
BL-MLE: block-level message-locked encryption for secure large file deduplication
R Chen, Y Mu, G Yang, F Guo
IEEE Transactions on Information Forensics and Security 10 (12), 2643-2652, 2015
1062015
Anonymous and authenticated key exchange for roaming networks
G Yang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 6 (9), 3461-3472, 2007
912007
A new general framework for secure public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Wang
Australasian conference on information security and privacy, 59-76, 2015
882015
Server-aided public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Huang, X Wang, Y Wang
IEEE Transactions on Information Forensics and Security 11 (12), 2833-2842, 2016
842016
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
F Wen, W Susilo, G Yang
Wireless personal communications 73 (3), 993-1004, 2013
792013
Strongly secure certificateless key exchange without pairing
G Yang, CH Tan
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
752011
Heterogeneous signcryption with key privacy
Q Huang, DS Wong, G Yang
The Computer Journal 54 (4), 525-536, 2011
732011
Secure fine-grained access control and data sharing for dynamic groups in the cloud
S Xu, G Yang, Y Mu, RH Deng
IEEE Transactions on Information Forensics and Security 13 (8), 2101-2113, 2018
702018
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
RW Zhu, G Yang, DS Wong
Theoretical Computer Science 378 (2), 198-207, 2007
702007
On the security of auditing mechanisms for secure cloud storage
Y Yu, L Niu, G Yang, Y Mu, W Susilo
Future Generation Computer Systems 30, 127-132, 2014
652014
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability
Q Huang, G Yang, DS Wong, W Susilo
International Journal of Information Security 10 (6), 373-385, 2011
612011
Ambiguous optimistic fair exchange
Q Huang, G Yang, DS Wong, W Susilo
International Conference on the Theory and Application of Cryptology and …, 2008
612008
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20