Follow
Guomin Yang
Guomin Yang
Associate Professor of Computer Science, Singapore Management University
Verified email at smu.edu.sg
Title
Cited by
Cited by
Year
Malicious KGC attacks in certificateless cryptography
MH Au, J Chen, JK Liu, Y Mu, DS Wong, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2812007
Two-factor mutual authentication based on smart cards and passwords
G Yang, DS Wong, H Wang, X Deng
Journal of computer and system sciences 74 (7), 1160-1172, 2008
2412008
Probabilistic public key encryption with equality test
G Yang, CH Tan, Q Huang, DS Wong
Cryptographers’ track at the RSA conference, 119-131, 2010
2402010
Dual-server public-key encryption with keyword search for secure cloud storage
R Chen, Y Mu, G Yang, F Guo, X Wang
IEEE transactions on information forensics and security 11 (4), 789-798, 2015
2182015
Universal authentication protocols for anonymous wireless communications
G Yang, Q Huang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 9 (1), 168-174, 2010
1652010
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1492015
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1492014
Hidden ciphertext policy attribute-based encryption under standard assumptions
TVX Phuong, G Yang, W Susilo
IEEE transactions on information forensics and security 11 (1), 35-45, 2015
1382015
BL-MLE: block-level message-locked encryption for secure large file deduplication
R Chen, Y Mu, G Yang, F Guo
IEEE Transactions on Information Forensics and Security 10 (12), 2643-2652, 2015
1162015
Server-aided public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Huang, X Wang, Y Wang
IEEE Transactions on Information Forensics and Security 11 (12), 2833-2842, 2016
992016
A new general framework for secure public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Wang
Australasian conference on information security and privacy, 59-76, 2015
942015
Anonymous and authenticated key exchange for roaming networks
G Yang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 6 (9), 3461-3472, 2007
912007
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
F Wen, W Susilo, G Yang
Wireless personal communications 73 (3), 993-1004, 2013
802013
Secure fine-grained access control and data sharing for dynamic groups in the cloud
S Xu, G Yang, Y Mu, RH Deng
IEEE Transactions on Information Forensics and Security 13 (8), 2101-2113, 2018
792018
Strongly secure certificateless key exchange without pairing
G Yang, CH Tan
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
782011
Heterogeneous signcryption with key privacy
Q Huang, DS Wong, G Yang
The Computer Journal 54 (4), 525-536, 2011
732011
Traceable monero: Anonymous cryptocurrency with enhanced accountability
Y Li, G Yang, W Susilo, Y Yu, MH Au, D Liu
IEEE Transactions on Dependable and Secure Computing 18 (2), 679-691, 2019
702019
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
RW Zhu, G Yang, DS Wong
Theoretical Computer Science 378 (2), 198-207, 2007
702007
Exploiting the error correction mechanism in QR codes for secret sharing
YW Chow, W Susilo, G Yang, JG Phillips, I Pranata, AM Barmawi
Australasian conference on information security and privacy, 409-425, 2016
652016
On the security of auditing mechanisms for secure cloud storage
Y Yu, L Niu, G Yang, Y Mu, W Susilo
Future Generation Computer Systems 30, 127-132, 2014
652014
The system can't perform the operation now. Try again later.
Articles 1–20