Follow
Guomin Yang
Guomin Yang
Associate Professor of Computer Science, Singapore Management University
Verified email at smu.edu.sg
Title
Cited by
Cited by
Year
Malicious KGC attacks in certificateless cryptography
MH Au, J Chen, JK Liu, Y Mu, DS Wong, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2802007
Two-factor mutual authentication based on smart cards and passwords
G Yang, DS Wong, H Wang, X Deng
Journal of computer and system sciences 74 (7), 1160-1172, 2008
2362008
Probabilistic public key encryption with equality test
G Yang, CH Tan, Q Huang, DS Wong
Cryptographers’ track at the RSA conference, 119-131, 2010
2302010
Dual-server public-key encryption with keyword search for secure cloud storage
R Chen, Y Mu, G Yang, F Guo, X Wang
IEEE transactions on information forensics and security 11 (4), 789-798, 2015
2082015
Universal authentication protocols for anonymous wireless communications
G Yang, Q Huang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 9 (1), 168-174, 2010
1642010
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1432014
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1412015
Hidden ciphertext policy attribute-based encryption under standard assumptions
TVX Phuong, G Yang, W Susilo
IEEE transactions on information forensics and security 11 (1), 35-45, 2015
1322015
BL-MLE: block-level message-locked encryption for secure large file deduplication
R Chen, Y Mu, G Yang, F Guo
IEEE Transactions on Information Forensics and Security 10 (12), 2643-2652, 2015
1092015
Anonymous and authenticated key exchange for roaming networks
G Yang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 6 (9), 3461-3472, 2007
912007
Server-aided public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Huang, X Wang, Y Wang
IEEE Transactions on Information Forensics and Security 11 (12), 2833-2842, 2016
902016
A new general framework for secure public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Wang
Australasian conference on information security and privacy, 59-76, 2015
902015
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
F Wen, W Susilo, G Yang
Wireless personal communications 73 (3), 993-1004, 2013
792013
Strongly secure certificateless key exchange without pairing
G Yang, CH Tan
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
782011
Secure fine-grained access control and data sharing for dynamic groups in the cloud
S Xu, G Yang, Y Mu, RH Deng
IEEE Transactions on Information Forensics and Security 13 (8), 2101-2113, 2018
762018
Heterogeneous signcryption with key privacy
Q Huang, DS Wong, G Yang
The Computer Journal 54 (4), 525-536, 2011
732011
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
RW Zhu, G Yang, DS Wong
Theoretical Computer Science 378 (2), 198-207, 2007
702007
On the security of auditing mechanisms for secure cloud storage
Y Yu, L Niu, G Yang, Y Mu, W Susilo
Future Generation Computer Systems 30, 127-132, 2014
652014
Exploiting the error correction mechanism in QR codes for secret sharing
YW Chow, W Susilo, G Yang, JG Phillips, I Pranata, AM Barmawi
Australasian conference on information security and privacy, 409-425, 2016
612016
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability
Q Huang, G Yang, DS Wong, W Susilo
International Journal of Information Security 10 (6), 373-385, 2011
612011
The system can't perform the operation now. Try again later.
Articles 1–20