Follow
Guomin Yang
Guomin Yang
Associate Professor of Computer Science, Singapore Management University
Verified email at smu.edu.sg
Title
Cited by
Cited by
Year
Malicious KGC attacks in certificateless cryptography
MH Au, J Chen, JK Liu, Y Mu, DS Wong, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2882007
Probabilistic public key encryption with equality test
G Yang, CH Tan, Q Huang, DS Wong
Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010
2822010
Dual-server public-key encryption with keyword search for secure cloud storage
R Chen, Y Mu, G Yang, F Guo, X Wang
IEEE transactions on information forensics and security 11 (4), 789-798, 2015
2592015
Two-factor mutual authentication based on smart cards and passwords
G Yang, DS Wong, H Wang, X Deng
Journal of computer and system sciences 74 (7), 1160-1172, 2008
2452008
Universal authentication protocols for anonymous wireless communications
G Yang, Q Huang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 9 (1), 168-174, 2010
1702010
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1692015
Hidden ciphertext policy attribute-based encryption under standard assumptions
TVX Phuong, G Yang, W Susilo
IEEE transactions on information forensics and security 11 (1), 35-45, 2015
1642015
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1562014
BL-MLE: Block-level message-locked encryption for secure large file deduplication
R Chen, Y Mu, G Yang, F Guo
IEEE Transactions on Information Forensics and Security 10 (12), 2643-2652, 2015
1372015
Server-aided public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Huang, X Wang, Y Wang
IEEE Transactions on Information Forensics and Security 11 (12), 2833-2842, 2016
1282016
A new general framework for secure public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Wang
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
1022015
Traceable monero: Anonymous cryptocurrency with enhanced accountability
Y Li, G Yang, W Susilo, Y Yu, MH Au, D Liu
IEEE Transactions on Dependable and Secure Computing 18 (2), 679-691, 2019
1012019
Secure fine-grained access control and data sharing for dynamic groups in the cloud
S Xu, G Yang, Y Mu, RH Deng
IEEE Transactions on Information Forensics and Security 13 (8), 2101-2113, 2018
982018
Designated-server identity-based authenticated encryption with keyword search for encrypted emails
H Li, Q Huang, J Shen, G Yang, W Susilo
Information Sciences 481, 330-343, 2019
952019
Anonymous and authenticated key exchange for roaming networks
G Yang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 6 (9), 3461-3472, 2007
932007
Attribute-based cloud data integrity auditing for secure outsourced storage
Y Yu, Y Li, B Yang, W Susilo, G Yang, J Bai
IEEE Transactions on Emerging Topics in Computing 8 (2), 377-390, 2017
862017
Building redactable consortium blockchain for industrial Internet-of-Things
K Huang, X Zhang, Y Mu, X Wang, G Yang, X Du, F Rezaeibagha, Q Xia, ...
IEEE Transactions on Industrial Informatics 15 (6), 3670-3679, 2019
822019
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
F Wen, W Susilo, G Yang
Wireless personal communications 73, 993-1004, 2013
822013
Strongly secure certificateless key exchange without pairing
G Yang, CH Tan
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
822011
Exploiting the error correction mechanism in QR codes for secret sharing
YW Chow, W Susilo, G Yang, JG Phillips, I Pranata, AM Barmawi
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
802016
The system can't perform the operation now. Try again later.
Articles 1–20