Guilin Wang
Orcid: 0000-0002-3353-4290Affiliations:
- University of Birmingham, UK
According to our database1,
Guilin Wang
authored at least 112 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+.
J. Ambient Intell. Humaniz. Comput., February, 2024
Improving the model robustness of flood hazard mapping based on hyperparameter optimization of random forest.
Expert Syst. Appl., 2024
2021
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021
Spatio-Temporal Variability of PM2.5 Concentrations and Their Relationship with Impervious Surface Expansion in the Beijing- Tianjin-Hebei Region, China.
Proceedings of the 28th International Conference on Geoinformatics, 2021
2020
Concurr. Comput. Pract. Exp., 2020
2019
IEEE/ACM Trans. Netw., 2019
Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash.
Frontiers Inf. Technol. Electron. Eng., 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
Frontiers Comput. Sci., 2018
Proceedings of the Communications, Signal Processing, and Systems, 2018
Proceedings of the Cyber-Physical Systems Security., 2018
2017
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
IEEE Trans. Inf. Forensics Secur., 2017
Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security.
Informatica, 2017
Future Gener. Comput. Syst., 2017
Proceedings of the Communications, Signal Processing, and Systems, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Theor. Comput. Sci., 2016
PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid.
Comput. Secur., 2016
2015
Int. J. Inf. Commun. Technol., 2015
Multiple Attribute Authorities Attribute-Based Designated Confirmer Signature Scheme with Unified Verification.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited.
Comput. J., 2015
Analysis of spatial characteristics of soil erosion in ErHai Lake Basin based on GIS and RUSLE.
Proceedings of the 23rd International Conference on Geoinformatics, 2015
Proceedings of the 23rd International Conference on Geoinformatics, 2015
Proceedings of the 23rd International Conference on Geoinformatics, 2015
2014
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation.
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Ind. Electron., 2014
Secur. Commun. Networks, 2014
Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks.
Int. J. Inf. Sec., 2014
Efficient identity-based threshold signature scheme from bilinear pairings in standard model.
Int. J. Internet Protoc. Technol., 2014
Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme.
Concurr. Comput. Pract. Exp., 2014
Proceedings of the 22nd International Conference on Geoinformatics, 2014
MAS / LUCC model simulate Land Use change in Erhai Lake Basin based on ant colony algorithm.
Proceedings of the 22nd International Conference on Geoinformatics, 2014
2013
IEEE Trans. Ind. Informatics, 2013
Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification.
Inf. Technol. Control., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Nash bargaining between friends for cooperative data distribution in a social peer-to-peer swarming system.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
2012
J. Commun., 2012
IET Inf. Secur., 2012
An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures: Implementation and Evaluation.
IEICE Trans. Inf. Syst., 2012
Efficient identity-based threshold signature scheme from bilinear pairings in the standard model.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Improvement of Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the Internet and Distributed Computing Systems, 2012
2011
IEEE Trans. Dependable Secur. Comput., 2011
IACR Cryptol. ePrint Arch., 2011
Comput. J., 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
IEEE Trans. Inf. Forensics Secur., 2010
Special issue of computers and mathematics with applications on "Advances in cryptography, security and applications for future computer science".
Comput. Math. Appl., 2010
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Informatica, 2009
2008
Secur. Commun. Networks, 2008
J. Softw., 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the New Approaches for Security, 2007
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Public Key Infrastructure, 2007
Further Discussions on the Security of a Nominative Signature Scheme.
Proceedings of the 2007 International Conference on Security & Management, 2007
2006
J. Comput. Secur., 2006
IACR Cryptol. ePrint Arch., 2006
Comput. Commun., 2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
2005
Comput. Networks, 2005
Designated-Verifier Proxy Signature Schemes.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the IEEE 16th International Symposium on Personal, 2005
Proceedings of the Applied Public Key Infrastructure, 2005
Providing efficient certification services against active attacks in ad hoc networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Computational Science and Its Applications, 2005
Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
2004
Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem".
IEEE Trans. Knowl. Data Eng., 2004
Inf. Process. Lett., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers.
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Applied Cryptography and Network Security, 2003
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Information Security and Cryptology, 2002
2001
Proceedings of the Information and Communications Security, Third International Conference, 2001