Guomin Yang
Orcid: 0000-0002-4949-7738
According to our database1,
Guomin Yang
authored at least 202 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
OpenSE: Efficient Verifiable Searchable Encryption With Access and Search Pattern Hidden for Cloud-IoT.
IEEE Internet Things J., April, 2024
Toward Fine-Grained Task Allocation With Bilateral Access Control for Intelligent Transportation Systems.
IEEE Internet Things J., April, 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network.
IEEE Trans. Inf. Forensics Secur., 2024
RAIRO Oper. Res., 2024
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Balancing Privacy and Flexibility of Cloud-Based Personal Health Records Sharing System.
IEEE Trans. Cloud Comput., 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
IEEE Trans. Serv. Comput., 2022
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics.
IEEE Trans. Dependable Secur. Comput., 2022
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers.
IEEE Trans. Dependable Secur. Comput., 2022
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts.
Inf. Sci., 2022
IACR Cryptol. ePrint Arch., 2022
Comput. Stand. Interfaces, 2022
Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks.
Comput. Stand. Interfaces, 2022
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security.
Comput. Stand. Interfaces, 2022
2021
IEEE Trans. Parallel Distributed Syst., 2021
An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Dependable Secur. Comput., 2021
Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
J. Comput. Secur., 2021
Inf. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA.
Comput. Stand. Interfaces, 2021
Proceedings of the Provable and Practical Security, 2021
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments.
Proceedings of the Computer Security - ESORICS 2021, 2021
Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
IEEE Trans. Emerg. Top. Comput., 2020
IEEE Trans. Emerg. Top. Comput., 2020
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
ACM Trans. Cyber Phys. Syst., 2020
Inf. Sci., 2020
IEEE Access, 2020
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
IEEE Trans. Ind. Informatics, 2019
J. Comput. Secur., 2019
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation.
Inf. Sci., 2019
Designated-server identity-based authenticated encryption with keyword search for encrypted emails.
Inf. Sci., 2019
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters.
Inf. Sci., 2019
IEEE Internet Things J., 2019
Int. J. Found. Comput. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance.
Future Gener. Comput. Syst., 2019
Des. Codes Cryptogr., 2019
Comput. J., 2019
Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups.
IEEE Access, 2019
Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy.
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search.
Proceedings of the Provable Security, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Wirel. Commun. Mob. Comput., 2018
IEEE Trans. Inf. Forensics Secur., 2018
J. Comput. Sci. Technol., 2018
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes.
Inf. Sci., 2018
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
IACR Cryptol. ePrint Arch., 2018
Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models.
Future Gener. Comput. Syst., 2018
Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server.
Clust. Comput., 2018
IEEE Access, 2018
Proceedings of the Provable Security, 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information Security Practice and Experience, 2018
Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines.
Proceedings of the Computer Security, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications.
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2017
J. Inf. Secur. Appl., 2017
Int. J. Found. Comput. Sci., 2017
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange.
Int. J. Comput. Math., 2017
Int. J. Appl. Cryptogr., 2017
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
IACR Cryptol. ePrint Arch., 2017
Des. Codes Cryptogr., 2017
Proceedings of the Provable Security, 2017
Proceedings of the Information Security Practice and Experience, 2017
Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Comments on "Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks".
IEEE Trans. Wirel. Commun., 2016
IEEE Trans. Parallel Distributed Syst., 2016
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Secur. Commun. Networks, 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Proceedings of the Provable Security, 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards.
Wirel. Pers. Commun., 2015
IEEE Trans. Inf. Forensics Secur., 2015
Theor. Comput. Sci., 2015
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Gener. Comput. Syst., 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
ACM Trans. Inf. Syst. Secur., 2014
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2014
Theor. Comput. Sci., 2014
A robust smart card-based anonymous user authentication protocol for wireless communications.
Secur. Commun. Networks, 2014
IACR Cryptol. ePrint Arch., 2014
Future Gener. Comput. Syst., 2014
Concurr. Comput. Pract. Exp., 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing.
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Information Security Practice and Experience, 2013
2012
Int. J. Inf. Sec., 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
2011
Comments on "An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks".
IEEE Trans. Wirel. Commun., 2011
Certificateless public key encryption: A new generic construction and two pairing-free schemes.
Theor. Comput. Sci., 2011
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability.
Int. J. Inf. Sec., 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
IEEE Trans. Wirel. Commun., 2010
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting".
IEEE Trans. Inf. Theory, 2010
An efficient signcryption scheme with key privacy and its extension to ring signcryption.
J. Comput. Secur., 2010
Proceedings of the Topics in Cryptology, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
2009
Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009
2008
A new framework for the design and analysis of identity-based identification schemes.
Theor. Comput. Sci., 2008
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension.
J. Univers. Comput. Sci., 2008
J. Comput. Syst. Sci., 2008
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
IEEE Trans. Wirel. Commun., 2007
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices.
Theor. Comput. Sci., 2007
IEICE Trans. Commun., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Public Key Infrastructure, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006
2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005