Yimin Guo
Orcid: 0000-0001-6728-5694Affiliations:
- Zhongnan University of Economics and Law, School of Information and Safety Engineering, Wuhan, China
- Chinese Academy of Sciences, Trusted Computing and Information Assurance Laboratory, Institute of Software, Beijing, China
According to our database1,
Yimin Guo
authored at least 25 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Wirel. Networks, January, 2024
BSRA: Blockchain-Based Secure Remote Authentication Scheme for Fog-Enabled Internet of Things.
IEEE Internet Things J., January, 2024
Deeper Insight Into Why Authentication Schemes in IoT Environments Fail to Achieve the Desired Security.
IEEE Trans. Inf. Forensics Secur., 2024
A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things.
Pervasive Mob. Comput., 2024
Comput. Networks, 2024
2023
A puf-based three-party authentication key establishment scheme for fog-enabled smart home.
Pervasive Mob. Comput., October, 2023
A decentralized lightweight blockchain-based authentication mechanism for Internet of Vehicles.
Peer Peer Netw. Appl., May, 2023
Comput. Commun., May, 2023
CS-LAKA: A Lightweight Authenticated Key Agreement Protocol With Critical Security Properties for IoT Environments.
IEEE Trans. Serv. Comput., 2023
2022
Wirel. Networks, 2022
Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing.
IEEE Trans. Mob. Comput., 2022
Comput. Networks, 2022
2021
IEEE Syst. J., 2021
Comput. Secur., 2021
Comput. Secur., 2021
2020
Corrigendum to "Optiwords: A new password policy for creating memorable and strong password" [Computers & Security, Volume 85, 2019, Pages 423-435].
Comput. Secur., 2020
Corrigendum to "LPSE: Lightweight password-strength estimation for password meters" [Computers & Security, Volume 73, 2018, Pages 507-518].
Comput. Secur., 2020
Comput. Secur., 2020
2019
Comput. Secur., 2019
2018
Comput. Secur., 2018
2016
Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems.
IET Inf. Secur., 2016
2014
A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing.
Proceedings of the Network and System Security - 8th International Conference, 2014
2011
Proceedings of the Applied Informatics and Communication - International Conference, 2011
Proceedings of the Advances in Computer Science, 2011