Follow
Guomin Yang
Guomin Yang
Associate Professor of Computer Science, Singapore Management University
Verified email at smu.edu.sg
Title
Cited by
Cited by
Year
Probabilistic public key encryption with equality test
G Yang, CH Tan, Q Huang, DS Wong
Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010
3332010
Malicious KGC attacks in certificateless cryptography
MH Au, J Chen, JK Liu, Y Mu, DS Wong, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2942007
Dual-server public-key encryption with keyword search for secure cloud storage
R Chen, Y Mu, G Yang, F Guo, X Wang
IEEE transactions on information forensics and security 11 (4), 789-798, 2015
2882015
Two-factor mutual authentication based on smart cards and passwords
G Yang, DS Wong, H Wang, X Deng
Journal of computer and system sciences 74 (7), 1160-1172, 2008
2522008
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1912015
Hidden ciphertext policy attribute-based encryption under standard assumptions
TVX Phuong, G Yang, W Susilo
IEEE transactions on information forensics and security 11 (1), 35-45, 2015
1882015
Universal authentication protocols for anonymous wireless communications
G Yang, Q Huang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 9 (1), 168-174, 2010
1762010
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1602014
BL-MLE: Block-level message-locked encryption for secure large file deduplication
R Chen, Y Mu, G Yang, F Guo
IEEE Transactions on Information Forensics and Security 10 (12), 2643-2652, 2015
1542015
Server-aided public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Huang, X Wang, Y Wang
IEEE Transactions on Information Forensics and Security 11 (12), 2833-2842, 2016
1532016
Traceable monero: Anonymous cryptocurrency with enhanced accountability
Y Li, G Yang, W Susilo, Y Yu, MH Au, D Liu
IEEE Transactions on Dependable and Secure Computing 18 (2), 679-691, 2019
1382019
Designated-server identity-based authenticated encryption with keyword search for encrypted emails
H Li, Q Huang, J Shen, G Yang, W Susilo
Information Sciences 481, 330-343, 2019
1282019
Secure fine-grained access control and data sharing for dynamic groups in the cloud
S Xu, G Yang, Y Mu, RH Deng
IEEE Transactions on Information Forensics and Security 13 (8), 2101-2113, 2018
1102018
Building redactable consortium blockchain for industrial Internet-of-Things
K Huang, X Zhang, Y Mu, X Wang, G Yang, X Du, F Rezaeibagha, Q Xia, ...
IEEE Transactions on Industrial Informatics 15 (6), 3670-3679, 2019
1092019
A new general framework for secure public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Wang
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
1092015
A blockchain-based self-tallying voting protocol in decentralized IoT
Y Li, W Susilo, G Yang, Y Yu, D Liu, X Du, M Guizani
IEEE Transactions on Dependable and Secure Computing 19 (1), 119-130, 2020
1012020
Attribute-based cloud data integrity auditing for secure outsourced storage
Y Yu, Y Li, B Yang, W Susilo, G Yang, J Bai
IEEE Transactions on Emerging Topics in Computing 8 (2), 377-390, 2017
952017
Anonymous and authenticated key exchange for roaming networks
G Yang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 6 (9), 3461-3472, 2007
942007
Exploiting the error correction mechanism in QR codes for secret sharing
YW Chow, W Susilo, G Yang, JG Phillips, I Pranata, AM Barmawi
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
922016
Heterogeneous signcryption with key privacy
Q Huang, DS Wong, G Yang
The Computer Journal 54 (4), 525-536, 2011
882011
The system can't perform the operation now. Try again later.
Articles 1–20