


Остановите войну!
for scientists:


default search action
Guomin Yang
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [i25]Xiaoguo Li, Bowen Zhao, Guomin Yang, Tao Xiang, Jian Weng, Robert H. Deng:
A Survey of Secure Computation Using Trusted Execution Environments. CoRR abs/2302.12150 (2023) - 2022
- [j101]Yulin Wu
, Xuan Wang
, Willy Susilo
, Guomin Yang
, Zoe Lin Jiang, Siu-Ming Yiu, Hao Wang:
Generic server-aided secure multi-party computation in cloud computing. Comput. Stand. Interfaces 79: 103552 (2022) - [j100]Yulin Wu, Xuan Wang
, Willy Susilo
, Guomin Yang
, Zoe Lin Jiang, Junyi Li
, Xueqiao Liu
:
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security. Comput. Stand. Interfaces 80: 103570 (2022) - [j99]Yulin Wu, Xuan Wang
, Willy Susilo
, Guomin Yang
, Zoe Lin Jiang, Hao Wang, Tong Wu
:
Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks. Comput. Stand. Interfaces 80: 103571 (2022) - [j98]Jianchang Lai, Fuchun Guo, Willy Susilo
, Peng Jiang, Guomin Yang
, Xinyi Huang:
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts. Inf. Sci. 613: 966-981 (2022) - [j97]Yannan Li
, Willy Susilo
, Guomin Yang
, Yong Yu
, Dongxi Liu, Xiaojiang Du
, Mohsen Guizani
:
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT. IEEE Trans. Dependable Secur. Comput. 19(1): 119-130 (2022) - [j96]Lei Zhou, Anmin Fu
, Guomin Yang
, Huaqun Wang
, Yuqing Zhang
:
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics. IEEE Trans. Dependable Secur. Comput. 19(2): 1118-1132 (2022) - [j95]Willy Susilo
, Peng Jiang
, Jianchang Lai
, Fuchun Guo
, Guomin Yang
, Robert H. Deng
:
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers. IEEE Trans. Dependable Secur. Comput. 19(3): 2138-2148 (2022) - [j94]Zhen Liu
, Guomin Yang
, Duncan S. Wong, Khoa Nguyen
, Huaxiong Wang
, Xiaorong Ke, Yining Liu:
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key. IEEE Trans. Dependable Secur. Comput. 19(5): 2934-2951 (2022) - [j93]Xueqiao Liu
, Guomin Yang
, Willy Susilo
, Joseph Tonien
, Rongmao Chen
, Xixiang Lv
:
Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage. IEEE Trans. Serv. Comput. 15(3): 1664-1677 (2022) - [c75]Khoa Nguyen
, Fuchun Guo
, Willy Susilo
, Guomin Yang
:
Multimodal Private Signatures. CRYPTO (2) 2022: 792-822 - [c74]Xin Yin
, Zhen Liu
, Guomin Yang
, Guoxing Chen
, Haojin Zhu
:
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. ESORICS (1) 2022: 89-109 - [e2]Khoa Nguyen
, Guomin Yang
, Fuchun Guo
, Willy Susilo
:
Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings. Lecture Notes in Computer Science 13494, Springer 2022, ISBN 978-3-031-22300-6 [contents] - [i24]Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu:
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. IACR Cryptol. ePrint Arch. 2022: 627 (2022) - [i23]Khoa Nguyen, Fuchun Guo, Willy Susilo, Guomin Yang:
Multimodal Private Signatures. IACR Cryptol. ePrint Arch. 2022: 1008 (2022) - 2021
- [j92]Qingwen Guo, Qiong Huang, Sha Ma, Meiyan Xiao, Guomin Yang
, Willy Susilo
:
Functional signatures: new definition and constructions. Sci. China Inf. Sci. 64(12) (2021) - [j91]Yangguang Tian, Yingjiu Li, Yi Mu, Guomin Yang
:
Unlinkable and Revocable Secret Handshake. Comput. J. 64(8): 1303-1314 (2021) - [j90]Willy Susilo
, Joseph Tonien
, Guomin Yang
:
Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA. Comput. Stand. Interfaces 74: 103470 (2021) - [j89]Tong Wu
, Guomin Yang
, Liehuang Zhu, Yulin Wu:
Privacy-preserving voluntary-tallying leader election for internet of things. Inf. Sci. 574: 461-472 (2021) - [j88]Yangguang Tian, Yingjiu Li, Robert H. Deng
, Binanda Sengupta
, Guomin Yang
:
Lattice-based remote user authentication from reusable fuzzy signature. J. Comput. Secur. 29(3): 273-298 (2021) - [j87]Tong Wu
, Guomin Yang
, Yi Mu
, Fuchun Guo
, Robert H. Deng
:
Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model. IEEE Trans. Dependable Secur. Comput. 18(2): 563-575 (2021) - [j86]Yannan Li
, Guomin Yang
, Willy Susilo
, Yong Yu
, Man Ho Au
, Dongxi Liu:
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. IEEE Trans. Dependable Secur. Comput. 18(2): 679-691 (2021) - [j85]Yulin Wu
, Xuan Wang
, Willy Susilo
, Guomin Yang
, Zoe Lin Jiang
, Qian Chen
, Peng Xu
:
Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing. IEEE Trans. Dependable Secur. Comput. 18(6): 2820-2834 (2021) - [j84]Jiannan Wei
, Tran Viet Xuan Phuong, Guomin Yang
:
An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things. IEEE Trans. Ind. Informatics 17(1): 617-626 (2021) - [j83]Xueqiao Liu
, Guomin Yang
, Willy Susilo
, Joseph Tonien
, Ximeng Liu
, Jian Shen
:
Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems. IEEE Trans. Parallel Distributed Syst. 32(3): 561-574 (2021) - [c73]Xueqiao Liu
, Kai He
, Guomin Yang
, Willy Susilo
, Joseph Tonien
, Qiong Huang
:
Broadcast Authenticated Encryption with Keyword Search. ACISP 2021: 193-213 - [c72]Yannan Li
, Willy Susilo
, Guomin Yang
, Tran Viet Xuan Phuong
, Yong Yu
, Dongxi Liu:
Concise Mercurial Subvector Commitments: Definitions and Constructions. ACISP 2021: 353-371 - [c71]Yannan Li
, Willy Susilo
, Guomin Yang
, Yong Yu, Tran Viet Xuan Phuong, Dongxi Liu:
Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual. AsiaCCS 2021: 859-871 - [c70]Yi Wang, Rongmao Chen, Guomin Yang
, Xinyi Huang, Baosheng Wang, Moti Yung:
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved. CRYPTO (4) 2021: 270-300 - [c69]Tran Viet Xuan Phuong, Willy Susilo
, Guomin Yang
, Jongkil Kim, Yang-Wai Chow
, Dongxi Liu:
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments. ESORICS (2) 2021: 106-126 - [c68]Yuanhao Wang, Qiong Huang, Hongbo Li, Meiyan Xiao, Jianye Huang, Guomin Yang
:
Public Key Encryption with Fuzzy Matching. ProvSec 2021: 39-62 - [i22]Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung:
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved. IACR Cryptol. ePrint Arch. 2021: 862 (2021) - 2020
- [j82]Yuanhao Wang, Yuzhao Cui, Qiong Huang
, Hongbo Li, Jianye Huang, Guomin Yang
:
Attribute-Based Equality Test Over Encrypted Data Without Random Oracles. IEEE Access 8: 32891-32903 (2020) - [j81]Zhichao Yang, Rongmao Chen, Chao Li, Longjiang Qu, Guomin Yang
:
On the Security of LWE Cryptosystem against Subversion Attacks. Comput. J. 63(4): 495-507 (2020) - [j80]Yangguang Tian, Yingjiu Li, Robert H. Deng
, Nan Li
, Guomin Yang
, Zheng Yang:
A New Construction for Linkable Secret Handshake. Comput. J. 63(4): 536-548 (2020) - [j79]Zhichao Yang, Dung Hoang Duong, Willy Susilo
, Guomin Yang
, Chao Li, Rongmao Chen:
Hierarchical Identity-Based Signature in Polynomial Rings. Comput. J. 63(10): 1490-1499 (2020) - [j78]Tong Wu
, Guomin Yang
, Yi Mu
, Rongmao Chen, Shengmin Xu:
Privacy-enhanced remote data integrity checking with updatable timestamp. Inf. Sci. 527: 210-226 (2020) - [j77]Willy Susilo
, Joseph Tonien
, Guomin Yang
:
A generalised bound for the Wiener attack on RSA. J. Inf. Secur. Appl. 53: 102531 (2020) - [j76]Ke Huang
, Xiaosong Zhang, Xiaofen Wang, Yi Mu, Fatemeh Rezaeibagha
, Guangquan Xu, Hao Wang
, Xi Zheng
, Guomin Yang
, Qi Xia, Xiaojiang Du:
HUCDO: A Hybrid User-centric Data Outsourcing Scheme. ACM Trans. Cyber Phys. Syst. 4(3): 35:1-35:23 (2020) - [j75]Hui Ma
, Rui Zhang
, Guomin Yang
, Zishuai Song, Kai He, Yuting Xiao
:
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices. IEEE Trans. Dependable Secur. Comput. 17(5): 1026-1038 (2020) - [j74]Xueqiao Liu
, Guomin Yang
, Yi Mu
, Robert H. Deng
:
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 17(6): 1322-1332 (2020) - [j73]Yunhui Zhuang, Anjia Yang
, Gerhard P. Hancke
, Duncan S. Wong, Guomin Yang
:
Energy-Efficient Distance-Bounding with Residual Charge Computation. IEEE Trans. Emerg. Top. Comput. 8(2): 365-376 (2020) - [j72]Yong Yu
, Yannan Li
, Bo Yang, Willy Susilo
, Guomin Yang
, Jian Bai
:
Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage. IEEE Trans. Emerg. Top. Comput. 8(2): 377-390 (2020) - [c67]Wenling Liu, Zhen Liu, Khoa Nguyen
, Guomin Yang
, Yu Yu:
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. ESORICS (2) 2020: 357-377
2010 – 2019
- 2019
- [j71]Yuanhao Wang, Qiong Huang
, Hongbo Li, Jianye Huang, Guomin Yang
, Willy Susilo
:
Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups. IEEE Access 7: 135999-136011 (2019) - [j70]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang
:
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification. Comput. J. 62(8): 1166-1177 (2019) - [j69]Guomin Yang
, Rongmao Chen, Yi Mu, Willy Susilo
, Fuchun Guo, Jie Li:
Strongly leakage resilient authenticated key exchange, revisited. Des. Codes Cryptogr. 87(12): 2885-2911 (2019) - [j68]Shengmin Xu
, Guomin Yang
, Yi Mu, Ximeng Liu:
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Future Gener. Comput. Syst. 97: 284-294 (2019) - [j67]Yong Yu, Guomin Yang
, Huaxiong Wang:
Preface: Special Issue Cryptography and Provable Security. Int. J. Found. Comput. Sci. 30(4): 489-492 (2019) - [j66]Boyu Kuang
, Anmin Fu
, Shui Yu
, Guomin Yang
, Mang Su
, Yuqing Zhang
:
ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms. IEEE Internet Things J. 6(5): 8372-8383 (2019) - [j65]Peng Jiang, Jianchang Lai, Fuchun Guo
, Willy Susilo
, Man Ho Au, Guomin Yang
, Yi Mu, Rongmao Chen:
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters. Inf. Sci. 472: 35-52 (2019) - [j64]Shengmin Xu, Guomin Yang
, Yi Mu
:
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Inf. Sci. 479: 116-134 (2019) - [j63]Hongbo Li, Qiong Huang
, Jian Shen
, Guomin Yang
, Willy Susilo
:
Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Inf. Sci. 481: 330-343 (2019) - [j62]Yangguang Tian, Yingjiu Li, Guomin Yang
, Willy Susilo
, Yi Mu, Hui Cui
, Yinghui Zhang:
DABKE: Secure deniable attribute-based key exchange framework. J. Comput. Secur. 27(2): 259-275 (2019) - [j61]Yannan Li
, Willy Susilo
, Guomin Yang
, Yong Yu, Xiaojiang Du, Dongxi Liu, Nadra Guizani:
Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies. IEEE Netw. 33(5): 111-117 (2019) - [j60]Ke Huang
, Xiaosong Zhang
, Yi Mu
, Xiaofen Wang, Guomin Yang
, Xiaojiang Du
, Fatemeh Rezaeibagha
, Qi Xia, Mohsen Guizani
:
Building Redactable Consortium Blockchain for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 15(6): 3670-3679 (2019) - [c66]Tran Viet Xuan Phuong, Willy Susilo
, Guomin Yang
, Jun Yan
, Dongxi Liu:
Location Based Encryption. ACISP 2019: 21-38 - [c65]Willy Susilo
, Joseph Tonien
, Guomin Yang
:
The Wiener Attack on RSA Revisited: A Quest for the Exact Bound. ACISP 2019: 381-398 - [c64]Tran Viet Xuan Phuong, Willy Susilo
, Jongkil Kim
, Guomin Yang
, Dongxi Liu:
Puncturable Proxy Re-Encryption Supporting to Group Messaging Service. ESORICS (1) 2019: 215-233 - [c63]Zhen Liu, Khoa Nguyen
, Guomin Yang
, Huaxiong Wang, Duncan S. Wong:
A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses. ESORICS (1) 2019: 726-746 - [c62]Zhen Liu, Guomin Yang
, Duncan S. Wong, Khoa Nguyen
, Huaxiong Wang:
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. EuroS&P 2019: 215-230 - [c61]Xueqiao Liu, Hongbo Li, Guomin Yang
, Willy Susilo
, Joseph Tonien
, Qiong Huang:
Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search. ProvSec 2019: 113-129 - [c60]Duc-Phong Le, Guomin Yang
, Ali A. Ghorbani:
A New Multisignature Scheme with Public Key Aggregation for Blockchain. PST 2019: 1-7 - [c59]Shengmin Xu, Yinghui Zhang, Yingjiu Li, Ximeng Liu, Guomin Yang
:
Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy. SecureComm (2) 2019: 184-204 - [i21]Yannan Li, Willy Susilo
, Guomin Yang, Yong Yu, Dongxi Liu, Mohsen Guizani:
A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT. CoRR abs/1902.03710 (2019) - [i20]Yangguang Tian, Yingjiu Li, Robert H. Deng, Binanda Sengupta, Guomin Yang:
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature. IACR Cryptol. ePrint Arch. 2019: 743 (2019) - [i19]Duc-Phong Le, Guomin Yang, Ali A. Ghorbani:
DDH-based Multisignatures with Public Key Aggregation. IACR Cryptol. ePrint Arch. 2019: 771 (2019) - [i18]Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu:
Puncturable Proxy Re-Encryption supporting to Group Messaging Service. IACR Cryptol. ePrint Arch. 2019: 1078 (2019) - 2018
- [j59]Jiannan Wei
, Xiaojie Wang
, Nan Li
, Guomin Yang
, Yi Mu:
A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks. IEEE Access 6: 43776-43784 (2018) - [j58]Tran Viet Xuan Phuong, Guomin Yang
, Willy Susilo
:
Criteria-Based Encryption. Comput. J. 61(4): 512-525 (2018) - [j57]Qingwen Guo
, Qiong Huang, Guomin Yang
:
Authorized Function Homomorphic Signature. Comput. J. 61(12): 1897-1908 (2018) - [j56]Anmin Fu
, Yiming Zhu, Guomin Yang
, Shui Yu
, Yan Yu:
Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server. Clust. Comput. 21(4): 1933-1947 (2018) - [j55]Anjia Yang
, Yunhui Zhuang
, Jian Weng
, Gerhard P. Hancke
, Duncan S. Wong, Guomin Yang
:
Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models. Future Gener. Comput. Syst. 82: 315-326 (2018) - [j54]Willy Susilo
, Guomin Yang
, Fuchun Guo, Qiong Huang:
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. Inf. Sci. 429: 349-360 (2018) - [j53]Shengmin Xu, Guomin Yang
, Yi Mu:
A New Revocable and Re-Delegable Proxy Signature and Its Application. J. Comput. Sci. Technol. 33(2): 380-399 (2018) - [j52]Yang-Wai Chow
, Willy Susilo
, Joseph Tonien
, Elena Vlahu-Gjorgievska
, Guomin Yang
:
Cooperative Secret Sharing Using QR Codes and Symmetric Keys. Symmetry 10(4): 95 (2018) - [j51]Shengmin Xu
, Guomin Yang
, Yi Mu
, Robert H. Deng
:
Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud. IEEE Trans. Inf. Forensics Secur. 13(8): 2101-2113 (2018) - [j50]Weiwei Liu
, Yi Mu, Guomin Yang
, Yangguang Tian:
Strong Identity-Based Proxy Signature Schemes, Revisited. Wirel. Commun. Mob. Comput. 2018: 6925019:1-6925019:11 (2018) - [c58]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang
:
Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test. Inscrypt 2018: 448-467 - [c57]Hui Ma, Rui Zhang, Guomin Yang
, Zishuai Song, Shuzhou Sun, Yuting Xiao:
Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines. ESORICS (2) 2018: 507-526 - [c56]Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li
, Guomin Yang
, Yong Yu:
DSH: Deniable Secret Handshake Framework. ISPEC 2018: 341-353 - [c55]Weiwei Liu, Yinghui Zhang, Yi Mu, Guomin Yang
, Yangguang Tian:
Efficient Traceable Oblivious Transfer and Its Applications. ISPEC 2018: 610-621 - [c54]Shengmin Xu, Guomin Yang
, Yi Mu, Ximeng Liu:
Efficient Attribute-Based Encryption with Blackbox Traceability. ProvSec 2018: 182-200 - [e1]Willy Susilo, Guomin Yang:
Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings. Lecture Notes in Computer Science 10946, Springer 2018, ISBN 978-3-319-93637-6 [contents] - [i17]Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang:
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. IACR Cryptol. ePrint Arch. 2018: 956 (2018) - [i16]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang:
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification. IACR Cryptol. ePrint Arch. 2018: 1058 (2018) - 2017
- [j49]Rongmao Chen, Yi Mu, Guomin Yang
, Willy Susilo
, Fuchun Guo:
Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1): 145-173 (2017) - [j48]Rongmao Chen, Yi Mu, Guomin Yang
, Willy Susilo
, Fuchun Guo, Zheng Yang
:
A note on the strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1): 175-178 (2017) - [j47]Yiteng Feng, Guomin Yang, Joseph K. Liu:
A new public remote integrity checking scheme with user and data privacy. Int. J. Appl. Cryptogr. 3(3): 196-209 (2017) - [j46]Jiannan Wei, Guomin Yang
, Yi Mu:
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange. Int. J. Comput. Math. 94(5): 946-961 (2017) - [j45]Yangguang Tian, Guomin Yang
, Yi Mu, Shiwei Zhang, Kaitai Liang
, Yong Yu:
One-Round Attribute-Based Key Exchange in the Multi-Party Setting. Int. J. Found. Comput. Sci. 28(6): 725-742 (2017) - [j44]Tran Viet Xuan Phuong, Guomin Yang
, Willy Susilo
, Fuchun Guo, Qiong Huang:
Sequence aware functional encryption and its application in searchable encryption. J. Inf. Secur. Appl. 35: 106-118 (2017) - [j43]Jorge Munilla
, Mike Burmester
, Alberto Peinado, Guomin Yang
, Willy Susilo
:
RFID Ownership Transfer with Positive Secrecy Capacity Channels. Sensors 17(1): 53 (2017) - [j42]Weiwei Liu, Yi Mu, Guomin Yang
, Yong Yu:
Efficient E-coupon systems with strong user privacy. Telecommun. Syst. 64(4): 695-708 (2017) - [j41]Willy Susilo
, Peng Jiang, Fuchun Guo, Guomin Yang
, Yong Yu, Yi Mu:
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. IEEE Trans. Inf. Forensics Secur. 12(12): 3110-3122 (2017) - [j40]Yangguang Tian, Guomin Yang
, Yi Mu:
Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting. Wirel. Pers. Commun. 94(3): 1017-1034 (2017) - [j39]Jiannan Wei, Guomin Yang
, Yi Mu:
Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications. Wirel. Pers. Commun. 97(2): 3017-3030 (2017) - [c53]Shiwei Zhang, Yi Mu, Guomin Yang
, Xiaofen Wang:
Hierarchical Functional Encryption for Linear Transformations. ACISP (1) 2017: 23-43 - [c52]Shengmin Xu, Guomin Yang
, Yi Mu, Willy Susilo
:
Mergeable and Revocable Identity-Based Encryption. ACISP (1) 2017: 147-167 - [c51]Yangguang Tian, Shiwei Zhang, Guomin Yang
, Yi Mu, Yong Yu:
Privacy-Preserving k-time Authenticated Secret Handshakes. ACISP (2) 2017: 281-300 - [c50]Yang-Wai Chow
, Willy Susilo
, Guomin Yang
:
Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts. CDVE 2017: 65-72 - [c49]Fuchun Guo, Rongmao Chen, Willy Susilo
, Jianchang Lai, Guomin Yang
, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample. CRYPTO (2) 2017: 517-547 - [c48]Zhongyuan Yao, Yi Mu, Guomin Yang
:
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking. ISPEC 2017: 186-203 - [c47]Shengke Zeng, Yi Mu, Guomin Yang
, Mingxing He:
Deniable Ring Authentication Based on Projective Hash Functions. ProvSec 2017: 127-143 - [i15]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strong Authenticated Key Exchange with Auxiliary Inputs. IACR Cryptol. ePrint Arch. 2017: 418 (2017) - [i14]Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample. IACR Cryptol. ePrint Arch. 2017: 499 (2017) - 2016
- [j38]Jiannan Wei, Guomin Yang
, Yi Mu, Kaitai Liang
:
Anonymous Proxy Signature with Hierarchical Traceability. Comput. J. 59(4): 559-569 (2016) - [j37]Guomin Yang
, Willy Susilo
, Yi Mu:
Message from the Guest Editors. Int. J. Inf. Sec. 15(2): 223-224 (2016) - [j36]