The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Guomin Yang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Guomin Yang, Duncan S. Wong, Xiaotie Deng
    Deposit-Case Attack Against Secure Roaming. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:417-428 [Conf]
  2. Guomin Yang, Duncan S. Wong, Xiaotie Deng
    Efficient Anonymous Roaming and Its Security Analysis. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:334-349 [Conf]
  3. Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng
    Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:82-91 [Conf]
  4. Guomin Yang, Duncan S. Wong, Xiaotie Deng
    Analysis and Improvement of a Signcryption Scheme with Key Privacy. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:218-232 [Conf]
  5. Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang
    Anonymous Signature Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:347-363 [Conf]
  6. Robert W. Zhu, Guomin Yang, Duncan S. Wong
    An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices. [Citation Graph (0, 0)][DBLP]
    WINE, 2005, pp:500-509 [Conf]
  7. Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang
    A More Natural Way to Construct Identity-Based Identification Schemes. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:307-322 [Conf]
  8. Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow
    An Efficient Signcryption Scheme with Key Privacy. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:78-93 [Conf]
  9. Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng
    Time Capsule Signature: Efficient and Provably Secure Constructions. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:126-142 [Conf]
  10. Robert W. Zhu, Guomin Yang, Duncan S. Wong
    An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2007, v:378, n:2, pp:198-207 [Journal]

  11. Traceable and Retrievable Identity-Based Encryption. [Citation Graph (, )][DBLP]


  12. Ambiguous Optimistic Fair Exchange. [Citation Graph (, )][DBLP]


  13. Efficient Non-interactive Range Proof. [Citation Graph (, )][DBLP]


  14. Probabilistic Public Key Encryption with Equality Test. [Citation Graph (, )][DBLP]


  15. Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. [Citation Graph (, )][DBLP]


Search in 0.017secs, Finished in 0.019secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002