|
Search the dblp DataBase
Guomin Yang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Guomin Yang, Duncan S. Wong, Xiaotie Deng
Deposit-Case Attack Against Secure Roaming. [Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:417-428 [Conf]
- Guomin Yang, Duncan S. Wong, Xiaotie Deng
Efficient Anonymous Roaming and Its Security Analysis. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:334-349 [Conf]
- Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). [Citation Graph (0, 0)][DBLP] ICICS, 2006, pp:82-91 [Conf]
- Guomin Yang, Duncan S. Wong, Xiaotie Deng
Analysis and Improvement of a Signcryption Scheme with Key Privacy. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:218-232 [Conf]
- Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang
Anonymous Signature Schemes. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2006, pp:347-363 [Conf]
- Robert W. Zhu, Guomin Yang, Duncan S. Wong
An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices. [Citation Graph (0, 0)][DBLP] WINE, 2005, pp:500-509 [Conf]
- Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang
A More Natural Way to Construct Identity-Based Identification Schemes. [Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:307-322 [Conf]
- Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow
An Efficient Signcryption Scheme with Key Privacy. [Citation Graph (0, 0)][DBLP] EuroPKI, 2007, pp:78-93 [Conf]
- Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng
Time Capsule Signature: Efficient and Provably Secure Constructions. [Citation Graph (0, 0)][DBLP] EuroPKI, 2007, pp:126-142 [Conf]
- Robert W. Zhu, Guomin Yang, Duncan S. Wong
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2007, v:378, n:2, pp:198-207 [Journal]
Traceable and Retrievable Identity-Based Encryption. [Citation Graph (, )][DBLP]
Ambiguous Optimistic Fair Exchange. [Citation Graph (, )][DBLP]
Efficient Non-interactive Range Proof. [Citation Graph (, )][DBLP]
Probabilistic Public Key Encryption with Equality Test. [Citation Graph (, )][DBLP]
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. [Citation Graph (, )][DBLP]
Search in 0.017secs, Finished in 0.019secs
|