Guilin Wang

According to our database1, Guilin Wang authored at least 107 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks.
IEEE/ACM Trans. Netw., 2019

Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash.
Frontiers of IT & EE, 2019

2018
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud.
IEEE Trans. Dependable Sec. Comput., 2018

Efficient identity-based threshold decryption scheme from bilinear pairings.
Frontiers Comput. Sci., 2018

Public Key-Based Lightweight Swarm Authentication.
Proceedings of the Cyber-Physical Systems Security., 2018

2017
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
IEEE Trans. Information Forensics and Security, 2017

Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security.
Informatica, Lith. Acad. Sci., 2017

Evolving privacy: From sensors to the Internet of Things.
Future Generation Comp. Syst., 2017

VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
A reduction of security notions in designated confirmer signatures.
Theor. Comput. Sci., 2016

Special issue on provable security.
Security and Communication Networks, 2016

Escrow free attribute-based signature with self-revealability.
Inf. Sci., 2016

Public-Key Based Lightweight Swarm Authentication.
IACR Cryptology ePrint Archive, 2016

PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid.
Computers & Security, 2016

2015
Attribute-based signature schemes with accountability.
IJICT, 2015

Multiple Attribute Authorities Attribute-Based Designated Confirmer Signature Scheme with Unified Verification.
IEICE Transactions, 2015

Cloud Computing: Security, Privacy and Practice.
Future Generation Comp. Syst., 2015

Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited.
Comput. J., 2015

Analysis of spatial characteristics of soil erosion in ErHai Lake Basin based on GIS and RUSLE.
Proceedings of the 23rd International Conference on Geoinformatics, 2015

Mining the drive mechanism for Impervious Surface expansion with index of entropy.
Proceedings of the 23rd International Conference on Geoinformatics, 2015

The impact of the map projection on China's geopolitical environment.
Proceedings of the 23rd International Conference on Geoinformatics, 2015

2014
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation.
IEEE Trans. Information Forensics and Security, 2014

Collusion-Resistance in Optimistic Fair Exchange.
IEEE Trans. Information Forensics and Security, 2014

SKM: Scalable Key Management for Advanced Metering Infrastructure in Smart Grids.
IEEE Trans. Industrial Electronics, 2014

A practical anonymous authentication protocol for wireless roaming.
Security and Communication Networks, 2014

Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks.
Int. J. Inf. Sec., 2014

Efficient identity-based threshold signature scheme from bilinear pairings in standard model.
IJIPT, 2014

Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme.
Concurrency and Computation: Practice and Experience, 2014

Basin water environmental effects of urban landscape.
Proceedings of the 22nd International Conference on Geoinformatics, 2014

MAS / LUCC model simulate Land Use change in Erhai Lake Basin based on ant colony algorithm.
Proceedings of the 22nd International Conference on Geoinformatics, 2014

2013
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks.
IEEE Trans. Industrial Informatics, 2013

Controllable Ring Signatures and Its Application to E-Prosecution.
JCP, 2013

Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification.
ITC, 2013

Secure Single Sign-On Schemes Constructed from Nominative Signatures.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Anonymous Single Sign-On Schemes Transformed from Group Signatures.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Nash bargaining between friends for cooperative data distribution in a social peer-to-peer swarming system.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2013

Accountable Authority Attribute-Based Signature.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
Round-Optimal ID-Based Blind Signature Schemes without ROS Assumption.
JCM, 2012

Improved certificateless signature scheme provably secure in the standard model.
IET Information Security, 2012

An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures: Implementation and Evaluation.
IEICE Transactions, 2012

Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks.
IACR Cryptology ePrint Archive, 2012

Efficient identity-based threshold signature scheme from bilinear pairings in the standard model.
IACR Cryptology ePrint Archive, 2012

Efficient identity-based threshold decryption scheme from bilinear pairings.
IACR Cryptology ePrint Archive, 2012

Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited.
IACR Cryptology ePrint Archive, 2012

Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model.
IACR Cryptology ePrint Archive, 2012

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Improvement of Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Designated Condition One-Time Signatures.
Proceedings of the Internet and Distributed Computing Systems, 2012

2011
Analyzing a Family of Key Protection Schemes against Modification Attacks.
IEEE Trans. Dependable Sec. Comput., 2011

Threshold Anonymous Announcement in VANETs.
IEEE Journal on Selected Areas in Communications, 2011

Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature.
Comput. J., 2011

Optimistic Fair Exchange of Ring Signatures.
Proceedings of the Security and Privacy in Communication Networks, 2011

Secure and Practical Key Distribution for RFID-Enabled Supply Chains.
Proceedings of the Security and Privacy in Communication Networks, 2011

Designated Confirmer Signatures with Unified Verification.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

On the invisibility of designated confirmer signatures.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Special issue of computers and mathematics with applications on "Advances in cryptography, security and applications for future computer science".
Computers & Mathematics with Applications, 2010

An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Fair and Secure Mobile Billing Systems.
Wireless Personal Communications, 2009

One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings.
Informatica, Lith. Acad. Sci., 2009

2008
The security and improvement of an ultra-lightweight RFID authentication protocol.
Security and Communication Networks, 2008

Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.
JSW, 2008

One-Round ID-Based Blind Signature Scheme without ROS Assumption.
Proceedings of the Pairing-Based Cryptography, 2008

2007
Nominative Signature: Application, Security Model and Construction.
IACR Cryptology ePrint Archive, 2007

One-Round ID-Based Blind Signature Scheme without ROS Assumption.
IACR Cryptology ePrint Archive, 2007

Insider attacks on multi-proxy multi-signature schemes.
Computers & Electrical Engineering, 2007

Security Remarks on a Convertible Nominative Signature Scheme.
Proceedings of the New Approaches for Security, 2007

Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols.
Proceedings of the New Approaches for Security, 2007

On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.
Proceedings of the Public Key Cryptography, 2007

Formal Definition and Construction of Nominative Signature.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Undeniable Mobile Billing Schemes.
Proceedings of the Public Key Infrastructure, 2007

Further Discussions on the Security of a Nominative Signature Scheme.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Generic non-repudiation protocols supporting transparent off-line TTP.
Journal of Computer Security, 2006

Further Discussions on the Security of a Nominative Signature Scheme.
IACR Cryptology ePrint Archive, 2006

A secure extension of the Kwak-Moon group signcryption scheme.
Computers & Security, 2006

Some common attacks against certified email protocols and the countermeasures.
Computer Communications, 2006

Controllable Ring Signatures.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

The Fairness of Perfect Concurrent Signatures.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

2005
Efficient and robust key management for large mobile ad hoc networks.
Computer Networks, 2005

An abuse-free fair contract signing protocol based on the RSA signature.
Proceedings of the 14th international conference on World Wide Web, 2005

Designated-Verifier Proxy Signature Schemes.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

An efficient certified e-mail scheme suitable for wireless mobile environments.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

Generic Fair Non-Repudiation Protocols with Transparent Off-line TTP.
Proceedings of the Applied Public Key Infrastructure, 2005

Providing efficient certification services against active attacks in ad hoc networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Security Flaws in Several Group Signatures Proposed by Popescu.
Proceedings of the Computational Science and Its Applications, 2005

On the Security of a Certified E-Mail Scheme with Temporal Authentication.
Proceedings of the Computational Science and Its Applications, 2005

Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

2004
Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem".
IEEE Trans. Knowl. Data Eng., 2004

Universal forgery on a group signature scheme using self-certified public keys.
Inf. Process. Lett., 2004

Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
IACR Cryptology ePrint Archive, 2004

On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Security Analysis of Two Signcryption Schemes.
Proceedings of the Information Security, 7th International Conference, 2004

On the Security of a Certified E-Mail Scheme.
Proceedings of the Progress in Cryptology, 2004

Designated-verifier proxy signatures for e-commerce.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Analysis and Improvement of Micali's Fair Contract Signing Protocol.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers.
IACR Cryptology ePrint Archive, 2003

An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures.
IACR Cryptology ePrint Archive, 2003

Security Analysis of Several Group Signature Schemes.
Proceedings of the Progress in Cryptology, 2003

Security Analysis of Some Proxy Signatures.
Proceedings of the Information Security and Cryptology, 2003

On the Security of a Group Signature Scheme with Forward Security.
Proceedings of the Information Security and Cryptology, 2003

Security Remarks on a Group Signature Scheme with Member Deletion.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

On the Security of Two Threshold Signature Schemes with Traceable Signers.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes.
IACR Cryptology ePrint Archive, 2002

On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme.
Proceedings of the Information Security and Cryptology, 2002

2001
Threshold Undeniable RSA Signature Scheme.
Proceedings of the Information and Communications Security, Third International Conference, 2001


  Loading...