Yimin Guo

Orcid: 0000-0001-6728-5694

Affiliations:
  • Zhongnan University of Economics and Law, School of Information and Safety Engineering, Wuhan, China
  • Chinese Academy of Sciences, Trusted Computing and Information Assurance Laboratory, Institute of Software, Beijing, China


According to our database1, Yimin Guo authored at least 22 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Design of anonymous authentication scheme for vehicle fog services using blockchain.
Wirel. Networks, January, 2024

BSRA: Blockchain-Based Secure Remote Authentication Scheme for Fog-Enabled Internet of Things.
IEEE Internet Things J., January, 2024

2023
A puf-based three-party authentication key establishment scheme for fog-enabled smart home.
Pervasive Mob. Comput., October, 2023

A decentralized lightweight blockchain-based authentication mechanism for Internet of Vehicles.
Peer Peer Netw. Appl., May, 2023

Fog-enabled private blockchain-based identity authentication scheme for smart home.
Comput. Commun., May, 2023

CS-LAKA: A Lightweight Authenticated Key Agreement Protocol With Critical Security Properties for IoT Environments.
IEEE Trans. Serv. Comput., 2023

2022
A PUF-based anonymous authentication protocol for wireless medical sensor networks.
Wirel. Networks, 2022

Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing.
IEEE Trans. Mob. Comput., 2022

SecFHome: Secure remote authentication in fog-enabled smart home environment.
Comput. Networks, 2022

2021
Fog-Centric Authenticated Key Agreement Scheme Without Trusted Parties.
IEEE Syst. J., 2021

Superword: A honeyword system for achieving higher security goals.
Comput. Secur., 2021

FogHA: An efficient handover authentication for mobile devices in fog computing.
Comput. Secur., 2021

2020
A Global Optimal Model for Protecting Privacy.
Wirel. Pers. Commun., 2020

Corrigendum to "Optiwords: A new password policy for creating memorable and strong password" [Computers & Security, Volume 85, 2019, Pages 423-435].
Comput. Secur., 2020

Corrigendum to "LPSE: Lightweight password-strength estimation for password meters" [Computers & Security, Volume 73, 2018, Pages 507-518].
Comput. Secur., 2020

Nudging personalized password policies by understanding users' personality.
Comput. Secur., 2020

2019
<i>Optiwords</i>: A new password policy for creating memorable and strong passwords.
Comput. Secur., 2019

2018
LPSE: Lightweight password-strength estimation for password meters.
Comput. Secur., 2018

2016
Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems.
IET Inf. Secur., 2016

2014
A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing.
Proceedings of the Network and System Security - 8th International Conference, 2014

2011
The Intrinsic Relationship between Security Mechanisms and Trust Mechanisms.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

Reusable Pseudonym Privacy Protection in Pervasive Computing.
Proceedings of the Advances in Computer Science, 2011


  Loading...