Guilin Wang
Guilin Wang
Huawei International Pte Ltd, Singapore
Потвърден имейл адрес: huawei.com - Начална страница
Security analysis of two ultra-lightweight RFID authentication protocols
T Li, G Wang
IFIP international information security conference, 109-120, 2007
Designated verifier signature schemes: Attacks, new security notions and a new construction
H Lipmaa, G Wang, F Bao
Automata, Languages and Programming: 32nd International Colloquium, ICALP …, 2005
Evolving privacy: From sensors to the Internet of Things
J Lopez, R Rios, F Bao, G Wang
Future Generation Computer Systems 75, 46-57, 2017
Threshold anonymous announcement in VANETs
L Chen, SL Ng, G Wang
IEEE Journal on selected areas in communications 29 (3), 605-615, 2011
Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model
Q Xie, DS Wong, G Wang, X Tan, K Chen, L Fang
IEEE Transactions on Information Forensics and Security 12 (6), 1382-1392, 2017
Security analysis of some proxy signatures
G Wang, F Bao, J Zhou, RH Deng
Information Security and Cryptology-ICISC 2003: 6th International Conference …, 2004
SKM: Scalable key management for advanced metering infrastructure in smart grids
Z Wan, G Wang, Y Yang, S Shi
IEEE Transactions on Industrial Electronics 61 (12), 7055-7066, 2014
An efficient generic framework for three-factor authentication with provably secure instantiation
J Yu, G Wang, Y Mu, W Gao
IEEE transactions on information forensics and security 9 (12), 2302-2313, 2014
Efficient and expressive keyword search over encrypted data in cloud
H Cui, Z Wan, RH Deng, G Wang, Y Li
IEEE Transactions on Dependable and Secure Computing 15 (3), 409-422, 2016
Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks
G Wang, J Yu, Q Xie
Industrial Informatics, IEEE Transactions on 9 (1), 294-302, 2013
An authentication framework for wireless sensor networks using identity-based signatures
R Yasmin, E Ritter, G Wang
2010 10th IEEE International Conference on Computer and Information …, 2010
Designated-verifier proxy signature schemes
G Wang
Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20 th …, 2005
Analysis and improvement of Micali’s fair contract signing protocol
F Bao, G Wang, J Zhou, H Zhu
Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004
Enhancing pharmacokinetics, tumor accumulation, and antitumor efficacy by elastin‐like polypeptide fusion of interferon alpha
J Hu, G Wang, X Liu, W Gao
Advanced Materials 45 (27), 7320-7324, 2015
Efficient and robust key management for large mobile ad hoc networks
B Zhu, F Bao, RH Deng, MS Kankanhalli, G Wang
Computer networks 48 (4), 657-682, 2005
The fairness of perfect concurrent signatures
G Wang, F Bao, J Zhou
Information and Communications Security: 8th International Conference, ICICS …, 2006
Improved certificateless signature scheme provably secure in the standard model
Y Yu, Y Mu, G Wang, Q Xia, B Yang
IET Information Security 6 (2), 102-110, 2012
Designated-verifier proxy signatures for e-commerce
G Wang
2004 IEEE International Conference on Multimedia and Expo (ICME)(IEEE Cat …, 2004
An abuse-free fair contract-signing protocol based on the RSA signature
G Wang
IEEE Transactions on Information Forensics and Security 5 (1), 158-168, 2009
Comments on ''A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem''
G Wang, F Bao, J Zhou, RH Deng
Knowledge and Data Engineering, IEEE Transactions on 16 (10), 1309-1311, 2004
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20