Guilin Wang
Guilin Wang
Huawei International Pte Ltd, Singapore
Verified email at - Homepage
Cited by
Cited by
Security analysis of two ultra-lightweight RFID authentication protocols
T Li, G Wang
IFIP international information security conference, 109-120, 2007
Designated verifier signature schemes: Attacks, new security notions and a new construction
H Lipmaa, G Wang, F Bao
International Colloquium on Automata, Languages, and Programming, 459-471, 2005
Evolving privacy: From sensors to the Internet of Things
J Lopez, R Rios, F Bao, G Wang
Future Generation Computer Systems 75, 46-57, 2017
Threshold anonymous announcement in VANETs
L Chen, SL Ng, G Wang
IEEE Journal on selected areas in communications 29 (3), 605-615, 2011
Security analysis of some proxy signatures
G Wang, F Bao, J Zhou, RH Deng
International Conference on Information Security and Cryptology, 305-319, 2003
SKM: Scalable key management for advanced metering infrastructure in smart grids
Z Wan, G Wang, Y Yang, S Shi
IEEE Transactions on Industrial Electronics 61 (12), 7055-7066, 2014
Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model
Q Xie, DS Wong, G Wang, X Tan, K Chen, L Fang
IEEE Transactions on Information Forensics and Security 12 (6), 1382-1392, 2017
An authentication framework for wireless sensor networks using identity-based signatures
R Yasmin, E Ritter, G Wang
2010 10th IEEE International Conference on Computer and Information …, 2010
An efficient generic framework for three-factor authentication with provably secure instantiation
J Yu, G Wang, Y Mu, W Gao
IEEE transactions on information forensics and security 9 (12), 2302-2313, 2014
Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks
G Wang, J Yu, Q Xie
Industrial Informatics, IEEE Transactions on 9 (1), 294-302, 2013
Designated-verifier proxy signature schemes
G Wang
IFIP International Information Security Conference, 409-423, 2005
Efficient and robust key management for large mobile ad hoc networks
B Zhu, F Bao, RH Deng, MS Kankanhalli, G Wang
Computer networks 48 (4), 657-682, 2005
Analysis and improvement of Micali’s fair contract signing protocol
F Bao, G Wang, J Zhou, H Zhu
Australasian Conference on Information Security and Privacy, 176-187, 2004
The fairness of perfect concurrent signatures
G Wang, F Bao, J Zhou
International Conference on Information and Communications Security, 435-451, 2006
Efficient and expressive keyword search over encrypted data in cloud
H Cui, Z Wan, RH Deng, G Wang, Y Li
IEEE Transactions on Dependable and Secure Computing 15 (3), 409-422, 2016
Improved certificateless signature scheme provably secure in the standard model
Y Yu, Y Mu, G Wang, Q Xia, B Yang
IET Information Security 6 (2), 102-110, 2012
Designated-verifier proxy signatures for e-commerce
G Wang
2004 IEEE International Conference on Multimedia and Expo (ICME)(IEEE Cat …, 2004
Enhancing pharmacokinetics, tumor accumulation, and antitumor efficacy by elastin‐like polypeptide fusion of interferon alpha
J Hu, G Wang, X Liu, W Gao
Advanced Materials 27 (45), 7320-7324, 2015
An abuse-free fair contract-signing protocol based on the RSA signature
G Wang
IEEE Transactions on Information Forensics and Security 5 (1), 158-168, 2009
Comments on ''A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem''
G Wang, F Bao, J Zhou, RH Deng
Knowledge and Data Engineering, IEEE Transactions on 16 (10), 1309-1311, 2004
The system can't perform the operation now. Try again later.
Articles 1–20