default search action
Guilin Wang
Person information
- affiliation: University of Birmingham, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Mingyong Liao, Haijia Wen, Ling Yang, Guilin Wang, Xuekun Xiang, Xiaowen Liang:
Improving the model robustness of flood hazard mapping based on hyperparameter optimization of random forest. Expert Syst. Appl. 241: 122682 (2024) - [j46]Fei Li, Dongqing Xie, Wei Gao, Kefei Chen, Guilin Wang, Roberto Metere:
A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+. J. Ambient Intell. Humaniz. Comput. 15(2): 1317-1326 (2024) - 2021
- [c54]Guilin Wang, Lu Gai:
Spatio-Temporal Variability of PM2.5 Concentrations and Their Relationship with Impervious Surface Expansion in the Beijing- Tianjin-Hebei Region, China. Geoinformatics 2021: 1-9 - [c53]Malte Lücken, Daniel Burkhardt, Robrecht Cannoodt, Christopher Lance, Aditi Agrawal, Hananeh Aliee, Ann Chen, Louise Deconinck, Angela Detweiler, Alejandro Granados, Shelly Huynh, Laura Isacco, Yang Kim, Dominik Klein, Bony de Kumar, Sunil Kuppasani, Heiko Lickert, Aaron McGeever, Joaquin Melgarejo, Honey Mekonen, Maurizio Morri, Michaela Müller, Norma Neff, Sheryl Paul, Bastian Rieck, Kaylie Schneider, Scott Steelman, Michael Sterr, Daniel Treacy, Alexander Tong, Alexandra-Chloé Villani, Guilin Wang, Jia Yan, Ce Zhang, Angela Pisco, Smita Krishnaswamy, Fabian J. Theis, Jonathan M. Bloom:
A sandbox for prediction and integration of DNA, RNA, and proteins in single cells. NeurIPS Datasets and Benchmarks 2021 - [e10]Robert H. Deng, Feng Bao, Guilin Wang, Jian Shen, Mark Ryan, Weizhi Meng, Ding Wang:
Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings. Lecture Notes in Computer Science 13107, Springer 2021, ISBN 978-3-030-93206-0 [contents] - 2020
- [j45]Hui Cui, Tsz Hon Yuen, Robert H. Deng, Guilin Wang:
Server-aided revocable attribute-based encryption for cloud computing services. Concurr. Comput. Pract. Exp. 32(14) (2020)
2010 – 2019
- 2019
- [j44]Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Chunming Tang:
Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash. Frontiers Inf. Technol. Electron. Eng. 20(2): 176-186 (2019) - [j43]Hui Cui, Robert H. Deng, Guilin Wang:
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks. IEEE/ACM Trans. Netw. 27(2): 721-733 (2019) - 2018
- [j42]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Efficient identity-based threshold decryption scheme from bilinear pairings. Frontiers Comput. Sci. 12(1): 177-189 (2018) - [j41]Hui Cui, Zhiguo Wan, Robert H. Deng, Guilin Wang, Yingjiu Li:
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud. IEEE Trans. Dependable Secur. Comput. 15(3): 409-422 (2018) - [c52]Baoju Zhang, Guilin Wang, Lei Xue:
An Improving Data Stream Classification Algorithm Based on BP Neural Network. CSPS (3) 2018: 145-153 - [p1]Simon Cogliani, Feng Bao, Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Rodrigo Portella do Canto, Guilin Wang:
Public Key-Based Lightweight Swarm Authentication. Cyber-Physical Systems Security 2018: 255-267 - 2017
- [j40]Javier López, Ruben Rios, Feng Bao, Guilin Wang:
Evolving privacy: From sensors to the Internet of Things. Future Gener. Comput. Syst. 75: 46-57 (2017) - [j39]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security. Informatica 28(2): 215-235 (2017) - [j38]Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang:
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model. IEEE Trans. Inf. Forensics Secur. 12(6): 1382-1392 (2017) - [c51]David Pointcheval, Guilin Wang:
VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange. AsiaCCS 2017: 301-312 - [c50]Chen Wang, Yue Wang, Shaolin Ma, Yifei Yuan, Lei Wang, Xin Zheng, Guilin Wang, Jiaxi Wang:
Ultra-Wideband Ranging System Prototype Design and Implementation. CSPS 2017: 1848-1855 - 2016
- [j37]Zhiguo Wan, Wen Tao Zhu, Guilin Wang:
PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid. Comput. Secur. 62: 246-256 (2016) - [j36]Hui Cui, Guilin Wang, Robert H. Deng, Baodong Qin:
Escrow free attribute-based signature with self-revealability. Inf. Sci. 367-368: 660-672 (2016) - [j35]Shaoquan Jiang, Tsuyoshi Takagi, Guilin Wang:
Special issue on provable security. Secur. Commun. Networks 9(12): 1635-1637 (2016) - [j34]Yingjie Xia, Xuejiao Liu, Fubiao Xia, Guilin Wang:
A reduction of security notions in designated confirmer signatures. Theor. Comput. Sci. 618: 1-20 (2016) - [i20]Simon Cogliani, Feng Bao, Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Rodrigo Portella do Canto, Guilin Wang:
Public-Key Based Lightweight Swarm Authentication. IACR Cryptol. ePrint Arch. 2016: 750 (2016) - 2015
- [j33]Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:
Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited. Comput. J. 58(10): 2747-2757 (2015) - [j32]Yang Xiang, Beniamino Di Martino, Guilin Wang, Jin Li:
Cloud Computing: Security, Privacy and Practice. Future Gener. Comput. Syst. 52: 59-60 (2015) - [j31]Yan Ren, Guilin Wang, Yunhong Hu, Qiuyan Wang:
Multiple Attribute Authorities Attribute-Based Designated Confirmer Signature Scheme with Unified Verification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(11): 2341-2348 (2015) - [j30]Yan Ren, Chunming Tang, Guilin Wang, Duncan S. Wong:
Attribute-based signature schemes with accountability. Int. J. Inf. Commun. Technol. 7(2/3): 141-158 (2015) - [c49]Juhua Hong, Huasong Luo, Guilin Wang:
The impact of the map projection on China's geopolitical environment. Geoinformatics 2015: 1-8 - [c48]Guilin Wang, Kun Yang, Yiwu Xu, Baoyun Wang:
Mining the drive mechanism for Impervious Surface expansion with index of entropy. Geoinformatics 2015: 1-7 - [c47]Weilin Wang, Kun Yang, Yanhui Zhu, Guilin Wang, Fei Su:
Analysis of spatial characteristics of soil erosion in ErHai Lake Basin based on GIS and RUSLE. Geoinformatics 2015: 1-7 - 2014
- [j29]Qi Xie, Guilin Wang, Fubiao Xia, Deren Chen:
Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme. Concurr. Comput. Pract. Exp. 26(5): 1038-1051 (2014) - [j28]Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Efficient identity-based threshold signature scheme from bilinear pairings in standard model. Int. J. Internet Protoc. Technol. 8(2/3): 107-115 (2014) - [j27]Rehana Yasmin, Eike Ritter, Guilin Wang:
Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks. Int. J. Inf. Sec. 13(5): 453-465 (2014) - [j26]Qi Xie, Xiao Tan, Duncan S. Wong, Guilin Wang, Mengjie Bao, Na Dong:
A practical anonymous authentication protocol for wireless roaming. Secur. Commun. Networks 7(8): 1264-1273 (2014) - [j25]Zhiguo Wan, Guilin Wang, Yanjiang Yang, Shenxing Shi:
SKM: Scalable Key Management for Advanced Metering Infrastructure in Smart Grids. IEEE Trans. Ind. Electron. 61(12): 7055-7066 (2014) - [j24]Yang Wang, Willy Susilo, Man Ho Au, Guilin Wang:
Collusion-Resistance in Optimistic Fair Exchange. IEEE Trans. Inf. Forensics Secur. 9(8): 1227-1239 (2014) - [j23]Jiangshan Yu, Guilin Wang, Yi Mu, Wei Gao:
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation. IEEE Trans. Inf. Forensics Secur. 9(12): 2302-2313 (2014) - [c46]Guilin Wang, Kun Yang, Tao Liu, Yulian Yang, Quanli Xu, Yanhui Zhu:
MAS / LUCC model simulate Land Use change in Erhai Lake Basin based on ant colony algorithm. Geoinformatics 2014: 1-7 - [c45]Guilin Wang, Kun Yang, Meie Pan, Yanhui Zhu:
Basin water environmental effects of urban landscape. Geoinformatics 2014: 1-5 - 2013
- [j22]Qi Xie, Na Dong, Xiao Tan, Duncan S. Wong, Guilin Wang:
Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification. Inf. Technol. Control. 42(3): 231-237 (2013) - [j21]Wei Gao, Guilin Wang, Xueli Wang, Dongqing Xie:
Controllable Ring Signatures and Its Application to E-Prosecution. J. Comput. 8(4): 833-841 (2013) - [j20]Guilin Wang, Jiangshan Yu, Qi Xie:
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks. IEEE Trans. Ind. Informatics 9(1): 294-302 (2013) - [c44]Yan Ren, Chunming Tang, Guilin Wang, Duncan S. Wong:
Accountable Authority Attribute-Based Signature. EIDWT 2013: 773-777 - [c43]Guilin Wang, Haojun Zhang, Yanqin Zhu, Qijin Ji, Haifeng Shen:
Nash bargaining between friends for cooperative data distribution in a social peer-to-peer swarming system. ICMLC 2013: 1490-1495 - [c42]Jingquan Wang, Guilin Wang, Willy Susilo:
Anonymous Single Sign-On Schemes Transformed from Group Signatures. INCoS 2013: 560-567 - [c41]Jingquan Wang, Guilin Wang, Willy Susilo:
Secure Single Sign-On Schemes Constructed from Nominative Signatures. TrustCom/ISPA/IUCC 2013: 620-627 - 2012
- [j19]Rehana Yasmin, Eike Ritter, Guilin Wang:
An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures: Implementation and Evaluation. IEICE Trans. Inf. Syst. 95-D(1): 126-133 (2012) - [j18]Yong Yu, Yi Mu, Guilin Wang, Qi Xia, Bo Yang:
Improved certificateless signature scheme provably secure in the standard model. IET Inf. Secur. 6(2): 102-110 (2012) - [j17]Wei Gao, Guilin Wang, Xueli Wang, Fei Li:
Round-Optimal ID-Based Blind Signature Schemes without ROS Assumption. J. Commun. 7(12): 909-920 (2012) - [c40]Wei Gao, Kefei Chen, Guilin Wang, Xueli Wang:
Designated Condition One-Time Signatures. IDCS 2012: 253-263 - [c39]Qi Xie, Guilin Wang, Fubiao Xia, Deren Chen:
Improvement of Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme. INCoS 2012: 360-364 - [c38]Jiangshan Yu, Guilin Wang, Yi Mu:
Provably Secure Single Sign-on Scheme in Distributed Systems and Networks. TrustCom 2012: 271-278 - [c37]Chunhua Su, Guilin Wang, Kouichi Sakurai:
Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework. TrustCom 2012: 1012-1017 - [e9]Mark Dermot Ryan, Ben Smyth, Guilin Wang:
Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7232, Springer 2012, ISBN 978-3-642-29100-5 [contents] - [e8]Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu:
Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings. Lecture Notes in Computer Science 7496, Springer 2012, ISBN 978-3-642-33271-5 [contents] - [i19]Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:
Efficient identity-based threshold signature scheme from bilinear pairings in the standard model. IACR Cryptol. ePrint Arch. 2012: 73 (2012) - [i18]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang:
Efficient identity-based threshold decryption scheme from bilinear pairings. IACR Cryptol. ePrint Arch. 2012: 75 (2012) - [i17]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model. IACR Cryptol. ePrint Arch. 2012: 104 (2012) - [i16]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited. IACR Cryptol. ePrint Arch. 2012: 105 (2012) - [i15]Guilin Wang, Jiangshan Yu, Qi Xie:
Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks. IACR Cryptol. ePrint Arch. 2012: 107 (2012) - 2011
- [j16]Yong Yu, Yi Mu, Guilin Wang, Ying Sun:
Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature. Comput. J. 54(10): 1645-1651 (2011) - [j15]Liqun Chen, Siaw-Lynn Ng, Guilin Wang:
Threshold Anonymous Announcement in VANETs. IEEE J. Sel. Areas Commun. 29(3): 605-615 (2011) - [j14]Tieyan Li, Guilin Wang:
Analyzing a Family of Key Protection Schemes against Modification Attacks. IEEE Trans. Dependable Secur. Comput. 8(5): 770-776 (2011) - [c36]Fubiao Xia, Guilin Wang, Rui Xue:
On the invisibility of designated confirmer signatures. AsiaCCS 2011: 268-276 - [c35]Guilin Wang, Fubiao Xia, Yunlei Zhao:
Designated Confirmer Signatures with Unified Verification. IMACC 2011: 469-495 - [c34]Lie Qu, Guilin Wang, Yi Mu:
Optimistic Fair Exchange of Ring Signatures. SecureComm 2011: 227-242 - [c33]Tieyan Li, Yingjiu Li, Guilin Wang:
Secure and Practical Key Distribution for RFID-Enabled Supply Chains. SecureComm 2011: 356-372 - [e7]Sihan Qing, Willy Susilo, Guilin Wang, Dongmei Liu:
Information and Communications Security - 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings. Lecture Notes in Computer Science 7043, Springer 2011, ISBN 978-3-642-25242-6 [contents] - [i14]Guilin Wang, Fubiao Xia, Yunlei Zhao:
Designated Confirmer Signatures With Unified Verification. IACR Cryptol. ePrint Arch. 2011: 182 (2011) - 2010
- [j13]Jong Hyuk Park, Sajid Hussain, Guilin Wang, Yi Mu:
Special issue of computers and mathematics with applications on "Advances in cryptography, security and applications for future computer science". Comput. Math. Appl. 60(2): 175 (2010) - [j12]Guilin Wang:
An abuse-free fair contract-signing protocol based on the RSA signature. IEEE Trans. Inf. Forensics Secur. 5(1): 158-168 (2010) - [c32]Rehana Yasmin, Eike Ritter, Guilin Wang:
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures. CIT 2010: 882-889 - [e6]Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang:
Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings. Lecture Notes in Computer Science 6047, Springer 2010, ISBN 978-3-642-12826-4 [contents]
2000 – 2009
- 2009
- [j11]Wei Gao, Guilin Wang, Xueli Wang, Zhenguang Yang:
One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings. Informatica 20(4): 461-476 (2009) - [j10]Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen:
Fair and Secure Mobile Billing Systems. Wirel. Pers. Commun. 51(1): 81-93 (2009) - [e5]Sihan Qing, Chris J. Mitchell, Guilin Wang:
Information and Communications Security, 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings. Lecture Notes in Computer Science 5927, Springer 2009, ISBN 978-3-642-11144-0 [contents] - [e4]Feng Bao, Hui Li, Guilin Wang:
Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings. Lecture Notes in Computer Science 5451, Springer 2009, ISBN 978-3-642-00842-9 [contents] - 2008
- [j9]Tieyan Li, Guilin Wang, Robert H. Deng:
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols. J. Softw. 3(3): 1-10 (2008) - [j8]Tieyan Li, Robert H. Deng, Guilin Wang:
The security and improvement of an ultra-lightweight RFID authentication protocol. Secur. Commun. Networks 1(2): 135-146 (2008) - [c31]Wei Gao, Guilin Wang, Xueli Wang, Fei Li:
One-Round ID-Based Blind Signature Scheme without ROS Assumption. Pairing 2008: 316-331 - [e3]Sihan Qing, Hideki Imai, Guilin Wang:
Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings. Lecture Notes in Computer Science 4861, Springer 2008, ISBN 978-3-540-77047-3 [contents] - [e2]Liqun Chen, Mark Dermot Ryan, Guilin Wang:
Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings. Lecture Notes in Computer Science 5308, Springer 2008, ISBN 978-3-540-88624-2 [contents] - 2007
- [j7]Lifeng Guo, Guilin Wang:
Insider attacks on multi-proxy multi-signature schemes. Comput. Electr. Eng. 33(2): 88-93 (2007) - [c30]Lifeng Guo, Guilin Wang, Duncan S. Wong, Lei Hu:
Further Discussions on the Security of a Nominative Signature Scheme. Security and Management 2007: 566-572 - [c29]Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen:
Undeniable Mobile Billing Schemes. EuroPKI 2007: 338-345 - [c28]Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo:
Formal Definition and Construction of Nominative Signature. ICICS 2007: 57-68 - [c27]Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao:
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. Public Key Cryptography 2007: 43-60 - [c26]Tieyan Li, Guilin Wang:
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. SEC 2007: 109-120 - [c25]Guilin Wang, Feng Bao:
Security Remarks on a Convertible Nominative Signature Scheme. SEC 2007: 265-275 - [i13]Wei Gao, Xueli Wang, Guilin Wang, Fei Li:
One-Round ID-Based Blind Signature Scheme without ROS Assumption. IACR Cryptol. ePrint Arch. 2007: 7 (2007) - [i12]Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo:
Nominative Signature: Application, Security Model and Construction. IACR Cryptol. ePrint Arch. 2007: 69 (2007) - 2006
- [j6]Min-Hua Shao, Guilin Wang, Jianying Zhou:
Some common attacks against certified email protocols and the countermeasures. Comput. Commun. 29(15): 2759-2769 (2006) - [j5]Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng:
A secure extension of the Kwak-Moon group signcryption scheme. Comput. Secur. 25(6): 435-444 (2006) - [j4]Guilin Wang:
Generic non-repudiation protocols supporting transparent off-line TTP. J. Comput. Secur. 14(5): 441-467 (2006) - [c24]Guilin Wang, Feng Bao:
Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. ICICS 2006: 399-409 - [c23]Guilin Wang, Feng Bao, Jianying Zhou:
The Fairness of Perfect Concurrent Signatures. ICICS 2006: 435-451 - [c22]Wei Gao, Guilin Wang, Xueli Wang, Dongqing Xie:
Controllable Ring Signatures. WISA 2006: 1-14 - [i11]Lifeng Guo, Guilin Wang, Duncan S. Wong:
Further Discussions on the Security of a Nominative Signature Scheme. IACR Cryptol. ePrint Arch. 2006: 7 (2006) - [i10]Guilin Wang, Feng Bao, Jianying Zhou:
The Fairness of Perfect Concurrent Signatures. IACR Cryptol. ePrint Arch. 2006: 226 (2006) - 2005
- [j3]Bo Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli, Guilin Wang:
Efficient and robust key management for large mobile ad hoc networks. Comput. Networks 48(4): 657-682 (2005) - [c21]Helger Lipmaa, Guilin Wang, Feng Bao:
Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction. ICALP 2005: 459-471 - [c20]Min-Hua Shao, Jianying Zhou, Guilin Wang:
On the Security of a Certified E-Mail Scheme with Temporal Authentication. ICCSA (3) 2005: 701-710 - [c19]Guilin Wang, Sihan Qing:
Security Flaws in Several Group Signatures Proposed by Popescu. ICCSA (3) 2005: 711-718 - [c18]Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai:
Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. ICICS 2005: 40-52 - [c17]Bo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng:
Providing efficient certification services against active attacks in ad hoc networks. IPCCC 2005: 285-292 - [c16]Guilin Wang:
Generic Fair Non-Repudiation Protocols with Transparent Off-line TTP. IWAP 2005: 51-65 - [c15]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
An efficient certified e-mail scheme suitable for wireless mobile environments. PIMRC 2005: 1994-1998 - [c14]Guilin Wang:
Designated-Verifier Proxy Signature Schemes. SEC 2005: 409-424 - [c13]Guilin Wang:
An abuse-free fair contract signing protocol based on the RSA signature. WWW 2005: 412-421 - [e1]Sihan Qing, Wenbo Mao, Javier López, Guilin Wang:
Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings. Lecture Notes in Computer Science 3783, Springer 2005, ISBN 3-540-30934-9 [contents] - [i9]Guilin Wang, Feng Bao, Changshe Ma, Kefei Chen:
Efficient Authenticated Encryption Schemes with Public Verifiability. CoRR abs/cs/0504019 (2005) - 2004
- [j2]Guilin Wang:
Universal forgery on a group signature scheme using self-certified public keys. Inf. Process. Lett. 89(5): 227-231 (2004) - [j1]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". IEEE Trans. Knowl. Data Eng. 16(10): 1309-1311 (2004) - [c12]Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu:
Analysis and Improvement of Micali's Fair Contract Signing Protocol. ACISP 2004: 176-187 - [c11]Guilin Wang:
Designated-verifier proxy signatures for e-commerce. ICME 2004: 1731-1734 - [c10]Guilin Wang, Feng Bao, Jianying Zhou:
On the Security of a Certified E-Mail Scheme. INDOCRYPT 2004: 48-60 - [c9]Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon:
Security Analysis of Two Signcryption Schemes. ISC 2004: 123-133 - [c8]Guilin Wang, Jianying Zhou, Robert H. Deng:
On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. TrustBus 2004: 289-298 - [i8]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IACR Cryptol. ePrint Arch. 2004: 54 (2004) - 2003
- [c7]Guilin Wang, Xiaoxi Han, Bo Zhu:
On the Security of Two Threshold Signature Schemes with Traceable Signers. ACNS 2003: 111-122 - [c6]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Security Remarks on a Group Signature Scheme with Member Deletion. ICICS 2003: 72-83 - [c5]Guilin Wang:
On the Security of a Group Signature Scheme with Forward Security. ICISC 2003: 27-39 - [c4]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Security Analysis of Some Proxy Signatures. ICISC 2003: 305-319 - [c3]Guilin Wang:
Security Analysis of Several Group Signature Schemes. INDOCRYPT 2003: 252-265 - [i7]Guilin Wang, Bo Zhu:
Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers. IACR Cryptol. ePrint Arch. 2003: 46 (2003) - [i6]Guilin Wang:
Security Analysis of Several Group Signature Schemes. IACR Cryptol. ePrint Arch. 2003: 194 (2003) - [i5]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Security Analysis of Some Proxy Signatures. IACR Cryptol. ePrint Arch. 2003: 196 (2003) - [i4]Guilin Wang, Sihan Qing:
Security Flaws in Several Group Signatures Proposed by Popescu. IACR Cryptol. ePrint Arch. 2003: 207 (2003) - [i3]Guilin Wang:
On the Security of a Group Signature Scheme with Forward Security. IACR Cryptol. ePrint Arch. 2003: 226 (2003) - [i2]Guilin Wang:
An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures. IACR Cryptol. ePrint Arch. 2003: 243 (2003) - 2002
- [c2]Guilin Wang:
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme. ICISC 2002: 75-89 - [i1]Guilin Wang, Jianying Zhou, Robert H. Deng:
Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. IACR Cryptol. ePrint Arch. 2002: 150 (2002) - 2001
- [c1]Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou:
Threshold Undeniable RSA Signature Scheme. ICICS 2001: 221-232
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint