Guilin Wang
Guilin Wang
Huawei International Pte Ltd, Singapore
Verified email at huawei.com - Homepage
Title
Cited by
Cited by
Year
Security analysis of two ultra-lightweight RFID authentication protocols
T Li, G Wang
IFIP international information security conference, 109-120, 2007
2442007
Designated verifier signature schemes: attacks, new security notions and a new construction
H Lipmaa, G Wang, F Bao
International Colloquium on Automata, Languages, and Programming, 459-471, 2005
1612005
Threshold anonymous announcement in VANETs
L Chen, SL Ng, G Wang
IEEE Journal on Selected Areas in Communications 29 (3), 605-615, 2011
1252011
Security analysis of some proxy signatures
G Wang, F Bao, J Zhou, RH Deng
International Conference on Information Security and Cryptology, 305-319, 2003
1252003
Evolving privacy: From sensors to the Internet of Things
J Lopez, R Rios, F Bao, G Wang
Future Generation Computer Systems 75, 46-57, 2017
912017
An authentication framework for wireless sensor networks using identity-based signatures
R Yasmin, E Ritter, G Wang
2010 10th IEEE International Conference on Computer and Information …, 2010
842010
SKM: Scalable key management for advanced metering infrastructure in smart grids
Z Wan, G Wang, Y Yang, S Shi
IEEE Transactions on Industrial Electronics 61 (12), 7055-7066, 2014
772014
Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks
G Wang, J Yu, Q Xie
Industrial Informatics, IEEE Transactions on 9 (1), 294-302, 2013
772013
Designated-verifier proxy signature schemes
G Wang
IFIP International Information Security Conference, 409-423, 2005
752005
Analysis and improvement of Micali’s fair contract signing protocol
F Bao, G Wang, J Zhou, H Zhu
Australasian Conference on Information Security and Privacy, 176-187, 2004
722004
Efficient and robust key management for large mobile ad hoc networks
B Zhu, F Bao, RH Deng, MS Kankanhalli, G Wang
Computer networks 48 (4), 657-682, 2005
712005
Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model
Q Xie, DS Wong, G Wang, X Tan, K Chen, L Fang
IEEE Transactions on Information Forensics and Security 12 (6), 1382-1392, 2017
632017
The fairness of perfect concurrent signatures
G Wang, F Bao, J Zhou
International Conference on Information and Communications Security, 435-451, 2006
612006
An efficient generic framework for three-factor authentication with provably secure instantiation
J Yu, G Wang, Y Mu, W Gao
IEEE transactions on information forensics and security 9 (12), 2302-2313, 2014
592014
Designated-verifier proxy signatures for e-commerce
G Wang
2004 IEEE International Conference on Multimedia and Expo (ICME)(IEEE Cat …, 2004
592004
Improved certificateless signature scheme provably secure in the standard model
Y Yu, Y Mu, G Wang, Q Xia, B Yang
IET Information Security 6 (2), 102-110, 2012
582012
An abuse-free fair contract-signing protocol based on the RSA signature
G Wang
IEEE Transactions on Information Forensics and Security 5 (1), 158-168, 2009
522009
Comments on ''A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem''
G Wang, F Bao, J Zhou, RH Deng
Knowledge and Data Engineering, IEEE Transactions on 16 (10), 1309-1311, 2004
512004
Generic non-repudiation protocols supporting transparent off-line TTP
G Wang
Journal of Computer Security 14 (5), 441-467, 2006
432006
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.
T Li, G Wang, RH Deng
JSW 3 (3), 1-10, 2008
422008
The system can't perform the operation now. Try again later.
Articles 1–20