Guilin Wang
Person information
- affiliation: University of Birmingham, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [j42]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Efficient identity-based threshold decryption scheme from bilinear pairings. Frontiers Comput. Sci. 12(1): 177-189 (2018) - [j41]Hui Cui, Zhiguo Wan, Robert H. Deng, Guilin Wang, Yingjiu Li:
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud. IEEE Trans. Dependable Sec. Comput. 15(3): 409-422 (2018) - 2017
- [j40]Javier López, Ruben Rios, Feng Bao, Guilin Wang:
Evolving privacy: From sensors to the Internet of Things. Future Generation Comp. Syst. 75: 46-57 (2017) - [j39]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security. Informatica, Lith. Acad. Sci. 28(2): 215-235 (2017) - [j38]Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang:
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model. IEEE Trans. Information Forensics and Security 12(6): 1382-1392 (2017) - [c50]David Pointcheval, Guilin Wang:
VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange. AsiaCCS 2017: 301-312 - 2016
- [j37]Zhiguo Wan, Wen Tao Zhu, Guilin Wang:
PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid. Computers & Security 62: 246-256 (2016) - [j36]Hui Cui, Guilin Wang, Robert H. Deng, Baodong Qin:
Escrow free attribute-based signature with self-revealability. Inf. Sci. 367-368: 660-672 (2016) - [j35]Shaoquan Jiang, Tsuyoshi Takagi, Guilin Wang:
Special issue on provable security. Security and Communication Networks 9(12): 1635-1637 (2016) - [j34]Yingjie Xia, Xuejiao Liu, Fubiao Xia, Guilin Wang:
A reduction of security notions in designated confirmer signatures. Theor. Comput. Sci. 618: 1-20 (2016) - [i20]Simon Cogliani, Feng Bao, Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Rodrigo Portella do Canto, Guilin Wang:
Public-Key Based Lightweight Swarm Authentication. IACR Cryptology ePrint Archive 2016: 750 (2016) - 2015
- [j33]Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:
Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited. Comput. J. 58(10): 2747-2757 (2015) - [j32]Yang Xiang, Beniamino Di Martino, Guilin Wang, Jin Li:
Cloud Computing: Security, Privacy and Practice. Future Generation Comp. Syst. 52: 59-60 (2015) - [j31]Yan Ren, Guilin Wang, Yunhong Hu, Qiuyan Wang:
Multiple Attribute Authorities Attribute-Based Designated Confirmer Signature Scheme with Unified Verification. IEICE Transactions 98-A(11): 2341-2348 (2015) - [j30]Yan Ren, Chunming Tang, Guilin Wang, Duncan S. Wong:
Attribute-based signature schemes with accountability. IJICT 7(2/3): 141-158 (2015) - [c49]Juhua Hong, Huasong Luo, Guilin Wang:
The impact of the map projection on China's geopolitical environment. Geoinformatics 2015: 1-8 - [c48]Guilin Wang, Kun Yang, Yiwu Xu, Baoyun Wang:
Mining the drive mechanism for Impervious Surface expansion with index of entropy. Geoinformatics 2015: 1-7 - [c47]Weilin Wang, Kun Yang, Yanhui Zhu, Guilin Wang, Fei Su:
Analysis of spatial characteristics of soil erosion in ErHai Lake Basin based on GIS and RUSLE. Geoinformatics 2015: 1-7 - 2014
- [j29]Qi Xie, Guilin Wang, Fubiao Xia, Deren Chen:
Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme. Concurrency and Computation: Practice and Experience 26(5): 1038-1051 (2014) - [j28]Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Efficient identity-based threshold signature scheme from bilinear pairings in standard model. IJIPT 8(2/3): 107-115 (2014) - [j27]Rehana Yasmin, Eike Ritter, Guilin Wang:
Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks. Int. J. Inf. Sec. 13(5): 453-465 (2014) - [j26]Qi Xie, Xiao Tan, Duncan S. Wong, Guilin Wang, Mengjie Bao, Na Dong:
A practical anonymous authentication protocol for wireless roaming. Security and Communication Networks 7(8): 1264-1273 (2014) - [j25]Zhiguo Wan, Guilin Wang, Yanjiang Yang, Shenxing Shi:
SKM: Scalable Key Management for Advanced Metering Infrastructure in Smart Grids. IEEE Trans. Industrial Electronics 61(12): 7055-7066 (2014) - [j24]Yang Wang, Willy Susilo, Man Ho Au, Guilin Wang:
Collusion-Resistance in Optimistic Fair Exchange. IEEE Trans. Information Forensics and Security 9(8): 1227-1239 (2014) - [j23]Jiangshan Yu, Guilin Wang, Yi Mu, Wei Gao:
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation. IEEE Trans. Information Forensics and Security 9(12): 2302-2313 (2014) - [c46]Guilin Wang, Kun Yang, Tao Liu, Yulian Yang, Quanli Xu, Yanhui Zhu:
MAS / LUCC model simulate Land Use change in Erhai Lake Basin based on ant colony algorithm. Geoinformatics 2014: 1-7 - [c45]Guilin Wang, Kun Yang, Meie Pan, Yanhui Zhu:
Basin water environmental effects of urban landscape. Geoinformatics 2014: 1-5 - 2013
- [j22]Qi Xie, Na Dong, Xiao Tan, Duncan S. Wong, Guilin Wang:
Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification. ITC 42(3): 231-237 (2013) - [j21]Wei Gao, Guilin Wang, Xueli Wang, Dongqing Xie:
Controllable Ring Signatures and Its Application to E-Prosecution. JCP 8(4): 833-841 (2013) - [j20]Guilin Wang, Jiangshan Yu, Qi Xie:
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks. IEEE Trans. Industrial Informatics 9(1): 294-302 (2013) - [c44]Yan Ren, Chunming Tang, Guilin Wang, Duncan S. Wong:
Accountable Authority Attribute-Based Signature. EIDWT 2013: 773-777 - [c43]Guilin Wang, Haojun Zhang, Yanqin Zhu, Qijin Ji, Haifeng Shen:
Nash bargaining between friends for cooperative data distribution in a social peer-to-peer swarming system. ICMLC 2013: 1490-1495 - [c42]Jingquan Wang, Guilin Wang, Willy Susilo:
Anonymous Single Sign-On Schemes Transformed from Group Signatures. INCoS 2013: 560-567 - [c41]Jingquan Wang, Guilin Wang, Willy Susilo:
Secure Single Sign-On Schemes Constructed from Nominative Signatures. TrustCom/ISPA/IUCC 2013: 620-627 - 2012
- [j19]Rehana Yasmin, Eike Ritter, Guilin Wang:
An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures: Implementation and Evaluation. IEICE Transactions 95-D(1): 126-133 (2012) - [j18]Yong Yu, Yi Mu, Guilin Wang, Qi Xia, Bo Yang:
Improved certificateless signature scheme provably secure in the standard model. IET Information Security 6(2): 102-110 (2012) - [j17]Wei Gao, Guilin Wang, Xueli Wang, Fei Li:
Round-Optimal ID-Based Blind Signature Schemes without ROS Assumption. JCM 7(12): 909-920 (2012) - [c40]Wei Gao, Kefei Chen, Guilin Wang, Xueli Wang:
Designated Condition One-Time Signatures. IDCS 2012: 253-263 - [c39]Qi Xie, Guilin Wang, Fubiao Xia, Deren Chen:
Improvement of Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme. INCoS 2012: 360-364 - [c38]Jiangshan Yu, Guilin Wang, Yi Mu:
Provably Secure Single Sign-on Scheme in Distributed Systems and Networks. TrustCom 2012: 271-278 - [c37]Chunhua Su, Guilin Wang, Kouichi Sakurai:
Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework. TrustCom 2012: 1012-1017 - [e9]Mark Dermot Ryan, Ben Smyth, Guilin Wang:
Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7232, Springer 2012, ISBN 978-3-642-29100-5 [contents] - [e8]Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu:
Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings. Lecture Notes in Computer Science 7496, Springer 2012, ISBN 978-3-642-33271-5 [contents] - [i19]Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:
Efficient identity-based threshold signature scheme from bilinear pairings in the standard model. IACR Cryptology ePrint Archive 2012: 73 (2012) - [i18]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang:
Efficient identity-based threshold decryption scheme from bilinear pairings. IACR Cryptology ePrint Archive 2012: 75 (2012) - [i17]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model. IACR Cryptology ePrint Archive 2012: 104 (2012) - [i16]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited. IACR Cryptology ePrint Archive 2012: 105 (2012) - [i15]Guilin Wang, Jiangshan Yu, Qi Xie:
Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks. IACR Cryptology ePrint Archive 2012: 107 (2012) - 2011
- [j16]Yong Yu, Yi Mu, Guilin Wang, Ying Sun:
Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature. Comput. J. 54(10): 1645-1651 (2011) - [j15]Liqun Chen, Siaw-Lynn Ng, Guilin Wang:
Threshold Anonymous Announcement in VANETs. IEEE Journal on Selected Areas in Communications 29(3): 605-615 (2011) - [j14]Tieyan Li, Guilin Wang:
Analyzing a Family of Key Protection Schemes against Modification Attacks. IEEE Trans. Dependable Sec. Comput. 8(5): 770-776 (2011) - [c36]Fubiao Xia, Guilin Wang, Rui Xue:
On the invisibility of designated confirmer signatures. AsiaCCS 2011: 268-276 - [c35]Guilin Wang, Fubiao Xia, Yunlei Zhao:
Designated Confirmer Signatures with Unified Verification. IMA Int. Conf. 2011: 469-495 - [c34]
- [c33]Tieyan Li, Yingjiu Li, Guilin Wang:
Secure and Practical Key Distribution for RFID-Enabled Supply Chains. SecureComm 2011: 356-372 - [e7]Sihan Qing, Willy Susilo, Guilin Wang, Dongmei Liu:
Information and Communications Security - 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings. Lecture Notes in Computer Science 7043, Springer 2011, ISBN 978-3-642-25242-6 [contents] - [i14]Guilin Wang, Fubiao Xia, Yunlei Zhao:
Designated Confirmer Signatures With Unified Verification. IACR Cryptology ePrint Archive 2011: 182 (2011) - 2010
- [j13]Jong Hyuk Park, Sajid Hussain, Guilin Wang, Yi Mu:
Special issue of computers and mathematics with applications on "Advances in cryptography, security and applications for future computer science". Computers & Mathematics with Applications 60(2): 175 (2010) - [j12]Guilin Wang:
An abuse-free fair contract-signing protocol based on the RSA signature. IEEE Trans. Information Forensics and Security 5(1): 158-168 (2010) - [c32]Rehana Yasmin, Eike Ritter, Guilin Wang:
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures. CIT 2010: 882-889 - [e6]Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang:
Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings. Lecture Notes in Computer Science 6047, Springer 2010, ISBN 978-3-642-12826-4 [contents]
2000 – 2009
- 2009
- [j11]Wei Gao, Guilin Wang, Xueli Wang, Zhenguang Yang:
One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings. Informatica, Lith. Acad. Sci. 20(4): 461-476 (2009) - [j10]Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen:
Fair and Secure Mobile Billing Systems. Wireless Personal Communications 51(1): 81-93 (2009) - [e5]Sihan Qing, Chris J. Mitchell, Guilin Wang:
Information and Communications Security, 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings. Lecture Notes in Computer Science 5927, Springer 2009, ISBN 978-3-642-11144-0 [contents] - [e4]Feng Bao, Hui Li, Guilin Wang:
Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings. Lecture Notes in Computer Science 5451, Springer 2009, ISBN 978-3-642-00842-9 [contents] - 2008
- [j9]Tieyan Li, Guilin Wang, Robert H. Deng:
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols. JSW 3(3): 1-10 (2008) - [j8]Tieyan Li, Robert H. Deng, Guilin Wang:
The security and improvement of an ultra-lightweight RFID authentication protocol. Security and Communication Networks 1(2): 135-146 (2008) - [c31]Wei Gao, Guilin Wang, Xueli Wang, Fei Li:
One-Round ID-Based Blind Signature Scheme without ROS Assumption. Pairing 2008: 316-331 - [e3]Sihan Qing, Hideki Imai, Guilin Wang:
Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings. Lecture Notes in Computer Science 4861, Springer 2008, ISBN 978-3-540-77047-3 [contents] - [e2]Liqun Chen, Mark Dermot Ryan, Guilin Wang:
Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings. Lecture Notes in Computer Science 5308, Springer 2008, ISBN 978-3-540-88624-2 [contents] - 2007
- [j7]Lifeng Guo, Guilin Wang:
Insider attacks on multi-proxy multi-signature schemes. Computers & Electrical Engineering 33(2): 88-93 (2007) - [c30]Lifeng Guo, Guilin Wang, Duncan S. Wong, Lei Hu:
Further Discussions on the Security of a Nominative Signature Scheme. Security and Management 2007: 566-572 - [c29]Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen:
Undeniable Mobile Billing Schemes. EuroPKI 2007: 338-345 - [c28]Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo:
Formal Definition and Construction of Nominative Signature. ICICS 2007: 57-68 - [c27]Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao:
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. Public Key Cryptography 2007: 43-60 - [c26]
- [c25]
- [i13]Wei Gao, Xueli Wang, Guilin Wang, Fei Li:
One-Round ID-Based Blind Signature Scheme without ROS Assumption. IACR Cryptology ePrint Archive 2007: 7 (2007) - [i12]Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo:
Nominative Signature: Application, Security Model and Construction. IACR Cryptology ePrint Archive 2007: 69 (2007) - 2006
- [j6]Min-Hua Shao, Guilin Wang, Jianying Zhou:
Some common attacks against certified email protocols and the countermeasures. Computer Communications 29(15): 2759-2769 (2006) - [j5]Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng:
A secure extension of the Kwak-Moon group signcryption scheme. Computers & Security 25(6): 435-444 (2006) - [j4]Guilin Wang:
Generic non-repudiation protocols supporting transparent off-line TTP. Journal of Computer Security 14(5): 441-467 (2006) - [c24]Guilin Wang, Feng Bao:
Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. ICICS 2006: 399-409 - [c23]Guilin Wang, Feng Bao, Jianying Zhou:
The Fairness of Perfect Concurrent Signatures. ICICS 2006: 435-451 - [c22]
- [i11]Lifeng Guo, Guilin Wang, Duncan S. Wong:
Further Discussions on the Security of a Nominative Signature Scheme. IACR Cryptology ePrint Archive 2006: 7 (2006) - [i10]Guilin Wang, Feng Bao, Jianying Zhou:
The Fairness of Perfect Concurrent Signatures. IACR Cryptology ePrint Archive 2006: 226 (2006) - 2005
- [j3]Bo Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli, Guilin Wang:
Efficient and robust key management for large mobile ad hoc networks. Computer Networks 48(4): 657-682 (2005) - [c21]Helger Lipmaa, Guilin Wang, Feng Bao:
Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction. ICALP 2005: 459-471 - [c20]Min-Hua Shao, Jianying Zhou, Guilin Wang:
On the Security of a Certified E-Mail Scheme with Temporal Authentication. ICCSA (3) 2005: 701-710 - [c19]Guilin Wang, Sihan Qing:
Security Flaws in Several Group Signatures Proposed by Popescu. ICCSA (3) 2005: 711-718 - [c18]Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai:
Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. ICICS 2005: 40-52 - [c17]Bo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng:
Providing efficient certification services against active attacks in ad hoc networks. IPCCC 2005: 285-292 - [c16]
- [c15]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
An efficient certified e-mail scheme suitable for wireless mobile environments. PIMRC 2005: 1994-1998 - [c14]
- [c13]Guilin Wang:
An abuse-free fair contract signing protocol based on the RSA signature. WWW 2005: 412-421 - [e1]Sihan Qing, Wenbo Mao, Javier López, Guilin Wang:
Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings. Lecture Notes in Computer Science 3783, Springer 2005, ISBN 3-540-30934-9 [contents] - [i9]Guilin Wang, Feng Bao, Changshe Ma, Kefei Chen:
Efficient Authenticated Encryption Schemes with Public Verifiability. CoRR abs/cs/0504019 (2005) - 2004
- [j2]Guilin Wang:
Universal forgery on a group signature scheme using self-certified public keys. Inf. Process. Lett. 89(5): 227-231 (2004) - [j1]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". IEEE Trans. Knowl. Data Eng. 16(10): 1309-1311 (2004) - [c12]Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu:
Analysis and Improvement of Micali's Fair Contract Signing Protocol. ACISP 2004: 176-187 - [c11]
- [c10]Guilin Wang, Feng Bao, Jianying Zhou:
On the Security of a Certified E-Mail Scheme. INDOCRYPT 2004: 48-60 - [c9]Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon:
Security Analysis of Two Signcryption Schemes. ISC 2004: 123-133 - [c8]Guilin Wang, Jianying Zhou, Robert H. Deng:
On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. TrustBus 2004: 289-298 - [i8]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IACR Cryptology ePrint Archive 2004: 54 (2004) - 2003
- [c7]Guilin Wang, Xiaoxi Han, Bo Zhu:
On the Security of Two Threshold Signature Schemes with Traceable Signers. ACNS 2003: 111-122 - [c6]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Security Remarks on a Group Signature Scheme with Member Deletion. ICICS 2003: 72-83 - [c5]
- [c4]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Security Analysis of Some Proxy Signatures. ICISC 2003: 305-319 - [c3]
- [i7]Guilin Wang, Bo Zhu:
Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers. IACR Cryptology ePrint Archive 2003: 46 (2003) - [i6]Guilin Wang:
Security Analysis of Several Group Signature Schemes. IACR Cryptology ePrint Archive 2003: 194 (2003) - [i5]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Security Analysis of Some Proxy Signatures. IACR Cryptology ePrint Archive 2003: 196 (2003) - [i4]Guilin Wang, Sihan Qing:
Security Flaws in Several Group Signatures Proposed by Popescu. IACR Cryptology ePrint Archive 2003: 207 (2003) - [i3]Guilin Wang:
On the Security of a Group Signature Scheme with Forward Security. IACR Cryptology ePrint Archive 2003: 226 (2003) - [i2]Guilin Wang:
An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures. IACR Cryptology ePrint Archive 2003: 243 (2003) - 2002
- [c2]Guilin Wang:
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme. ICISC 2002: 75-89 - [i1]Guilin Wang, Jianying Zhou, Robert H. Deng:
Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. IACR Cryptology ePrint Archive 2002: 150 (2002) - 2001
- [c1]Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou:
Threshold Undeniable RSA Signature Scheme. ICICS 2001: 221-232