Guomin Yang
University of Wollongong
H-index: 43
Oceania-Australia
Top articles of Guomin Yang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Attribute-hiding fuzzy encryption for privacy-preserving data evaluation | IEEE Transactions on Services Computing | Zhenhua Chen Luqi Huang Guomin Yang Willy Susilo Xingbing Fu | 2024/3/12 |
Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption | Xiaoguo Li Guomin Yang Tao Xiang Shengmin Xu Bowen Zhao | 2024/2/1 | |
Blockchain-based Dynamic Time-encapsulated Data Auditing for Outsourcing Storage | IEEE Transactions on Information Forensics and Security | Chuan Zhang Haojun Xuan Tong Wu Ximeng Liu Guomin Yang | 2023/11/30 |
PPDF: A Privacy-Preserving Cloud-Based Data Distribution System With Filtering | IEEE Transactions on Services Computing | Yudi Zhang Willy Susilo Fuchun Guo Guomin Yang | 2023/7/20 |
OpenSE: Efficient Verifiable Searchable Encryption With Access and Search Pattern Hidden for Cloud-IoT | IEEE Internet of Things Journal | Yunbo Yang Yiwei Hu Xiaolei Dong Jiachen Shen Zhenfu Cao | 2023/11/29 |
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM | Jia-Chng Loh Fuchun Guo Willy Susilo Guomin Yang | 2023/6/15 | |
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network | IEEE Transactions on Information Forensics and Security | Xiaoguo Li Zixi Huang Bowen Zhao Guomin Yang Tao Xiang | 2023/11/23 |
A survey of secure computation using trusted execution environments | arXiv preprint arXiv:2302.12150 | Xiaoguo Li Bowen Zhao Guomin Yang Tao Xiang Jian Weng | 2023/2/23 |
Policy-Based Remote User Authentication From Multi-Biometrics | The Computer Journal | Yangguang Tian Yingjiu Li Robert H Deng Guomin Yang Nan Li | 2023/10/19 |
Towards Fine-Grained Task Allocation With Bilateral Access Control for Intelligent Transportation Systems | IEEE Internet of Things Journal | Tong Wu Xiaochen Ma Chuan Zhang Ximeng Liu Guomin Yang | 2023/12/19 |
Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits | IEEE Transactions on Information Forensics and Security | Xueqiao Liu Guomin Yang Willy Susilo Kai He Robert H Deng | 2023/8/3 |
Secure hierarchical deterministic wallet supporting stealth address | Xin Yin Zhen Liu Guomin Yang Guoxing Chen Haojin Zhu | 2022/9/25 | |
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security | Computer Standards & Interfaces | Yulin Wu Xuan Wang Willy Susilo Guomin Yang Zoe L Jiang | 2022/3/1 |
Balancing privacy and flexibility of cloud-based personal health records sharing system | IEEE Transactions on Cloud Computing | Yudi Zhang Fuchun Guo Willy Susilo Guomin Yang | 2022/9/20 |
Conditional Attribute-Based Proxy Re-Encryption: Definitions and Constructions from LWE | Cryptology ePrint Archive | Lisha Yao Jian Weng Pengfei Wu Xiaoguo Li Yi Liu | 2024 |
Fair cloud auditing based on blockchain for resource-constrained IoT devices | IEEE Transactions on Dependable and Secure Computing | Lei Zhou Anmin Fu Guomin Yang Yansong Gao Shui Yu | 2022/9/16 |
Generic server-aided secure multi-party computation in cloud computing | Computer Standards & Interfaces | Yulin Wu Xuan Wang Willy Susilo Guomin Yang Zoe L Jiang | 2022/1/1 |
Information Security and Privacy: 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28–30, 2022, Proceedings | Khoa Nguyen Guomin Yang Fuchun Guo Willy Susilo | 2022/12/1 | |
Multimodal private signatures | Khoa Nguyen Fuchun Guo Willy Susilo Guomin Yang | 2022/8/15 | |
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts | Information Sciences | Jianchang Lai Fuchun Guo Willy Susilo Peng Jiang Guomin Yang | 2022/10/1 |