Attribute-based encryption, Key exchange, Proxy re-encryption and Random oracle are the subject areas of his Public-key cryptography study. His Database research covers fields of interest such as Database transaction and Software engineering. His work blends Software engineering and Database studies together. His research on Computer security frequently links to adjacent areas such as Anonymity. Guomin Yang applies his multidisciplinary studies on Encryption and Cryptography in his research. He performs multidisciplinary studies into Cryptography and Encryption in his work. His research links Roaming with Computer network. In his articles, Guomin Yang combines various disciplines, including Cloud computing and Cloud storage. Guomin Yang performs multidisciplinary study in the fields of Operating system and Distributed computing via his papers.
His Public-key cryptography study is focused on Key exchange and Random oracle. Theoretical computer science is integrated with Cryptography and Programming language in his study. His work often combines Cryptography and Public-key cryptography studies. Guomin Yang conducts interdisciplinary study in the fields of Programming language and Theoretical computer science through his research. As part of his studies on Computer security, Guomin Yang often connects relevant areas like Authentication (law). Guomin Yang merges Encryption with Key exchange in his study. His multidisciplinary approach integrates Computer network and Operating system in his work. Guomin Yang undertakes interdisciplinary study in the fields of Operating system and Cloud computing through his research. He connects Cloud computing with Computer network in his study.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Malicious KGC attacks in certificateless cryptography
Man Ho Au;Yi Mu;Jing Chen;Duncan S. Wong.
computer and communications security (2007)
Two-factor mutual authentication based on smart cards and passwords
Guomin Yang;Duncan S. Wong;Huaxiong Wang;Xiaotie Deng.
Journal of Computer and System Sciences (2008)
Probabilistic public key encryption with equality test
Guomin Yang;Chik How Tan;Qiong Huang;Duncan S. Wong.
the cryptographers track at the rsa conference (2010)
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
Rongmao Chen;Yi Mu;Guomin Yang;Fuchun Guo.
IEEE Transactions on Information Forensics and Security (2016)
Universal authentication protocols for anonymous wireless communications
Guomin Yang;Qiong Huang;Duncan Wong;Xiaotie Deng.
IEEE Transactions on Wireless Communications (2010)
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing
Kaitai Liang;Man Ho Au;Joseph K. Liu;Willy Susilo.
IEEE Transactions on Information Forensics and Security (2014)
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
Kaitai Liang;Man Ho Au;Joseph K. Liu;Willy Susilo.
grid computing (2015)
Hidden ciphertext policy attribute-based encryption under standard assumptions
Tran Viet Xuan Phuong;Guomin Yang;Willy Susilo.
IEEE Transactions on Information Forensics and Security (2016)
BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication
Rongmao Chen;Yi Mu;Guomin Yang;Fuchun Guo.
IEEE Transactions on Information Forensics and Security (2015)
Server-Aided Public Key Encryption With Keyword Search
Rongmao Chen;Yi Mu;Guomin Yang;Fuchun Guo.
IEEE Transactions on Information Forensics and Security (2016)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Wollongong
Fujian Normal University
City University of Hong Kong
Peking University
Nanyang Technological University
University of Hong Kong
Monash University
Singapore Management University
Singapore Management University
Fuzhou University
Indian Institute of Science
University of Chicago
Microsoft (United States)
Intuitive Surgical (Switzerland)
Université Libre de Bruxelles
Isfahan University of Technology
University of Cambridge
University of Siegen
Pepperdine University
Kansas State University
University of Bologna
University of Campania "Luigi Vanvitelli"
Indiana University
Aarhus University
Instituto de Salud Carlos III
The Open University