D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 33 Citations 4,143 182 World Ranking 8769 National Ranking 113

Overview

What is he best known for?

The fields of study Guomin Yang is best known for:

  • Cryptography
  • Encryption
  • Public-key cryptography

Attribute-based encryption, Key exchange, Proxy re-encryption and Random oracle are the subject areas of his Public-key cryptography study. His Database research covers fields of interest such as Database transaction and Software engineering. His work blends Software engineering and Database studies together. His research on Computer security frequently links to adjacent areas such as Anonymity. Guomin Yang applies his multidisciplinary studies on Encryption and Cryptography in his research. He performs multidisciplinary studies into Cryptography and Encryption in his work. His research links Roaming with Computer network. In his articles, Guomin Yang combines various disciplines, including Cloud computing and Cloud storage. Guomin Yang performs multidisciplinary study in the fields of Operating system and Distributed computing via his papers.

His most cited work include:

  • Two-factor mutual authentication based on smart cards and passwords (180 citations)
  • Probabilistic Public Key Encryption with Equality Test (128 citations)
  • Electrical tuning of magnetism in Fe3O4/PZN–PT multiferroic heterostructures derived by reactive magnetron sputtering (126 citations)

What are the main themes of his work throughout his whole career to date

His Public-key cryptography study is focused on Key exchange and Random oracle. Theoretical computer science is integrated with Cryptography and Programming language in his study. His work often combines Cryptography and Public-key cryptography studies. Guomin Yang conducts interdisciplinary study in the fields of Programming language and Theoretical computer science through his research. As part of his studies on Computer security, Guomin Yang often connects relevant areas like Authentication (law). Guomin Yang merges Encryption with Key exchange in his study. His multidisciplinary approach integrates Computer network and Operating system in his work. Guomin Yang undertakes interdisciplinary study in the fields of Operating system and Cloud computing through his research. He connects Cloud computing with Computer network in his study.

Guomin Yang most often published in these fields:

  • Computer security (83.33%)
  • Encryption (54.39%)
  • Public-key cryptography (40.35%)

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Malicious KGC attacks in certificateless cryptography

Man Ho Au;Yi Mu;Jing Chen;Duncan S. Wong.
computer and communications security (2007)

276 Citations

Two-factor mutual authentication based on smart cards and passwords

Guomin Yang;Duncan S. Wong;Huaxiong Wang;Xiaotie Deng.
Journal of Computer and System Sciences (2008)

242 Citations

Probabilistic public key encryption with equality test

Guomin Yang;Chik How Tan;Qiong Huang;Duncan S. Wong.
the cryptographers track at the rsa conference (2010)

227 Citations

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage

Rongmao Chen;Yi Mu;Guomin Yang;Fuchun Guo.
IEEE Transactions on Information Forensics and Security (2016)

192 Citations

Universal authentication protocols for anonymous wireless communications

Guomin Yang;Qiong Huang;Duncan Wong;Xiaotie Deng.
IEEE Transactions on Wireless Communications (2010)

163 Citations

A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing

Kaitai Liang;Man Ho Au;Joseph K. Liu;Willy Susilo.
IEEE Transactions on Information Forensics and Security (2014)

146 Citations

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing

Kaitai Liang;Man Ho Au;Joseph K. Liu;Willy Susilo.
grid computing (2015)

144 Citations

Hidden ciphertext policy attribute-based encryption under standard assumptions

Tran Viet Xuan Phuong;Guomin Yang;Willy Susilo.
IEEE Transactions on Information Forensics and Security (2016)

132 Citations

BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication

Rongmao Chen;Yi Mu;Guomin Yang;Fuchun Guo.
IEEE Transactions on Information Forensics and Security (2015)

114 Citations

Server-Aided Public Key Encryption With Keyword Search

Rongmao Chen;Yi Mu;Guomin Yang;Fuchun Guo.
IEEE Transactions on Information Forensics and Security (2016)

101 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Guomin Yang

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 98

Yi Mu

Yi Mu

Fujian Normal University

Publications: 49

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 38

Duncan S. Wong

Duncan S. Wong

City University of Hong Kong

Publications: 34

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 34

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 30

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 30

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 28

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 27

Debiao He

Debiao He

Wuhan University

Publications: 27

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 23

Man Ho Au

Man Ho Au

University of Hong Kong

Publications: 21

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 20

Xiong Li

Xiong Li

University of Electronic Science and Technology of China

Publications: 18

Huaxiong Wang

Huaxiong Wang

Nanyang Technological University

Publications: 16

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 16

Trending Scientists

Narasimha Murty M

Narasimha Murty M

Indian Institute of Science

Luis Silvestre

Luis Silvestre

University of Chicago

William Buxton

William Buxton

Microsoft (United States)

Thomas G. Cooper

Thomas G. Cooper

Intuitive Surgical (Switzerland)

Valentina Shevtsova

Valentina Shevtsova

Université Libre de Bruxelles

Shadpour Mallakpour

Shadpour Mallakpour

Isfahan University of Technology

Allan N. Hayhurst

Allan N. Hayhurst

University of Cambridge

Ulrich Jonas

Ulrich Jonas

University of Siegen

Lee B. Kats

Lee B. Kats

Pepperdine University

David C. Hartnett

David C. Hartnett

Kansas State University

Vincenzo Russo

Vincenzo Russo

University of Bologna

Lucia Altucci

Lucia Altucci

University of Campania "Luigi Vanvitelli"

Daniel B. Kearns

Daniel B. Kearns

Indiana University

Johannes Overgaard

Johannes Overgaard

Aarhus University

Julio Díaz

Julio Díaz

Instituto de Salud Carlos III

John T. E. Richardson

John T. E. Richardson

The Open University

Something went wrong. Please try again later.