What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Guilin Wang
Google Scholar
24
publications in security and cryptology related venues
Year
Venue
Title
2017
journals/tifs
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
Qi Xie
Duncan S. Wong
Guilin Wang
Xiao Tan
Kefei Chen
Liming Fang
2017
conf/ccs
VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange.
David Pointcheval
Guilin Wang
2016
journals/compsec
PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid.
Zhiguo Wan
Wen Tao Zhu
Guilin Wang
2014
journals/tifs
Collusion-Resistance in Optimistic Fair Exchange.
Yang Wang
Willy Susilo
Man Ho Au
Guilin Wang
2014
journals/tifs
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation.
Jiangshan Yu
Guilin Wang
Yi Mu
Wei Gao
2011
conf/ccs
On the invisibility of designated confirmer signatures.
Fubiao Xia
Guilin Wang
Rui Xue
2010
journals/tifs
An abuse-free fair contract-signing protocol based on the RSA signature.
Guilin Wang
2007
conf/sec
Security Remarks on a Convertible Nominative Signature Scheme.
Guilin Wang
Feng Bao
2007
conf/sec
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols.
Tieyan Li
Guilin Wang
2007
conf/pkc
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.
Guilin Wang
Joonsang Baek
Duncan S. Wong
Feng Bao
2007
conf/icics
Formal Definition and Construction of Nominative Signature.
Dennis Y. W. Liu
Duncan S. Wong
Xinyi Huang
Guilin Wang
Qiong Huang
Yi Mu
Willy Susilo
2006
journals/compsec
A secure extension of the Kwak-Moon group signcryption scheme.
Dong Jin Kwak
Sang-Jae Moon
Guilin Wang
Robert H. Deng
2006
conf/wisa
Controllable Ring Signatures.
Wei Gao
Guilin Wang
Xueli Wang
Dongqing Xie
2006
conf/icics
The Fairness of Perfect Concurrent Signatures.
Guilin Wang
Feng Bao
Jianying Zhou
2006
conf/icics
Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards.
Guilin Wang
Feng Bao
2005
conf/sec
Designated-Verifier Proxy Signature Schemes.
Guilin Wang
2005
conf/icics
Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery.
Guilin Wang
Feng Bao
Kenji Imamoto
Kouichi Sakurai
2004
conf/acisp
Analysis and Improvement of Micali's Fair Contract Signing Protocol.
Feng Bao
Guilin Wang
Jianying Zhou
Huafei Zhu
2003
conf/acns
On the Security of Two Threshold Signature Schemes with Traceable Signers.
Guilin Wang
Xiaoxi Han
Bo Zhu
2003
conf/icisc
On the Security of a Group Signature Scheme with Forward Security.
Guilin Wang
2003
conf/icisc
Security Analysis of Some Proxy Signatures.
Guilin Wang
Feng Bao
Jianying Zhou
Robert H. Deng
2003
conf/icics
Security Remarks on a Group Signature Scheme with Member Deletion.
Guilin Wang
Feng Bao
Jianying Zhou
Robert H. Deng
2002
conf/icisc
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme.
Guilin Wang
2001
conf/icics
Threshold Undeniable RSA Signature Scheme.
Guilin Wang
Sihan Qing
Mingsheng Wang
Zhanfei Zhou
Coauthors
Bo Zhu
(1)
David Pointcheval
(1)
Dennis Y. W. Liu
(1)
Dong Jin Kwak
(1)
Dongqing Xie
(1)
Duncan S. Wong
(3)
Feng Bao
(8)
Fubiao Xia
(1)
Guilin Wang
(24)
Huafei Zhu
(1)
Jiangshan Yu
(1)
Jianying Zhou
(4)
Joonsang Baek
(1)
Kefei Chen
(1)
Kenji Imamoto
(1)
Kouichi Sakurai
(1)
Liming Fang
(1)
Man Ho Au
(1)
Mingsheng Wang
(1)
Qi Xie
(1)
Qiong Huang
(1)
Robert H. Deng
(3)
Rui Xue
(1)
Sang-Jae Moon
(1)
Sihan Qing
(1)
Tieyan Li
(1)
Wei Gao
(2)
Wen Tao Zhu
(1)
Willy Susilo
(2)
Xiao Tan
(1)
Xiaoxi Han
(1)
Xinyi Huang
(1)
Xueli Wang
(1)
Yang Wang
(1)
Yi Mu
(2)
Zhanfei Zhou
(1)
Zhiguo Wan
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to