dblp.uni-trier.dewww.uni-trier.de

Guilin Wang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
43EEFeng Bao, Hui Li, Guilin Wang: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings Springer 2009
2008
42 Sihan Qing, Hideki Imai, Guilin Wang: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings Springer 2008
41 Liqun Chen, Mark Dermot Ryan, Guilin Wang: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings Springer 2008
40EEWei Gao, Guilin Wang, Xueli Wang, Fei Li: One-Round ID-Based Blind Signature Scheme without ROS Assumption. Pairing 2008: 316-331
39EETieyan Li, Guilin Wang, Robert H. Deng: Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols. JSW 3(3): 1-10 (2008)
38EETieyan Li, Robert H. Deng, Guilin Wang: The security and improvement of an ultra-lightweight RFID authentication protocol. Security and Communication Networks 1(2): 135-146 (2008)
2007
37EEShiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen: Undeniable Mobile Billing Schemes. EuroPKI 2007: 338-345
36EEDennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo: Formal Definition and Construction of Nominative Signature. ICICS 2007: 57-68
35EEGuilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao: On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. Public Key Cryptography 2007: 43-60
34EETieyan Li, Guilin Wang: Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. SEC 2007: 109-120
33EEGuilin Wang, Feng Bao: Security Remarks on a Convertible Nominative Signature Scheme. SEC 2007: 265-275
32 Lifeng Guo, Guilin Wang, Duncan S. Wong, Lei Hu: Further Discussions on the Security of a Nominative Signature Scheme. Security and Management 2007: 566-572
31EELifeng Guo, Guilin Wang: Insider attacks on multi-proxy multi-signature schemes. Computers & Electrical Engineering 33(2): 88-93 (2007)
2006
30EEGuilin Wang, Feng Bao: Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. ICICS 2006: 399-409
29EEGuilin Wang, Feng Bao, Jianying Zhou: The Fairness of Perfect Concurrent Signatures. ICICS 2006: 435-451
28EEWei Gao, Guilin Wang, Xueli Wang, Dongqing Xie: Controllable Ring Signatures. WISA 2006: 1-14
27EEMin-Hua Shao, Guilin Wang, Jianying Zhou: Some common attacks against certified email protocols and the countermeasures. Computer Communications 29(15): 2759-2769 (2006)
26EEDong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng: A secure extension of the Kwak-Moon group signcryption scheme. Computers & Security 25(6): 435-444 (2006)
25EEGuilin Wang: Generic non-repudiation protocols supporting transparent off-line TTP. Journal of Computer Security 14(5): 441-467 (2006)
2005
24 Sihan Qing, Wenbo Mao, Javier Lopez, Guilin Wang: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings Springer 2005
23EEHelger Lipmaa, Guilin Wang, Feng Bao: Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction. ICALP 2005: 459-471
22EEMin-Hua Shao, Jianying Zhou, Guilin Wang: On the Security of a Certified E-Mail Scheme with Temporal Authentication. ICCSA (3) 2005: 701-710
21EEGuilin Wang, Sihan Qing: Security Flaws in Several Group Signatures Proposed by Popescu. ICCSA (3) 2005: 711-718
20EEGuilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai: Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. ICICS 2005: 40-52
19EEBo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Providing efficient certification services against active attacks in ad hoc networks. IPCCC 2005: 285-292
18 Guilin Wang: Designated-Verifier Proxy Signature Schemes. SEC 2005: 409-424
17EEGuilin Wang: An abuse-free fair contract signing protocol based on the RSA signature. WWW 2005: 412-421
16EEGuilin Wang, Feng Bao, Changshe Ma, Kefei Chen: Efficient Authenticated Encryption Schemes with Public Verifiability CoRR abs/cs/0504019: (2005)
15EEBo Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli, Guilin Wang: Efficient and robust key management for large mobile ad hoc networks. Computer Networks 48(4): 657-682 (2005)
2004
14EEFeng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu: Analysis and Improvement of Micali's Fair Contract Signing Protocol. ACISP 2004: 176-187
13 Guilin Wang: Designated-verifier proxy signatures for e-commerce. ICME 2004: 1731-1734
12EEGuilin Wang, Feng Bao, Jianying Zhou: On the Security of a Certified E-Mail Scheme. INDOCRYPT 2004: 48-60
11EEGuilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon: Security Analysis of Two Signcryption Schemes. ISC 2004: 123-133
10EEGuilin Wang, Jianying Zhou, Robert H. Deng: On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. TrustBus 2004: 289-298
9EEGuilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". IEEE Trans. Knowl. Data Eng. 16(10): 1309-1311 (2004)
8EEGuilin Wang: Universal forgery on a group signature scheme using self-certified public keys. Inf. Process. Lett. 89(5): 227-231 (2004)
2003
7EEGuilin Wang, Xiaoxi Han, Bo Zhu: On the Security of Two Threshold Signature Schemes with Traceable Signers. ACNS 2003: 111-122
6EEGuilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Remarks on a Group Signature Scheme with Member Deletion. ICICS 2003: 72-83
5EEGuilin Wang: On the Security of a Group Signature Scheme with Forward Security. ICISC 2003: 27-39
4EEGuilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Analysis of Some Proxy Signatures. ICISC 2003: 305-319
3EEGuilin Wang: Security Analysis of Several Group Signature Schemes. INDOCRYPT 2003: 252-265
2002
2EEGuilin Wang: On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme. ICISC 2002: 75-89
2001
1EEGuilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou: Threshold Undeniable RSA Signature Scheme. ICICS 2001: 221-232

Coauthor Index

1Joonsang Baek [35]
2Feng Bao [4] [6] [9] [12] [14] [15] [16] [19] [20] [23] [29] [30] [33] [35] [43]
3Kefei Chen [16] [37]
4Liqun Chen [41]
5Robert H. Deng (Robert Huijie Deng) [4] [6] [9] [10] [11] [15] [19] [26] [38] [39]
6Wei Gao [28] [40]
7Lifeng Guo [31] [32]
8Xiaoxi Han [7]
9Lei Hu [32]
10Qiong Huang [36]
11Xinyi Huang [36]
12Hideki Imai [42]
13Kenji Imamoto [20]
14Mohan S. Kankanhalli [15] [19]
15Dong Jin Kwak [11] [26]
16Fei Li [40]
17Hui Li [43]
18Shiqun Li [37]
19Tieyan Li [34] [38] [39]
20Helger Lipmaa [23]
21Dennis Y. W. Liu [36]
22Javier Lopez [24]
23Changshe Ma [16]
24Wenbo Mao [24]
25Sang-Jae Moon [11] [26]
26Yi Mu [36]
27Sihan Qing [1] [21] [24] [42]
28Mark Ryan (Mark Dermot Ryan) [41]
29Kouichi Sakurai [20]
30Min-Hua Shao [22] [27]
31Willy Susilo [36]
32Zhiguo Wan [19]
33Mingsheng Wang [1]
34Xueli Wang [28] [40]
35Duncan S. Wong [32] [35] [36]
36Dongqing Xie [28]
37Jianying Zhou [4] [6] [9] [10] [12] [14] [22] [27] [29] [37]
38Zhanfei Zhou [1]
39Bo Zhu [7] [15] [19]
40Huafei Zhu [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)