2009 |
43 | EE | Feng Bao,
Hui Li,
Guilin Wang:
Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings
Springer 2009 |
2008 |
42 | | Sihan Qing,
Hideki Imai,
Guilin Wang:
Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings
Springer 2008 |
41 | | Liqun Chen,
Mark Dermot Ryan,
Guilin Wang:
Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings
Springer 2008 |
40 | EE | Wei Gao,
Guilin Wang,
Xueli Wang,
Fei Li:
One-Round ID-Based Blind Signature Scheme without ROS Assumption.
Pairing 2008: 316-331 |
39 | EE | Tieyan Li,
Guilin Wang,
Robert H. Deng:
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.
JSW 3(3): 1-10 (2008) |
38 | EE | Tieyan Li,
Robert H. Deng,
Guilin Wang:
The security and improvement of an ultra-lightweight RFID authentication protocol.
Security and Communication Networks 1(2): 135-146 (2008) |
2007 |
37 | EE | Shiqun Li,
Guilin Wang,
Jianying Zhou,
Kefei Chen:
Undeniable Mobile Billing Schemes.
EuroPKI 2007: 338-345 |
36 | EE | Dennis Y. W. Liu,
Duncan S. Wong,
Xinyi Huang,
Guilin Wang,
Qiong Huang,
Yi Mu,
Willy Susilo:
Formal Definition and Construction of Nominative Signature.
ICICS 2007: 57-68 |
35 | EE | Guilin Wang,
Joonsang Baek,
Duncan S. Wong,
Feng Bao:
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.
Public Key Cryptography 2007: 43-60 |
34 | EE | Tieyan Li,
Guilin Wang:
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols.
SEC 2007: 109-120 |
33 | EE | Guilin Wang,
Feng Bao:
Security Remarks on a Convertible Nominative Signature Scheme.
SEC 2007: 265-275 |
32 | | Lifeng Guo,
Guilin Wang,
Duncan S. Wong,
Lei Hu:
Further Discussions on the Security of a Nominative Signature Scheme.
Security and Management 2007: 566-572 |
31 | EE | Lifeng Guo,
Guilin Wang:
Insider attacks on multi-proxy multi-signature schemes.
Computers & Electrical Engineering 33(2): 88-93 (2007) |
2006 |
30 | EE | Guilin Wang,
Feng Bao:
Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards.
ICICS 2006: 399-409 |
29 | EE | Guilin Wang,
Feng Bao,
Jianying Zhou:
The Fairness of Perfect Concurrent Signatures.
ICICS 2006: 435-451 |
28 | EE | Wei Gao,
Guilin Wang,
Xueli Wang,
Dongqing Xie:
Controllable Ring Signatures.
WISA 2006: 1-14 |
27 | EE | Min-Hua Shao,
Guilin Wang,
Jianying Zhou:
Some common attacks against certified email protocols and the countermeasures.
Computer Communications 29(15): 2759-2769 (2006) |
26 | EE | Dong Jin Kwak,
Sang-Jae Moon,
Guilin Wang,
Robert H. Deng:
A secure extension of the Kwak-Moon group signcryption scheme.
Computers & Security 25(6): 435-444 (2006) |
25 | EE | Guilin Wang:
Generic non-repudiation protocols supporting transparent off-line TTP.
Journal of Computer Security 14(5): 441-467 (2006) |
2005 |
24 | | Sihan Qing,
Wenbo Mao,
Javier Lopez,
Guilin Wang:
Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings
Springer 2005 |
23 | EE | Helger Lipmaa,
Guilin Wang,
Feng Bao:
Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction.
ICALP 2005: 459-471 |
22 | EE | Min-Hua Shao,
Jianying Zhou,
Guilin Wang:
On the Security of a Certified E-Mail Scheme with Temporal Authentication.
ICCSA (3) 2005: 701-710 |
21 | EE | Guilin Wang,
Sihan Qing:
Security Flaws in Several Group Signatures Proposed by Popescu.
ICCSA (3) 2005: 711-718 |
20 | EE | Guilin Wang,
Feng Bao,
Kenji Imamoto,
Kouichi Sakurai:
Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery.
ICICS 2005: 40-52 |
19 | EE | Bo Zhu,
Guilin Wang,
Zhiguo Wan,
Mohan S. Kankanhalli,
Feng Bao,
Robert H. Deng:
Providing efficient certification services against active attacks in ad hoc networks.
IPCCC 2005: 285-292 |
18 | | Guilin Wang:
Designated-Verifier Proxy Signature Schemes.
SEC 2005: 409-424 |
17 | EE | Guilin Wang:
An abuse-free fair contract signing protocol based on the RSA signature.
WWW 2005: 412-421 |
16 | EE | Guilin Wang,
Feng Bao,
Changshe Ma,
Kefei Chen:
Efficient Authenticated Encryption Schemes with Public Verifiability
CoRR abs/cs/0504019: (2005) |
15 | EE | Bo Zhu,
Feng Bao,
Robert H. Deng,
Mohan S. Kankanhalli,
Guilin Wang:
Efficient and robust key management for large mobile ad hoc networks.
Computer Networks 48(4): 657-682 (2005) |
2004 |
14 | EE | Feng Bao,
Guilin Wang,
Jianying Zhou,
Huafei Zhu:
Analysis and Improvement of Micali's Fair Contract Signing Protocol.
ACISP 2004: 176-187 |
13 | | Guilin Wang:
Designated-verifier proxy signatures for e-commerce.
ICME 2004: 1731-1734 |
12 | EE | Guilin Wang,
Feng Bao,
Jianying Zhou:
On the Security of a Certified E-Mail Scheme.
INDOCRYPT 2004: 48-60 |
11 | EE | Guilin Wang,
Robert H. Deng,
Dong Jin Kwak,
Sang-Jae Moon:
Security Analysis of Two Signcryption Schemes.
ISC 2004: 123-133 |
10 | EE | Guilin Wang,
Jianying Zhou,
Robert H. Deng:
On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes.
TrustBus 2004: 289-298 |
9 | EE | Guilin Wang,
Feng Bao,
Jianying Zhou,
Robert H. Deng:
Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem".
IEEE Trans. Knowl. Data Eng. 16(10): 1309-1311 (2004) |
8 | EE | Guilin Wang:
Universal forgery on a group signature scheme using self-certified public keys.
Inf. Process. Lett. 89(5): 227-231 (2004) |
2003 |
7 | EE | Guilin Wang,
Xiaoxi Han,
Bo Zhu:
On the Security of Two Threshold Signature Schemes with Traceable Signers.
ACNS 2003: 111-122 |
6 | EE | Guilin Wang,
Feng Bao,
Jianying Zhou,
Robert H. Deng:
Security Remarks on a Group Signature Scheme with Member Deletion.
ICICS 2003: 72-83 |
5 | EE | Guilin Wang:
On the Security of a Group Signature Scheme with Forward Security.
ICISC 2003: 27-39 |
4 | EE | Guilin Wang,
Feng Bao,
Jianying Zhou,
Robert H. Deng:
Security Analysis of Some Proxy Signatures.
ICISC 2003: 305-319 |
3 | EE | Guilin Wang:
Security Analysis of Several Group Signature Schemes.
INDOCRYPT 2003: 252-265 |
2002 |
2 | EE | Guilin Wang:
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme.
ICISC 2002: 75-89 |
2001 |
1 | EE | Guilin Wang,
Sihan Qing,
Mingsheng Wang,
Zhanfei Zhou:
Threshold Undeniable RSA Signature Scheme.
ICICS 2001: 221-232 |