Search Results - "Guomin Yang"
-
1
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
Published in IEEE transactions on information forensics and security (01-01-2016)“…We propose two new ciphertext policy attribute-based encryption (CP-ABE) schemes where the access policy is defined by AND-gate with wildcard. In the first…”
Get full text
Journal Article -
2
Atomistic simulations of cation hydration in sodium and calcium montmorillonite nanopores
Published in The journal of physical chemistry. B (28-08-2017)“…facile synthesis of 3d-metal based electro-catalysts directly incorporated into a carbon support was carried out by.-radiation. Transition metals of period 4,…”
Get full text
Journal Article -
3
Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud
Published in IEEE transactions on information forensics and security (01-08-2018)“…Cloud computing is an emerging computing paradigm that enables users to store their data in a cloud server to enjoy scalable and on-demand services…”
Get full text
Journal Article -
4
BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication
Published in IEEE transactions on information forensics and security (01-12-2015)“…Deduplication is a popular technique widely used to save storage spaces in the cloud. To achieve secure deduplication of encrypted files, Bellare et al…”
Get full text
Journal Article -
5
Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies
Published in IEEE network (01-09-2019)“…Privacy is supreme in cryptocurrencies since most users do not want to reveal their identities or the transaction amount in financial transactions…”
Get full text
Journal Article -
6
Server-Aided Public Key Encryption With Keyword Search
Published in IEEE transactions on information forensics and security (01-12-2016)“…Public key encryption with keyword search (PEKS) is a well-known cryptographic primitive for secure searchable data encryption in cloud storage. Unfortunately,…”
Get full text
Journal Article -
7
Building Redactable Consortium Blockchain for Industrial Internet-of-Things
Published in IEEE transactions on industrial informatics (01-06-2019)“…Applying consortium blockchain as a trust layer for heterogeneous industrial Internet-of-Things devices is cost-effective. However, with an increase in…”
Get full text
Journal Article -
8
An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things
Published in IEEE transactions on industrial informatics (01-01-2021)“…As an essential element of the next generation Internet, Internet of Things (IoT) has been undergoing an extensive development in recent years. In addition to…”
Get full text
Journal Article -
9
A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks
Published in Wireless personal communications (01-12-2013)“…In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart…”
Get full text
Journal Article -
10
Comments on "An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks"
Published in IEEE transactions on wireless communications (01-06-2011)“…In a recent paper (IEEE Trans. Wireless Commun., vol. 9, no. 11, 2010), Chang and Tsai presented a self-verified mobile authentication scheme for large-scale…”
Get full text
Journal Article -
11
ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms
Published in IEEE internet of things journal (01-10-2019)“…An Internet of Things (IoT) system generally contains thousands of heterogeneous devices which often operate in swarms-large, dynamic, and self-organizing…”
Get full text
Journal Article -
12
Anonymous and Authenticated Key Exchange for Roaming Networks
Published in IEEE transactions on wireless communications (01-09-2007)“…User privacy is a notable security issue in wireless communications. It concerns about user identities from being exposed and user movements and whereabouts…”
Get full text
Journal Article -
13
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification
Published in Computer journal (09-08-2019)“…Thanks to the ease of access and low expenses, it is now popular for people to store data in cloud servers. To protect sensitive data from being leaked to the…”
Get full text
Journal Article -
14
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing
Published in IEEE transactions on information forensics and security (01-10-2014)“…In this paper, for the first time, we define a general notion for proxy re-encryption (PRE), which we call deterministic finite automata-based functional PRE…”
Get full text
Journal Article -
15
A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks
Published in IEEE access (01-01-2018)“…Recently, the study of road surface condition monitoring has drawn great attention to improve the traffic efficiency and road safety. As a matter of fact, this…”
Get full text
Journal Article -
16
Universal authentication protocols for anonymous wireless communications
Published in IEEE transactions on wireless communications (01-01-2010)“…A secure roaming protocol allows a roaming user U to visit a foreign server V and establish a session key in an authenticated way such that U authenticates V…”
Get full text
Journal Article -
17
Authenticated Key Exchange Protocols for Parallel Network File Systems
Published in IEEE transactions on parallel and distributed systems (01-01-2016)“…We study the problem of key establishment for secure many-to-many communications. The problem is inspired by the proliferation of large-scale distributed file…”
Get full text
Journal Article -
18
Comparative Modeling of Ions and Solvent Properties in Ca-Na Montmorillonite by Atomistic Simulations and Fluid Density Functional Theory
Published in Clays and clay minerals (01-04-2020)“…Molecular dynamics (MD) simulations provide an accurate description of the mineral–fluid interface from the perspective of the atomistic level taking into…”
Get full text
Journal Article -
19
Freezing mechanism of supercooled water droplet impinging on metal surfaces
Published in International journal of refrigeration (01-12-2011)“…Ice accretion on power lines is a random natural phenomenon and may seriously harm to the safety of power network. However, the mechanism of the freezing…”
Get full text
Journal Article -
20
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud
Published in IEEE transactions on information forensics and security (01-12-2017)“…It is widely acknowledged that the collaborations with more users increase productivity. Secure cloud storage is a promising tool to enhance such a…”
Get full text
Journal Article