Search Results - "Guomin Yang"

Refine Results
  1. 1

    Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions by Tran Viet Xuan Phuong, Guomin Yang, Susilo, Willy

    “…We propose two new ciphertext policy attribute-based encryption (CP-ABE) schemes where the access policy is defined by AND-gate with wildcard. In the first…”
    Get full text
    Journal Article
  2. 2

    Atomistic simulations of cation hydration in sodium and calcium montmorillonite nanopores by Yang, Guomin, Neretnieks, Ivars, Holmboe, Michael

    Published in The journal of physical chemistry. B (28-08-2017)
    “…facile synthesis of 3d-metal based electro-catalysts directly incorporated into a carbon support was carried out by.-radiation. Transition metals of period 4,…”
    Get full text
    Journal Article
  3. 3

    Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud by Shengmin Xu, Guomin Yang, Yi Mu, Deng, Robert H.

    “…Cloud computing is an emerging computing paradigm that enables users to store their data in a cloud server to enjoy scalable and on-demand services…”
    Get full text
    Journal Article
  4. 4

    BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication by Chen, Rongmao, Mu, Yi, Yang, Guomin, Guo, Fuchun

    “…Deduplication is a popular technique widely used to save storage spaces in the cloud. To achieve secure deduplication of encrypted files, Bellare et al…”
    Get full text
    Journal Article
  5. 5

    Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies by Li, Yannan, Susilo, Willy, Yang, Guomin, Yu, Yong, Du, Xiaojiang, Liu, Dongxi, Guizani, Nadra

    Published in IEEE network (01-09-2019)
    “…Privacy is supreme in cryptocurrencies since most users do not want to reveal their identities or the transaction amount in financial transactions…”
    Get full text
    Journal Article
  6. 6

    Server-Aided Public Key Encryption With Keyword Search by Chen, Rongmao, Mu, Yi, Yang, Guomin, Guo, Fuchun, Huang, Xinyi, Wang, Xiaofen, Wang, Yongjun

    “…Public key encryption with keyword search (PEKS) is a well-known cryptographic primitive for secure searchable data encryption in cloud storage. Unfortunately,…”
    Get full text
    Journal Article
  7. 7

    Building Redactable Consortium Blockchain for Industrial Internet-of-Things by Huang, Ke, Zhang, Xiaosong, Mu, Yi, Wang, Xiaofen, Yang, Guomin, Du, Xiaojiang, Rezaeibagha, Fatemeh, Xia, Qi, Guizani, Mohsen

    “…Applying consortium blockchain as a trust layer for heterogeneous industrial Internet-of-Things devices is cost-effective. However, with an increase in…”
    Get full text
    Journal Article
  8. 8

    An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things by Wei, Jiannan, Phuong, Tran Viet Xuan, Yang, Guomin

    “…As an essential element of the next generation Internet, Internet of Things (IoT) has been undergoing an extensive development in recent years. In addition to…”
    Get full text
    Journal Article
  9. 9

    A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks by Wen, Fengtong, Susilo, Willy, Yang, Guomin

    Published in Wireless personal communications (01-12-2013)
    “…In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart…”
    Get full text
    Journal Article
  10. 10

    Comments on "An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks" by Yang, Guomin

    “…In a recent paper (IEEE Trans. Wireless Commun., vol. 9, no. 11, 2010), Chang and Tsai presented a self-verified mobile authentication scheme for large-scale…”
    Get full text
    Journal Article
  11. 11

    ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms by Kuang, Boyu, Fu, Anmin, Yu, Shui, Yang, Guomin, Su, Mang, Zhang, Yuqing

    Published in IEEE internet of things journal (01-10-2019)
    “…An Internet of Things (IoT) system generally contains thousands of heterogeneous devices which often operate in swarms-large, dynamic, and self-organizing…”
    Get full text
    Journal Article
  12. 12

    Anonymous and Authenticated Key Exchange for Roaming Networks by Guomin Yang, Wong, D.S., Xiaotie Deng

    “…User privacy is a notable security issue in wireless communications. It concerns about user identities from being exposed and user movements and whereabouts…”
    Get full text
    Journal Article
  13. 13

    Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification by Cui, Yuzhao, Huang, Qiong, Huang, Jianye, Li, Hongbo, Yang, Guomin

    Published in Computer journal (09-08-2019)
    “…Thanks to the ease of access and low expenses, it is now popular for people to store data in cloud servers. To protect sensitive data from being leaked to the…”
    Get full text
    Journal Article
  14. 14

    A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing by Kaitai Liang, Man Ho Au, Liu, Joseph K., Susilo, Willy, Wong, Duncan S., Guomin Yang, Phuong, Tran Viet Xuan, Qi Xie

    “…In this paper, for the first time, we define a general notion for proxy re-encryption (PRE), which we call deterministic finite automata-based functional PRE…”
    Get full text
    Journal Article
  15. 15

    A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks by Wei, Jiannan, Wang, Xiaojie, Li, Nan, Yang, Guomin, Mu, Yi

    Published in IEEE access (01-01-2018)
    “…Recently, the study of road surface condition monitoring has drawn great attention to improve the traffic efficiency and road safety. As a matter of fact, this…”
    Get full text
    Journal Article
  16. 16

    Universal authentication protocols for anonymous wireless communications by Yang, Guomin, Huang, Qiong, Wong, Duncan S., Deng, Xiaotie

    “…A secure roaming protocol allows a roaming user U to visit a foreign server V and establish a session key in an authenticated way such that U authenticates V…”
    Get full text
    Journal Article
  17. 17

    Authenticated Key Exchange Protocols for Parallel Network File Systems by Lim, Hoon Wei, Yang, Guomin

    “…We study the problem of key establishment for secure many-to-many communications. The problem is inspired by the proliferation of large-scale distributed file…”
    Get full text
    Journal Article
  18. 18

    Comparative Modeling of Ions and Solvent Properties in Ca-Na Montmorillonite by Atomistic Simulations and Fluid Density Functional Theory by Yang, Guomin, Prasianakis, Nikolaos I., Churakov, Sergey V.

    Published in Clays and clay minerals (01-04-2020)
    “…Molecular dynamics (MD) simulations provide an accurate description of the mineral–fluid interface from the perspective of the atomistic level taking into…”
    Get full text
    Journal Article
  19. 19

    Freezing mechanism of supercooled water droplet impinging on metal surfaces by Yang, Guomin, Guo, Kaihua, Li, Ning

    Published in International journal of refrigeration (01-12-2011)
    “…Ice accretion on power lines is a random natural phenomenon and may seriously harm to the safety of power network. However, the mechanism of the freezing…”
    Get full text
    Journal Article
  20. 20

    EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud by Susilo, Willy, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu, Yi Mu

    “…It is widely acknowledged that the collaborations with more users increase productivity. Secure cloud storage is a promising tool to enhance such a…”
    Get full text
    Journal Article