Security analysis of two ultra-lightweight RFID authentication protocols T Li, G Wang IFIP international information security conference, 109-120, 2007 | 282 | 2007 |
Evolving privacy: From sensors to the Internet of Things J Lopez, R Rios, F Bao, G Wang Future Generation Computer Systems 75, 46-57, 2017 | 200 | 2017 |
Designated verifier signature schemes: Attacks, new security notions and a new construction H Lipmaa, G Wang, F Bao Automata, Languages and Programming: 32nd International Colloquium, ICALP …, 2005 | 199 | 2005 |
Threshold anonymous announcement in VANETs L Chen, SL Ng, G Wang IEEE Journal on selected areas in communications 29 (3), 605-615, 2011 | 173 | 2011 |
Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model Q Xie, DS Wong, G Wang, X Tan, K Chen, L Fang IEEE Transactions on Information Forensics and Security 12 (6), 1382-1392, 2017 | 150 | 2017 |
Security analysis of some proxy signatures G Wang, F Bao, J Zhou, RH Deng Information Security and Cryptology-ICISC 2003: 6th International Conference …, 2004 | 135 | 2004 |
SKM: Scalable key management for advanced metering infrastructure in smart grids Z Wan, G Wang, Y Yang, S Shi IEEE Transactions on Industrial Electronics 61 (12), 7055-7066, 2014 | 128 | 2014 |
Efficient and expressive keyword search over encrypted data in cloud H Cui, Z Wan, RH Deng, G Wang, Y Li IEEE Transactions on Dependable and Secure Computing 15 (3), 409-422, 2016 | 105 | 2016 |
An efficient generic framework for three-factor authentication with provably secure instantiation J Yu, G Wang, Y Mu, W Gao IEEE transactions on information forensics and security 9 (12), 2302-2313, 2014 | 105 | 2014 |
Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks G Wang, J Yu, Q Xie Industrial Informatics, IEEE Transactions on 9 (1), 294-302, 2013 | 96 | 2013 |
An authentication framework for wireless sensor networks using identity-based signatures R Yasmin, E Ritter, G Wang 2010 10th IEEE International Conference on Computer and Information …, 2010 | 93 | 2010 |
Designated-verifier proxy signature schemes G Wang Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20 th …, 2005 | 84 | 2005 |
Analysis and improvement of Micali’s fair contract signing protocol F Bao, G Wang, J Zhou, H Zhu Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004 | 83 | 2004 |
Enhancing pharmacokinetics, tumor accumulation, and antitumor efficacy by elastin‐like polypeptide fusion of interferon alpha J Hu, G Wang, X Liu, W Gao Advanced Materials 45 (27), 7320-7324, 2015 | 81 | 2015 |
Efficient and robust key management for large mobile ad hoc networks B Zhu, F Bao, RH Deng, MS Kankanhalli, G Wang Computer networks 48 (4), 657-682, 2005 | 77 | 2005 |
The fairness of perfect concurrent signatures G Wang, F Bao, J Zhou Information and Communications Security: 8th International Conference, ICICS …, 2006 | 72 | 2006 |
Improved certificateless signature scheme provably secure in the standard model Y Yu, Y Mu, G Wang, Q Xia, B Yang IET Information Security 6 (2), 102-110, 2012 | 70 | 2012 |
An abuse-free fair contract-signing protocol based on the RSA signature G Wang IEEE Transactions on Information Forensics and Security 5 (1), 158-168, 2009 | 64 | 2009 |
Designated-verifier proxy signatures for e-commerce G Wang 2004 IEEE International Conference on Multimedia and Expo (ICME)(IEEE Cat …, 2004 | 62 | 2004 |
Comments on ''A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'' G Wang, F Bao, J Zhou, RH Deng Knowledge and Data Engineering, IEEE Transactions on 16 (10), 1309-1311, 2004 | 57 | 2004 |