1. Privacy‐preserving grouping proof with key exchange in the multiple‐party setting. Issue 16 (14th July 2016) Authors: Tian, Yangguang; Yang, Guomin; Mu, Yi Journal: Security and communication networks Issue: Volume 9:Issue 16(2016) Page Start: 3239 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification. (26th April 2019) Authors: Cui, Yuzhao; Huang, Qiong; Huang, Jianye; Li, Hongbo; Yang, Guomin Editors: Liu, Joseph Journal: Computer journal Issue: Volume 62:Number 8(2019) Page Start: 1166 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Authorized Function Homomorphic Signature. (3rd November 2018) Authors: Guo, Qingwen; Huang, Qiong; Yang, Guomin Editors: Liu, Joseph Journal: Computer journal Issue: Volume 61:Number 12(2018) Page Start: 1897 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. A generalised bound for the Wiener attack on RSA. (August 2020) Authors: Susilo, Willy; Tonien, Joseph; Yang, Guomin Journal: Journal of information security and applications Issue: Volume 53(2020) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Unlinkable and Revocable Secret Handshake. (14th January 2021) Authors: Tian, Yangguang; Li, Yingjiu; Mu, Yi; Yang, Guomin Journal: Computer journal Issue: Volume 64:Number 8(2021) Page Start: 1303 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Hierarchical Identity-Based Signature in Polynomial Rings. (28th April 2020) Authors: Yang, Zhichao; Duong, Dung H; Susilo, Willy; Yang, Guomin; Li, Chao; Chen, Rongmao Journal: Computer journal Issue: Volume 63:Number 10(2020) Page Start: 1490 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange. Issue 5 (4th May 2017) Authors: Wei, Jiannan; Yang, Guomin; Mu, Yi Journal: International journal of computer mathematics Issue: Volume 94:Issue 5(2017) Page Start: 946 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Strong Identity-Based Proxy Signature Schemes, Revisited. (6th August 2018) Authors: Liu, Weiwei; Mu, Yi; Yang, Guomin; Tian, Yangguang Other Names: Choo Kim-Kwang Raymond Academic Editor. Journal: Wireless communications and mobile computing Issue: Volume 2018(2018) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Endogenous Secretory Receptor for Advanced Glycation End Products Protects Endothelial Cells from AGEs Induced Apoptosis. (10th April 2018) Authors: Yang, Guomin; Huang, Yinqiong; Wu, Xiaohong; Lin, Xiahong; Xu, Jinting; Chen, Xiaoyu; Bai, Xuefeng; Li, Qiulan Other Names: Safe Stephen H. Academic Editor. Journal: BioMed research international Issue: Volume 2018(2018) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. On the Security of LWE Cryptosystem against Subversion Attacks. (10th September 2019) Authors: Yang, Zhichao; Chen, Rongmao; Li, Chao; Qu, Longjiang; Yang, Guomin Journal: Computer journal Issue: Volume 63:Number 4(2020) Page Start: 495 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗