Suivre
Fuchun Guo
Fuchun Guo
Adresse e-mail validée de uow.edu.au - Page d'accueil
Titre
Citée par
Citée par
Année
Dual-server public-key encryption with keyword search for secure cloud storage
R Chen, Y Mu, G Yang, F Guo, X Wang
IEEE transactions on information forensics and security 11 (4), 789-798, 2015
2202015
CP-ABE with constant-size keys for lightweight devices
F Guo, Y Mu, W Susilo, DS Wong, V Varadharajan
IEEE transactions on information forensics and security 9 (5), 763-771, 2014
1782014
Multi-identity single-key decryption without random oracles
F Guo, Y Mu, Z Chen, L Xu
International Conference on Information Security and Cryptology, 384-398, 2007
1292007
BL-MLE: block-level message-locked encryption for secure large file deduplication
R Chen, Y Mu, G Yang, F Guo
IEEE Transactions on Information Forensics and Security 10 (12), 2643-2652, 2015
1162015
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
Y Jiang, W Susilo, Y Mu, F Guo
Future Generation Computer Systems 78, 720-729, 2018
1082018
Server-aided public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Huang, X Wang, Y Wang
IEEE Transactions on Information Forensics and Security 11 (12), 2833-2842, 2016
992016
Identity-based online/offline encryption
F Guo, Y Mu, Z Chen
International conference on financial cryptography and data security, 247-261, 2008
982008
Identity-based online/offline encryption
F Guo, Y Mu, Z Chen
International conference on financial cryptography and data security, 247-261, 2008
982008
Searchain: Blockchain-based private keyword search in decentralized storage
P Jiang, F Guo, K Liang, J Lai, Q Wen
Future Generation Computer Systems 107, 781-792, 2020
972020
A new general framework for secure public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Wang
Australasian conference on information security and privacy, 59-76, 2015
942015
Identity-based encryption: how to decrypt multiple ciphertexts using a single decryption key
F Guo, Y Mu, Z Chen
International Conference on Pairing-Based Cryptography, 392-406, 2007
862007
Privacy-preserving and regular language search over encrypted cloud data
K Liang, X Huang, F Guo, JK Liu
IEEE Transactions on Information Forensics and Security 11 (10), 2365-2376, 2016
602016
Cryptographic reverse firewall via malleable smooth projective hash functions
R Chen, Y Mu, G Yang, W Susilo, F Guo, M Zhang
International Conference on the Theory and Application of Cryptology and …, 2016
442016
Strongly leakage-resilient authenticated key exchange
R Chen, Y Mu, G Yang, W Susilo, F Guo
Cryptographers’ Track at the RSA Conference, 19-36, 2016
432016
Distance-based encryption: How to embed fuzziness in biometric-based encryption
F Guo, W Susilo, Y Mu
IEEE Transactions on Information Forensics and Security 11 (2), 247-257, 2015
432015
Anonymous identity-based broadcast encryption with revocation for file sharing
J Lai, Y Mu, F Guo, W Susilo, R Chen
Australasian Conference on Information Security and Privacy, 223-239, 2016
362016
Recipient revocable identity-based broadcast encryption: How to revoke some recipients in IBBE without knowledge of the plaintext
W Susilo, R Chen, F Guo, G Yang, Y Mu, YW Chow
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
352016
Strong authenticated key exchange with auxiliary inputs
R Chen, Y Mu, G Yang, W Susilo, F Guo
Designs, Codes and Cryptography 85 (1), 145-173, 2017
322017
Optimized identity-based encryption from bilinear pairing for lightweight devices
F Guo, Y Mu, W Susilo, H Hsing, DS Wong, V Varadharajan
IEEE Transactions on Dependable and Secure Computing 14 (2), 211-220, 2015
312015
A cloud-aided privacy-preserving multi-dimensional data comparison protocol
H Shen, M Zhang, H Wang, F Guo, W Susilo
Information Sciences 545, 739-752, 2021
302021
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20