Guilin Wang

From MaRDI portal
Person:869323


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Material point method simulation approach to hydraulic fracturing in porous medium
Engineering Analysis with Boundary Elements
2024-05-29Paper
Material point method for the propagation of multiple branched cracks based on classical fracture mechanics
Computer Methods in Applied Mechanics and Engineering
2021-11-16Paper
Escrow free attribute-based signature with self-revealability
Information Sciences
2020-01-06Paper
A reduction of security notions in designated confirmer signatures
Theoretical Computer Science
2016-02-18Paper
Designated confirmer signatures with unified verification
Cryptography and Coding
2011-12-16Paper
Universal forgery on a group signature scheme using self-certified public keys
Information Processing Letters
2009-07-09Paper
Formal Definition and Construction of Nominative Signature
Information and Communications Security
2008-03-25Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures
Public Key Cryptography – PKC 2007
2007-09-04Paper
Insider attacks on multi-proxy multi-signature schemes
Computers and Electrical Engineering
2007-03-02Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
Analysis and improvement of a multisecret sharing authenticating scheme
 
2006-10-04Paper
scientific article; zbMATH DE number 2247709 (Why is no real title available?)
 
2006-01-16Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Efficient and robust key management for large mobile ad hoc networks
Computer Networks
2005-08-03Paper
scientific article; zbMATH DE number 2127888 (Why is no real title available?)
 
2005-01-14Paper
scientific article; zbMATH DE number 2114005 (Why is no real title available?)
 
2004-11-05Paper
scientific article; zbMATH DE number 2080694 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 1950605 (Why is no real title available?)
 
2003-07-17Paper


Research outcomes over time


This page was built for person: Guilin Wang