Yi Mu
Title
Cited by
Cited by
Year
On the security of certificateless signature schemes from Asiacrypt 2003
X Huang, W Susilo, Y Mu, F Zhang
International Conference on Cryptology and Network Security, 13-25, 2005
3812005
Certificateless signature revisited
X Huang, Y Mu, W Susilo, DS Wong, W Wu
Australasian Conference on Information Security and Privacy, 308-322, 2007
3182007
Malicious KGC attacks in certificateless cryptography
MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2482007
One-atom lasers
Y Mu, CM Savage
Physical Review A 46 (9), 5944, 1992
2241992
Constant-Size Dynamic k-TAA
MH Au, W Susilo, Y Mu
International conference on security and cryptography for networks, 111-125, 2006
2142006
Asymmetric group key agreement
Q Wu, Y Mu, W Susilo, B Qin, J Domingo-Ferrer
Annual International Conference on the Theory and Applications of …, 2009
1932009
Identity-based strong designated verifier signature schemes
W Susilo, F Zhang, Y Mu
Australasian Conference on Information Security and Privacy, 313-324, 2004
1772004
Privacy-preserving decentralized key-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Yan
IEEE transactions on parallel and distributed systems 23 (11), 2150-2162, 2012
1692012
Certificate-based signature: security model and efficient construction
J Li, X Huang, Y Mu, W Susilo, Q Wu
European Public Key Infrastructure Workshop, 110-125, 2007
1382007
Dual-server public-key encryption with keyword search for secure cloud storage
R Chen, Y Mu, G Yang, F Guo, X Wang
IEEE transactions on information forensics and security 11 (4), 789-798, 2015
1222015
Multi-identity single-key decryption without random oracles
F Guo, Y Mu, Z Chen, L Xu
International Conference on Information Security and Cryptology, 384-398, 2007
1192007
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Zhou, MHA Au
IEEE transactions on information forensics and security 10 (3), 665-678, 2014
1132014
CP-ABE with constant-size keys for lightweight devices
F Guo, Y Mu, W Susilo, DS Wong, V Varadharajan
IEEE transactions on information forensics and security 9 (5), 763-771, 2014
1132014
Personal health record systems and their security protection
KT Win, W Susilo, Y Mu
Journal of medical systems 30 (4), 309-315, 2006
1082006
Cryptanalysis of simple three-party key exchange protocol
H Guo, Z Li, Y Mu, X Zhang
Computers & Security 27 (1-2), 16-21, 2008
1062008
Perfect concurrent signature schemes
W Susilo, Y Mu, F Zhang
International Conference on Information and Communications Security, 14-26, 2004
962004
Identity-based proxy signature from pairings
W Wu, Y Mu, W Susilo, J Seberry, X Huang
International Conference on Autonomic and Trusted Computing, 22-31, 2007
942007
Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world
X Huang, W Susilo, Y Mu, F Zhang
19th International Conference on Advanced Information Networking and …, 2005
932005
Short designated verifier signature scheme and its identity-based variant
X Huang, W Susilo, Y Mu, F Zhang
902008
Optical image encryption based on chaotic baker map and double random phase encoding
AM Elshamy, ANZ Rashed, AENA Mohamed, OS Faragalla, Y Mu, ...
Journal of Lightwave Technology 31 (15), 2533-2539, 2013
892013
The system can't perform the operation now. Try again later.
Articles 1–20