![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Yi Mu 0001
Person information
- affiliation: City University of Macau, Macau
- affiliation (former): Fujian Normal University, Fuzhou, China
- affiliation (former): University of Wollongong, NSW, Australia
- affiliation (former): Macquarie University, Sydney, NSW, Australia
- affiliation (former): University of Western Sydney, NSW, Australia
- affiliation (PhD 1994): Australian National University, Canberra, ACT, Australia
Other persons with the same name
- Yi Mu 0002 — Desert Research Institute, Reno, NV, USA
- Yi Mu 0003 — Ocean University of China, Qingdao, China
- Yi Mu 0004 — Xi'an Jiaotong University, Department of Earth and Environmental Sciences, China
- Yi Mu 0005 — University of Illinois at Urbana-Champaign, Urbana, IL, USA
- Yi Mu 0006 — Lanzhou Power Supply Company, China
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j288]Xiangqian Kong, Lanxiang Chen, Yizhao Zhu, Yi Mu:
Laconic updatable private set intersection. J. Inf. Secur. Appl. 89: 103969 (2025) - 2024
- [j287]Yizhao Zhu
, Lanxiang Chen
, Yi Mu:
Practical and malicious private set intersection with improved efficiency. Theor. Comput. Sci. 991: 114443 (2024) - [j286]Ke Huang
, Yi Mu
, Fatemeh Rezaeibagha
, Xiaosong Zhang
, Xiong Li
, Sheng Cao
:
Monero With Multi-Grained Redaction. IEEE Trans. Dependable Secur. Comput. 21(1): 241-253 (2024) - [j285]Mengdi Hu, Lanxiang Chen
, Gaolin Chen
, Yi Mu
, Robert H. Deng
:
A Pruned Pendant Vertex Based Index for Shortest Distance Query Under Structured Encrypted Graph. IEEE Trans. Inf. Forensics Secur. 19: 6351-6363 (2024) - [j284]Xiangqian Kong
, Lanxiang Chen
, Yizhao Zhu
, Yi Mu
:
Efficient Public-Key Searchable Encryption Scheme From PSI With Scalable Proxy Servers. IEEE Trans. Serv. Comput. 17(6): 3527-3540 (2024) - [c238]Qinghua Deng, Lanxiang Chen, Yizhao Zhu, Yi Mu:
Volume Hiding Conjunctive Searchable Symmetric Encryption over Cloud. CyberC 2024: 142-188 - 2023
- [j283]Yanwei Zhou, Zhaolong Wang, Zirui Qiao, Ying Wang, Bo Yang, Yi Mu, Mingwu Zhang:
Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption. Comput. J. 66(4): 924-940 (2023) - [j282]Yanwei Zhou
, Bo Yang, Zirui Qiao, Zhe Xia, Mingwu Zhang, Yi Mu:
Leakage-resilient identity-based cryptography from minimal assumptions. Des. Codes Cryptogr. 91(11): 3757-3801 (2023) - [j281]Tianshuai Zhang
, Leyou Zhang
, Qing Wu
, Yi Mu
, Fatemeh Rezaeibagha
:
Redactable Blockchain-Enabled Hierarchical Access Control Framework for Data Sharing in Electronic Medical Records. IEEE Syst. J. 17(2): 1962-1973 (2023) - [j280]Fatemeh Rezaeibagha
, Yi Mu
, Ke Huang
, Lanxiang Chen
, Leyou Zhang
:
Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT. IEEE Trans. Cloud Comput. 11(1): 217-228 (2023) - [j279]Xiaoguo Li
, Tao Xiang
, Yi Mu
, Fuchun Guo
, Zhongyuan Yao:
C-Wall: Conflict-Resistance in Privacy-Preserving Cloud Storage. IEEE Trans. Cloud Comput. 11(2): 1911-1926 (2023) - [j278]Lanxiang Chen
, Yi Mu
, Lingfang Zeng
, Fatemeh Rezaeibagha
, Robert H. Deng
:
Authenticable Data Analytics Over Encrypted Data in the Cloud. IEEE Trans. Inf. Forensics Secur. 18: 1800-1813 (2023) - [j277]Ruonan Ma
, Leyou Zhang
, Qing Wu
, Yi Mu
, Fatemeh Rezaeibagha
:
BE-TRDSS: Blockchain-Enabled Secure and Efficient Traceable-Revocable Data-Sharing Scheme in Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(11): 10821-10830 (2023) - [j276]Lanxiang Chen
, Lingfang Zeng
, Yi Mu
, Leilei Chen:
Global Combination and Clustering Based Differential Privacy Mixed Data Publishing. IEEE Trans. Knowl. Data Eng. 35(11): 11437-11448 (2023) - [j275]Lanxiang Chen
, Yujie Xue, Yi Mu
, Lingfang Zeng
, Fatemeh Rezaeibagha
, Robert H. Deng
:
CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data. IEEE Trans. Serv. Comput. 16(2): 1011-1022 (2023) - [j274]Fatemeh Rezaeibagha
, Yi Mu
, Ke Huang
, Lanxiang Chen
, Leyou Zhang
:
Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT. IEEE Trans. Serv. Comput. 16(3): 1664-1672 (2023) - 2022
- [j273]Lanxiang Chen
, Qingxiao Fu, Yi Mu
, Lingfang Zeng
, Fatemeh Rezaeibagha
, Min-Shiang Hwang:
Blockchain-based random auditor committee for integrity verification. Future Gener. Comput. Syst. 131: 183-193 (2022) - [j272]Jian Su, Leyou Zhang
, Yi Mu:
BA-RMKABSE: Blockchain-aided Ranked Multi-keyword Attribute-based Searchable Encryption with Hiding Policy for Smart Health System. Future Gener. Comput. Syst. 132: 299-309 (2022) - [j271]Ke Huang
, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaoming Huang, Yongcheng Gong:
Blockchain-based deduplication with arbitration and incentives. IET Inf. Secur. 16(6): 401-416 (2022) - [j270]Leyou Zhang
, Tianshuai Zhang
, Qing Wu
, Yi Mu
, Fatemeh Rezaeibagha
:
Secure Decentralized Attribute-Based Sharing of Personal Health Records With Blockchain. IEEE Internet Things J. 9(14): 12482-12496 (2022) - [j269]Leyou Zhang
, Ye Zhang
, Qing Wu
, Yi Mu
, Fatemeh Rezaeibagha
:
A Secure and Efficient Decentralized Access Control Scheme Based on Blockchain for Vehicular Social Networks. IEEE Internet Things J. 9(18): 17938-17952 (2022) - [j268]Yujie Xue, Lanxiang Chen, Yi Mu, Lingfang Zeng
, Fatemeh Rezaeibagha, Robert H. Deng
:
Structured encryption for knowledge graphs. Inf. Sci. 605: 43-70 (2022) - [j267]Manli Yuan
, Yi Mu
, Fatemeh Rezaeibagha
, Li Xu
, Xinyi Huang
:
Controllable software licensing system for sub-licensing. J. Inf. Secur. Appl. 64: 103061 (2022) - [j266]Ye Zhang, Leyou Zhang, Qing Wu, Yi Mu:
Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9216-9227 (2022) - [j265]Qing Wu
, Taotao Lai
, Leyou Zhang
, Yi Mu, Fatemeh Rezaeibagha:
Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud. J. Syst. Archit. 129: 102569 (2022) - [j264]Leyou Zhang
, Chuchu Zhao, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth. J. Syst. Archit. 130: 102654 (2022) - [j263]Zhongyuan Yao
, Yi Mu:
Publicly verifiable secure communication with user and data privacy. Pers. Ubiquitous Comput. 26(3): 863-879 (2022) - [j262]Leyou Zhang
, Xuehuang Gao
, Li Kang, Pengfei Liang, Yi Mu
:
Distributed Ciphertext-Policy Attribute-Based Encryption With Enhanced Collusion Resilience and Privacy Preservation. IEEE Syst. J. 16(1): 735-746 (2022) - [j261]Qing Wu
, Liangjun Li
, Leyou Zhang
, Yi Mu
, Fatemeh Rezaeibagha
:
Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing. IEEE Syst. J. 16(4): 5533-5543 (2022) - [j260]Ke Huang
, Xiaosong Zhang
, Yi Mu
, Fatemeh Rezaeibagha
, Xiaojiang Du
:
Bidirectional and Malleable Proof-of-Ownership for Large File in Cloud Storage. IEEE Trans. Cloud Comput. 10(4): 2351-2365 (2022) - [j259]Jinhua Ma
, Xinyi Huang
, Yi Mu
, Robert H. Deng
:
Authenticated Data Redaction With Accountability and Transparency. IEEE Trans. Dependable Secur. Comput. 19(1): 149-160 (2022) - [j258]Anmin Fu
, Zhenzhu Chen
, Yi Mu
, Willy Susilo
, Yinxia Sun
, Jie Wu
:
Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization. IEEE Trans. Serv. Comput. 15(1): 266-278 (2022) - [j257]Xiaoguo Li
, Tao Xiang
, Shangwei Guo
, Hongwei Li
, Yi Mu
:
Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data. IEEE Trans. Serv. Comput. 15(5): 2954-2968 (2022) - [j256]Leyou Zhang
, Wenting You
, Yi Mu
:
Secure Outsourced Attribute-Based Sharing Framework for Lightweight Devices in Smart Health Systems. IEEE Trans. Serv. Comput. 15(5): 3019-3030 (2022) - 2021
- [j255]Haixia Chen, Xinyi Huang, Wei Wu, Yi Mu:
Privacy-Aware Image Authentication from Cryptographic Primitives. Comput. J. 64(8): 1178-1192 (2021) - [j254]Yangguang Tian, Yingjiu Li, Yi Mu, Guomin Yang
:
Unlinkable and Revocable Secret Handshake. Comput. J. 64(8): 1303-1314 (2021) - [j253]Yanwei Zhou
, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Novel generic construction of leakage-resilient PKE scheme with CCA security. Des. Codes Cryptogr. 89(7): 1575-1614 (2021) - [j252]Ximeng Liu, Yi Mu, Jianting Ning, Qingchen Zhang:
Securing the Internet-of-Things: Advances, challenges, future trends. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j251]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Leyou Zhang:
Enhanced bitcoin with two-factor authentication. Int. J. Inf. Comput. Secur. 16(3/4): 292-306 (2021) - [j250]Leyou Zhang
, Yadi Ye
, Yi Mu
:
Multiauthority Access Control With Anonymous Authentication for Personal Health Record. IEEE Internet Things J. 8(1): 156-167 (2021) - [j249]Wenjie Yang
, Shangpeng Wang, Yi Mu
:
An Enhanced Certificateless Aggregate Signature Without Pairings for E-Healthcare System. IEEE Internet Things J. 8(6): 5000-5008 (2021) - [j248]Fatemeh Rezaeibagha
, Yi Mu
, Ke Huang
, Lanxiang Chen
:
Secure and Efficient Data Aggregation for IoT Monitoring Systems. IEEE Internet Things J. 8(10): 8056-8063 (2021) - [j247]Leyou Zhang
, Jun Wang
, Yi Mu
:
Privacy-Preserving Flexible Access Control for Encrypted Data in Internet of Things. IEEE Internet Things J. 8(19): 14731-14745 (2021) - [j246]Fatemeh Rezaeibagha
, Yi Mu
, Ke Huang
, Leyou Zhang
, Xinyi Huang
:
Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors. IEEE Internet Things J. 8(24): 17669-17677 (2021) - [j245]Lei Zhou
, Anmin Fu
, Yi Mu
, Huaqun Wang, Shui Yu
, Yinxia Sun:
Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system. Inf. Sci. 545: 254-276 (2021) - [j244]Ke Huang
, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha
, Xiaojiang Du:
Scalable and redactable blockchain with update and anonymity. Inf. Sci. 546: 25-41 (2021) - [j243]Ke Huang, Yi Mu, Fatemeh Rezaeibagha, Xiaosong Zhang, Ting Chen:
Building Blockchains with Secure and Practical Public-Key Cryptographic Algorithms: Background, Motivations and Example. IEEE Netw. 35(6): 240-246 (2021) - [j242]Gongcheng Hu
, Leyou Zhang
, Yi Mu
, Xiaoxu Gao:
An Expressive "Test-Decrypt-Verify" Attribute-Based Encryption Scheme With Hidden Policy for Smart Medical Cloud. IEEE Syst. J. 15(1): 365-376 (2021) - [j241]Tong Wu
, Guomin Yang
, Yi Mu
, Fuchun Guo
, Robert H. Deng
:
Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model. IEEE Trans. Dependable Secur. Comput. 18(2): 563-575 (2021) - [c237]Yadi Ye, Leyou Zhang, Wenting You, Yi Mu:
Secure Decentralized Access Control Policy for Data Sharing in Smart Grid. INFOCOM Workshops 2021: 1-6 - [e14]Wanlei Zhou
, Yi Mu
:
Advances in Web-Based Learning - ICWL 2021 - 20th International Conference, ICWL 2021, Macau, China, November 13-14, 2021, Proceedings. Lecture Notes in Computer Science 13103, Springer 2021, ISBN 978-3-030-90784-6 [contents] - 2020
- [j240]Leyou Zhang
, Juan Ren
, Yi Mu
, Baocang Wang
:
Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid. IEEE Access 8: 23294-23307 (2020) - [j239]Leyou Zhang
, Jian Su
, Yi Mu
:
Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage. IEEE Access 8: 104344-104356 (2020) - [j238]Leyou Zhang
, Jun Wang
, Yi Mu
:
Secure and Privacy-Preserving Attribute-Based Sharing Framework in Vehicles Ad Hoc Networks. IEEE Access 8: 116781-116795 (2020) - [j237]Da-Zhi Sun
, Yi Mu
:
On the Security of Symmetric Encryption Against Mass Surveillance. IEEE Access 8: 175625-175636 (2020) - [j236]Leyou Zhang
, Xuehuang Gao
, Yi Mu
:
Secure Data Sharing With Lightweight Computation in E-Health. IEEE Access 8: 209630-209643 (2020) - [j235]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu:
An improved Durandal signature scheme. Sci. China Inf. Sci. 63(3) (2020) - [j234]Haixia Chen, Xinyi Huang, Wei Wu, Yi Mu:
Efficient and secure image authentication with robustness and versatility. Sci. China Inf. Sci. 63(12) (2020) - [j233]Zhen Zhao, Ge Wu, Fuchun Guo
, Willy Susilo
, Yi Mu, Baocang Wang, Yupu Hu:
Black-Box Accountable Authority Identity-Based Revocation System. Comput. J. 63(4): 525-535 (2020) - [j232]Ke Huang
, Xiaosong Zhang
, Yi Mu
, Fatemeh Rezaeibagha
, Xiaofen Wang, Jingwei Li, Qi Xia
, Jing Qin
:
EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud. IEEE Internet Things J. 7(2): 882-892 (2020) - [j231]Shengke Zeng
, Yi Mu, Hongjie Zhang, Mingxing He:
A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy. Inf. Sci. 516: 331-345 (2020) - [j230]Tong Wu
, Guomin Yang
, Yi Mu
, Rongmao Chen, Shengmin Xu:
Privacy-enhanced remote data integrity checking with updatable timestamp. Inf. Sci. 527: 210-226 (2020) - [j229]Leyou Zhang
, Yilei Cui
, Yi Mu
:
Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing. IEEE Syst. J. 14(1): 387-397 (2020) - [j228]Ke Huang
, Xiaosong Zhang, Xiaofen Wang, Yi Mu, Fatemeh Rezaeibagha
, Guangquan Xu, Hao Wang
, Xi Zheng
, Guomin Yang
, Qi Xia, Xiaojiang Du:
HUCDO: A Hybrid User-centric Data Outsourcing Scheme. ACM Trans. Cyber Phys. Syst. 4(3): 35:1-35:23 (2020) - [j227]Yanwei Zhou, Bo Yang, Tao Wang, Yi Mu:
Novel updatable identity-based hash proof system and its applications. Theor. Comput. Sci. 804: 1-28 (2020) - [j226]Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security. Theor. Comput. Sci. 809: 277-295 (2020) - [j225]Yinxia Sun, Yi Mu, Willy Susilo
, Futai Zhang, Anmin Fu
:
Revocable identity-based encryption with server-aided ciphertext evolution. Theor. Comput. Sci. 815: 11-24 (2020) - [j224]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu, Huaxiong Wang:
A code-based signature scheme from the Lyubashevsky framework. Theor. Comput. Sci. 835: 15-30 (2020) - [j223]Xueqiao Liu
, Guomin Yang
, Yi Mu
, Robert H. Deng
:
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 17(6): 1322-1332 (2020) - [j222]Ke Huang
, Xiaosong Zhang
, Yi Mu
, Fatemeh Rezaeibagha
, Xiaojiang Du
, Nadra Guizani:
Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain. IEEE Trans. Ind. Informatics 16(4): 2677-2686 (2020) - [j221]Yi Mu
, Fatemeh Rezaeibagha
, Ke Huang
:
Policy-Driven Blockchain and Its Applications for Transport Systems. IEEE Trans. Serv. Comput. 13(2): 230-240 (2020) - [c236]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Yi Mu:
Improvement of Attribute-Based Encryption Using Blakley Secret Sharing. ACISP 2020: 631-641 - [i22]Yadi Ye, Leyou Zhang, Yi Mu, Wenting You:
Secure Decentralized Access Control Policy for Data Sharing in Smart Grid. IACR Cryptol. ePrint Arch. 2020: 1567 (2020)
2010 – 2019
- 2019
- [j220]Leyou Zhang
, Gongcheng Hu
, Yi Mu, Fatemeh Rezaeibagha
:
Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System. IEEE Access 7: 33202-33213 (2019) - [j219]Wenjie Yang
, Shangpeng Wang, Xinyi Huang, Yi Mu:
On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments. IEEE Access 7: 91074-91079 (2019) - [j218]Wenjie Yang
, Shangpeng Wang, Wei Wu, Yi Mu:
Top-Level Secure Certificateless Signature Against Malicious-But-Passive KGC. IEEE Access 7: 112870-112878 (2019) - [j217]Fatemeh Rezaeibagha
, Yi Mu
, Xinyi Huang, Wenjie Yang
, Ke Huang:
Fully Secure Lightweight Certificateless Signature Scheme for IIoT. IEEE Access 7: 144433-144443 (2019) - [j216]Fatemeh Rezaeibagha
, Yi Mu
:
Efficient Micropayment of Cryptocurrency from Blockchains. Comput. J. 62(4): 507-517 (2019) - [j215]Yanwei Zhou
, Bo Yang, Yi Mu:
Continuous leakage-resilient identity-based encryption with leakage amplification. Des. Codes Cryptogr. 87(9): 2061-2090 (2019) - [j214]Guomin Yang
, Rongmao Chen, Yi Mu, Willy Susilo
, Fuchun Guo
, Jie Li:
Strongly leakage resilient authenticated key exchange, revisited. Des. Codes Cryptogr. 87(12): 2885-2911 (2019) - [j213]Shengmin Xu
, Guomin Yang
, Yi Mu, Ximeng Liu:
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Future Gener. Comput. Syst. 97: 284-294 (2019) - [j212]Yanwei Zhou, Bo Yang, Yi Mu, Tao Wang, Xin Wang:
Identity-based encryption resilient to continuous key leakage. IET Inf. Secur. 13(5): 426-434 (2019) - [j211]Fatemeh Rezaeibagha
, Yi Mu, Shiwei Zhang, Xiaofen Wang:
Provably Secure (Broadcast) Homomorphic Signcryption. Int. J. Found. Comput. Sci. 30(4): 511-529 (2019) - [j210]Zhongyuan Yao, Yi Mu:
ACE with Compact Ciphertext Size and Decentralized Sanitizers. Int. J. Found. Comput. Sci. 30(4): 531-549 (2019) - [j209]Ge Wu
, Yi Mu, Willy Susilo
, Fuchun Guo
, Futai Zhang:
Threshold privacy-preserving cloud auditing with multiple uploaders. Int. J. Inf. Sec. 18(3): 321-331 (2019) - [j208]Peng Jiang, Jianchang Lai, Fuchun Guo
, Willy Susilo
, Man Ho Au, Guomin Yang
, Yi Mu, Rongmao Chen:
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters. Inf. Sci. 472: 35-52 (2019) - [j207]Shengmin Xu, Guomin Yang
, Yi Mu
:
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Inf. Sci. 479: 116-134 (2019) - [j206]Yangguang Tian, Yingjiu Li, Guomin Yang
, Willy Susilo
, Yi Mu, Hui Cui
, Yinghui Zhang:
DABKE: Secure deniable attribute-based key exchange framework. J. Comput. Secur. 27(2): 259-275 (2019) - [j205]Yong Yu, Yi Mu:
Advances of Provable Security Techniques. J. Univers. Comput. Sci. 25(3): 154-157 (2019) - [j204]Yanwei Zhou
, Bo Yang
, Zhe Xia, Yi Mu
, Tao Wang:
Anonymous and Updatable Identity-Based Hash Proof System. IEEE Syst. J. 13(3): 2818-2829 (2019) - [j203]Peng Jiang, Fuchun Guo
, Yi Mu:
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems. Theor. Comput. Sci. 767: 51-72 (2019) - [j202]Yanwei Zhou
, Bo Yang, Yi Mu
:
The generic construction of continuous leakage-resilient identity-based cryptosystems. Theor. Comput. Sci. 772: 1-45 (2019) - [j201]Ke Huang
, Xiaosong Zhang
, Yi Mu
, Xiaofen Wang, Guomin Yang
, Xiaojiang Du
, Fatemeh Rezaeibagha
, Qi Xia, Mohsen Guizani
:
Building Redactable Consortium Blockchain for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 15(6): 3670-3679 (2019) - [j200]Ge Wu
, Yi Mu, Willy Susilo
, Fuchun Guo
, Futai Zhang:
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users. Wirel. Pers. Commun. 106(3): 1161-1182 (2019) - [c235]Wenwen Yan, Anmin Fu
, Yi Mu, Zhe Xia, Shui Yu
, Boyu Kuang:
EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices. IoT S&P@CCS 2019: 2-7 - [c234]Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo
, Weizhi Meng
:
Provably Secure Group Authentication in the Asynchronous Communication Model. ICICS 2019: 324-340 - [c233]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Hua Shen, Yi Mu:
Provably Secure Proactive Secret Sharing Without the Adjacent Assumption. ProvSec 2019: 247-264 - [c232]Xin Chen, Xinyi Huang, Yi Mu, Ding Wang
:
A Typo-Tolerant Password Authentication Scheme with Targeted Error Correction. TrustCom/BigDataSE 2019: 546-553 - [e13]Yi Mu, Robert H. Deng, Xinyi Huang:
Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings. Lecture Notes in Computer Science 11829, Springer 2019, ISBN 978-3-030-31577-1 [contents] - 2018
- [b1]Fuchun Guo
, Willy Susilo
, Yi Mu:
Introduction to Security Reduction. Springer 2018, ISBN 978-3-319-93048-0, pp. 1-253 - [j199]Leyou Zhang
, Pengfei Liang, Yi Mu:
Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption. IEEE Access 6: 12736-12745 (2018) - [j198]Jiannan Wei
, Xiaojie Wang
, Nan Li
, Guomin Yang
, Yi Mu:
A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks. IEEE Access 6: 43776-43784 (2018) - [j197]Yanwei Zhou
, Bo Yang, Yi Mu, Zhe Xia:
Continuous leakage-resilient access control for wireless sensor networks. Ad Hoc Networks 80: 41-53 (2018) - [j196]Yanwei Zhou
, Bo Yang, Yi Mu:
Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles. Comput. J. 61(4): 586-600 (2018) - [j195]Jianchang Lai, Yi Mu, Fuchun Guo
, Peng Jiang, Sha Ma:
Identity-Based Broadcast Encryption for Inner Products. Comput. J. 61(8): 1240-1251 (2018) - [j194]Yinhao Jiang
, Willy Susilo
, Yi Mu, Fuchun Guo
:
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener. Comput. Syst. 78: 720-729 (2018) - [j193]Xiaonan Wang, Zhengxiong Dou, Yi Mu:
CCN framework with privacy support. IET Inf. Secur. 12(2): 157-164 (2018) - [j192]Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu:
Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud. Int. J. High Perform. Comput. Netw. 11(1): 45-54 (2018) - [j191]Yinhao Jiang
, Willy Susilo
, Yi Mu, Fuchun Guo
:
Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts. Int. J. Inf. Sec. 17(4): 463-475 (2018) - [j190]Yinhao Jiang
, Willy Susilo
, Yi Mu, Fuchun Guo
:
Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes. Int. J. Inf. Sec. 17(5): 533-548 (2018) - [j189]Sujuan Li, Yi Mu, Mingwu Zhang:
Certificate-based Smooth Projective Hashing and Its Applications. Int. J. Netw. Secur. 20(2): 266-277 (2018) - [j188]Sha Ma, Yi Mu, Willy Susilo
:
A Generic Scheme of plaintext-checkable database encryption. Inf. Sci. 429: 88-101 (2018) - [j187]Sha Ma
, Yi Mu, Willy Susilo
, Bo Yang:
Witness-based searchable encryption. Inf. Sci. 453: 364-378 (2018) - [j186]Jianchang Lai, Yi Mu, Fuchun Guo
, Peng Jiang, Willy Susilo
:
Privacy-enhanced attribute-based private information retrieval. Inf. Sci. 454-455: 275-291 (2018) - [j185]Shams Qazi, Raad Raad, Yi Mu, Willy Susilo
:
Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks. J. Inf. Secur. Appl. 39: 31-40 (2018) - [j184]Fatemeh Rezaeibagha
, Yi Mu:
Practical and secure telemedicine systems for user mobility. J. Biomed. Informatics 78: 24-32 (2018) - [j183]Shengmin Xu, Guomin Yang
, Yi Mu:
A New Revocable and Re-Delegable Proxy Signature and Its Application. J. Comput. Sci. Technol. 33(2): 380-399 (2018) - [j182]Da-Zhi Sun
, Yi Mu, Willy Susilo
:
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure. Pers. Ubiquitous Comput. 22(1): 55-67 (2018) - [j181]Da-Zhi Sun
, Yi Mu, Willy Susilo
:
Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure. Pers. Ubiquitous Comput. 22(1): 69 (2018) - [j180]Jianchang Lai, Yi Mu, Fuchun Guo
, Rongmao Chen, Sha Ma:
Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost. Theor. Comput. Sci. 714: 15-26 (2018) - [j179]Pairat Thorncharoensri
, Willy Susilo
, Yi Mu:
Policy controlled system with anonymity. Theor. Comput. Sci. 745: 87-113 (2018) - [j178]Shengmin Xu
, Guomin Yang
, Yi Mu
, Robert H. Deng
:
Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud. IEEE Trans. Inf. Forensics Secur. 13(8): 2101-2113 (2018) - [j177]Da-Zhi Sun
, Yi Mu
:
Security of Grouping-Proof Authentication Protocol for Distributed RFID Systems. IEEE Wirel. Commun. Lett. 7(2): 254-257 (2018) - [j176]Weiwei Liu
, Yi Mu, Guomin Yang
, Yangguang Tian:
Strong Identity-Based Proxy Signature Schemes, Revisited. Wirel. Commun. Mob. Comput. 2018: 6925019:1-6925019:11 (2018) - [j175]Shengke Zeng, Yi Mu, Mingxing He, Yong Chen:
New Approach for Privacy-Aware Location-Based Service Communications. Wirel. Pers. Commun. 101(2): 1057-1073 (2018) - [c231]Hongjian Yin, Leyou Zhang
, Yi Mu:
A Novel Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Anonymous Key Generation. ICCCS (3) 2018: 435-446 - [c230]Leyou Zhang
, Yilei Cui, Yi Mu:
Improving Privacy-Preserving CP-ABE with Hidden Access Policy. ICCCS (3) 2018: 596-605 - [c229]Zhe Xia, Bo Yang, Mingwu Zhang, Yi Mu:
An Efficient and Provably Secure Private Polynomial Evaluation Scheme. ISPEC 2018: 595-609 - [c228]Weiwei Liu, Yinghui Zhang, Yi Mu, Guomin Yang
, Yangguang Tian:
Efficient Traceable Oblivious Transfer and Its Applications. ISPEC 2018: 610-621 - [c227]Shengmin Xu, Guomin Yang
, Yi Mu, Ximeng Liu:
Efficient Attribute-Based Encryption with Blackbox Traceability. ProvSec 2018: 182-200 - 2017
- [j174]Mingwu Zhang
, Yan Jiang, Yi Mu, Willy Susilo
:
Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server. IEEE Access 5: 26419-26434 (2017) - [j173]Leyou Zhang
, Jingxia Zhang, Yi Mu:
Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System. Comput. J. 60(4): 541-554 (2017) - [j172]Jianchang Lai, Yi Mu, Fuchun Guo
, Rongmao Chen:
Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization. Comput. J. 60(12): 1809-1821 (2017) - [j171]Peng Jiang, Yi Mu, Fuchun Guo
, Qiaoyan Wen:
Secure-channel free keyword search with authorization in manager-centric databases. Comput. Secur. 69: 50-64 (2017) - [j170]Xiaofen Wang, Yi Mu, Rongmao Chen:
Privacy-preserving data search and sharing protocol for social networks through wireless applications. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j169]Pairat Thorncharoensri
, Willy Susilo
, Yi Mu:
Policy-controlled signatures and their applications. Comput. Stand. Interfaces 50: 26-41 (2017) - [j168]Hongyu Liu, Yi Mu, Jining Zhao, Chunxiang Xu, Huaqun Wang, Leiting Chen, Yong Yu
:
Identity-based provable data possession revisited: Security analysis and generic construction. Comput. Stand. Interfaces 54: 10-19 (2017) - [j167]Rongmao Chen, Yi Mu, Guomin Yang
, Willy Susilo
, Fuchun Guo
:
Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1): 145-173 (2017) - [j166]Rongmao Chen, Yi Mu, Guomin Yang
, Willy Susilo
, Fuchun Guo
, Zheng Yang
:
A note on the strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1): 175-178 (2017) - [j165]Jiannan Wei, Guomin Yang
, Yi Mu:
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange. Int. J. Comput. Math. 94(5): 946-961 (2017) - [j164]Leyou Zhang, Zongchen Sun, Yi Mu, Yupu Hu:
Revocable hierarchical identity-based encryption over lattice for pay-TV systems. Int. J. Embed. Syst. 9(4): 379-398 (2017) - [j163]Yangguang Tian, Guomin Yang
, Yi Mu, Shiwei Zhang, Kaitai Liang
, Yong Yu
:
One-Round Attribute-Based Key Exchange in the Multi-Party Setting. Int. J. Found. Comput. Sci. 28(6): 725-742 (2017) - [j162]Jianchang Lai, Yi Mu, Fuchun Guo
:
Efficient identity-based online/offline encryption and signcryption with short ciphertext. Int. J. Inf. Sec. 16(3): 299-311 (2017) - [j161]Sujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang:
Continuous Leakage Resilient Lossy Trapdoor Functions. Inf. 8(2): 38 (2017) - [j160]Xiaonan Wang, Yi Mu:
Communication security and privacy support in 6LoWPAN. J. Inf. Secur. Appl. 34: 108-119 (2017) - [j159]Peng Jiang, Yi Mu, Fuchun Guo
, Qiao-Yan Wen:
Private Keyword-Search for Database Systems Against Insider Attacks. J. Comput. Sci. Technol. 32(3): 599-617 (2017) - [j158]Jianchang Lai, Yi Mu, Fuchun Guo
, Willy Susilo
, Rongmao Chen:
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city. Pers. Ubiquitous Comput. 21(5): 855-868 (2017) - [j157]Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang:
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query. Quantum Inf. Process. 16(1): 8 (2017) - [j156]Mingwu Zhang, Yudi Zhang, Yixin Su, Qiong Huang, Yi Mu:
Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments. IEEE Syst. J. 11(2): 1018-1026 (2017) - [j155]Ming Tang
, Zhenlong Qiu, Zhipeng Guo
, Yi Mu, Xinyi Huang
, Jean-Luc Danger:
A Generic Table Recomputation-Based Higher-Order Masking. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(11): 1779-1789 (2017) - [j154]Fuchun Guo
, Yi Mu, Willy Susilo
, Homer Hsing, Duncan S. Wong, Vijay Varadharajan
:
Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. IEEE Trans. Dependable Secur. Comput. 14(2): 211-220 (2017) - [j153]Weiwei Liu, Yi Mu, Guomin Yang
, Yong Yu
:
Efficient E-coupon systems with strong user privacy. Telecommun. Syst. 64(4): 695-708 (2017) - [j152]Yuan Zhang
, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, Xiaojun Zhang:
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation. IEEE Trans. Inf. Forensics Secur. 12(3): 676-688 (2017) - [j151]Willy Susilo
, Peng Jiang, Fuchun Guo
, Guomin Yang
, Yong Yu
, Yi Mu:
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. IEEE Trans. Inf. Forensics Secur. 12(12): 3110-3122 (2017) - [j150]Ching-Fang Hsu, Lein Harn, Yi Mu, Maoyuan Zhang, Xuan Zhu:
Computation-efficient key establishment in wireless group communications. Wirel. Networks 23(1): 289-297 (2017) - [j149]Yangguang Tian, Guomin Yang
, Yi Mu:
Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting. Wirel. Pers. Commun. 94(3): 1017-1034 (2017) - [j148]Xiaofen Wang, Yi Mu, Rongmao Chen:
Privacy-Preserving Data Packet Filtering Protocol with Source IP Authentication. Wirel. Pers. Commun. 95(4): 3509-3537 (2017) - [j147]Fuchun Guo
, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
Privacy-Preserving Mutual Authentication in RFID with Designated Readers. Wirel. Pers. Commun. 96(3): 4819-4845 (2017) - [j146]Jiannan Wei, Guomin Yang
, Yi Mu:
Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications. Wirel. Pers. Commun. 97(2): 3017-3030 (2017) - [c226]Shiwei Zhang, Yi Mu, Guomin Yang
, Xiaofen Wang:
Hierarchical Functional Encryption for Linear Transformations. ACISP (1) 2017: 23-43 - [c225]Shengmin Xu, Guomin Yang
, Yi Mu, Willy Susilo
:
Mergeable and Revocable Identity-Based Encryption. ACISP (1) 2017: 147-167 - [c224]Tong Wu
, Sha Ma, Yi Mu, Shengke Zeng:
ID-Based Encryption with Equality Test Against Insider Attack. ACISP (1) 2017: 168-183 - [c223]Yangguang Tian, Shiwei Zhang, Guomin Yang
, Yi Mu, Yong Yu
:
Privacy-Preserving k-time Authenticated Secret Handshakes. ACISP (2) 2017: 281-300 - [c222]Shu Cheng
, Vijay Varadharajan
, Yi Mu, Willy Susilo
:
An efficient and provably secure RFID grouping proof protocol. ACSW 2017: 71:1-71:7 - [c221]Fuchun Guo
, Rongmao Chen, Willy Susilo
, Jianchang Lai, Guomin Yang
, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample. CRYPTO (2) 2017: 517-547 - [c220]Nan Li
, Fuchun Guo
, Yi Mu, Willy Susilo
, Surya Nepal
:
Fuzzy Extractors for Biometric Identification. ICDCS 2017: 667-677 - [c219]Zhongyuan Yao, Yi Mu, Guomin Yang
:
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking. ISPEC 2017: 186-203 - [c218]Shengke Zeng, Yi Mu, Guomin Yang
, Mingxing He:
Deniable Ring Authentication Based on Projective Hash Functions. ProvSec 2017: 127-143 - [c217]Fatemeh Rezaeibagha
, Yi Mu, Shiwei Zhang, Xiaofen Wang:
Provably Secure Homomorphic Signcryption. ProvSec 2017: 349-360 - [c216]Fatemeh Rezaeibagha
, Yi Mu:
Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems. TrustCom/BigDataSE/ICESS 2017: 386-393 - [i21]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strong Authenticated Key Exchange with Auxiliary Inputs. IACR Cryptol. ePrint Arch. 2017: 418 (2017) - [i20]Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample. IACR Cryptol. ePrint Arch. 2017: 499 (2017) - 2016
- [j145]Leyou Zhang
, Yi Mu, Qing Wu:
Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys. Comput. J. 59(4): 452-461 (2016) - [j144]Mingwu Zhang, Yi Mu:
Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations. Comput. J. 59(4): 493-507 (2016) - [j143]Jiannan Wei, Guomin Yang
, Yi Mu, Kaitai Liang
:
Anonymous Proxy Signature with Hierarchical Traceability. Comput. J. 59(4): 559-569 (2016) - [j142]Peng Jiang, Yi Mu, Fuchun Guo
, Xiaofen Wang, Qiaoyan Wen:
Online/Offline Ciphertext Retrieval on Resource Constrained Devices. Comput. J. 59(7): 955-969 (2016) - [j141]Yong Yu
, Yi Mu, Rongxing Lu, Jian Ren:
Recent advances in security and privacy in large-scale networks. Concurr. Comput. Pract. Exp. 28(4): 1080-1082 (2016) - [j140]Fuchun Guo
, Willy Susilo
, Yi Mu:
Generalized closest substring encryption. Des. Codes Cryptogr. 80(1): 103-124 (2016) - [j139]Xiaojuan Chen, Yi Mu, Xiaofen Wang, Runhua Shi:
Privacy-enhanced distance computation with applications. Int. J. Electron. Secur. Digit. Forensics 8(3): 234-249 (2016) - [j138]Guomin Yang
, Willy Susilo
, Yi Mu:
Message from the Guest Editors. Int. J. Inf. Sec. 15(2): 223-224 (2016) - [j137]Fatemeh Rezaeibagha
, Yi Mu, Willy Susilo
, Khin Than Win
:
Multi-authority security framework for scalable EHR systems. Int. J. Medical Eng. Informatics 8(4): 390-408 (2016) - [j136]Fatemeh Rezaeibagha
, Yi Mu:
Distributed clinical data sharing via dynamic access-control policy transformation. Int. J. Medical Informatics 89: 25-31 (2016) - [j135]Runhua Shi, Yi Mu, Hong Zhong, Shun Zhang, Jie Cui:
Quantum private set intersection cardinality and its application to anonymous authentication. Inf. Sci. 370-371: 147-158 (2016) - [j134]Xiaofen Wang, Yi Mu, Rongmao Chen, Xiaosong Zhang:
Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group. J. Comput. Sci. Technol. 31(5): 1012-1027 (2016) - [j133]Leyou Zhang
, Qing Wu, Yi Mu, Jingxia Zhang:
Privacy-Preserving and Secure Sharing of PHR in the Cloud. J. Medical Syst. 40(12): 267:1-267:13 (2016) - [j132]Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang:
An efficient quantum scheme for Private Set Intersection. Quantum Inf. Process. 15(1): 363-371 (2016) - [j131]Mingwu Zhang, Yi Mu, Jian Shen, Xinyi Huang:
Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity. Secur. Commun. Networks 9(12): 1737-1747 (2016) - [j130]Yangguang Tian, Guomin Yang
, Yi Mu:
Privacy-preserving grouping proof with key exchange in the multiple-party setting. Secur. Commun. Networks 9(16): 3239-3250 (2016) - [j129]Yanwei Zhou, Bo Yang, Wenzheng Zhang, Yi Mu:
CCA2 secure public-key encryption scheme tolerating continual leakage attacks. Secur. Commun. Networks 9(17): 4505-4519 (2016) - [j128]Xiaofen Wang, Yi Mu, Rongmao Chen:
An efficient privacy-preserving aggregation and billing protocol for smart grid. Secur. Commun. Networks 9(17): 4536-4547 (2016) - [j127]Peng Jiang, Yi Mu, Fuchun Guo
, Xiaofen Wang, Jianchang Lai:
Centralized keyword search on encrypted data for cloud applications. Secur. Commun. Networks 9(18): 5064-5084 (2016) - [j126]Willy Susilo
, Fuchun Guo
, Yi Mu:
Efficient dynamic threshold identity-based encryption with constant-size ciphertext. Theor. Comput. Sci. 609: 49-59 (2016) - [j125]Hui Cui
, Yi Mu, Man Ho Au
:
Relations between robustness and RKA security under public-key encryption. Theor. Comput. Sci. 628: 78-91 (2016) - [j124]Fuchun Guo
, Willy Susilo
, Yi Mu:
Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption. IEEE Trans. Inf. Forensics Secur. 11(2): 247-257 (2016) - [j123]Yong Yu
, Yannan Li
, Jianbing Ni, Guomin Yang
, Yi Mu, Willy Susilo
:
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification". IEEE Trans. Inf. Forensics Secur. 11(3): 658-659 (2016) - [j122]Rongmao Chen, Yi Mu, Guomin Yang
, Fuchun Guo
, Xiaofen Wang:
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 11(4): 789-798 (2016) - [j121]Xiaofen Wang, Yi Mu, Rongmao Chen
:
One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications. IEEE Trans. Inf. Forensics Secur. 11(8): 1712-1721 (2016) - [j120]Rongmao Chen
, Yi Mu
, Guomin Yang
, Fuchun Guo
, Xinyi Huang, Xiaofen Wang, Yongjun Wang:
Server-Aided Public Key Encryption With Keyword Search. IEEE Trans. Inf. Forensics Secur. 11(12): 2833-2842 (2016) - [j119]Jiannan Wei, Guomin Yang
, Yi Mu:
Comments on "Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks". IEEE Trans. Wirel. Commun. 15(4): 3097-3099 (2016) - [j118]Xing Su
, Minjie Zhang
, Yi Mu:
Trust-based group services selection in web-based service-oriented environments. World Wide Web 19(5): 807-832 (2016) - [c215]Rongmao Chen, Yi Mu, Willy Susilo
, Guomin Yang
, Fuchun Guo
, Mingwu Zhang:
One-Round Strong Oblivious Signature-Based Envelope. ACISP (2) 2016: 3-20 - [c214]Shengmin Xu, Guomin Yang
, Yi Mu, Sha Ma:
Proxy Signature with Revocation. ACISP (2) 2016: 21-36 - [c213]Xiaofen Wang, Yi Mu:
Content-Based Encryption. ACISP (2) 2016: 57-72 - [c212]Peng Jiang, Yi Mu, Fuchun Guo
, Qiaoyan Wen:
Public Key Encryption with Authorized Keyword Search. ACISP (2) 2016: 170-186 - [c211]Shiwei Zhang, Guomin Yang
, Yi Mu:
Linear Encryption with Keyword Search. ACISP (2) 2016: 187-203 - [c210]Jianchang Lai, Yi Mu, Fuchun Guo
, Willy Susilo
, Rongmao Chen:
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing. ACISP (2) 2016: 223-239 - [c209]Yinhao Jiang, Willy Susilo
, Yi Mu, Fuchun Guo
:
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance. ACISP (1) 2016: 477-494 - [c208]Fuchun Guo
, Willy Susilo
, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang
:
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. ASIACRYPT (2) 2016: 745-776 - [c207]Rongmao Chen, Yi Mu, Guomin Yang
, Willy Susilo
, Fuchun Guo
, Mingwu Zhang:
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. ASIACRYPT (1) 2016: 844-876 - [c206]Willy Susilo
, Rongmao Chen, Fuchun Guo
, Guomin Yang
, Yi Mu, Yang-Wai Chow
:
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext. AsiaCCS 2016: 201-210 - [c205]Tao Xiang
, Xiaoguo Li, Fei Chen, Yi Mu:
Bilateral-secure Signature by Key Evolving. AsiaCCS 2016: 523-533 - [c204]Shiwei Zhang, Yi Mu, Guomin Yang
:
Achieving IND-CCA Security for Functional Encryption for Inner Products. Inscrypt 2016: 119-139 - [c203]Rongmao Chen, Yi Mu, Guomin Yang
, Willy Susilo
, Fuchun Guo
:
Strongly Leakage-Resilient Authenticated Key Exchange. CT-RSA 2016: 19-36 - [c202]Xiaojuan Chen, Yi Mu:
Preserving User Location Privacy for Location-Based Service. GPC 2016: 290-300 - [c201]Zhongyuan Yao, Yi Mu, Guomin Yang
:
A Privacy Preserving Source Verifiable Encryption Scheme. ISPEC 2016: 182-193 - [c200]Ge Wu, Yi Mu, Willy Susilo
, Fuchun Guo
:
Privacy-Preserving Cloud Auditing with Multiple Uploaders. ISPEC 2016: 224-237 - [c199]Yinhao Jiang, Willy Susilo
, Yi Mu, Fuchun Guo
:
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update. ProvSec 2016: 39-60 - [c198]Yangguang Tian, Guomin Yang
, Yi Mu, Kaitai Liang
, Yong Yu
:
One-Round Attribute-Based Key Exchange in the Multi-party Setting. ProvSec 2016: 227-243 - [c197]Sujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang:
Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage. ProvSec 2016: 309-319 - [i19]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strongly Leakage-Resilient Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2016: 308 (2016) - [i18]Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang:
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. IACR Cryptol. ePrint Arch. 2016: 872 (2016) - [i17]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang:
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. IACR Cryptol. ePrint Arch. 2016: 873 (2016) - 2015
- [j117]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Yi Mu, Jianwei Liu
:
Further ideal multipartite access structures from integer polymatroids. Sci. China Inf. Sci. 58(7): 1-13 (2015) - [j116]Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu:
Functional Encryption Resilient to Hard-to-Invert Leakage. Comput. J. 58(4): 735-749 (2015) - [j115]Xinyu Fan, Guomin Yang
, Yi Mu, Yong Yu
:
On Indistinguishability in Remote Data Integrity Checking. Comput. J. 58(4): 823-830 (2015) - [j114]Yong Yu
, Man Ho Au
, Yi Mu, Willy Susilo
, Huai Wu:
Secure Delegation of Signing Power from Factorization. Comput. J. 58(4): 867-877 (2015) - [j113]Nan Li
, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
Shared RFID ownership transfer protocols. Comput. Stand. Interfaces 42: 95-104 (2015) - [j112]Hui Lin, Li Xu, Yi Mu, Wei Wu:
A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing. Future Gener. Comput. Syst. 52: 125-136 (2015) - [j111]Hui Cui
, Yi Mu, Man Ho Au
:
Proof of retrievability with public verifiability resilient against related-key attacks. IET Inf. Secur. 9(1): 43-49 (2015) - [j110]Xixiang Lv, Yi Mu, Hui Li:
Key management for Smart Grid based on asymmetric key-wrapping. Int. J. Comput. Math. 92(3): 498-512 (2015) - [j109]Yong Yu
, Man Ho Au
, Yi Mu, Shaohua Tang, Jian Ren, Willy Susilo
, Liju Dong:
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int. J. Inf. Sec. 14(4): 307-318 (2015) - [j108]Xiaonan Wang, Deguang Le, Hongbin Cheng, Yi Mu:
An IPv6-based mobility framework for urban vehicular networks. Int. J. Netw. Manag. 25(3): 141-158 (2015) - [j107]Kefeng Wang, Yi Mu, Willy Susilo
:
Identity-based quotable ring signature. Inf. Sci. 321: 71-89 (2015) - [j106]Yong Yu, Yi Mu, Giuseppe Ateniese:
Recent Advances in Security and Privacy in Big Data. J. Univers. Comput. Sci. 21(3): 365-368 (2015) - [j105]Ibrahim F. Elashry, Yi Mu, Willy Susilo
:
A resilient identity-based authenticated key exchange protocol. Secur. Commun. Networks 8(13): 2279-2290 (2015) - [j104]Nan Li
, Yi Mu, Willy Susilo
, Fuchun Guo
, Vijay Varadharajan
:
Vulnerabilities of an ECC-based RFID authentication scheme. Secur. Commun. Networks 8(17): 3262-3270 (2015) - [j103]Ibrahim F. Elashry, Yi Mu, Willy Susilo
:
Mediated Encryption: Analysis and Design. EAI Endorsed Trans. Security Safety 2(3): e2 (2015) - [j102]Xixiang Lv, Yi Mu, Hui Li:
Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs. IEEE Trans. Dependable Secur. Comput. 12(6): 615-625 (2015) - [j101]Jinguang Han
, Willy Susilo
, Yi Mu, Jianying Zhou
, Man Ho Allen Au
:
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption. IEEE Trans. Inf. Forensics Secur. 10(3): 665-678 (2015) - [j100]Jinguang Han
, Willy Susilo
, Yi Mu, Man Ho Au
, Jie Cao
:
AAC-OT: Accountable Oblivious Transfer With Access Control. IEEE Trans. Inf. Forensics Secur. 10(12): 2502-2514 (2015) - [j99]Rongmao Chen, Yi Mu, Guomin Yang
, Fuchun Guo
:
BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication. IEEE Trans. Inf. Forensics Secur. 10(12): 2643-2652 (2015) - [j98]Yong Yu
, Jianbing Ni, Man Ho Au
, Yi Mu, Boyang Wang, Hui Li:
Comments on a Public Auditing Mechanism for Shared Cloud Data Service. IEEE Trans. Serv. Comput. 8(6): 998-999 (2015) - [c196]Leyou Zhang
, Zhuanning Wang, Yi Mu, Yupu Hu:
Fully Secure Hierarchical Inner Product Encryption for Privacy Preserving Keyword Searching in Cloud. 3PGCIC 2015: 449-453 - [c195]Jun Yan
, Hao Gao, Yi Mu:
Business Rule Driven Composite Service Optimisation and Selection. SCC 2015: 49-56 - [c194]Rongmao Chen, Yi Mu, Guomin Yang
, Fuchun Guo
, Xiaofen Wang:
A New General Framework for Secure Public Key Encryption with Keyword Search. ACISP 2015: 59-76 - [c193]Jianchang Lai, Yi Mu, Fuchun Guo
, Willy Susilo
:
Improved Identity-Based Online/Offline Encryption. ACISP 2015: 160-173 - [c192]Yiteng Feng, Yi Mu, Guomin Yang
, Joseph K. Liu
:
A New Public Remote Integrity Checking Scheme with User Privacy. ACISP 2015: 377-394 - [c191]Nan Li
, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
Anonymous Yoking-Group Proofs. AsiaCCS 2015: 615-620 - [c190]Shiwei Zhang, Yi Mu, Guomin Yang
:
Threshold Broadcast Encryption with Keyword Search. Inscrypt 2015: 322-337 - [c189]Yong Yu
, Yafang Zhang, Yi Mu, Willy Susilo
, Hongyu Liu:
Provably Secure Identity Based Provable Data Possession. ProvSec 2015: 310-325 - [c188]Xiaofen Wang, Xiaosong Zhang, Yi Mu:
Hierarchical ID-Based Searchable Encryption with Constant Size Ciphertext in Cloud. SmartCity 2015: 1024-1031 - 2014
- [j97]Ming Tang, Zhenlong Qiu, Hongbo Peng, Xiaobo Hu, Yi Mu, Huanguo Zhang:
Toward reverse engineering on secret S-boxes in block ciphers. Sci. China Inf. Sci. 57(3): 1-18 (2014) - [j96]Fuchun Guo
, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
Server-Aided Signature Verification for Lightweight Devices. Comput. J. 57(4): 481-493 (2014) - [j95]Jinguang Han
, Willy Susilo
, Yi Mu, Jun Yan
:
Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing. Comput. J. 57(4): 579-591 (2014) - [j94]Hui Cui
, Yi Mu, Man Ho Au
:
Signcryption Secure Against Linear Related-Key Attacks. Comput. J. 57(10): 1472-1483 (2014) - [j93]Chang Xu
, Hua Guo, Zhoujun Li, Yi Mu:
Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature. Comput. J. 57(10): 1580-1590 (2014) - [j92]Hao Gao, Jun Yan
, Yi Mu:
Trust-oriented QoS-aware composite service selection based on genetic algorithms. Concurr. Comput. Pract. Exp. 26(2): 500-515 (2014) - [j91]Li Xu, Elisa Bertino, Yi Mu:
Security of new generation computing systems. Concurr. Comput. Pract. Exp. 26(8): 1475-1476 (2014) - [j90]Mingwu Zhang, Yi Mu:
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks. Frontiers Comput. Sci. 8(3): 456-468 (2014) - [j89]Yong Yu
, Lei Niu, Guomin Yang
, Yi Mu, Willy Susilo
:
On the security of auditing mechanisms for secure cloud storage. Future Gener. Comput. Syst. 30: 127-132 (2014) - [j88]Yanling Lian, Xinyi Huang, Yi Mu:
SA3: Self-adaptive anonymous authentication for dynamic authentication policies. Future Gener. Comput. Syst. 30: 133-139 (2014) - [j87]Xiaonan Wang, Yi Mu:
A Secure Home Healthcare System Based on 6LoWPAN WSN. Int. J. Interdiscip. Telecommun. Netw. 6(3): 15-26 (2014) - [j86]Hui Cui
, Yi Mu, Man Ho Au
:
Anonymous broadcast encryption with an untrusted gateway. Int. J. Secur. Networks 9(1): 20-29 (2014) - [j85]Jennifer Seberry, Yi Mu, Fuchun Guo
, Tim Wellsmore:
Efficient authentication and integrity protection for the border gateway protocol. Int. J. Secur. Networks 9(4): 234-243 (2014) - [j84]Yong Yu
, Yi Mu, Willy Susilo
, Man Ho Au
:
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents. Inf. Process. Lett. 114(1-2): 5-8 (2014) - [j83]Tsz Hon Yuen
, Willy Susilo
, Yi Mu:
Towards a cryptographic treatment of publish/subscribe systems. J. Comput. Secur. 22(1): 33-67 (2014) - [j82]Yong Yu
, Jianbing Ni, Haomiao Yang, Yi Mu, Willy Susilo
:
Efficient public key encryption with revocable keyword search. Secur. Commun. Networks 7(2): 466-472 (2014) - [j81]Xiaonan Wang, Yi Mu:
A secure mobility support scheme for 6LoWPAN wireless sensor networks. Secur. Commun. Networks 7(3): 641-652 (2014) - [j80]Xixiang Lv, Yi Mu, Hui Li:
Loss-tolerant authentication with digital signatures. Secur. Commun. Networks 7(11): 2054-2062 (2014) - [j79]Jinguang Han
, Willy Susilo
, Yi Mu:
Identity-Based Secure DistributedData Storage Schemes. IEEE Trans. Computers 63(4): 941-953 (2014) - [j78]Guomin Yang
, Chik How Tan, Yi Mu, Willy Susilo
, Duncan S. Wong:
Identity based identification from algebraic coding theory. Theor. Comput. Sci. 520: 51-61 (2014) - [j77]Xixiang Lv, Yi Mu, Hui Li:
Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs. IEEE Trans. Inf. Forensics Secur. 9(1): 5-13 (2014) - [j76]Fuchun Guo
, Yi Mu, Willy Susilo
, Duncan S. Wong, Vijay Varadharajan
:
CP-ABE With Constant-Size Keys for Lightweight Devices. IEEE Trans. Inf. Forensics Secur. 9(5): 763-771 (2014) - [j75]Fuchun Guo
, Yi Mu, Willy Susilo
:
Subset Membership Encryption and Its Applications to Oblivious Transfer. IEEE Trans. Inf. Forensics Secur. 9(7): 1098-1107 (2014) - [j74]Jiangshan Yu
, Guilin Wang, Yi Mu, Wei Gao:
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation. IEEE Trans. Inf. Forensics Secur. 9(12): 2302-2313 (2014) - [j73]Jianbing Ni, Yong Yu
, Yi Mu, Qi Xia:
On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage. IEEE Trans. Parallel Distributed Syst. 25(10): 2760-2761 (2014) - [j72]Xiaonan Wang, Yi Mu, Guangjie Han, Deguang Le:
A Secure IPv6 Address Configuration Protocol for Vehicular Networks. Wirel. Pers. Commun. 79(1): 721-744 (2014) - [c187]Fuchun Guo
, Willy Susilo
, Yi Mu:
POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption. CCS 2014: 1430-1432 - [c186]Weiwei Liu, Yi Mu, Guomin Yang
:
An Efficient Privacy-Preserving E-coupon System. Inscrypt 2014: 3-15 - [c185]Jinguang Han
, Willy Susilo
, Yi Mu, Jianying Zhou
, Man Ho Au
:
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption. ESORICS (2) 2014: 73-90 - [c184]Kefeng Wang, Yi Mu, Willy Susilo
, Fuchun Guo
:
Attribute-Based Signature with Message Recovery. ISPEC 2014: 433-447 - [c183]Yong Yu
, Yi Mu, Jianbing Ni, Jiang Deng, Ke Huang:
Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage. NSS 2014: 28-40 - [c182]Ibrahim F. Elashry, Yi Mu, Willy Susilo
:
Jhanwar-Barua's Identity-Based Encryption Revisited. NSS 2014: 271-284 - [c181]Weiwei Liu, Yi Mu, Guomin Yang
:
Attribute-Based Signing Right Delegation. NSS 2014: 323-334 - [c180]Hui Cui
, Yi Mu, Man Ho Au:
Complete Robustness in Identity-Based Encryption. ProvSec 2014: 342-349 - [c179]Nan Li
, Yi Mu, Willy Susilo
, Fuchun Guo
, Vijay Varadharajan
:
Privacy-Preserving Authorized RFID Authentication Protocols. RFIDSec 2014: 108-122 - [c178]Jun Yan
, Hao Gao, Yi Mu:
Attribute Based Service Customization and Selection. SOCA 2014: 57-64 - [c177]Hui Cui
, Yi Mu, Man Ho Au
:
Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited. TrustCom 2014: 268-275 - [c176]Jiannan Wei, Guomin Yang
, Yi Mu:
Anonymous Proxy Signature with Restricted Traceability. TrustCom 2014: 575-581 - [c175]Pairat Thorncharoensri
, Willy Susilo
, Yi Mu:
Fair Multi-signature. WISA 2014: 244-256 - [c174]Ibrahim F. Elashry, Yi Mu, Willy Susilo
:
An Efficient Variant of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing. WISA 2014: 257-268 - [e12]Willy Susilo
, Yi Mu:
Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings. Lecture Notes in Computer Science 8544, Springer 2014, ISBN 978-3-319-08343-8 [contents] - [i16]Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Au:
PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2014: 470 (2014) - 2013
- [j71]Jinguang Han
, Willy Susilo
, Yi Mu:
Identity-based data storage in cloud computing. Future Gener. Comput. Syst. 29(3): 673-681 (2013) - [j70]Jongsung Kim, Yi Mu, Mohammad S. Obaidat
:
Advanced computer mathematics based cryptography and security technologies. Int. J. Comput. Math. 90(12): 2512-2514 (2013) - [j69]Hui Cui, Yi Mu, Fuchun Guo:
Server-aided identity-based anonymous broadcast encryption. Int. J. Secur. Networks 8(1): 29-39 (2013) - [j68]Hua Guo, Chang Xu
, Zhoujun Li
, Yanqing Yao, Yi Mu:
Efficient and dynamic key management for multiple identities in identity-based systems. Inf. Sci. 221: 579-590 (2013) - [j67]Songqin Miao, Futai Zhang, Sujuan Li, Yi Mu:
On security of a certificateless signcryption scheme. Inf. Sci. 232: 475-481 (2013) - [j66]Xixiang Lv, Yi Mu, Hui Li:
Key distribution for heterogeneous public-key cryptosystems. J. Commun. Networks 15(5): 464-468 (2013) - [j65]Xing Su, Minjie Zhang
, Yi Mu, Quan Bai
:
A robust trust model for service-oriented systems. J. Comput. Syst. Sci. 79(5): 596-608 (2013) - [j64]Shams Qazi, Raad Raad, Yi Mu, Willy Susilo
:
Securing DSR against wormhole attacks in multirate ad hoc networks. J. Netw. Comput. Appl. 36(2): 582-592 (2013) - [j63]Chang Xu
, Hua Guo, Zhoujun Li, Yi Mu:
New construction of affiliation-hiding authenticated group key agreement. Secur. Commun. Networks 6(6): 723-734 (2013) - [j62]Xiaonan Wang, Yi Mu:
A secure IPv6 address configuration scheme for a MANET. Secur. Commun. Networks 6(6): 777-789 (2013) - [j61]Man Ho Au
, Willy Susilo
, Yi Mu, Sherman S. M. Chow
:
Constant-Size Dynamic $k$ -Times Anonymous Authentication. IEEE Syst. J. 7(2): 249-261 (2013) - [c173]Fuchun Guo
, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
Membership Encryption and Its Applications. ACISP 2013: 219-234 - [c172]Leyou Zhang, Qing Wu, Yi Mu:
Anonymous Identity-Based Broadcast Encryption with Adaptive Security. CSS 2013: 258-271 - [c171]Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu:
Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions. ISPEC 2013: 75-90 - [c170]Kefeng Wang, Yi Mu, Willy Susilo
:
Identity-Based Multisignature with Message Recovery. ISPEC 2013: 91-104 - [c169]Nan Li
, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
Secure RFID Ownership Transfer Protocols. ISPEC 2013: 189-203 - [c168]Guomin Yang
, Yi Mu, Willy Susilo
, Duncan S. Wong:
Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model. ISPEC 2013: 204-217 - [c167]Weiwei Liu, Guomin Yang
, Yi Mu, Jiannan Wei:
k-time Proxy Signature: Formal Definition and Efficient Construction. ProvSec 2013: 154-164 - [c166]Hui Cui
, Yi Mu, Man Ho Au
:
Anonymous Signcryption against Linear Related-Key Attacks. ProvSec 2013: 165-183 - [c165]Nan Li
, Yi Mu, Willy Susilo
, Fuchun Guo
, Vijay Varadharajan
:
On RFID Authentication Protocols with Wide-Strong Privacy. RFIDSec Asia 2013: 3-16 - [c164]Shu Cheng
, Vijay Varadharajan
, Yi Mu, Willy Susilo
:
A Secure Elliptic Curve based RFID Ownership Transfer Scheme with Controlled Delegation. RFIDSec Asia 2013: 31-43 - [c163]Ibrahim F. Elashry, Yi Mu, Willy Susilo
:
Generic Mediated Encryption. SecureComm 2013: 154-168 - [c162]Hui Cui
, Yi Mu, Man Ho Au:
Public-Key Encryption Resilient to Linear Related-Key Attacks. SecureComm 2013: 182-196 - [c161]Miao Zhou, Yi Mu, Willy Susilo
, Man Ho Au
:
Privacy-Enhanced Keyword Search in Clouds. TrustCom/ISPA/IUCC 2013: 447-451 - [c160]Hui Cui
, Yi Mu, Man Ho Au
:
Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps. TrustCom/ISPA/IUCC 2013: 704-711 - [c159]Ibrahim F. Elashry, Yi Mu, Willy Susilo
:
Identity-Based Mediated RSA Revisited. TrustCom/ISPA/IUCC 2013: 728-735 - [i15]Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu:
Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction. IACR Cryptol. ePrint Arch. 2013: 247 (2013) - 2012
- [j60]Fuchun Guo
, Yi Mu, Willy Susilo
:
Efficient and secure stored-value cards with leakage resilience. Comput. Electr. Eng. 38(2): 370-380 (2012) - [j59]Hua Guo, Chang Xu
, Yi Mu, Zhoujun Li:
A provably secure authenticated key agreement protocol for wireless communications. Comput. Electr. Eng. 38(3): 563-572 (2012) - [j58]Ming Tang, Zhenlong Qiu, Si Gao, Yi Mu, Shubo Liu, Huanguo Zhang, Yingzhen Jin:
Polar differential power attacks and evaluation. Sci. China Inf. Sci. 55(7): 1588-1604 (2012) - [j57]Xinyi Huang, Yi Mu, Willy Susilo
, Duncan S. Wong, Wei Wu:
Certificateless Signatures: New Schemes and Security Models. Comput. J. 55(4): 457-474 (2012) - [j56]Wei Wu, Yi Mu, Willy Susilo
, Xinyi Huang, Li Xu:
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption. Comput. J. 55(10): 1157-1168 (2012) - [j55]Chang Xu
, Zhoujun Li, Yi Mu, Hua Guo, Tao Guo:
Affiliation-Hiding Authenticated Asymmetric Group Key Agreement. Comput. J. 55(10): 1180-1191 (2012) - [j54]Jinguang Han
, Willy Susilo
, Yi Mu, Jun Yan
:
Attribute-Based Oblivious Access Control. Comput. J. 55(10): 1202-1215 (2012) - [j53]Jinguang Han
, Willy Susilo
, Yi Mu, Jun Yan
:
Efficient oblivious transfers with access control. Comput. Math. Appl. 63(4): 827-837 (2012) - [j52]Ying Sun, Yong Yu
, Yi Mu:
Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme. IEICE Trans. Inf. Syst. 95-D(6): 1690-1693 (2012) - [j51]Yong Yu
, Yi Mu, Guilin Wang, Qi Xia, Bo Yang:
Improved certificateless signature scheme provably secure in the standard model. IET Inf. Secur. 6(2): 102-110 (2012) - [j50]Jinguang Han
, Willy Susilo
, Yi Mu, Jun Yan
:
New constructions of OSBE schemes and their applications in oblivious access control. Int. J. Inf. Sec. 11(6): 389-401 (2012) - [j49]Miao Zhou, Yi Mu, Willy Susilo
, Jun Yan
, Liju Dong:
Privacy enhanced data outsourcing in the cloud. J. Netw. Comput. Appl. 35(4): 1367-1373 (2012) - [j48]Yong Yu
, Yi Mu, Willy Susilo
, Ying Sun, Yafu Ji:
Provably secure proxy signature scheme from factorization. Math. Comput. Model. 55(3-4): 1160-1168 (2012) - [j47]Peishun Wang, Yi Mu, Willy Susilo
, Jun Yan
:
Privacy preserving protocol for service aggregation in cloud computing. Softw. Pract. Exp. 42(4): 467-483 (2012) - [j46]Jinguang Han
, Willy Susilo
, Yi Mu, Jun Yan
:
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption. IEEE Trans. Parallel Distributed Syst. 23(11): 2150-2162 (2012) - [c158]Fuchun Guo
, Yi Mu, Willy Susilo
:
Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext. ESORICS 2012: 609-626 - [c157]Fuchun Guo
, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
A Pre-computable Signature Scheme with Efficient Verification for RFID. ISPEC 2012: 1-16 - [c156]Jiangshan Yu
, Guilin Wang, Yi Mu:
Provably Secure Single Sign-on Scheme in Distributed Systems and Networks. TrustCom 2012: 271-278 - [c155]Pairat Thorncharoensri
, Willy Susilo
, Yi Mu:
Multi-Level Controlled Signature. WISA 2012: 96-110 - [e11]Willy Susilo
, Yi Mu, Jennifer Seberry:
Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings. Lecture Notes in Computer Science 7372, Springer 2012, ISBN 978-3-642-31447-6 [contents] - [e10]Li Xu, Elisa Bertino, Yi Mu:
Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7645, Springer 2012, ISBN 978-3-642-34600-2 [contents] - 2011
- [j45]Fuchun Guo
, Yi Mu, Willy Susilo
:
Short Signatures with a Tighter Security Reduction Without Random Oracles. Comput. J. 54(4): 513-524 (2011) - [j44]Yong Yu
, Yi Mu, Guilin Wang, Ying Sun:
Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature. Comput. J. 54(10): 1645-1651 (2011) - [j43]Jun Zhang
, Yang Xiang
, Wanlei Zhou
, Lei Ye, Yi Mu:
Secure Image Retrieval Based on Visual Content and Watermarking Protocol. Comput. J. 54(10): 1661-1674 (2011) - [j42]Wei Wu, Yi Mu, Willy Susilo
, Xinyi Huang:
Provably secure server-aided verification signatures. Comput. Math. Appl. 61(7): 1705-1723 (2011) - [j41]Hua Guo, Zhoujun Li, Yi Mu, Fan Zhang, Chuankun Wu, Jikai Teng:
An efficient dynamic authenticated key exchange protocol with selectable identities. Comput. Math. Appl. 61(9): 2518-2527 (2011) - [j40]Qi Zhang, Yi Mu, Minjie Zhang
:
Attribute-based authentication for multi-agent systems with dynamic groups. Comput. Commun. 34(3): 436-446 (2011) - [j39]Hua Guo, Yi Mu, Zhoujun Li, Xiyong Zhang:
An efficient and non-interactive hierarchical key agreement protocol. Comput. Secur. 30(1): 28-34 (2011) - [j38]Qi Zhang, Yi Mu, Minjie Zhang
, Robert H. Deng
:
Secure mobile agents with controlled resources. Concurr. Comput. Pract. Exp. 23(12): 1348-1366 (2011) - [j37]Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang:
Provably secure identity-based authenticated key agreement protocols with malicious private key generators. Inf. Sci. 181(3): 628-647 (2011) - [j36]Ching Yu Ng, Willy Susilo
, Yi Mu, Reihaneh Safavi-Naini:
Practical RFID ownership transfer scheme. J. Comput. Secur. 19(2): 319-341 (2011) - [j35]Xinyi Huang, Yi Mu, Willy Susilo
, Wei Wu, Yang Xiang
:
Optimistic Fair Exchange with Strong Resolution-Ambiguity. IEEE J. Sel. Areas Commun. 29(7): 1491-1502 (2011) - [j34]Ying Sun, Chunxiang Xu, Yong Yu
, Yi Mu:
Strongly unforgeable proxy signature scheme secure in the standard model. J. Syst. Softw. 84(9): 1471-1479 (2011) - [j33]Fuchun Guo
, Yi Mu, Willy Susilo
:
Improving security of q-SDH based digital signatures. J. Syst. Softw. 84(10): 1783-1790 (2011) - [j32]Xinyi Huang, Yi Mu, Willy Susilo
, Wei Wu, Jianying Zhou
, Robert H. Deng
:
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures. IEEE Trans. Inf. Forensics Secur. 6(2): 498-512 (2011) - [j31]Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li:
Authenticated key exchange protocol with selectable identities. Wirel. Commun. Mob. Comput. 11(2): 226-239 (2011) - [c154]Hao Gao, Jun Yan
, Yi Mu:
Web Service Selection Based on Similarity Evaluation. IEEE SCC 2011: 322-329 - [c153]Man Ho Au
, Willy Susilo
, Yi Mu:
Electronic Cash with Anonymous User Suspension. ACISP 2011: 172-188 - [c152]Nan Li
, Yi Mu, Willy Susilo
, Fuchun Guo
:
Self-certified ring signatures. AsiaCCS 2011: 396-400 - [c151]Nan Li
, Yi Mu, Willy Susilo
:
Efficient Self-certified Signatures with Batch Verification. Inscrypt 2011: 179-194 - [c150]Yikai Wang, Yi Mu, Minjie Zhang
:
Policy-Based Authentication for Mobile Agents. ISPEC 2011: 123-137 - [c149]Lie Qu, Guilin Wang, Yi Mu:
Optimistic Fair Exchange of Ring Signatures. SecureComm 2011: 227-242 - [c148]Miao Zhou, Yi Mu, Willy Susilo
, Man Ho Au
, Jun Yan
:
Privacy-Preserved Access Control for Cloud Computing. TrustCom 2011: 83-90 - [c147]Quan Bai
, Xing Su, Qing Liu, Andrew Terhorst
, Minjie Zhang
, Yi Mu:
Case-Based Trust Evaluation from Provenance Information. TrustCom 2011: 336-343 - [c146]Xing Su, Minjie Zhang
, Yi Mu, Quan Bai
:
GTrust: An Innovated Trust Model for Group Services Selection in Web-Based Service-Oriented Environments. WISE 2011: 306-313 - 2010
- [j30]Jong Hyuk Park, Sajid Hussain, Guilin Wang, Yi Mu:
Special issue of computers and mathematics with applications on "Advances in cryptography, security and applications for future computer science". Comput. Math. Appl. 60(2): 175 (2010) - [j29]Futai Zhang, Sujuan Li, Songqin Miao, Yi Mu, Willy Susilo
, Xinyi Huang:
Cryptanalysis on Two Certificateless Signature Schemes. Int. J. Comput. Commun. Control 5(4): 586-591 (2010) - [j28]Tsz Hon Yuen
, Willy Susilo
, Yi Mu:
How to construct identity-based signatures without the key escrow problem. Int. J. Inf. Sec. 9(4): 297-311 (2010) - [j27]Li Xu, Sisheng Chen, Xinyi Huang, Yi Mu:
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks. Int. J. Secur. Networks 5(1): 35-44 (2010) - [j26]Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li:
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security. Int. J. Secur. Networks 5(2/3): 173-187 (2010) - [j25]Hong Yuan, Futai Zhang, Xinyi Huang, Yi Mu, Willy Susilo
, Lei Zhang:
Certificateless threshold signature scheme from bilinear maps. Inf. Sci. 180(23): 4714-4728 (2010) - [j24]Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo
, Qianhong Wu:
Constructions of certificate-based signature secure against key replacement attacks. J. Comput. Secur. 18(3): 421-449 (2010) - [c145]Peishun Wang, Yi Mu, Willy Susilo
, Jun Yan
:
Constructing an Authentication Token to Access External Services in Service Aggregation. IEEE SCC 2010: 321-328 - [c144]Man Ho Au
, Willy Susilo
, Yi Mu:
Proof-of-Knowledge of Representation of Committed Value and Its Applications. ACISP 2010: 352-369 - [c143]Tsz Hon Yuen
, Willy Susilo
, Yi Mu:
Towards a Cryptographic Treatment of Publish/Subscribe Systems. CANS 2010: 201-220 - [c142]Fuchun Guo
, Yi Mu, Willy Susilo
:
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase. Inscrypt 2010: 455-470 - [c141]Peishun Wang, Liju Dong, Yi Mu, Willy Susilo
, Jun Yan
:
A framework for privacy policy management in service aggregation. CSCWD 2010: 166-171 - [c140]Fei Bi, Yi Mu:
Efficient RFID Authentication Scheme for Supply Chain Applications. EUC 2010: 583-588 - [c139]Xing Su, Minjie Zhang
, Yi Mu, Kwang Mong Sim:
PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented Environments. EUC 2010: 841-848 - [c138]Xiaofeng Chen, Fangguo Zhang
, Haibo Tian, Qianhong Wu, Yi Mu, Jangseong Kim, Kwangjo Kim:
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. Financial Cryptography 2010: 304-311 - [c137]Mohammad Reza Reyhanitabar, Willy Susilo
, Yi Mu:
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships. FSE 2010: 192-211 - [c136]Hao Gao, Jun Yan
, Yi Mu:
Dynamic Trust Model for Federated Identity Management. NSS 2010: 55-61 - [c135]Xinyi Huang, Yi Mu, Willy Susilo
, Wei Wu, Yang Xiang
:
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. Public Key Cryptography 2010: 124-141 - [c134]Jinguang Han
, Yi Mu, Willy Susilo
, Jun Yan
:
A Generic Construction of Dynamic Single Sign-on with Strong Security. SecureComm 2010: 181-198 - [i14]Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu:
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships. IACR Cryptol. ePrint Arch. 2010: 22 (2010)
2000 – 2009
- 2009
- [j23]Yong Yu
, Chunxiang Xu, Xinyi Huang, Yi Mu:
An efficient anonymous proxy signature scheme with provable security. Comput. Stand. Interfaces 31(2): 348-353 (2009) - [j22]Xiaofeng Chen, Guomin Chen, Fangguo Zhang, Baodian Wei, Yi Mu:
Identity-based Universal Designated Verifier Signature Proof System. Int. J. Netw. Secur. 8(1): 52-58 (2009) - [j21]Shuang Chang
, Duncan S. Wong, Yi Mu, Zhenfeng Zhang:
Certificateless Threshold Ring Signature. Inf. Sci. 179(20): 3685-3696 (2009) - [j20]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Certificate-based Signatures Revisited. J. Univers. Comput. Sci. 15(8): 1659-1684 (2009) - [c133]Mohammad Reza Reyhanitabar, Willy Susilo
, Yi Mu:
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. ACISP 2009: 153-170 - [c132]Tsz Hon Yuen
, Qiong Huang, Yi Mu, Willy Susilo
, Duncan S. Wong, Guomin Yang
:
Efficient Non-interactive Range Proof. COCOON 2009: 138-147 - [c131]Man Ho Au
, Patrick P. Tsang, Willy Susilo
, Yi Mu:
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. CT-RSA 2009: 295-308 - [c130]Ching Yu Ng, Willy Susilo
, Yi Mu, Reihaneh Safavi-Naini:
New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. ESORICS 2009: 321-336 - [c129]Qianhong Wu, Yi Mu, Willy Susilo
, Bo Qin, Josep Domingo-Ferrer:
Asymmetric Group Key Agreement. EUROCRYPT 2009: 153-170 - [c128]Tsz Hon Yuen
, Willy Susilo
, Yi Mu:
How to Construct Identity-Based Signatures without the Key Escrow Problem. EuroPKI 2009: 286-301 - [c127]Pairat Thorncharoensri
, Qiong Huang, Willy Susilo
, Man Ho Au
, Yi Mu, Duncan S. Wong:
Escrowed Deniable Identification Schemes. FGIT-SecTech 2009: 234-241 - [c126]Mohammad Reza Reyhanitabar, Willy Susilo
, Yi Mu:
Enhanced Target Collision Resistant Hash Functions Revisited. FSE 2009: 327-344 - [c125]Pairat Thorncharoensri
, Willy Susilo
, Yi Mu:
Policy-Controlled Signatures. ICICS 2009: 91-106 - [c124]Pairat Thorncharoensri
, Willy Susilo
, Yi Mu:
Universal Designated Verifier Signatures with Threshold-Signers. IWSEC 2009: 89-109 - [c123]Qi Zhang, Yi Mu, Minjie Zhang
, Robert Huijie Deng
:
Secure Mobile Agents with Designated Hosts. NSS 2009: 286-293 - [c122]Hua Guo, Xiyong Zhang, Yi Mu, Zhoujun Li:
An Efficient Certificateless Encryption Scheme in the Standard Model. NSS 2009: 302-309 - [c121]Fuchun Guo
, Yi Mu, Willy Susilo
:
How to Prove Security of a Signature with a Tighter Security Reduction. ProvSec 2009: 90-103 - [c120]Man Ho Au
, Willy Susilo
, Yi Mu:
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? ProvSec 2009: 129-139 - [c119]Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li:
Server-Controlled Identity-Based Authenticated Key Exchange. ProvSec 2009: 214-229 - [c118]Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li:
Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings. UIC 2009: 310-324 - [c117]Pairat Thorncharoensri
, Willy Susilo
, Yi Mu:
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles. WISA 2009: 94-108 - [i13]Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu:
Enhanced Target Collision Resistant Hash Functions Revisited. IACR Cryptol. ePrint Arch. 2009: 51 (2009) - [i12]Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu:
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. IACR Cryptol. ePrint Arch. 2009: 170 (2009) - [i11]Tsz Hon Yuen, Willy Susilo, Yi Mu:
How to Construct Identity-Based Signatures without the Key Escrow Problem. IACR Cryptol. ePrint Arch. 2009: 421 (2009) - [i10]Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu:
An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions. IACR Cryptol. ePrint Arch. 2009: 506 (2009) - 2008
- [j19]Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang:
Cryptanalysis of simple three-party key exchange protocol. Comput. Secur. 27(1-2): 16-21 (2008) - [j18]Xinyi Huang, Willy Susilo
, Yi Mu, Wei Wu:
Secure universal designated verifier signature without random oracles. Int. J. Inf. Sec. 7(3): 171-183 (2008) - [j17]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Short Designated Verifier Signature Scheme and Its Identity-based Variant. Int. J. Netw. Secur. 6(1): 82-93 (2008) - [j16]Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo:
A New and Efficient Signature on Commitment Values. Int. J. Netw. Secur. 7(1): 100-105 (2008) - [j15]Xiaofeng Chen, Fangguo Zhang
, Haibo Tian, Baodian Wei, Willy Susilo
, Yi Mu, Hyunrok Lee, Kwangjo Kim:
Efficient generic on-line/off-line (threshold) signatures without key exposure. Inf. Sci. 178(21): 4192-4203 (2008) - [j14]Jiguo Li, Xinyi Huang, Yi Mu, Wei Wu:
Cryptanalysis and improvement of an efficient certificateless signature scheme. J. Commun. Networks 10(1): 10-17 (2008) - [j13]Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart:
Cryptography in Computer System Security. J. Univers. Comput. Sci. 14(3): 314-317 (2008) - [c116]Qiong Ren, Yi Mu, Willy Susilo:
Mitigating Phishing with ID-based Online/Offline Authentication. AISC 2008: 59-64 - [c115]Tsz Hon Yuen
, Willy Susilo
, Joseph K. Liu
, Yi Mu:
Sanitizable Signatures Revisited. CANS 2008: 80-97 - [c114]Bo Qin, Qianhong Wu, Willy Susilo
, Yi Mu:
Publicly Verifiable Privacy-Preserving Group Decryption. Inscrypt 2008: 72-83 - [c113]Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
:
Privacy for Private Key in Signatures. Inscrypt 2008: 84-95 - [c112]Ching Yu Ng, Willy Susilo
, Yi Mu, Reihaneh Safavi-Naini:
RFID Privacy Models Revisited. ESORICS 2008: 251-266 - [c111]Fuchun Guo
, Yi Mu, Zhide Chen:
Identity-Based Online/Offline Encryption. Financial Cryptography 2008: 247-261 - [c110]Man Ho Au
, Willy Susilo
, Yi Mu:
Practical Anonymous Divisible E-Cash from Bounded Accumulators. Financial Cryptography 2008: 287-301 - [c109]Pairat Thorncharoensri
, Willy Susilo
, Yi Mu:
How to Balance Privacy with Authenticity. ICISC 2008: 184-201 - [c108]Zhongren Liu, Li Xu, Zhide Chen, Yi Mu, Fuchun Guo
:
Hierarchical Identity-Based Online/Offline Encryption. ICYCS 2008: 2115-2119 - [c107]Dongdong Sun, Yi Mu, Willy Susilo
:
A Generic Construction of Identity-Based Online/Offline Signcryption. ISPA 2008: 707-712 - [c106]Fuchun Guo
, Yi Mu, Zhide Chen:
Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles. IWSEC 2008: 49-63 - [c105]Dongdong Sun, Xinyi Huang, Yi Mu, Willy Susilo
:
Identity-Based On-Line/Off-Line Signcryption. NPC Workshops 2008: 34-41 - [c104]Fuchun Guo
, Yi Mu:
Optimal Online/Offline Signature: How to Sign a Message without Online Computation. ProvSec 2008: 98-111 - [c103]Wei Wu, Yi Mu, Willy Susilo
, Xinyi Huang:
Server-Aided Verification Signatures: Definitions and New Constructions. ProvSec 2008: 141-155 - [c102]Wei Wu, Yi Mu, Willy Susilo
, Xinyi Huang:
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. WISA 2008: 99-114 - [e9]Yi Mu, Willy Susilo
, Jennifer Seberry:
Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings. Lecture Notes in Computer Science 5107, Springer 2008, ISBN 978-3-540-69971-2 [contents] - [e8]Liqun Chen, Yi Mu, Willy Susilo
:
Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings. Lecture Notes in Computer Science 4991, Springer 2008, ISBN 978-3-540-79103-4 [contents] - [i9]Man Ho Au, Willy Susilo, Yi Mu:
Constant-Size Dynamic k-TAA. IACR Cryptol. ePrint Arch. 2008: 136 (2008) - 2007
- [j12]Pairat Thorncharoensri, Tianbing Xia, Yi Mu:
How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis. Int. J. Netw. Secur. 4(2): 138-148 (2007) - [j11]Xinyi Huang, Willy Susilo
, Yi Mu, Futai Zhang:
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. J. Comput. Sci. Technol. 22(1): 71-74 (2007) - [j10]Dennis Y. W. Liu
, Joseph K. Liu
, Yi Mu, Willy Susilo
, Duncan S. Wong:
Revocable Ring Signature. J. Comput. Sci. Technol. 22(6): 785-794 (2007) - [j9]Bo Qin, Qianhong Wu, Willy Susilo
, Yi Mu, Yumin Wang, Zhengtao Jiang:
Short Group Signatures Without Random Oracles. J. Comput. Sci. Technol. 22(6): 805-821 (2007) - [c101]Qiong Ren, Yi Mu, Willy Susilo
:
SEFAP: An Email System for Anti-Phishing. ACIS-ICIS 2007: 782-787 - [c100]Xinyi Huang, Yi Mu, Willy Susilo
, Duncan S. Wong, Wei Wu:
Certificateless Signature Revisited. ACISP 2007: 308-322 - [c99]Man Ho Au, Willy Susilo
, Yi Mu:
Practical Compact E-Cash. ACISP 2007: 431-445 - [c98]Xiaofeng Chen, Fangguo Zhang
, Willy Susilo
, Yi Mu:
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. ACNS 2007: 18-30 - [c97]Wei Wu, Yi Mu, Willy Susilo
, Jennifer Seberry, Xinyi Huang:
Identity-Based Proxy Signature from Pairings. ATC 2007: 22-31 - [c96]Qianhong Wu, Willy Susilo
, Yi Mu, Bo Qin:
Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. ATC 2007: 32-41 - [c95]Fuchun Guo
, Yi Mu, Zhide Chen:
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. CANS 2007: 1-14 - [c94]Xinyi Huang, Yi Mu, Willy Susilo
, Wei Wu:
A Generic Construction for Universally-Convertible Undeniable Signatures. CANS 2007: 15-33 - [c93]Wei Wu, Yi Mu, Willy Susilo
, Xinyi Huang:
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. Inscrypt 2007: 25-39 - [c92]Fuchun Guo
, Yi Mu, Zhide Chen, Li Xu:
Multi-Identity Single-Key Decryption without Random Oracles. Inscrypt 2007: 384-398 - [c91]Man Ho Au, Qianhong Wu, Willy Susilo
, Yi Mu:
Compact E-Cash from Bounded Accumulator. CT-RSA 2007: 178-195 - [c90]Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo
, Qianhong Wu:
Certificate-Based Signature: Security Model and Efficient Construction. EuroPKI 2007: 110-125 - [c89]Qianhong Wu, Willy Susilo
, Yi Mu, Fangguo Zhang:
Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2007: 1096-1105 - [c88]Lan Zhou, Willy Susilo
, Yi Mu:
New Construction of Group Secret Handshakes Based on Pairings. ICICS 2007: 16-30 - [c87]Dennis Y. W. Liu
, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo
:
Formal Definition and Construction of Nominative Signature. ICICS 2007: 57-68 - [c86]Jianwei Chen, Li Xu, Yi Mu:
A new group rekeying scheme based on t-packing designs for ad hoc networks. Infoscale 2007: 54 - [c85]Shuo Zheng, Luke McAven, Yi Mu:
First price sealed bid auction without auctioneers. IWCMC 2007: 127-131 - [c84]Dennis Y. W. Liu
, Shuang Chang
, Duncan S. Wong, Yi Mu:
Nominative Signature from Ring Signature. IWSEC 2007: 396-411 - [c83]Xinyi Huang, Yi Mu, Willy Susilo
, Wei Wu:
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. Pairing 2007: 367-391 - [c82]Fuchun Guo
, Yi Mu, Zhide Chen:
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. Pairing 2007: 392-406 - [c81]Huafei Zhu, Willy Susilo
, Yi Mu:
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. Public Key Cryptography 2007: 134-149 - [c80]Yi Mu, Willy Susilo
, Huafei Zhu:
Compact sequential aggregate signatures. SAC 2007: 249-253 - [c79]Yong Li, Willy Susilo
, Yi Mu, Dingyi Pei:
Designated Verifier Signature: Definition, Framework and New Constructions. UIC 2007: 1191-1200 - [c78]Wei Wu, Yi Mu, Willy Susilo
, Xinyi Huang:
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. WISA 2007: 16-29 - [e7]Willy Susilo
, Joseph K. Liu, Yi Mu:
Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings. Lecture Notes in Computer Science 4784, Springer 2007, ISBN 978-3-540-75669-9 [contents] - [i8]Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang:
Group Decryption. IACR Cryptol. ePrint Arch. 2007: 17 (2007) - [i7]Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo:
Nominative Signature: Application, Security Model and Construction. IACR Cryptol. ePrint Arch. 2007: 69 (2007) - [i6]Man Ho Au, Willy Susilo, Yi Mu:
Practical Compact E-Cash. IACR Cryptol. ePrint Arch. 2007: 148 (2007) - [i5]Man Ho Au, Willy Susilo, Yi Mu:
Practical Anonymous Divisible E-Cash From Bounded Accumulators. IACR Cryptol. ePrint Arch. 2007: 459 (2007) - 2006
- [j8]Yiqun Chen, Willy Susilo
, Yi Mu:
Convertible identity-based anonymous designated ring signatures. Int. J. Secur. Networks 1(3/4): 218-225 (2006) - [j7]Khin Than Win
, Willy Susilo
, Yi Mu:
Personal Health Record Systems and Their Security Protection. J. Medical Syst. 30(4): 309-315 (2006) - [j6]Shidi Xu, Yi Mu, Willy Susilo
:
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes. J. Networks 1(1): 47-53 (2006) - [c77]Shidi Xu, Yi Mu, Willy Susilo
:
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. ACISP 2006: 99-110 - [c76]Junqi Zhang, Vijay Varadharajan, Yi Mu:
A Scalable Multi-service Group Key Management Scheme. AICT/ICIW 2006: 172 - [c75]Xinyi Huang, Willy Susilo
, Yi Mu, Futai Zhang:
Certificateless Designated Verifier Signature Schemes. AINA (2) 2006: 15-19 - [c74]Qianhong Wu, Yi Mu, Willy Susilo
, Fangguo Zhang
:
Efficient Signcryption Without Random Oracles. ATC 2006: 449-458 - [c73]Bo Qin, Qianhong Wu, Willy Susilo
, Yi Mu, Yumin Wang:
Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). ATC 2006: 531-540 - [c72]Ching Yu Ng, Willy Susilo
, Yi Mu:
Designated group credentials. AsiaCCS 2006: 59-65 - [c71]Fuchun Guo, Zhide Chen, Yi Mu, Li Xu, Shengyuan Zhang:
Secure and Efficient Trust Negotiation. CIS 2006: 374-384 - [c70]Willy Susilo
, Yi Mu:
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. EuroPKI 2006: 68-80 - [c69]Xiaofeng Chen, Fangguo Zhang
, Yi Mu, Willy Susilo
:
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. Financial Cryptography 2006: 251-265 - [c68]Qianhong Wu, Willy Susilo
, Yi Mu, Fangguo Zhang:
Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2006: 345-354 - [c67]Xinyi Huang, Willy Susilo
, Yi Mu, Wei Wu:
Universal Designated Verifier Signature Without Delegatability. ICICS 2006: 479-498 - [c66]Xinyi Huang, Willy Susilo
, Yi Mu, Futai Zhang:
Short (Identity-Based) Strong Designated Verifier Signature Schemes. ISPEC 2006: 214-225 - [c65]Lan Zhou, Willy Susilo
, Yi Mu:
Three-Round Secret Handshakes Based on ElGamal and DSA. ISPEC 2006: 332-342 - [c64]Qianhong Wu, Yi Mu, Willy Susilo
, Fangguo Zhang
:
Privately Retrieve Data from Large Databases. ISPEC 2006: 367-378 - [c63]Yiqun Chen, Willy Susilo
, Yi Mu:
Identity-based anonymous designated ring signatures. IWCMC 2006: 189-194 - [c62]Qianhong Wu, Willy Susilo
, Yi Mu, Fangguo Zhang
:
Ad Hoc Group Signatures. IWSEC 2006: 120-135 - [c61]Xinyi Huang, Willy Susilo
, Yi Mu, Wei Wu:
Proxy Signature Without Random Oracles. MSN 2006: 473-484 - [c60]Lan Zhou, Willy Susilo
, Yi Mu:
Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings. MSN 2006: 521-532 - [c59]Man Ho Au, Willy Susilo
, Yi Mu:
Constant-Size Dynamic k-TAA. SCN 2006: 111-125 - [c58]Xinyi Huang, Willy Susilo
, Yi Mu, Futai Zhang:
Restricted Universal Designated Verifier Signature. UIC 2006: 874-882 - [c57]Fangguo Zhang
, Xiaofeng Chen, Willy Susilo
, Yi Mu:
A New Signature Scheme Without Random Oracles from Bilinear Pairings. VIETCRYPT 2006: 67-80 - [c56]Junqi Zhang, Vijay Varadharajan, Yi Mu:
ID-based Secure PIM-SM Schemes. Wireless and Optical Communications 2006: 190-195 - [e6]David Pointcheval
, Yi Mu, Kefei Chen:
Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings. Lecture Notes in Computer Science 4301, Springer 2006, ISBN 3-540-49462-6 [contents] - [e5]Xiaobo Zhou, Oleg Sokolsky, Lu Yan, Eun-Sun Jung, Zili Shao, Yi Mu, Dong Chun Lee, Daeyoung Kim, Young-Sik Jeong, Cheng-Zhong Xu:
Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings. Lecture Notes in Computer Science 4097, Springer 2006, ISBN 3-540-36850-7 [contents] - [i4]Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang:
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. IACR Cryptol. ePrint Arch. 2006: 236 (2006) - [i3]Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, Guomin Yang:
Malicious KGC Attacks in Certificateless Cryptography. IACR Cryptol. ePrint Arch. 2006: 255 (2006) - 2005
- [j5]Junqi Zhang, Vijay Varadharajan, Yi Mu:
Secure distribution and access of XML documents. Int. J. High Perform. Comput. Netw. 3(5/6): 356-365 (2005) - [j4]Willy Susilo
, Yi Mu:
Provably secure fail-stop signature schemes based on RSA. Int. J. Wirel. Mob. Comput. 1(1): 53-60 (2005) - [c55]Willy Susilo
, Yi Mu:
On the Security of Nominative Signatures. ACISP 2005: 329-335 - [c54]Fangguo Zhang
, Yi Mu, Willy Susilo
:
Reducing Security Overhead for Mobile Networks. AINA 2005: 398-403 - [c53]Willy Susilo
, Fangguo Zhang
, Yi Mu:
Privacy-Enhanced Internet Storage. AINA 2005: 603-608 - [c52]Xinyi Huang, Willy Susilo
, Yi Mu, Futai Zhang:
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. AINA 2005: 649-654 - [c51]Xinyi Huang, Willy Susilo
, Yi Mu, Futai Zhang:
On the Security of Certificateless Signature Schemes from Asiacrypt 2003. CANS 2005: 13-25 - [c50]Xinyi Huang, Yi Mu, Willy Susilo
, Fangguo Zhang
, Xiaofeng Chen:
A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. EUC Workshops 2005: 480-489 - [c49]Fangguo Zhang
, Willy Susilo
, Yi Mu, Xiaofeng Chen:
Identity-Based Universal Designated Verifier Signatures. EUC Workshops 2005: 825-834 - [c48]Xinyi Huang, Yi Mu, Willy Susilo
, Futai Zhang:
Short Designated Verifier Proxy Signature from Pairings. EUC Workshops 2005: 835-844 - [c47]Shidi Xu, Yi Mu, Willy Susilo
:
Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. EUC Workshops 2005: 854-863 - [c46]Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan:
Access Policy Sheet for Access Control in Fine-Grained XML. EUC Workshops 2005: 1273-1282 - [c45]Fangguo Zhang
, Willy Susilo
, Yi Mu:
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). Financial Cryptography 2005: 45-56 - [c44]Qianhong Wu, Fangguo Zhang, Willy Susilo
, Yi Mu:
An Efficient Static Blind Ring Signature Scheme. ICISC 2005: 410-423 - [c43]Jing Wu, Jennifer Seberry, Yi Mu, Chun Ruan:
Delegatable Access Control for Fine-Grained XML. ICPADS (2) 2005: 270-274 - [c42]Ching Yu Ng, Willy Susilo
, Yi Mu:
Universal Designated Multi Verifier Signature Schemes. ICPADS (2) 2005: 305-309 - [c41]Yi Mu, Willy Susilo, Xinyi Huang:
Efficient Broadcast from Trapdoor Functions. IWAP 2005: 240-248 - [c40]Shidi Xu, Yi Mu, Willy Susilo
:
Secure AODV Routing Protocol Using One-Time Signature. MSN 2005: 288-297 - [c39]Willy Susilo, Yi Mu:
Tripartite Concurrent Signatures. SEC 2005: 425-442 - [e4]Yvo Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li:
Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings. Lecture Notes in Computer Science 3810, Springer 2005, ISBN 3-540-30849-0 [contents] - [i2]Xinyi Huang, Willy Susilo, Yi Mu:
Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004. IACR Cryptol. ePrint Arch. 2005: 122 (2005) - [i1]Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu:
A New Short Signature Scheme Without Random Oracles from Bilinear Pairings. IACR Cryptol. ePrint Arch. 2005: 386 (2005) - 2004
- [c38]Willy Susilo
, Fangguo Zhang
, Yi Mu:
Identity-Based Strong Designated Verifier Signature Schemes. ACISP 2004: 313-324 - [c37]Willy Susilo
, Yi Mu:
Deniable Ring Authentication Revisited. ACNS 2004: 149-163 - [c36]Junqi Zhang, Vijay Varadharajan, Yi Mu:
Securing XML Document Sources and Their Distribution. AINA (1) 2004: 562-567 - [c35]Yi Mu, Willy Susilo
, Yan-Xia Lin, Chun Ruan:
Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. ASIAN 2004: 169-181 - [c34]Yi Mu, Fangguo Zhang
, Willy Susilo
:
Deniable Partial Proxy Signatures. ASIAN 2004: 182-194 - [c33]Willy Susilo
, Yi Mu, Fangguo Zhang
:
Perfect Concurrent Signature Schemes. ICICS 2004: 14-26 - [c32]Junqi Zhang, Vijay Varadharajan, Yi Mu:
A Secure PIM-SM Multicast Routing Protocol. IWDC 2004: 276-288 - [c31]Ching Lin, Vijay Varadharajan, Yan Wang
, Yi Mu:
On the Design of a New Trust Model for Mobile Agent Security. TrustBus 2004: 60-69 - 2003
- [j3]Yi Mu, Junqi Zhang, Vijay Varadharajan, Yan-Xia Lin
:
Robust non-interactive oblivious transfer. IEEE Commun. Lett. 7(4): 153-155 (2003) - [c30]Weiliang Zhao, Vijay Varadharajan, Yi Mu:
A Secure Mental Poker Protocol Over The Internet. ACSW 2003: 105-109 - [c29]Willy Susilo, Yi Mu:
On Fail-Stop Verifiable Secret Sharing Schemes. Security and Management 2003: 663-667 - [c28]Willy Susilo
, Yi Mu:
Non-interactive Deniable Ring Authentication. ICISC 2003: 386-401 - [c27]Junqi Zhang, Vijay Varadharajan, Yi Mu:
A novel dynamic key management scheme for secure multicasting. ICON 2003: 391-395 - [c26]Yi Mu, Willy Susilo
, Yan-Xia Lin:
Identity-Based Broadcasting. INDOCRYPT 2003: 177-190 - 2002
- [j2]Yi Mu, Vijay Varadharajan:
Group Cryptography: Signature and Encryption. Informatica (Slovenia) 26(3) (2002) - [c25]Yi Mu, Junqi Zhang, Vijay Varadharajan:
m out of n Oblivious Transfer. ACISP 2002: 395-405 - [c24]Junqi Zhang, Vijay Varadharajan, Yi Mu:
A Secure Object Sharing Scheme for Java Card. ICICS 2002: 243-251 - 2001
- [c23]Yi Mu, Vijay Varadharajan:
Robust and Secure Broadcasting. INDOCRYPT 2001: 223-231 - [c22]Yi Mu, Khanh Quoc Nguyen, Vijay Varadharajan:
A Fair Electronic Cash Scheme. ISEC 2001: 20-32 - [e3]Vijay Varadharajan, Yi Mu:
Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings. Lecture Notes in Computer Science 2119, Springer 2001, ISBN 3-540-42300-1 [contents] - 2000
- [c21]Yi Mu, Vijay Varadharajan:
Fail-Stop Confirmer Signatures. ACISP 2000: 368-377 - [c20]Weiliang Zhao, Vijay Varadharajan, Yi Mu:
Fair On-line Gambling. ACSAC 2000: 394-400 - [c19]Yi Mu, Vijay Varadharajan:
Towards a Protection Model for Supporting Multiple Access Control Policies. Australasian Database Conference 2000: 107-114 - [c18]Yi Mu, Vijay Varadharajan:
An Internet Anonymous Auction Scheme. ICISC 2000: 171-182 - [c17]Yi Mu, Vijay Varadharajan:
Distributed Signcryption. INDOCRYPT 2000: 155-164
1990 – 1999
- 1999
- [j1]Vijay Varadharajan, Khanh Quoc Nguyen, Yi Mu:
On the Design of Efficient RSA-based Off-line Electronic Cash Schemes. Theor. Comput. Sci. 226(1-2): 173-184 (1999) - [c16]Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan:
Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. ACISP 1999: 117-128 - [c15]Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu:
Batching Proofs of Knowledge and Its Applications. DEXA Workshop 1999: 844-849 - [c14]Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan:
Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. ICICS 1999: 103-118 - [c13]Yi Mu, Vijay Varadharajan, Khanh Quoc Nguyen:
Delegated Decryption. IMACC 1999: 258-269 - [c12]Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan:
Undeniable Confirmer Signature. ISW 1999: 235-246 - [e2]Vijay Varadharajan, Yi Mu:
Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings. Lecture Notes in Computer Science 1726, Springer 1999, ISBN 3-540-66682-6 [contents] - 1998
- [c11]Yi Mu, Vijay Varadharajan:
Anonymous Secure E-Voting Over a Network. ACSAC 1998: 293-299 - [c10]Yi Mu, Vijay Varadharajan:
A New Scheme of Credit based Payment for Electronic Commerce. LCN 1998: 278-284 - 1997
- [c9]Yi Mu, Vijay Varadharajan, Yan-Xia Lin
:
New Micropayment Schemes Based on PayWords. ACISP 1997: 283-293 - [c8]Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan:
Micro-Digital Money for Electronic Commerce. ACSAC 1997: 2-8 - [c7]Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan:
Secure and Efficient Digital Coins. ACSAC 1997: 9-15 - [c6]Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu:
A New Efficient Off-line Anonymous Cash Scheme. ISAAC 1997: 193-201 - [c5]Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan:
A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. ISW 1997: 313-320 - [e1]Vijay Varadharajan, Josef Pieprzyk, Yi Mu:
Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings. Lecture Notes in Computer Science 1270, Springer 1997, ISBN 3-540-63232-8 [contents] - 1996
- [c4]Yi Mu, Vijay Varadharajan:
On the design of security protocols for mobile communications. ACISP 1996: 134-145 - [c3]Yi Mu, Yuliang Zheng
:
An alternative model of quantum key agreement via photon coupling. ACISP 1996: 320-331 - [c2]Vijay Varadharajan, Yi Mu:
On The Design Of Secure Electronic Payment Schemes For Internet. ACSAC 1996: 78-87 - [c1]Vijay Varadharajan, Yi Mu:
Design of Secure End-toEnd Protocols for Mobile Systems. IFIP World Conference on Mobile Communications 1996: 258-266
Coauthor Index
aka: Man Ho Allen Au
aka: Robert Huijie Deng
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint