On the security of certificateless signature schemes from Asiacrypt 2003 X Huang, W Susilo, Y Mu, F Zhang International Conference on Cryptology and Network Security, 13-25, 2005 | 403 | 2005 |
Certificateless signature revisited X Huang, Y Mu, W Susilo, DS Wong, W Wu Australasian Conference on Information Security and Privacy, 308-322, 2007 | 357 | 2007 |
Malicious KGC attacks in certificateless cryptography MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 264 | 2007 |
One-atom lasers Y Mu, CM Savage Physical Review A 46 (9), 5944, 1992 | 237 | 1992 |
Constant-Size Dynamic k-TAA MH Au, W Susilo, Y Mu International conference on security and cryptography for networks, 111-125, 2006 | 235 | 2006 |
Asymmetric group key agreement Q Wu, Y Mu, W Susilo, B Qin, J Domingo-Ferrer Annual International Conference on the Theory and Applications of …, 2009 | 208 | 2009 |
Privacy-preserving decentralized key-policy attribute-based encryption J Han, W Susilo, Y Mu, J Yan IEEE Transactions on Parallel and Distributed Systems 23 (11), 2150-2162, 2012 | 192 | 2012 |
Identity-based strong designated verifier signature schemes W Susilo, F Zhang, Y Mu Australasian Conference on Information Security and Privacy, 313-324, 2004 | 184 | 2004 |
Dual-server public-key encryption with keyword search for secure cloud storage R Chen, Y Mu, G Yang, F Guo, X Wang IEEE transactions on information forensics and security 11 (4), 789-798, 2015 | 161 | 2015 |
CP-ABE with constant-size keys for lightweight devices F Guo, Y Mu, W Susilo, DS Wong, V Varadharajan IEEE transactions on information forensics and security 9 (5), 763-771, 2014 | 151 | 2014 |
Certificate-based signature: security model and efficient construction J Li, X Huang, Y Mu, W Susilo, Q Wu European Public Key Infrastructure Workshop, 110-125, 2007 | 147 | 2007 |
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption J Han, W Susilo, Y Mu, J Zhou, MHA Au IEEE transactions on information forensics and security 10 (3), 665-678, 2014 | 144 | 2014 |
Multi-identity single-key decryption without random oracles F Guo, Y Mu, Z Chen, L Xu International Conference on Information Security and Cryptology, 384-398, 2007 | 122 | 2007 |
Personal health record systems and their security protection KT Win, W Susilo, Y Mu Journal of medical systems 30 (4), 309-315, 2006 | 115 | 2006 |
Cryptanalysis of simple three-party key exchange protocol H Guo, Z Li, Y Mu, X Zhang Computers & Security 27 (1-2), 16-21, 2008 | 108 | 2008 |
Perfect concurrent signature schemes W Susilo, Y Mu, F Zhang International Conference on Information and Communications Security, 14-26, 2004 | 108 | 2004 |
Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world X Huang, W Susilo, Y Mu, F Zhang 19th International Conference on Advanced Information Networking and …, 2005 | 99 | 2005 |
Optical image encryption based on chaotic baker map and double random phase encoding AM Elshamy, ANZ Rashed, AENA Mohamed, OS Faragalla, Y Mu, ... Journal of Lightwave Technology 31 (15), 2533-2539, 2013 | 98 | 2013 |
Identity-based proxy signature from pairings W Wu, Y Mu, W Susilo, J Seberry, X Huang International Conference on Autonomic and Trusted Computing, 22-31, 2007 | 97 | 2007 |
Efficient generic on-line/off-line signatures without key exposure X Chen, F Zhang, W Susilo, Y Mu International Conference on Applied Cryptography and Network Security, 18-30, 2007 | 97 | 2007 |