关注
Yi Mu
Yi Mu
Professor
在 cityu.mo 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
On the security of certificateless signature schemes from Asiacrypt 2003
X Huang, W Susilo, Y Mu, F Zhang
Cryptology and Network Security: 4th International Conference, CANS 2005 …, 2005
4212005
Certificateless signature revisited
X Huang, Y Mu, W Susilo, DS Wong, W Wu
Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007
3892007
Constant-Size Dynamic k-TAA
MH Au, W Susilo, Y Mu
Security and Cryptography for Networks: 5th International Conference, SCN …, 2006
3012006
Malicious KGC attacks in certificateless cryptography
MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2842007
One-atom lasers
Y Mu, CM Savage
Physical Review A 46 (9), 5944, 1992
2691992
Dual-server public-key encryption with keyword search for secure cloud storage
R Chen, Y Mu, G Yang, F Guo, X Wang
IEEE transactions on information forensics and security 11 (4), 789-798, 2015
2392015
Asymmetric group key agreement
Q Wu, Y Mu, W Susilo, B Qin, J Domingo-Ferrer
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
2352009
Privacy-preserving decentralized key-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Yan
IEEE transactions on parallel and distributed systems 23 (11), 2150-2162, 2012
2272012
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Zhou, MHA Au
IEEE transactions on information forensics and security 10 (3), 665-678, 2014
1982014
Identity-based strong designated verifier signature schemes
W Susilo, F Zhang, Y Mu
Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004
1932004
CP-ABE with constant-size keys for lightweight devices
F Guo, Y Mu, W Susilo, DS Wong, V Varadharajan
IEEE transactions on information forensics and security 9 (5), 763-771, 2014
1892014
Certificate-based signature: security model and efficient construction
J Li, X Huang, Y Mu, W Susilo, Q Wu
Public Key Infrastructure: 4th European PKI Workshop: Theory and Practice …, 2007
1552007
Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation
Y Zhang, C Xu, X Liang, H Li, Y Mu, X Zhang
IEEE Transactions on Information Forensics and Security 12 (3), 676-688, 2016
1532016
Multi-identity single-key decryption without random oracles
F Guo, Y Mu, Z Chen, L Xu
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007 …, 2008
1282008
Personal health record systems and their security protection
KT Win, W Susilo, Y Mu
Journal of medical systems 30, 309-315, 2006
1262006
BL-MLE: Block-level message-locked encryption for secure large file deduplication
R Chen, Y Mu, G Yang, F Guo
IEEE Transactions on Information Forensics and Security 10 (12), 2643-2652, 2015
1252015
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
Y Jiang, W Susilo, Y Mu, F Guo
Future Generation Computer Systems 78, 720-729, 2018
1232018
Optical image encryption based on chaotic baker map and double random phase encoding
AM Elshamy, ANZ Rashed, AENA Mohamed, OS Faragalla, Y Mu, ...
Journal of Lightwave Technology 31 (15), 2533-2539, 2013
1182013
Identity-based data storage in cloud computing
J Han, W Susilo, Y Mu
Future Generation Computer Systems 29 (3), 673-681, 2013
1152013
Efficient generic on-line/off-line signatures without key exposure
X Chen, F Zhang, W Susilo, Y Mu
Applied Cryptography and Network Security: 5th International Conference …, 2007
1142007
系统目前无法执行此操作,请稍后再试。
文章 1–20