Yi Mu
Yi Mu
Professor
在 fjnu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
On the security of certificateless signature schemes from Asiacrypt 2003
X Huang, W Susilo, Y Mu, F Zhang
International Conference on Cryptology and Network Security, 13-25, 2005
4032005
Certificateless signature revisited
X Huang, Y Mu, W Susilo, DS Wong, W Wu
Australasian Conference on Information Security and Privacy, 308-322, 2007
3572007
Malicious KGC attacks in certificateless cryptography
MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2642007
One-atom lasers
Y Mu, CM Savage
Physical Review A 46 (9), 5944, 1992
2371992
Constant-Size Dynamic k-TAA
MH Au, W Susilo, Y Mu
International conference on security and cryptography for networks, 111-125, 2006
2352006
Asymmetric group key agreement
Q Wu, Y Mu, W Susilo, B Qin, J Domingo-Ferrer
Annual International Conference on the Theory and Applications of …, 2009
2082009
Privacy-preserving decentralized key-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Yan
IEEE Transactions on Parallel and Distributed Systems 23 (11), 2150-2162, 2012
1922012
Identity-based strong designated verifier signature schemes
W Susilo, F Zhang, Y Mu
Australasian Conference on Information Security and Privacy, 313-324, 2004
1842004
Dual-server public-key encryption with keyword search for secure cloud storage
R Chen, Y Mu, G Yang, F Guo, X Wang
IEEE transactions on information forensics and security 11 (4), 789-798, 2015
1612015
CP-ABE with constant-size keys for lightweight devices
F Guo, Y Mu, W Susilo, DS Wong, V Varadharajan
IEEE transactions on information forensics and security 9 (5), 763-771, 2014
1512014
Certificate-based signature: security model and efficient construction
J Li, X Huang, Y Mu, W Susilo, Q Wu
European Public Key Infrastructure Workshop, 110-125, 2007
1472007
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Zhou, MHA Au
IEEE transactions on information forensics and security 10 (3), 665-678, 2014
1442014
Multi-identity single-key decryption without random oracles
F Guo, Y Mu, Z Chen, L Xu
International Conference on Information Security and Cryptology, 384-398, 2007
1222007
Personal health record systems and their security protection
KT Win, W Susilo, Y Mu
Journal of medical systems 30 (4), 309-315, 2006
1152006
Cryptanalysis of simple three-party key exchange protocol
H Guo, Z Li, Y Mu, X Zhang
Computers & Security 27 (1-2), 16-21, 2008
1082008
Perfect concurrent signature schemes
W Susilo, Y Mu, F Zhang
International Conference on Information and Communications Security, 14-26, 2004
1082004
Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world
X Huang, W Susilo, Y Mu, F Zhang
19th International Conference on Advanced Information Networking and …, 2005
992005
Optical image encryption based on chaotic baker map and double random phase encoding
AM Elshamy, ANZ Rashed, AENA Mohamed, OS Faragalla, Y Mu, ...
Journal of Lightwave Technology 31 (15), 2533-2539, 2013
982013
Identity-based proxy signature from pairings
W Wu, Y Mu, W Susilo, J Seberry, X Huang
International Conference on Autonomic and Trusted Computing, 22-31, 2007
972007
Efficient generic on-line/off-line signatures without key exposure
X Chen, F Zhang, W Susilo, Y Mu
International Conference on Applied Cryptography and Network Security, 18-30, 2007
972007
系统目前无法执行此操作,请稍后再试。
文章 1–20