Yi Mu
Orcid: 0000-0002-1637-845XAffiliations:
- City University of Macau, Macau
- Fujian Normal University, Fuzhou, China (former)
- University of Wollongong, NSW, Australia (former)
- Macquarie University, Sydney, NSW, Australia (former)
- University of Western Sydney, NSW, Australia (former)
- Australian National University, Canberra, ACT, Australia (PhD 1994)
According to our database1,
Yi Mu
authored at least 531 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on d-nb.info
On csauthors.net:
Bibliography
2024
A Pruned Pendant Vertex Based Index for Shortest Distance Query Under Structured Encrypted Graph.
IEEE Trans. Inf. Forensics Secur., 2024
Theor. Comput. Sci., 2024
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2024
2023
IEEE Trans. Knowl. Data Eng., November, 2023
BE-TRDSS: Blockchain-Enabled Secure and Efficient Traceable-Revocable Data-Sharing Scheme in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, November, 2023
Des. Codes Cryptogr., November, 2023
Redactable Blockchain-Enabled Hierarchical Access Control Framework for Data Sharing in Electronic Medical Records.
IEEE Syst. J., June, 2023
Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption.
Comput. J., April, 2023
IEEE Trans. Serv. Comput., 2023
CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
2022
Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV.
J. King Saud Univ. Comput. Inf. Sci., November, 2022
Secure Outsourced Attribute-Based Sharing Framework for Lightweight Devices in Smart Health Systems.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cloud Comput., 2022
Distributed Ciphertext-Policy Attribute-Based Encryption With Enhanced Collusion Resilience and Privacy Preservation.
IEEE Syst. J., 2022
Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing.
IEEE Syst. J., 2022
Pers. Ubiquitous Comput., 2022
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth.
J. Syst. Archit., 2022
Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud.
J. Syst. Archit., 2022
A Secure and Efficient Decentralized Access Control Scheme Based on Blockchain for Vehicular Social Networks.
IEEE Internet Things J., 2022
Secure Decentralized Attribute-Based Sharing of Personal Health Records With Blockchain.
IEEE Internet Things J., 2022
IET Inf. Secur., 2022
BA-RMKABSE: Blockchain-aided Ranked Multi-keyword Attribute-based Searchable Encryption with Hiding Policy for Smart Health System.
Future Gener. Comput. Syst., 2022
Future Gener. Comput. Syst., 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
An Expressive "Test-Decrypt-Verify" Attribute-Based Encryption Scheme With Hidden Policy for Smart Medical Cloud.
IEEE Syst. J., 2021
Building Blockchains with Secure and Practical Public-Key Cryptographic Algorithms: Background, Motivations and Example.
IEEE Netw., 2021
Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system.
Inf. Sci., 2021
Multiauthority Access Control With Anonymous Authentication for Personal Health Record.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
An Enhanced Certificateless Aggregate Signature Without Pairings for E-Healthcare System.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Trans. Emerg. Telecommun. Technol., 2021
Des. Codes Cryptogr., 2021
2020
IEEE Trans. Serv. Comput., 2020
Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Dependable Secur. Comput., 2020
Theor. Comput. Sci., 2020
Theor. Comput. Sci., 2020
Theor. Comput. Sci., 2020
Theor. Comput. Sci., 2020
ACM Trans. Cyber Phys. Syst., 2020
IEEE Syst. J., 2020
A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy.
Inf. Sci., 2020
Inf. Sci., 2020
IEEE Internet Things J., 2020
IACR Cryptol. ePrint Arch., 2020
Sci. China Inf. Sci., 2020
Secure and Privacy-Preserving Attribute-Based Sharing Framework in Vehicles Ad Hoc Networks.
IEEE Access, 2020
Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage.
IEEE Access, 2020
Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid.
IEEE Access, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
Wirel. Pers. Commun., 2019
IEEE Trans. Ind. Informatics, 2019
The generic construction of continuous leakage-resilient identity-based cryptosystems.
Theor. Comput. Sci., 2019
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems.
Theor. Comput. Sci., 2019
J. Comput. Secur., 2019
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation.
Inf. Sci., 2019
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters.
Inf. Sci., 2019
Int. J. Inf. Sec., 2019
Int. J. Found. Comput. Sci., 2019
Int. J. Found. Comput. Sci., 2019
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance.
Future Gener. Comput. Syst., 2019
Des. Codes Cryptogr., 2019
Des. Codes Cryptogr., 2019
Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System.
IEEE Access, 2019
IEEE Access, 2019
On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Provable Security, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019
2018
Wirel. Pers. Commun., 2018
Wirel. Commun. Mob. Comput., 2018
IEEE Wirel. Commun. Lett., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Efficient <i>k</i>-out-of-<i>n</i> oblivious transfer scheme with the ideal communication cost.
Theor. Comput. Sci., 2018
Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure.
Pers. Ubiquitous Comput., 2018
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure.
Pers. Ubiquitous Comput., 2018
J. Comput. Sci. Technol., 2018
J. Biomed. Informatics, 2018
J. Inf. Secur. Appl., 2018
Int. J. Netw. Secur., 2018
Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes.
Int. J. Inf. Sec., 2018
Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts.
Int. J. Inf. Sec., 2018
Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud.
Int. J. High Perform. Comput. Netw., 2018
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing.
Future Gener. Comput. Syst., 2018
Comput. J., 2018
Ad Hoc Networks, 2018
Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the Provable Security, 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
A Novel Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Anonymous Key Generation.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications.
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
Wirel. Networks, 2017
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2017
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Dependable Secur. Comput., 2017
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017
Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments.
IEEE Syst. J., 2017
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query.
Quantum Inf. Process., 2017
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city.
Pers. Ubiquitous Comput., 2017
J. Comput. Sci. Technol., 2017
Efficient identity-based online/offline encryption and signcryption with short ciphertext.
Int. J. Inf. Sec., 2017
Int. J. Found. Comput. Sci., 2017
Int. J. Embed. Syst., 2017
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange.
Int. J. Comput. Math., 2017
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
IACR Cryptol. ePrint Arch., 2017
Des. Codes Cryptogr., 2017
Identity-based provable data possession revisited: Security analysis and generic construction.
Comput. Stand. Interfaces, 2017
Privacy-preserving data search and sharing protocol for social networks through wireless applications.
Concurr. Comput. Pract. Exp., 2017
Comput. Secur., 2017
Comput. J., 2017
Comput. J., 2017
Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server.
IEEE Access, 2017
Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Provable Security, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Australasian Computer Science Week Multiconference, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
World Wide Web, 2016
Comments on "Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks".
IEEE Trans. Wirel. Commun., 2016
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
IEEE Trans. Inf. Forensics Secur., 2016
One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Theor. Comput. Sci., 2016
Theor. Comput. Sci., 2016
Secur. Commun. Networks, 2016
Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Quantum Inf. Process., 2016
J. Comput. Sci. Technol., 2016
Quantum private set intersection cardinality and its application to anonymous authentication.
Inf. Sci., 2016
Int. J. Medical Informatics, 2016
Int. J. Medical Eng. Informatics, 2016
Int. J. Electron. Secur. Digit. Forensics, 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Concurr. Comput. Pract. Exp., 2016
Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys.
Comput. J., 2016
Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations.
Comput. J., 2016
Comput. J., 2016
Proceedings of the Provable Security, 2016
Proceedings of the Provable Security, 2016
Proceedings of the Provable Security, 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Serv. Comput., 2015
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption.
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Dependable Secur. Comput., 2015
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Int. J. Netw. Manag., 2015
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage.
Int. J. Inf. Sec., 2015
Int. J. Comput. Math., 2015
Proof of retrievability with public verifiability resilient against related-key attacks.
IET Inf. Secur., 2015
A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing.
Future Gener. Comput. Syst., 2015
Sci. China Inf. Sci., 2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Proceedings of the Provable Security, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015
2014
Wirel. Pers. Commun., 2014
IEEE Trans. Parallel Distributed Syst., 2014
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation.
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Inf. Forensics Secur., 2014
Theor. Comput. Sci., 2014
Secur. Commun. Networks, 2014
Secur. Commun. Networks, 2014
J. Comput. Secur., 2014
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents.
Inf. Process. Lett., 2014
Int. J. Secur. Networks, 2014
Int. J. Secur. Networks, 2014
Int. J. Interdiscip. Telecommun. Netw., 2014
PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2014
Future Gener. Comput. Syst., 2014
SA<sup>3</sup>: Self-adaptive anonymous authentication for dynamic authentication policies.
Future Gener. Comput. Syst., 2014
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks.
Frontiers Comput. Sci., 2014
Concurr. Comput. Pract. Exp., 2014
Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature.
Comput. J., 2014
Comput. J., 2014
Sci. China Inf. Sci., 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
An Efficient Variant of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing.
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014
Proceedings of the Provable Security - 8th International Conference, 2014
Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage.
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Secur. Commun. Networks, 2013
Secur. Commun. Networks, 2013
J. Netw. Comput. Appl., 2013
J. Commun. Networks, 2013
Efficient and dynamic key management for multiple identities in identity-based systems.
Inf. Sci., 2013
Int. J. Secur. Networks, 2013
Int. J. Comput. Math., 2013
Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the Radio Frequency Identification System Security, 2013
A Secure Elliptic Curve based RFID Ownership Transfer Scheme with Controlled Delegation.
Proceedings of the Radio Frequency Identification System Security, 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
IEEE Trans. Parallel Distributed Syst., 2012
Softw. Pract. Exp., 2012
Math. Comput. Model., 2012
New constructions of OSBE schemes and their applications in oblivious access control.
Int. J. Inf. Sec., 2012
IET Inf. Secur., 2012
IEICE Trans. Inf. Syst., 2012
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Comput. J., 2012
Comput. Electr. Eng., 2012
Comput. Electr. Eng., 2012
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Wirel. Commun. Mob. Comput., 2011
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Inf. Forensics Secur., 2011
J. Syst. Softw., 2011
IEEE J. Sel. Areas Commun., 2011
Provably secure identity-based authenticated key agreement protocols with malicious private key generators.
Inf. Sci., 2011
Comput. Secur., 2011
Comput. Commun., 2011
Comput. Math. Appl., 2011
Comput. J., 2011
Comput. J., 2011
Comput. J., 2011
GTrust: An Innovated Trust Model for Group Services Selection in Web-Based Service-Oriented Environments.
Proceedings of the Web Information System Engineering - WISE 2011, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
Proceedings of the IEEE International Conference on Services Computing, 2011
2010
J. Comput. Secur., 2010
Int. J. Secur. Networks, 2010
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security.
Int. J. Secur. Networks, 2010
Int. J. Comput. Commun. Control, 2010
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.
IACR Cryptol. ePrint Arch., 2010
Special issue of computers and mathematics with applications on "Advances in cryptography, security and applications for future computer science".
Comput. Math. Appl., 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented Environments.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
Constructing an Authentication Token to Access External Services in Service Aggregation.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010
2009
Int. J. Netw. Secur., 2009
IACR Cryptol. ePrint Arch., 2009
An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions.
IACR Cryptol. ePrint Arch., 2009
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Comput. Stand. Interfaces, 2009
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles.
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Provable Security, Third International Conference, 2009
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the Advances in Information and Computer Security, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the Security Technology, 2009
New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing.
Proceedings of the Computer Security, 2009
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.
Proceedings of the Topics in Cryptology, 2009
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009
2008
J. Commun. Networks, 2008
Inf. Sci., 2008
Int. J. Netw. Secur., 2008
Int. J. Inf. Sec., 2008
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles.
Proceedings of the Advances in Information and Computer Security, 2008
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Proceedings of the Sixth Australasian Information Security Conference, 2008
2007
J. Comput. Sci. Technol., 2007
How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis.
Int. J. Netw. Secur., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Security Applications, 8th International Workshop, 2007
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Proceedings of the Public Key Cryptography, 2007
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length.
Proceedings of the Pairing-Based Cryptography, 2007
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key.
Proceedings of the Pairing-Based Cryptography, 2007
Proceedings of the Advances in Information and Computer Security, 2007
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Public Key Infrastructure, 2007
Proceedings of the Topics in Cryptology, 2007
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
2006
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes.
J. Networks, 2006
Int. J. Secur. Networks, 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
ID-based Secure PIM-SM Schemes.
Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006
Proceedings of the Progressin Cryptology, 2006
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.
Proceedings of the Financial Cryptography and Data Security, 2006
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing.
Proceedings of the Public Key Infrastructure, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Int. J. Wirel. Mob. Comput., 2005
Int. J. High Perform. Comput. Netw., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Tripartite Concurrent Signatures.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005
Proceedings of the Applied Public Key Infrastructure, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the Information Security and Cryptology, 2005
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures).
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the Distributed Computing, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Advances in Computer Science, 2004
Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption.
Proceedings of the Advances in Computer Science, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Proceedings of the Applied Cryptography and Network Security, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
Proceedings of the Information Security and Cryptology, 2003
On Fail-Stop Verifiable Secret Sharing Schemes.
Proceedings of the International Conference on Security and Management, 2003
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003
2002
Group Cryptography: Signature and Encryption.
Informatica (Slovenia), 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the Topics in Electronic Commerce, Second International Symposium, 2001
2000
Proceedings of the Information Security and Cryptology, 2000
Proceedings of the Australasian Database Conference, 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Theor. Comput. Sci., 1999
Proceedings of the Information Security, Second International Workshop, 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1998
Proceedings of the Proceedings 23rd Conference on Local Computer Networks, 1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Algorithms and Computation, 8th International Symposium, 1997
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
Design of Secure End-toEnd Protocols for Mobile Systems.
Proceedings of the Mobile Communications: Technology, 1996
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996