2013
231Identity-based data storage in cloud computing. Jinguang Han, Willy Susilo, Yi Mu. Future Generation Comp. Syst. (29): 673-681 (2013). Web SearchBibTeXDownload
230Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction. Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu. IACR Cryptology ePrint Archive (2013): 247 (2013). Web SearchBibTeXDownload
229Constant-Size Dynamic $k$ -Times Anonymous Authentication. Man Ho Au, Willy Susilo, Yi Mu, Sherman S. M. Chow. IEEE Systems Journal (7): 249-261 (2013). Web SearchBibTeXDownload
228Efficient and dynamic key management for multiple identities in identity-based systems. Hua Guo, Chang Xu, Zhoujun Li, Yanqing Yao, Yi Mu. Inf. Sci. (221): 579-590 (2013). Web SearchBibTeXDownload
227On security of a certificateless signcryption scheme. Songqin Miao, Futai Zhang, Sujuan Li, Yi Mu. Inf. Sci. (232): 475-481 (2013). Web SearchBibTeXDownload
226Secure RFID Ownership Transfer Protocols. Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan. ISPEC 2013, 189-203. Web SearchBibTeXDownload
225Identity-Based Multisignature with Message Recovery. Kefeng Wang, Yi Mu, Willy Susilo. ISPEC 2013, 91-104. Web SearchBibTeXDownload
224Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions. Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu. ISPEC 2013, 75-90. Web SearchBibTeXDownload
223Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model. Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong. ISPEC 2013, 204-217. Web SearchBibTeXDownload
222A robust trust model for service-oriented systems. Xing Su, Minjie Zhang, Yi Mu, Quan Bai. J. Comput. Syst. Sci. (79): 596-608 (2013). Web SearchBibTeXDownload
221Securing DSR against wormhole attacks in multirate ad hoc networks. Shams Qazi, Raad Raad, Yi Mu, Willy Susilo. J. Network and Computer Applications (36): 582-592 (2013). Web SearchBibTeXDownload
2012
220A provably secure authenticated key agreement protocol for wireless communications. Hua Guo, Chang Xu, Yi Mu, Zhoujun Li. Computers & Electrical Engineering (38): 563-572 (2012). Web SearchBibTeXDownload
219Efficient and secure stored-value cards with leakage resilience. Fuchun Guo, Yi Mu, Willy Susilo. Computers & Electrical Engineering (38): 370-380 (2012). Web SearchBibTeXDownload
218Efficient oblivious transfers with access control. Jinguang Han, Willy Susilo, Yi Mu, Jun Yan. Computers & Mathematics with Applications (63): 827-837 (2012). Web SearchBibTeXDownload
217Attribute-Based Oblivious Access Control. Jinguang Han, Willy Susilo, Yi Mu, Jun Yan. Comput. J. (55): 1202-1215 (2012). Web SearchBibTeXDownload
216A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang, Li Xu. Comput. J. (55): 1157-1168 (2012). Web SearchBibTeXDownload
215Affiliation-Hiding Authenticated Asymmetric Group Key Agreement. Chang Xu, Zhoujun Li, Yi Mu, Hua Guo, Tao Guo. Comput. J. (55): 1180-1191 (2012). Web SearchBibTeXDownload
214Certificateless Signatures: New Schemes and Security Models. Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu. Comput. J. (55): 457-474 (2012). Web SearchBibTeXDownload
213Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext. Fuchun Guo, Yi Mu, Willy Susilo. ESORICS 2012, 609-626. Web SearchBibTeXDownload
212Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption. Jinguang Han, Willy Susilo, Yi Mu, Jun Yan. IEEE Trans. Parallel Distrib. Syst. (23): 2150-2162 (2012). Web SearchBibTeXDownload
211Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme. Ying Sun, Yong Yu, Yi Mu. IEICE Transactions (95-D): 1690-1693 (2012). Web SearchBibTeXDownload
210Improved certificateless signature scheme provably secure in the standard model. Yong Yu, Yi Mu, Guilin Wang, Qi Xia, Bo Yang. IET Information Security (6): 102-110 (2012). Web SearchBibTeXDownload
209New constructions of OSBE schemes and their applications in oblivious access control. Jinguang Han, Willy Susilo, Yi Mu, Jun Yan. Int. J. Inf. Sec. (11): 389-401 (2012). Web SearchBibTeXDownload
208A Pre-computable Signature Scheme with Efficient Verification for RFID. Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan. ISPEC 2012, 1-16. Web SearchBibTeXDownload
207Privacy enhanced data outsourcing in the cloud. Miao Zhou, Yi Mu, Willy Susilo, Jun Yan, Liju Dong. J. Network and Computer Applications (35): 1367-1373 (2012). Web SearchBibTeXDownload
206Provably secure proxy signature scheme from factorization. Yong Yu, Yi Mu, Willy Susilo, Ying Sun, Yafu Ji. Mathematical and Computer Modelling (55): 1160-1168 (2012). Web SearchBibTeXDownload
205Privacy preserving protocol for service aggregation in cloud computing. Peishun Wang, Yi Mu, Willy Susilo, Jun Yan. Softw., Pract. Exper. (42): 467-483 (2012). Web SearchBibTeXDownload
204Provably Secure Single Sign-on Scheme in Distributed Systems and Networks. Jiangshan Yu, Guilin Wang, Yi Mu. TrustCom 2012, 271-278. Web SearchBibTeXDownload
203Multi-Level Controlled Signature. Pairat Thorncharoensri, Willy Susilo, Yi Mu. WISA 2012, 96-110. Web SearchBibTeXDownload
2011
202Electronic Cash with Anonymous User Suspension. Man Ho Au, Willy Susilo, Yi Mu. ACISP 2011, 172-188. Web SearchBibTeXDownload
201Self-certified ring signatures. Nan Li, Yi Mu, Willy Susilo, Fuchun Guo. ASIACCS 2011, 396-400. Web SearchBibTeXDownload
200Attribute-based authentication for multi-agent systems with dynamic groups. Qi Zhang, Yi Mu, Minjie Zhang. Computer Communications (34): 436-446 (2011). Web SearchBibTeXDownload
199An efficient dynamic authenticated key exchange protocol with selectable identities. Hua Guo, Zhoujun Li, Yi Mu, Fan Zhang, Chuankun Wu, Jikai Teng. Computers & Mathematics with Applications (61): 2518-2527 (2011). Web SearchBibTeXDownload
198Provably secure server-aided verification signatures. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang. Computers & Mathematics with Applications (61): 1705-1723 (2011). Web SearchBibTeXDownload
197An efficient and non-interactive hierarchical key agreement protocol. Hua Guo, Yi Mu, Zhoujun Li, Xiyong Zhang. Computers & Security (30): 28-34 (2011). Web SearchBibTeXDownload
196Secure Image Retrieval Based on Visual Content and Watermarking Protocol. Jun Zhang, Yang Xiang, Wanlei Zhou, Lei Ye, Yi Mu. Comput. J. (54): 1661-1674 (2011). Web SearchBibTeXDownload
195Short Signatures with a Tighter Security Reduction Without Random Oracles. Fuchun Guo, Yi Mu, Willy Susilo. Comput. J. (54): 513-524 (2011). Web SearchBibTeXDownload
194Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature. Yong Yu, Yi Mu, Guilin Wang, Ying Sun. Comput. J. (54): 1645-1651 (2011). Web SearchBibTeXDownload
193Secure mobile agents with controlled resources. Qi Zhang, Yi Mu, Minjie Zhang, Robert H. Deng. Concurrency and Computation: Practice and Experience (23): 1348-1366 (2011). Web SearchBibTeXDownload
192Optimistic Fair Exchange with Strong Resolution-Ambiguity. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiang. IEEE Journal on Selected Areas in Communications (29): 1491-1502 (2011). Web SearchBibTeXDownload
191Web Service Selection Based on Similarity Evaluation. Hao Gao, Jun Yan, Yi Mu. IEEE SCC 2011, 322-329. Web SearchBibTeXDownload
190Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures. X. Huang, Y. Mu, W. Susilo, W. Wu, J. Zhou, Robert H. Deng. IEEE Transactions on Information Forensics and Security (6): 498-512 (2011). Web SearchBibTeXDownload
189Provably secure identity-based authenticated key agreement protocols with malicious private key generators. Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang. Inf. Sci. (181): 628-647 (2011). Web SearchBibTeXDownload
188Efficient Self-certified Signatures with Batch Verification. Nan Li, Yi Mu, Willy Susilo. Inscrypt 2011, 179-194. Web SearchBibTeXDownload
187Policy-Based Authentication for Mobile Agents. Yikai Wang, Yi Mu, Minjie Zhang. ISPEC 2011, 123-137. Web SearchBibTeXDownload
186Practical RFID ownership transfer scheme. Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini. Journal of Computer Security (19): 319-341 (2011). Web SearchBibTeXDownload
185Strongly unforgeable proxy signature scheme secure in the standard model. Ying Sun, Chunxiang Xu, Yong Yu, Yi Mu. Journal of Systems and Software (84): 1471-1479 (2011). Web SearchBibTeXDownload
184Improving security of q-SDH based digital signatures. Fuchun Guo, Yi Mu, Willy Susilo. Journal of Systems and Software (84): 1783-1790 (2011). Web SearchBibTeXDownload
183Optimistic Fair Exchange of Ring Signatures. Lie Qu, Guilin Wang, Yi Mu. SecureComm 2011, 227-242. Web SearchBibTeXDownload
182Authenticated key exchange protocol with selectable identities. Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li. Wireless Communications and Mobile Computing (11): 226-239 (2011). Web SearchBibTeXDownload
181GTrust: An Innovated Trust Model for Group Services Selection in Web-Based Service-Oriented Environments. Xing Su, Minjie Zhang, Yi Mu, Quan Bai. WISE 2011, 306-313. Web SearchBibTeXDownload
2010
180Proof-of-Knowledge of Representation of Committed Value and Its Applications. Man Ho Au, Willy Susilo, Yi Mu. ACISP 2010, 352-369. Web SearchBibTeXDownload
179Towards a Cryptographic Treatment of Publish/Subscribe Systems. Tsz Hon Yuen, Willy Susilo, Yi Mu. CANS 2010, 201-220. Web SearchBibTeXDownload
178Special issue of computers and mathematics with applications on "Advances in cryptography, security and applications for future computer science". Jong Hyuk Park, Sajid Hussain, Guilin Wang, Yi Mu. Computers & Mathematics with Applications (60): 175 (2010). Web SearchBibTeXDownload
177A framework for privacy policy management in service aggregation. Peishun Wang, Liju Dong, Yi Mu, Willy Susilo, Jun Yan. CSCWD 2010, 166-171. Web SearchBibTeXDownload
176PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented Environments. Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim. EUC 2010, 841-848. Web SearchBibTeXDownload
175Efficient RFID Authentication Scheme for Supply Chain Applications. Fei Bi, Yi Mu. EUC 2010, 583-588. Web SearchBibTeXDownload
174Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong Wu, Yi Mu, Jangseong Kim, Kwangjo Kim. Financial Cryptography 2010, 304-311. Web SearchBibTeXDownload
173Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships. Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu. FSE 2010, 192-211. Web SearchBibTeXDownload
172Constructing an Authentication Token to Access External Services in Service Aggregation. Peishun Wang, Yi Mu, Willy Susilo, Jun Yan. IEEE SCC 2010, 321-328. Web SearchBibTeXDownload
171Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks. Li Xu, Sisheng Chen, Xinyi Huang, Yi Mu. IJSN (5): 35-44 (2010). Web SearchBibTeXDownload
170Certificateless threshold signature scheme from bilinear maps. Hong Yuan, Futai Zhang, Xinyi Huang, Yi Mu, Willy Susilo, Lei Zhang. Inf. Sci. (180): 4714-4728 (2010). Web SearchBibTeXDownload
169Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase. Fuchun Guo, Yi Mu, Willy Susilo. Inscrypt 2010, 455-470. Web SearchBibTeXDownload
168How to construct identity-based signatures without the key escrow problem. Tsz Hon Yuen, Willy Susilo, Yi Mu. Int. J. Inf. Sec. (9): 297-311 (2010). Web SearchBibTeXDownload
167Constructions of certificate-based signature secure against key replacement attacks. Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu. Journal of Computer Security (18): 421-449 (2010). Web SearchBibTeXDownload
166Dynamic Trust Model for Federated Identity Management. Hao Gao, Jun Yan, Yi Mu. NSS 2010, 55-61. Web SearchBibTeXDownload
165Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiang. Public Key Cryptography 2010, 124-141. Web SearchBibTeXDownload
164A Generic Construction of Dynamic Single Sign-on with Strong Security. Jinguang Han, Yi Mu, Willy Susilo, Jun Yan. SecureComm 2010, 181-198. Web SearchBibTeXDownload
2009
163Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu. ACISP 2009, 153-170. Web SearchBibTeXDownload
162Efficient Non-interactive Range Proof. Tsz Hon Yuen, Qiong Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Guomin Yang. COCOON 2009, 138-147. Web SearchBibTeXDownload
161An efficient anonymous proxy signature scheme with provable security. Yong Yu, Chunxiang Xu, Xinyi Huang, Yi Mu. Computer Standards & Interfaces (31): 348-353 (2009). Web SearchBibTeXDownload
160Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. Man Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu. CT-RSA 2009, 295-308. Web SearchBibTeXDownload
159New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini. ESORICS 2009, 321-336. Web SearchBibTeXDownload
158Asymmetric Group Key Agreement. Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer. EUROCRYPT 2009, 153-170. Web SearchBibTeXDownload
157How to Construct Identity-Based Signatures without the Key Escrow Problem. Tsz Hon Yuen, Willy Susilo, Yi Mu. EuroPKI 2009, 286-301. Web SearchBibTeXDownload
156Escrowed Deniable Identification Schemes. Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Au, Yi Mu, Duncan S. Wong. FGIT-SecTech 2009, 234-241. Web SearchBibTeXDownload
155Enhanced Target Collision Resistant Hash Functions Revisited. Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu. FSE 2009, 327-344. Web SearchBibTeXDownload
154An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions. Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu. IACR Cryptology ePrint Archive (2009): 506 (2009). Web SearchBibTeXDownload
153Policy-Controlled Signatures. Pairat Thorncharoensri, Willy Susilo, Yi Mu. ICICS 2009, 91-106. Web SearchBibTeXDownload
152Identity-based Universal Designated Verifier Signature Proof System. Xiaofeng Chen, Guomin Chen, Fangguo Zhang, Baodian Wei, Yi Mu. I. J. Network Security (8): 52-58 (2009). Web SearchBibTeXDownload
151Certificateless Threshold Ring Signature. Shuang Chang, Duncan S. Wong, Yi Mu, Zhenfeng Zhang. Inf. Sci. (179): 3685-3696 (2009). Web SearchBibTeXDownload
150Universal Designated Verifier Signatures with Threshold-Signers. Pairat Thorncharoensri, Willy Susilo, Yi Mu. IWSEC 2009, 89-109. Web SearchBibTeXDownload
149Certificate-based Signatures Revisited. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang. J. UCS (15): 1659-1684 (2009). Web SearchBibTeXDownload
148An Efficient Certificateless Encryption Scheme in the Standard Model. Hua Guo, Xiyong Zhang, Yi Mu, Zhoujun Li. NSS 2009, 302-309. Web SearchBibTeXDownload
147Secure Mobile Agents with Designated Hosts. Qi Zhang, Yi Mu, Minjie Zhang, Robert Huijie Deng. NSS 2009, 286-293. Web SearchBibTeXDownload
146How to Prove Security of a Signature with a Tighter Security Reduction. Fuchun Guo, Yi Mu, Willy Susilo. ProvSec 2009, 90-103. Web SearchBibTeXDownload
145Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?. Man Ho Au, Willy Susilo, Yi Mu. ProvSec 2009, 129-139. Web SearchBibTeXDownload
144Server-Controlled Identity-Based Authenticated Key Exchange. Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li. ProvSec 2009, 214-229. Web SearchBibTeXDownload
143Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings. Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li. UIC 2009, 310-324. Web SearchBibTeXDownload
142Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles. Pairat Thorncharoensri, Willy Susilo, Yi Mu. WISA 2009, 94-108. Web SearchBibTeXDownload
2008
141Sanitizable Signatures Revisited. Tsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu. CANS 2008, 80-97. Web SearchBibTeXDownload
140Cryptanalysis of simple three-party key exchange protocol. Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang. Computers & Security (27): 16-21 (2008). Web SearchBibTeXDownload
139RFID Privacy Models Revisited. Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini. ESORICS 2008, 251-266. Web SearchBibTeXDownload
138Identity-Based Online/Offline Encryption. Fuchun Guo, Yi Mu, Zhide Chen. Financial Cryptography 2008, 247-261. Web SearchBibTeXDownload
137Practical Anonymous Divisible E-Cash from Bounded Accumulators. Man Ho Au, Willy Susilo, Yi Mu. Financial Cryptography 2008, 287-301. Web SearchBibTeXDownload
136Constant-Size Dynamic $k$-TAA. Man Ho Au, Willy Susilo, Yi Mu. IACR Cryptology ePrint Archive (2008): 136 (2008). Web SearchBibTeXDownload
135How to Balance Privacy with Authenticity. Pairat Thorncharoensri, Willy Susilo, Yi Mu. ICISC 2008, 184-201. Web SearchBibTeXDownload
134Hierarchical Identity-Based Online/Offline Encryption. Zhongren Liu, Li Xu, Zhide Chen, Yi Mu, Fuchun Guo. ICYCS 2008, 2115-2119. Web SearchBibTeXDownload
133A New and Efficient Signature on Commitment Values. Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo. I. J. Network Security (7): 100-105 (2008). Web SearchBibTeXDownload
132Short Designated Verifier Signature Scheme and Its Identity-based Variant. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. I. J. Network Security (6): 82-93 (2008). Web SearchBibTeXDownload
131Efficient generic on-line/off-line (threshold) signatures without key exposure. Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim. Inf. Sci. (178): 4192-4203 (2008). Web SearchBibTeXDownload
130Publicly Verifiable Privacy-Preserving Group Decryption. Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu. Inscrypt 2008, 72-83. Web SearchBibTeXDownload
129Privacy for Private Key in Signatures. Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo. Inscrypt 2008, 84-95. Web SearchBibTeXDownload
128Secure universal designated verifier signature without random oracles. Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu. Int. J. Inf. Sec. (7): 171-183 (2008). Web SearchBibTeXDownload
127A Generic Construction of Identity-Based Online/Offline Signcryption. Dongdong Sun, Yi Mu, Willy Susilo. ISPA 2008, 707-712. Web SearchBibTeXDownload
126Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles. Fuchun Guo, Yi Mu, Zhide Chen. IWSEC 2008, 49-63. Web SearchBibTeXDownload
125Cryptography in Computer System Security. Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart. J. UCS (14): 314-317 (2008). Web SearchBibTeX
124Identity-Based On-Line/Off-Line Signcryption. Dongdong Sun, Xinyi Huang, Yi Mu, Willy Susilo. NPC Workshops 2008, 34-41. Web SearchBibTeXDownload
123Server-Aided Verification Signatures: Definitions and New Constructions. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang. ProvSec 2008, 141-155. Web SearchBibTeXDownload
122Optimal Online/Offline Signature: How to Sign a Message without Online Computation. Fuchun Guo, Yi Mu. ProvSec 2008, 98-111. Web SearchBibTeXDownload
121Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang. WISA 2008, 99-114. Web SearchBibTeXDownload
2007
120SEFAP: An Email System for Anti-Phishing. Qiong Ren, Yi Mu, Willy Susilo. ACIS-ICIS 2007, 782-787. Web SearchBibTeXDownload
119Certificateless Signature Revisited. Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu. ACISP 2007, 308-322. Web SearchBibTeXDownload
118Practical Compact E-Cash. Man Ho Au, Willy Susilo, Yi Mu. ACISP 2007, 431-445. Web SearchBibTeXDownload
117Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu. ACNS 2007, 18-30. Web SearchBibTeXDownload
116Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin. ATC 2007, 32-41. Web SearchBibTeXDownload
115Identity-Based Proxy Signature from Pairings. Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang. ATC 2007, 22-31. Web SearchBibTeXDownload
114A Generic Construction for Universally-Convertible Undeniable Signatures. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu. CANS 2007, 15-33. Web SearchBibTeXDownload
113Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. Fuchun Guo, Yi Mu, Zhide Chen. CANS 2007, 1-14. Web SearchBibTeXDownload
112Compact E-Cash from Bounded Accumulator. Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu. CT-RSA 2007, 178-195. Web SearchBibTeXDownload
111Certificate-Based Signature: Security Model and Efficient Construction. Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu. EuroPKI 2007, 110-125. Web SearchBibTeXDownload
110Group Decryption. Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang. IACR Cryptology ePrint Archive (2007): 17 (2007). Web SearchBibTeXDownload
109Practical Anonymous Divisible E-Cash From Bounded Accumulators. Man Ho Au, Willy Susilo, Yi Mu. IACR Cryptology ePrint Archive (2007): 459 (2007). Web SearchBibTeXDownload
108Nominative Signature: Application, Security Model and Construction. Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo. IACR Cryptology ePrint Archive (2007): 69 (2007). Web SearchBibTeXDownload
107Efficient Partially Blind Signatures with Provable Security. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang. ICCSA (3) 2007, 1096-1105. Web SearchBibTeXDownload
106New Construction of Group Secret Handshakes Based on Pairings. Lan Zhou, Willy Susilo, Yi Mu. ICICS 2007, 16-30. Web SearchBibTeXDownload
105Formal Definition and Construction of Nominative Signature. Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo. ICICS 2007, 57-68. Web SearchBibTeXDownload
104Open-Source Tools for Immersive Environmental Visualization. William R. Sherman, Simon Su, Philip A. McDonald, Yi Mu, Frederick C. Harris Jr.. IEEE Computer Graphics and Applications (27): 88-91 (2007). Web SearchBibTeXDownload
103How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis. Pairat Thorncharoensri, Tianbing Xia, Yi Mu. I. J. Network Security (4): 138-148 (2007). Web SearchBibTeXDownload
102A new group rekeying scheme based on t-packing designs for ad hoc networks. Jianwei Chen, Li Xu, Yi Mu. Infoscale 2007, 54. Web SearchBibTeXDownload
101Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang. Inscrypt 2007, 25-39. Web SearchBibTeXDownload
100Multi-Identity Single-Key Decryption without Random Oracles. Fuchun Guo, Yi Mu, Zhide Chen, Li Xu. Inscrypt 2007, 384-398. Web SearchBibTeXDownload
99First price sealed bid auction without auctioneers. Shuo Zheng, Luke McAven, Yi Mu. IWCMC 2007, 127-131. Web SearchBibTeXDownload
98Nominative Signature from Ring Signature. Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong, Yi Mu. IWSEC 2007, 396-411. Web SearchBibTeXDownload
97Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. J. Comput. Sci. Technol. (22): 71-74 (2007). Web SearchBibTeXDownload
96Short Group Signatures Without Random Oracles. Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang, Zhengtao Jiang. J. Comput. Sci. Technol. (22): 805-821 (2007). Web SearchBibTeXDownload
95Revocable Ring Signature. Dennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, Duncan S. Wong. J. Comput. Sci. Technol. (22): 785-794 (2007). Web SearchBibTeXDownload
94Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. Fuchun Guo, Yi Mu, Zhide Chen. Pairing 2007, 392-406. Web SearchBibTeXDownload
93Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu. Pairing 2007, 367-391. Web SearchBibTeXDownload
92Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. Huafei Zhu, Willy Susilo, Yi Mu. Public Key Cryptography 2007, 134-149. Web SearchBibTeXDownload
91Compact sequential aggregate signatures. Yi Mu, Willy Susilo, Huafei Zhu. SAC 2007, 249-253. Web SearchBibTeXDownload
90Designated Verifier Signature: Definition, Framework and New Constructions. Yong Li, Willy Susilo, Yi Mu, Dingyi Pei. UIC 2007, 1191-1200. Web SearchBibTeXDownload
89Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang. WISA 2007, 16-29. Web SearchBibTeXDownload
2006
88Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang. ACISP 2006, 99-110. Web SearchBibTeXDownload
87A Scalable Multi-service Group Key Management Scheme. Junqi Zhang, Vijay Varadharajan, Yi Mu. AICT/ICIW 2006, 172. Web SearchBibTeXDownload
86Certificateless Designated Verifier Signature Schemes. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. AINA (2) 2006, 15-19. Web SearchBibTeXDownload
85Designated group credentials. Ching Yu Ng, Willy Susilo, Yi Mu. ASIACCS 2006, 59-65. Web SearchBibTeXDownload
84Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang. ATC 2006, 531-540. Web SearchBibTeXDownload
83Efficient Signcryption Without Random Oracles. Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang. ATC 2006, 449-458. Web SearchBibTeXDownload
82Secure and Efficient Trust Negotiation. Fuchun Guo, Zhide Chen, Yi Mu, Li Xu, Shengyuan Zhang. CIS 2006, 374-384. Web SearchBibTeXDownload
81Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. Willy Susilo, Yi Mu. EuroPKI 2006, 68-80. Web SearchBibTeXDownload
80Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo. Financial Cryptography 2006, 251-265. Web SearchBibTeXDownload
79Malicious KGC Attacks in Certificateless Cryptography. Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, Guomin Yang. IACR Cryptology ePrint Archive (2006): 255 (2006). Web SearchBibTeXDownload
78Efficient Partially Blind Signatures with Provable Security. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang. ICCSA (3) 2006, 345-354. Web SearchBibTeXDownload
77Universal Designated Verifier Signature Without Delegatability. Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu. ICICS 2006, 479-498. Web SearchBibTeXDownload
76Convertible identity-based anonymous designated ring signatures. Yiqun Chen, Willy Susilo, Yi Mu. IJSN (1): 218-225 (2006). Web SearchBibTeXDownload
75Volumetric Color Image Compression Using SET Partitioning Methods. Yi Mu, Beddhu Murali, Junfeng Gu. IPCV 2006, 445-450. Web SearchBibTeX
74Three-Round Secret Handshakes Based on ElGamal and DSA. Lan Zhou, Willy Susilo, Yi Mu. ISPEC 2006, 332-342. Web SearchBibTeXDownload
73Privately Retrieve Data from Large Databases. Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang. ISPEC 2006, 367-378. Web SearchBibTeXDownload
72Short (Identity-Based) Strong Designated Verifier Signature Schemes. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. ISPEC 2006, 214-225. Web SearchBibTeXDownload
71Identity-based anonymous designated ring signatures. Yiqun Chen, Willy Susilo, Yi Mu. IWCMC 2006, 189-194. Web SearchBibTeXDownload
70Ad Hoc Group Signatures. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang. IWSEC 2006, 120-135. Web SearchBibTeXDownload
69Personal Health Record Systems and Their Security Protection. Khin Than Win, Willy Susilo, Yi Mu. J. Medical Systems (30): 309-315 (2006). Web SearchBibTeXDownload
68Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes. Shidi Xu, Yi Mu, Willy Susilo. JNW (1): 47-53 (2006). Web SearchBibTeXDownload
67Proxy Signature Without Random Oracles. Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu. MSN 2006, 473-484. Web SearchBibTeXDownload
66Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings. Lan Zhou, Willy Susilo, Yi Mu. MSN 2006, 521-532. Web SearchBibTeXDownload
65Constant-Size Dynamic k-TAA. Man Ho Au, Willy Susilo, Yi Mu. SCN 2006, 111-125. Web SearchBibTeXDownload
64Restricted Universal Designated Verifier Signature. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. UIC 2006, 874-882. Web SearchBibTeXDownload
63A New Signature Scheme Without Random Oracles from Bilinear Pairings. Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu. VIETCRYPT 2006, 67-80. Web SearchBibTeXDownload
62ID-based Secure PIM-SM Schemes. Junqi Zhang, Vijay Varadharajan, Yi Mu. Wireless and Optical Communications 2006, 190-195. Web SearchBibTeX
2005
61On the Security of Nominative Signatures. Willy Susilo, Yi Mu. ACISP 2005, 329-335. Web SearchBibTeXDownload
60Reducing Security Overhead for Mobile Networks. Fangguo Zhang, Yi Mu, Willy Susilo. AINA 2005, 398-403. Web SearchBibTeXDownload
59Privacy-Enhanced Internet Storage. Willy Susilo, Fangguo Zhang, Yi Mu. AINA 2005, 603-608. Web SearchBibTeXDownload
58Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. AINA 2005, 649-654. Web SearchBibTeXDownload
57On the Security of Certificateless Signature Schemes from Asiacrypt 2003. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. CANS 2005, 13-25. Web SearchBibTeXDownload
56A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen. EUC Workshops 2005, 480-489. Web SearchBibTeXDownload
55Access Policy Sheet for Access Control in Fine-Grained XML. Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan. EUC Workshops 2005, 1273-1282. Web SearchBibTeXDownload
54Short Designated Verifier Proxy Signature from Pairings. Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang. EUC Workshops 2005, 835-844. Web SearchBibTeXDownload
53Identity-Based Universal Designated Verifier Signatures. Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen. EUC Workshops 2005, 825-834. Web SearchBibTeXDownload
52Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. Shidi Xu, Yi Mu, Willy Susilo. EUC Workshops 2005, 854-863. Web SearchBibTeXDownload
51Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). Fangguo Zhang, Willy Susilo, Yi Mu. Financial Cryptography 2005, 45-56. Web SearchBibTeXDownload
50Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004. Xinyi Huang, Willy Susilo, Yi Mu. IACR Cryptology ePrint Archive (2005): 122 (2005). Web SearchBibTeXDownload
49A New Short Signature Scheme Without Random Oracles from Bilinear Pairings. Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu. IACR Cryptology ePrint Archive (2005): 386 (2005). Web SearchBibTeXDownload
48An Efficient Static Blind Ring Signature Scheme. Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu. ICISC 2005, 410-423. Web SearchBibTeXDownload
47Delegatable Access Control for Fine-Grained XML. Jing Wu, Jennifer Seberry, Yi Mu, Chun Ruan. ICPADS (2) 2005, 270-274. Web SearchBibTeXDownload
46Universal Designated Multi Verifier Signature Schemes. Ching Yu Ng, Willy Susilo, Yi Mu. ICPADS (2) 2005, 305-309. Web SearchBibTeXDownload
45Secure distribution and access of XML documents. Junqi Zhang, Vijay Varadharajan, Yi Mu. IJHPCN (3): 356-365 (2005). Web SearchBibTeXDownload
44Provably secure fail-stop signature schemes based on RSA. Willy Susilo, Yi Mu. IJWMC (1): 53-60 (2005). Web SearchBibTeXDownload
43Efficient Broadcast from Trapdoor Functions. Yi Mu, Willy Susilo, Xinyi Huang. IWAP 2005, 240-248. Web SearchBibTeXDownload
42Secure AODV Routing Protocol Using One-Time Signature. Shidi Xu, Yi Mu, Willy Susilo. MSN 2005, 288-297. Web SearchBibTeXDownload
41Tripartite Concurrent Signatures. Willy Susilo, Yi Mu. SEC 2005, 425-442. Web SearchBibTeX
2004
40Identity-Based Strong Designated Verifier Signature Schemes. Willy Susilo, Fangguo Zhang, Yi Mu. ACISP 2004, 313-324. Web SearchBibTeXDownload
39Deniable Ring Authentication Revisited. Willy Susilo, Yi Mu. ACNS 2004, 149-163. Web SearchBibTeXDownload
38Securing XML Document Sources and Their Distribution. Junqi Zhang, Vijay Varadharajan, Yi Mu. AINA (1) 2004, 562-567. Web SearchBibTeXDownload
37Deniable Partial Proxy Signatures. Yi Mu, Fangguo Zhang, Willy Susilo. ASIAN 2004, 182-194. Web SearchBibTeXDownload
36Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. Yi Mu, Willy Susilo, Yan-Xia Lin, Chun Ruan. ASIAN 2004, 169-181. Web SearchBibTeXDownload
35On the Ambiguity of Concurrent Signatures. Yi Mu, Fangguo Zhang, Willy Susilo. IACR Cryptology ePrint Archive (2004): 96 (2004). Web SearchBibTeXDownload
34Perfect Concurrent Signature Schemes. Willy Susilo, Yi Mu, Fangguo Zhang. ICICS 2004, 14-26. Web SearchBibTeXDownload
33A Secure PIM-SM Multicast Routing Protocol. Junqi Zhang, Vijay Varadharajan, Yi Mu. IWDC 2004, 276-288. Web SearchBibTeXDownload
32On the Design of a New Trust Model for Mobile Agent Security. Ching Lin, Vijay Varadharajan, Yan Wang, Yi Mu. TrustBus 2004, 60-69. Web SearchBibTeXDownload
2003
31A Secure Mental Poker Protocol Over The Internet. Weiliang Zhao, Vijay Varadharajan, Yi Mu. ACSW Frontiers 2003, 105-109. Web SearchBibTeXDownload
30Non-interactive Deniable Ring Authentication. Willy Susilo, Yi Mu. ICISC 2003, 386-401. Web SearchBibTeXDownload
29Identity-Based Broadcasting. Yi Mu, Willy Susilo, Yan-Xia Lin. INDOCRYPT 2003, 177-190. Web SearchBibTeXDownload
28On Fail-Stop Verifiable Secret Sharing Schemes. Willy Susilo, Yi Mu. Security and Management 2003, 663-667. Web SearchBibTeX
2002
27m out of n Oblivious Transfer. Yi Mu, Junqi Zhang, Vijay Varadharajan. ACISP 2002, 395-405. Web SearchBibTeXDownload
26A Secure Object Sharing Scheme for Java Card. Junqi Zhang, Vijay Varadharajan, Yi Mu. ICICS 2002, 243-251. Web SearchBibTeXDownload
25Group Cryptography: Signature and Encryption. Yi Mu, Vijay Varadharajan. Informatica (Slovenia) (26) (2002). Web SearchBibTeX
2001
24Robust and Secure Broadcasting. Yi Mu, Vijay Varadharajan. INDOCRYPT 2001, 223-231. Web SearchBibTeXDownload
23A Fair Electronic Cash Scheme. Yi Mu, Khanh Quoc Nguyen, Vijay Varadharajan. ISEC 2001, 20-32. Web SearchBibTeXDownload
2000
22Fail-Stop Confirmer Signatures. Yi Mu, Vijay Varadharajan. ACISP 2000, 368-377. Web SearchBibTeXDownload
21Fair On-line Gambling. Weiliang Zhao, Vijay Varadharajan, Yi Mu. ACSAC 2000, 394-400. Web SearchBibTeXDownload
20Towards a Protection Model for Supporting Multiple Access Control Policies. Yi Mu, Vijay Varadharajan. Australasian Database Conference 2000, 107-114. Web SearchBibTeXDownload
19An Internet Anonymous Auction Scheme. Yi Mu, Vijay Varadharajan. ICISC 2000, 171-182. Web SearchBibTeXDownload
18Distributed Signcryption. Yi Mu, Vijay Varadharajan. INDOCRYPT 2000, 155-164. Web SearchBibTeXDownload
1999
17Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan. ACISP 1999, 117-128. Web SearchBibTeXDownload
16Batching Proofs of Knowledge and Its Applications. Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu. DEXA Workshop 1999, 844-849. Web SearchBibTeXDownload
15Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan. ICICS 1999, 103-118. Web SearchBibTeXDownload
14Delegated Decryption. Yi Mu, Vijay Varadharajan, Khanh Quoc Nguyen. IMA Int. Conf. 1999, 258-269. Web SearchBibTeXDownload
13Undeniable Confirmer Signature. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan. ISW 1999, 235-246. Web SearchBibTeXDownload
12On the Design of Efficient RSA-based Off-line Electronic Cash Schemes. Vijay Varadharajan, Khanh Quoc Nguyen, Yi Mu. Theor. Comput. Sci. (226): 173-184 (1999). Web SearchBibTeXDownload
1998
11Anonymous Secure E-Voting Over a Network. Yi Mu, Vijay Varadharajan. ACSAC 1998, 293-299. Web SearchBibTeXDownload
10A New Scheme of Credit based Payment for Electronic Commerce. Yi Mu, Vijay Varadharajan. LCN 1998, 278. Web SearchBibTeXDownload
1997
9New Micropayment Schemes Based on PayWords. Yi Mu, Vijay Varadharajan, Yan-Xia Lin. ACISP 1997, 283-293. Web SearchBibTeXDownload
8Secure and Efficient Digital Coins. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan. ACSAC 1997, 9-15. Web SearchBibTeXDownload
7Micro-Digital Money for Electronic Commerce. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan. ACSAC 1997, 2-8. Web SearchBibTeXDownload
6A New Efficient Off-line Anonymous Cash Scheme. Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu. ISAAC 1997, 193-201. Web SearchBibTeXDownload
5A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan. ISW 1997, 313-320. Web SearchBibTeXDownload
1996
4An alternative model of quantum key agreement via photon coupling. Yi Mu, Yuliang Zheng. ACISP 1996, 320-331. Web SearchBibTeXDownload
3On the design of security protocols for mobile communications. Yi Mu, Vijay Varadharajan. ACISP 1996, 134-145. Web SearchBibTeXDownload
2On The Design Of Secure Electronic Payment Schemes For Internet. Vijay Varadharajan, Yi Mu. ACSAC 1996, 78-87. Web SearchBibTeXDownload
1Design of Secure End-toEnd Protocols for Mobile Systems. Vijay Varadharajan, Yi Mu. IFIP World Conference on Mobile Communications 1996, 258-266. Web SearchBibTeX
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research