
Yi Mu 0001
Person information
- affiliation: Fujian Normal University, Fuzhou, China
- affiliation (former): University of Wollongong, NSW, Australia
- affiliation (PhD 1994): Australian National University, Australia
Other persons with the same name
- Yi Mu 0002 — Desert Research Institute, Reno, NV, USA
- Yi Mu 0003 — Ocean University of China, Qingdao, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j245]Leyou Zhang
, Yadi Ye
, Yi Mu
:
Multiauthority Access Control With Anonymous Authentication for Personal Health Record. IEEE Internet Things J. 8(1): 156-167 (2021) - [j244]Wenjie Yang
, Shangpeng Wang, Yi Mu
:
An Enhanced Certificateless Aggregate Signature Without Pairings for E-Healthcare System. IEEE Internet Things J. 8(6): 5000-5008 (2021) - [j243]Lei Zhou, Anmin Fu, Yi Mu
, Huaqun Wang, Shui Yu
, Yinxia Sun:
Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system. Inf. Sci. 545: 254-276 (2021) - [j242]Ke Huang
, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha
, Xiaojiang Du:
Scalable and redactable blockchain with update and anonymity. Inf. Sci. 546: 25-41 (2021) - [j241]Gongcheng Hu
, Leyou Zhang
, Yi Mu
, Xiaoxu Gao:
An Expressive "Test-Decrypt-Verify" Attribute-Based Encryption Scheme With Hidden Policy for Smart Medical Cloud. IEEE Syst. J. 15(1): 365-376 (2021) - [j240]Tong Wu
, Guomin Yang
, Yi Mu
, Fuchun Guo
, Robert H. Deng
:
Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model. IEEE Trans. Dependable Secur. Comput. 18(2): 563-575 (2021) - 2020
- [j239]Leyou Zhang, Juan Ren
, Yi Mu
, Baocang Wang
:
Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid. IEEE Access 8: 23294-23307 (2020) - [j238]Leyou Zhang, Jian Su
, Yi Mu
:
Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage. IEEE Access 8: 104344-104356 (2020) - [j237]Leyou Zhang
, Jun Wang
, Yi Mu
:
Secure and Privacy-Preserving Attribute-Based Sharing Framework in Vehicles Ad Hoc Networks. IEEE Access 8: 116781-116795 (2020) - [j236]Da-Zhi Sun
, Yi Mu
:
On the Security of Symmetric Encryption Against Mass Surveillance. IEEE Access 8: 175625-175636 (2020) - [j235]Leyou Zhang
, Xuehuang Gao
, Yi Mu
:
Secure Data Sharing With Lightweight Computation in E-Health. IEEE Access 8: 209630-209643 (2020) - [j234]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu:
An improved Durandal signature scheme. Sci. China Inf. Sci. 63(3) (2020) - [j233]Zhen Zhao, Ge Wu, Fuchun Guo, Willy Susilo, Yi Mu, Baocang Wang, Yupu Hu:
Black-Box Accountable Authority Identity-Based Revocation System. Comput. J. 63(4): 525-535 (2020) - [j232]Ke Huang
, Xiaosong Zhang
, Yi Mu
, Fatemeh Rezaeibagha
, Xiaofen Wang, Jingwei Li, Qi Xia
, Jing Qin
:
EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud. IEEE Internet Things J. 7(2): 882-892 (2020) - [j231]Shengke Zeng
, Yi Mu, Hongjie Zhang, Mingxing He:
A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy. Inf. Sci. 516: 331-345 (2020) - [j230]Tong Wu
, Guomin Yang
, Yi Mu
, Rongmao Chen, Shengmin Xu:
Privacy-enhanced remote data integrity checking with updatable timestamp. Inf. Sci. 527: 210-226 (2020) - [j229]Leyou Zhang
, Yilei Cui
, Yi Mu
:
Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing. IEEE Syst. J. 14(1): 387-397 (2020) - [j228]Ke Huang, Xiaosong Zhang, Xiaofen Wang, Yi Mu, Fatemeh Rezaeibagha
, Guangquan Xu, Hao Wang
, Xi Zheng
, Guomin Yang
, Qi Xia, Xiaojiang Du:
HUCDO: A Hybrid User-centric Data Outsourcing Scheme. ACM Trans. Cyber Phys. Syst. 4(3): 35:1-35:23 (2020) - [j227]Yanwei Zhou, Bo Yang, Tao Wang, Yi Mu:
Novel updatable identity-based hash proof system and its applications. Theor. Comput. Sci. 804: 1-28 (2020) - [j226]Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security. Theor. Comput. Sci. 809: 277-295 (2020) - [j225]Yinxia Sun, Yi Mu, Willy Susilo, Futai Zhang, Anmin Fu:
Revocable identity-based encryption with server-aided ciphertext evolution. Theor. Comput. Sci. 815: 11-24 (2020) - [j224]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu, Huaxiong Wang:
A code-based signature scheme from the Lyubashevsky framework. Theor. Comput. Sci. 835: 15-30 (2020) - [j223]Xueqiao Liu
, Guomin Yang
, Yi Mu
, Robert H. Deng
:
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 17(6): 1322-1332 (2020) - [j222]Ke Huang
, Xiaosong Zhang
, Yi Mu
, Fatemeh Rezaeibagha
, Xiaojiang Du
, Nadra Guizani:
Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain. IEEE Trans. Ind. Informatics 16(4): 2677-2686 (2020) - [j221]Yi Mu
, Fatemeh Rezaeibagha
, Ke Huang
:
Policy-Driven Blockchain and Its Applications for Transport Systems. IEEE Trans. Serv. Comput. 13(2): 230-240 (2020) - [c236]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Yi Mu:
Improvement of Attribute-Based Encryption Using Blakley Secret Sharing. ACISP 2020: 631-641 - [i23]Yadi Ye, Leyou Zhang, Yi Mu, Wenting You:
Secure Decentralized Access Control Policy for Data Sharing in Smart Grid. IACR Cryptol. ePrint Arch. 2020: 1567 (2020)
2010 – 2019
- 2019
- [j220]Leyou Zhang
, Gongcheng Hu
, Yi Mu, Fatemeh Rezaeibagha
:
Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System. IEEE Access 7: 33202-33213 (2019) - [j219]Wenjie Yang
, Shangpeng Wang, Xinyi Huang, Yi Mu:
On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments. IEEE Access 7: 91074-91079 (2019) - [j218]Wenjie Yang
, Shangpeng Wang, Wei Wu, Yi Mu:
Top-Level Secure Certificateless Signature Against Malicious-But-Passive KGC. IEEE Access 7: 112870-112878 (2019) - [j217]Fatemeh Rezaeibagha
, Yi Mu
, Xinyi Huang, Wenjie Yang
, Ke Huang:
Fully Secure Lightweight Certificateless Signature Scheme for IIoT. IEEE Access 7: 144433-144443 (2019) - [j216]Fatemeh Rezaeibagha
, Yi Mu
:
Efficient Micropayment of Cryptocurrency from Blockchains. Comput. J. 62(4): 507-517 (2019) - [j215]Yanwei Zhou
, Bo Yang, Yi Mu:
Continuous leakage-resilient identity-based encryption with leakage amplification. Des. Codes Cryptogr. 87(9): 2061-2090 (2019) - [j214]Guomin Yang
, Rongmao Chen, Yi Mu, Willy Susilo, Fuchun Guo, Jie Li:
Strongly leakage resilient authenticated key exchange, revisited. Des. Codes Cryptogr. 87(12): 2885-2911 (2019) - [j213]Shengmin Xu
, Guomin Yang
, Yi Mu, Ximeng Liu:
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Future Gener. Comput. Syst. 97: 284-294 (2019) - [j212]Yanwei Zhou, Bo Yang, Yi Mu, Tao Wang, Xin Wang:
Identity-based encryption resilient to continuous key leakage. IET Inf. Secur. 13(5): 426-434 (2019) - [j211]Fatemeh Rezaeibagha
, Yi Mu, Shiwei Zhang, Xiaofen Wang:
Provably Secure (Broadcast) Homomorphic Signcryption. Int. J. Found. Comput. Sci. 30(4): 511-529 (2019) - [j210]Zhongyuan Yao, Yi Mu:
ACE with Compact Ciphertext Size and Decentralized Sanitizers. Int. J. Found. Comput. Sci. 30(4): 531-549 (2019) - [j209]Ge Wu
, Yi Mu, Willy Susilo, Fuchun Guo, Futai Zhang:
Threshold privacy-preserving cloud auditing with multiple uploaders. Int. J. Inf. Sec. 18(3): 321-331 (2019) - [j208]Peng Jiang, Jianchang Lai, Fuchun Guo
, Willy Susilo, Man Ho Au, Guomin Yang
, Yi Mu, Rongmao Chen:
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters. Inf. Sci. 472: 35-52 (2019) - [j207]Shengmin Xu, Guomin Yang
, Yi Mu
:
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Inf. Sci. 479: 116-134 (2019) - [j206]Yangguang Tian, Yingjiu Li, Guomin Yang
, Willy Susilo, Yi Mu, Hui Cui, Yinghui Zhang:
DABKE: Secure deniable attribute-based key exchange framework. J. Comput. Secur. 27(2): 259-275 (2019) - [j205]Yong Yu, Yi Mu:
Advances of Provable Security Techniques. J. Univers. Comput. Sci. 25(3): 154-157 (2019) - [j204]Yanwei Zhou
, Bo Yang
, Zhe Xia, Yi Mu
, Tao Wang:
Anonymous and Updatable Identity-Based Hash Proof System. IEEE Syst. J. 13(3): 2818-2829 (2019) - [j203]Peng Jiang, Fuchun Guo, Yi Mu:
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems. Theor. Comput. Sci. 767: 51-72 (2019) - [j202]Yanwei Zhou
, Bo Yang, Yi Mu
:
The generic construction of continuous leakage-resilient identity-based cryptosystems. Theor. Comput. Sci. 772: 1-45 (2019) - [j201]Ke Huang
, Xiaosong Zhang
, Yi Mu
, Xiaofen Wang, Guomin Yang
, Xiaojiang Du
, Fatemeh Rezaeibagha
, Qi Xia, Mohsen Guizani
:
Building Redactable Consortium Blockchain for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 15(6): 3670-3679 (2019) - [j200]Ge Wu
, Yi Mu, Willy Susilo, Fuchun Guo, Futai Zhang:
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users. Wirel. Pers. Commun. 106(3): 1161-1182 (2019) - [c235]Wenwen Yan, Anmin Fu, Yi Mu, Xia Zhe, Shui Yu
, Boyu Kuang:
EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices. IoT S&P@CCS 2019: 2-7 - [c234]Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo, Weizhi Meng:
Provably Secure Group Authentication in the Asynchronous Communication Model. ICICS 2019: 324-340 - [c233]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Hua Shen, Yi Mu:
Provably Secure Proactive Secret Sharing Without the Adjacent Assumption. ProvSec 2019: 247-264 - [c232]Xin Chen, Xinyi Huang, Yi Mu, Ding Wang
:
A Typo-Tolerant Password Authentication Scheme with Targeted Error Correction. TrustCom/BigDataSE 2019: 546-553 - [e13]Yi Mu, Robert H. Deng, Xinyi Huang:
Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings. Lecture Notes in Computer Science 11829, Springer 2019, ISBN 978-3-030-31577-1 [contents] - [i22]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu:
A New Code-based Signature Scheme with Shorter Public Key. IACR Cryptol. ePrint Arch. 2019: 53 (2019) - 2018
- [b1]Fuchun Guo, Willy Susilo
, Yi Mu:
Introduction to Security Reduction. Springer 2018, ISBN 978-3-319-93048-0, pp. 1-253 - [j199]Leyou Zhang
, Pengfei Liang, Yi Mu:
Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption. IEEE Access 6: 12736-12745 (2018) - [j198]Jiannan Wei
, Xiaojie Wang, Nan Li, Guomin Yang
, Yi Mu:
A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks. IEEE Access 6: 43776-43784 (2018) - [j197]Yanwei Zhou
, Bo Yang, Yi Mu, Zhe Xia:
Continuous leakage-resilient access control for wireless sensor networks. Ad Hoc Networks 80: 41-53 (2018) - [j196]Yanwei Zhou
, Bo Yang, Yi Mu:
Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles. Comput. J. 61(4): 586-600 (2018) - [j195]Jianchang Lai, Yi Mu, Fuchun Guo, Peng Jiang, Sha Ma:
Identity-Based Broadcast Encryption for Inner Products. Comput. J. 61(8): 1240-1251 (2018) - [j194]Yinhao Jiang
, Willy Susilo, Yi Mu, Fuchun Guo:
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener. Comput. Syst. 78: 720-729 (2018) - [j193]Xiaonan Wang, Zhengxiong Dou, Yi Mu:
CCN framework with privacy support. IET Inf. Secur. 12(2): 157-164 (2018) - [j192]Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu:
Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud. Int. J. High Perform. Comput. Netw. 11(1): 45-54 (2018) - [j191]Yinhao Jiang
, Willy Susilo, Yi Mu, Fuchun Guo:
Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts. Int. J. Inf. Sec. 17(4): 463-475 (2018) - [j190]Yinhao Jiang
, Willy Susilo, Yi Mu, Fuchun Guo:
Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes. Int. J. Inf. Sec. 17(5): 533-548 (2018) - [j189]Sujuan Li, Yi Mu, Mingwu Zhang:
Certificate-based Smooth Projective Hashing and Its Applications. Int. J. Netw. Secur. 20(2): 266-277 (2018) - [j188]Sha Ma, Yi Mu, Willy Susilo:
A Generic Scheme of plaintext-checkable database encryption. Inf. Sci. 429: 88-101 (2018) - [j187]Sha Ma
, Yi Mu, Willy Susilo
, Bo Yang:
Witness-based searchable encryption. Inf. Sci. 453: 364-378 (2018) - [j186]Jianchang Lai, Yi Mu, Fuchun Guo, Peng Jiang, Willy Susilo
:
Privacy-enhanced attribute-based private information retrieval. Inf. Sci. 454-455: 275-291 (2018) - [j185]Shams Qazi, Raad Raad, Yi Mu, Willy Susilo
:
Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks. J. Inf. Secur. Appl. 39: 31-40 (2018) - [j184]Fatemeh Rezaeibagha
, Yi Mu:
Practical and secure telemedicine systems for user mobility. J. Biomed. Informatics 78: 24-32 (2018) - [j183]Shengmin Xu, Guomin Yang
, Yi Mu:
A New Revocable and Re-Delegable Proxy Signature and Its Application. J. Comput. Sci. Technol. 33(2): 380-399 (2018) - [j182]Da-Zhi Sun
, Yi Mu, Willy Susilo:
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure. Pers. Ubiquitous Comput. 22(1): 55-67 (2018) - [j181]Da-Zhi Sun
, Yi Mu, Willy Susilo:
Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure. Pers. Ubiquitous Comput. 22(1): 69 (2018) - [j180]Jianchang Lai, Yi Mu, Fuchun Guo, Rongmao Chen, Sha Ma:
Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost. Theor. Comput. Sci. 714: 15-26 (2018) - [j179]Pairat Thorncharoensri
, Willy Susilo
, Yi Mu:
Policy controlled system with anonymity. Theor. Comput. Sci. 745: 87-113 (2018) - [j178]Shengmin Xu
, Guomin Yang
, Yi Mu
, Robert H. Deng
:
Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud. IEEE Trans. Inf. Forensics Secur. 13(8): 2101-2113 (2018) - [j177]Da-Zhi Sun
, Yi Mu
:
Security of Grouping-Proof Authentication Protocol for Distributed RFID Systems. IEEE Wirel. Commun. Lett. 7(2): 254-257 (2018) - [j176]Weiwei Liu
, Yi Mu, Guomin Yang
, Yangguang Tian:
Strong Identity-Based Proxy Signature Schemes, Revisited. Wirel. Commun. Mob. Comput. 2018: 6925019:1-6925019:11 (2018) - [j175]Shengke Zeng, Yi Mu, Mingxing He, Yong Chen:
New Approach for Privacy-Aware Location-Based Service Communications. Wirel. Pers. Commun. 101(2): 1057-1073 (2018) - [c231]Hongjian Yin, Leyou Zhang, Yi Mu:
A Novel Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Anonymous Key Generation. ICCCS (3) 2018: 435-446 - [c230]Leyou Zhang, Yilei Cui, Yi Mu:
Improving Privacy-Preserving CP-ABE with Hidden Access Policy. ICCCS (3) 2018: 596-605 - [c229]Zhe Xia, Bo Yang, Mingwu Zhang, Yi Mu:
An Efficient and Provably Secure Private Polynomial Evaluation Scheme. ISPEC 2018: 595-609 - [c228]Weiwei Liu, Yinghui Zhang, Yi Mu, Guomin Yang
, Yangguang Tian:
Efficient Traceable Oblivious Transfer and Its Applications. ISPEC 2018: 610-621 - [c227]Shengmin Xu, Guomin Yang
, Yi Mu, Ximeng Liu:
Efficient Attribute-Based Encryption with Blackbox Traceability. ProvSec 2018: 182-200 - 2017
- [j174]Mingwu Zhang
, Yan Jiang, Yi Mu, Willy Susilo:
Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server. IEEE Access 5: 26419-26434 (2017) - [j173]Leyou Zhang, Jingxia Zhang, Yi Mu:
Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System. Comput. J. 60(4): 541-554 (2017) - [j172]Jianchang Lai, Yi Mu, Fuchun Guo, Rongmao Chen:
Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization. Comput. J. 60(12): 1809-1821 (2017) - [j171]Peng Jiang, Yi Mu, Fuchun Guo, Qiaoyan Wen:
Secure-channel free keyword search with authorization in manager-centric databases. Comput. Secur. 69: 50-64 (2017) - [j170]Xiaofen Wang, Yi Mu, Rongmao Chen:
Privacy-preserving data search and sharing protocol for social networks through wireless applications. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j169]Pairat Thorncharoensri
, Willy Susilo, Yi Mu:
Policy-controlled signatures and their applications. Comput. Stand. Interfaces 50: 26-41 (2017) - [j168]Hongyu Liu, Yi Mu, Jining Zhao, Chunxiang Xu, Huaqun Wang, Leiting Chen, Yong Yu:
Identity-based provable data possession revisited: Security analysis and generic construction. Comput. Stand. Interfaces 54: 10-19 (2017) - [j167]Rongmao Chen, Yi Mu, Guomin Yang
, Willy Susilo, Fuchun Guo:
Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1): 145-173 (2017) - [j166]Rongmao Chen, Yi Mu, Guomin Yang
, Willy Susilo, Fuchun Guo, Zheng Yang
:
A note on the strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1): 175-178 (2017) - [j165]Jiannan Wei, Guomin Yang
, Yi Mu:
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange. Int. J. Comput. Math. 94(5): 946-961 (2017) - [j164]Leyou Zhang, Zongchen Sun, Yi Mu, Yupu Hu:
Revocable hierarchical identity-based encryption over lattice for pay-TV systems. Int. J. Embed. Syst. 9(4): 379-398 (2017) - [j163]Yangguang Tian, Guomin Yang
, Yi Mu, Shiwei Zhang, Kaitai Liang
, Yong Yu:
One-Round Attribute-Based Key Exchange in the Multi-Party Setting. Int. J. Found. Comput. Sci. 28(6): 725-742 (2017) - [j162]Jianchang Lai, Yi Mu, Fuchun Guo:
Efficient identity-based online/offline encryption and signcryption with short ciphertext. Int. J. Inf. Sec. 16(3): 299-311 (2017) - [j161]Sujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang:
Continuous Leakage Resilient Lossy Trapdoor Functions. Inf. 8(2): 38 (2017) - [j160]Xiaonan Wang, Yi Mu:
Communication security and privacy support in 6LoWPAN. J. Inf. Secur. Appl. 34: 108-119 (2017) - [j159]Peng Jiang, Yi Mu, Fuchun Guo, Qiao-Yan Wen:
Private Keyword-Search for Database Systems Against Insider Attacks. J. Comput. Sci. Technol. 32(3): 599-617 (2017) - [j158]Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen:
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city. Pers. Ubiquitous Comput. 21(5): 855-868 (2017) - [j157]Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang:
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query. Quantum Inf. Process. 16(1): 8 (2017) - [j156]Mingwu Zhang, Yudi Zhang, Yixin Su, Qiong Huang, Yi Mu:
Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments. IEEE Syst. J. 11(2): 1018-1026 (2017) - [j155]Ming Tang
, Zhenlong Qiu, Zhipeng Guo
, Yi Mu, Xinyi Huang
, Jean-Luc Danger:
A Generic Table Recomputation-Based Higher-Order Masking. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(11): 1779-1789 (2017) - [j154]Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan
:
Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. IEEE Trans. Dependable Secur. Comput. 14(2): 211-220 (2017) - [j153]Weiwei Liu, Yi Mu, Guomin Yang
, Yong Yu:
Efficient E-coupon systems with strong user privacy. Telecommun. Syst. 64(4): 695-708 (2017) - [j152]Yuan Zhang
, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, Xiaojun Zhang:
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation. IEEE Trans. Inf. Forensics Secur. 12(3): 676-688 (2017) - [j151]Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang
, Yong Yu, Yi Mu:
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. IEEE Trans. Inf. Forensics Secur. 12(12): 3110-3122 (2017) - [j150]Ching-Fang Hsu, Lein Harn, Yi Mu, Maoyuan Zhang, Xuan Zhu:
Computation-efficient key establishment in wireless group communications. Wirel. Networks 23(1): 289-297 (2017) - [j149]Yangguang Tian, Guomin Yang
, Yi Mu:
Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting. Wirel. Pers. Commun. 94(3): 1017-1034 (2017) - [j148]Xiaofen Wang, Yi Mu, Rongmao Chen:
Privacy-Preserving Data Packet Filtering Protocol with Source IP Authentication. Wirel. Pers. Commun. 95(4): 3509-3537 (2017) - [j147]Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan
:
Privacy-Preserving Mutual Authentication in RFID with Designated Readers. Wirel. Pers. Commun. 96(3): 4819-4845 (2017) - [j146]Jiannan Wei, Guomin Yang
, Yi Mu:
Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications. Wirel. Pers. Commun. 97(2): 3017-3030 (2017) - [c226]Shiwei Zhang, Yi Mu, Guomin Yang
, Xiaofen Wang:
Hierarchical Functional Encryption for Linear Transformations. ACISP (1) 2017: 23-43 - [c225]Shengmin Xu, Guomin Yang
, Yi Mu, Willy Susilo:
Mergeable and Revocable Identity-Based Encryption. ACISP (1) 2017: 147-167 - [c224]Tong Wu, Sha Ma, Yi Mu, Shengke Zeng:
ID-Based Encryption with Equality Test Against Insider Attack. ACISP (1) 2017: 168-183 - [c223]Yangguang Tian, Shiwei Zhang, Guomin Yang
, Yi Mu, Yong Yu:
Privacy-Preserving k-time Authenticated Secret Handshakes. ACISP (2) 2017: 281-300 - [c222]Shu Cheng
, Vijay Varadharajan
, Yi Mu, Willy Susilo:
An efficient and provably secure RFID grouping proof protocol. ACSW 2017: 71:1-71:7 - [c221]Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang
, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample. CRYPTO (2) 2017: 517-547 - [c220]Nan Li, Fuchun Guo, Yi Mu, Willy Susilo, Surya Nepal
:
Fuzzy Extractors for Biometric Identification. ICDCS 2017: 667-677 - [c219]Zhongyuan Yao, Yi Mu, Guomin Yang
:
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking. ISPEC 2017: 186-203 - [c218]Shengke Zeng, Yi Mu, Guomin Yang
, Mingxing He:
Deniable Ring Authentication Based on Projective Hash Functions. ProvSec 2017: 127-143 - [c217]Fatemeh Rezaeibagha
, Yi Mu, Shiwei Zhang, Xiaofen Wang:
Provably Secure Homomorphic Signcryption. ProvSec 2017: 349-360 - [c216]