Publications
Journal Papers 
Conference Papers 
Book Chapters 
Edited Book Series:
 Willy Susilo and Yi Mu (Eds),
"Information Security and Privacy," Proceedings of the 19th
Australasia
Conference on Information Security and Privacy (ACISP 2014),
Lecture Notes in Computer Science, 8544,
Springer Verlag, 2014.
 Li Xu, Elisa Bertino and Yi Mu (Eds.): Network and System Security  6th International
Conference on Network and System Security (NSS 2012),
Wuyishan, Fujian, China, November
2123, 2012. Proceedings. Lecture Notes in Computer Science 7645, Springer Verlag, 2012
 Willy Susilo, Yi Mu and Jennifer Seberry (Eds),
"Information Security and Privacy," Proceedings of the
17th Australasian
Conference on Information Security and Privacy (ACISP
2012),
Lecture Notes in Computer Science 7372 ,
Springer Verlag, 2012.
 Yi Mu, Willy Susilo, and Jennifer Seberry (Eds),
"Information Security and Privacy," Proceedings of the 13th Australasian
Conference on Information Security and Privacy (ACISP 2008),
Lecture Notes in Computer Science, 5107,
Springer Verlag, 2008.
 Liqun Chen, Yi Mu, Willy Susilo, Information Security Practice and Experience (ISPEC 2008),
Lecture Notes in Computer Science 4991, Springer Verlag, 2008
 Willy Susilo, Joseph Lui, and Yi Mu (Eds),
Provable Security (Provsec 2007),
Lecture Notes in Computer Science 4784, Springer Verlag, 2007.
 David Pointcheval, Yi Mu, and Kefei Chen (Eds),
Cryptology and Network Security (CANS 2006),
Lecture Notes in Computer Science 4301, Springer Verlag, 2006.
 Xiao Zhou, Oleg Sokolsky, Lu Yan, EunSun Jung, Sili Shao, Yi Mu,
DongChun Lee, Daeyound Kim, and YoundSik Jeong (Eds),
The 2006 IFIP International Conference on Embedded And Ubiquitous Computing (EUC 2006),
Lecture Notes in Computer Science 4097, Springer Verlag, 2006
 Yvo G. Desmedt, Huaxiong Wang, Yi Mu, and Yongqing Li (Eds),
Cryptology and Network Security (CANS 2005),
Lecture Notes in Computer Science 3810, Springer Verlag, 2005.
 Vijay Varadharajan and Yi Mu (Eds),
"Information Security and Privacy," Proceedings of the 6th Australasian
Conference on Information Security and Privacy (ACISP 2001),
Lecture Notes in Computer Science, 2119,
Springer Verlag, 2001.
 Vijay Varadharajan and Yi Mu (Eds), "Information and Communication Security,"
Proceedings of International
Conference on Information and Communication Security (ICICS 1999),
Lecture Notes in Computer Science, 1726,
Springer Verlag, 1999.
 Vijay Varadharajan, Josef Pieprzyk and Yi Mu (Eds), "Information
Security and Privacy," Proceedings of
the 2nd Australasian
Conference on Information Security and Privacy (ACISP 1997),
Lecture Notes in Computer Science 1270, Springer Verlag, 1997.
Refereed Journal Papers:
back to top
2017
 Pairat Thorncharoensri, Willy Susilo and Yi Mu,
``Policycontrolled signatures and their applications,"
Computer Standards & Interfances, vol 50, pp. 2541, 2017
 Leyou Zhang, Jingxia Zhang, Yi Mu:
Novel LeakageResilient AttributeBased Encryption from Hash Proof System. Comput. J. 60(4): 541554 (2017)
 Xiaofen Wang, Yi Mu, Rongmao Chen:
Privacypreserving data search and sharing protocol for social networks through wireless applications. Concurrency and Computation:
Practice and Experience 29(7) (2017)
 Hongyu Liu, Yi Mu, Jining Zhao, Chunxiang Xu, Huaqun Wang, Leiting Chen, Yong Yu:
Identitybased provable data possession revisited: Security analysis and generic construction. Computer Standards & Interfaces 54:
1019 (2017)
 Jiannan Wei, Guomin Yang, Yi Mu:
A new generic construction of anonymous designated confirmer signature for privacypreserving fair exchange. Int. J. Comput. Math.
94(5): 946961 (2017)
 Jianchang Lai, Yi Mu, Fuchun Guo:
Efficient identitybased online/offline encryption and signcryption with short ciphertext. Int. J. Inf. Sec. 16(3): 299311 (2017)
 Peng Jiang, Yi Mu, Fuchun Guo, QiaoYan Wen:
Private KeywordSearch for Database Systems Against Insider Attacks. J. Comput. Sci. Technol. 32(3): 599617 (2017)
 Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang:
Privacypreserving pointinclusion protocol for an arbitrary area based on phaseencoded quantum private query. Quantum Information
Processing 16(1): 8 (2017)
 Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan:
Optimized IdentityBased Encryption from Bilinear Pairing for Lightweight Devices. IEEE Trans. Dependable Sec. Comput. 14(2):
211220 (2017)
 Weiwei Liu, Yi Mu, Guomin Yang, Yong Yu:
Efficient Ecoupon systems with strong user privacy. Telecommunication Systems 64(4): 695708 (2017)
 Yuan Zhang, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, Xiaojun Zhang:
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation. IEEE Trans.
Information Forensics and Security 12(3): 676688 (2017)
 ChingFang Hsu, Lein Harn, Yi Mu, Maoyuan Zhang, Xuan Zhu:
Computationefficient key establishment in wireless group communications. Wireless Networks 23(1): 289297 (2017)
 Yangguang Tian, Guomin Yang, Yi Mu:
PrivacyPreserving Yoking Proof with Key Exchange in the ThreeParty Setting. Wireless Personal Communications 94(3): 10171034
(2017)
2016
 Peng Jiang, Yi Mu, Fuchun Guo, and Xiaofen Wang,
``Online/offline Ciphertext Retrieval on Resource Constrained Devices,"
The Computer Journal, Oxford, 59(7), pp. 955969, 2016

Peng Jiang, Yi Mu, Fuchun Guo and Qiaoyan Wen,
`` SecureChannel Free Keyword Search with Authorization in Managercentric Databases,"
Computers & Security, http://dx.doi.org/10.1016/j.cose.2016.11.015
 Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo and Xinyi Huang,
``Strong Authenticated Key Exchange with Auxiliary Inputs"
Designs, Codes and Cryptography (accepted, 22 Oct. 2016)
 Rongmao Chen, Yi Mu, Guomin Yang, Xinyi Huang and Xiaofen Wang,
``ServerAided Public Key Encryption with Keyword Search,"
IEEE Transactions on Information Forensics
and Security, 11(12), pp. 28331842, 2016
 Xiaofen Wang, Yi Mu and Rongmao Chen,
`` OneRound Privacy Preserving Meeting
Location Determination for Smartphone
Applications,"
IEEE Transactions on Information Forensics
and Security, 11(8), pp. 17121721, 2016
 Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang,
``DualServer PublicKey Encryption With Keyword Search for Secure Cloud Storage,"
IEEE Transactions on Information Forensics
and Security 11(4): 789798 (2016)
 Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, and Shun Zhang,
``Secure Multiparty Quantum Computation for Summation and Multiplication,"
Scientific Reports, Nature Publishing Group, doi:10.1038/srep19655 (accepted, 8 December 2015)
 Jiannan Wei, Guomin Yang and Yi Mu, ``A new generic construction of anonymous
designated confirmer signature for
privacypreserving fair exchange,"
International Journal of Computer Mathematics, 2016
(http://dx.doi.org/10.1080/00207160.2016.1154951)
 Yangguang Tian,
Guomin Yang and Yi Mu,
``Privacypreserving grouping proof with key exchange in the multipleparty setting,"
Security and Communication Networks, 9(16), pp.32393250, 2016
 Weiwei Liu, Yi Mu, Guomin Yang and Yong Yu,
``Efficient Ecoupon systems with strong user privacy,"
Telecommunication Systems, 2016, (DOI: 10.1007/s1123501602013)
 Hui Cui, Yi Mu, and Man Ho Au,
``Relations between robustness and RKA security under publickey encryption," Theoretical Computer
Science,
628:
7891 (2016)
 Fuchun Guo, Willy Susilo and Yi Mu,
``Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption,"
IEEE Transactions on Information Forensics and Security, 11(2), 247257, 2016.
 Willy Susilo, Fuchun Guo and Yi Mu,
``Efficient Dynamic Threshold Identitybased Encryption with Constantsize Ciphertext,"
Theoretical Computer Science, Vol. 609, pp.4959, 2016.
 Jiannan Wei, Guomin Yang, and Yi Mu,
``Anonymous Proxy Signature with Hierarchical Traceability,"
The Computer Journal, Oxford, 59(4), pp559569, 2016
 Yong Yu, Jianbing Ni, Yi Mu, Guomin Yang, and Willy Susilo,
``Comments on Public Integrity Auditing for
Dynamic Data Sharing with Multiuser Modification,"
IEEE Transactions on Information Forensics and Security, 11(3): 658659 (2016)
 Mingwu Zhang, Yi Mu, Jian Shen and Xinyi Huang,
``Strongly averagecase secure obfuscation: achieving input privacy and circuit obscurity,"
Security and Communication Networks, DOI: 10.1002/sec.1435
 Fatemeh Rezaeibagha and Yi Mu, `` Distributed Clinical Data Sharing Via Dynamic AccessControl Policy
Transformation,"
International Journal of Medical Informatics, Vol. 89, pp.2531, 2016
 Fatemeh Rezaeibagha, Yi Mu, Willy Susilo and Khin Than Win,
``MultiAuthority Security Framework for Scalable EHR Systems,"
International Journal of Medical Engineering and Informatics, 8(4), pp.390408, 2016
 Jianchang Lai, Yi Mu and Fuchun Guo,
``Efficient IdentityBased Online/Offline Encryption and Signcryption with Short Ciphertext,"
International Journal of Information Security, 2016
(DOI: 10.1007/s1020701603206)
 Leyou Zhang, Zhuanning Wang, Yi Mu and Yupu Hu,
``Fully Secure Hierarchical Inner Product Encryption for Privacy Preserving Keyword Searching in Cloud,"
International Journal of High Performance Computing and Networking,

Leyou Zhang, Yi Mu, Qing Wu:
Compact Anonymous Hierarchical IdentityBased Encryption with Constant Size Private Keys. The Computer Journal, 59(4),
pp.452461,2016
 Xiaofen Wang, Yi Mu and Guozheng Xiao,
``Secure Channel Free IDBased Searchable Encryption for
a PeertoPeer Group," Journal of Computer Science and Technology,
31(5), pp.10121027, 2016
 Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, and Shun Zhang,
``An efficient quantum scheme for Private Set Intersection,"
Quantum Information Processing, 15(1), pp.363371, 2016
 Leyou Zhang and Yi Mu,
``Compact Anonymous Hierarchical IdentityBased Encryption with Constant Size Private Keys,"
The Computer Journal, Orford, 59(4), pp.452461, 2016
 Mingwu Zhang, Yi Mu,
``TokenLeakage Tolerant and Vector Obfuscated IPE and Application in PrivacyPreserving TwoParty
Point/Polynomial Evaluations," Computer Journal, 59(4), pp.493507 (2016)
 Jiannan Wei, Guomin Yang, and Yi Mu,
``Comments on ''Accountable and PrivacyEnhanced Access Control in Wireless Sensor Networks,"
IEEE Transactions on Wireless Communications, 15(4), pp.30973099, 2016
2015
 Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, and Shun Zhang,
``Two Quantum Protocols for Oblivious Setmember Decision Problem,"
Scientific Reports, Nature Publishing Group, DOI: 10.1038/srep15914
 Runhua Shi, Yi Mu, Hong Zhong, Shun Zhang,
``Quantum Oblivious Setmember Decision Protocol,"
Physical Review A 08/2015, 92(2). DOI:10.1103/PhysRevA.92.022309
 Rongmao Chen, Yi Mu, Guomin Yang and Fuchun Guo,
``BLMLE: BlockLevel MessageLocked Encryption for Secure Large File Deduplication,''
IEEE Transactions on Information Forensics & Security, 10(12), pp.26432652, 2015.
 Jinguang Han, Willy Susilo, Yi Mu, Man Ho Au and Jie Cao,
``AACOT: Accountable Oblivious Transfer with Access Control,"
IEEE Transactions on Information Forensics & Security, 10(12), pp.25022514, 2015.
 Mingwu Zhang, Yudi Zhang, Yixin Su, Qiong Huang, Yi Mu, ``Attributebased hash proof system under
learningwitherrors assumption in obfuscatorfree and leakageresilient environments," IEEE System Journal, DOI:
10.1109/JSYST.2015.2435518
 Xing Su, Minjie Zhang, and Yi Mu,
``Trustbased Group Services Selection in Webbased Serviceoriented Environments,"
World Wide Web Journal, 19(5), pp.807832, 10.1007/s1128001503620,
 Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong and Vijay Varadharajan,
``Optimized IdentityBased Encryption from Bilinear Pairing for Lightweight Devices,"
IEEE Transactions on Dependable and Secure Computing, DOI:
10.1109/TDSC.2015.2445760, (accepted, 7 June 2015)
 Kefeng Wang, Yi Mu and Willy Susilo,
``IdentityBased Quotable Ring Signature,"
Information Sciences, vol. 321, 7189, 2015.
 Xiaonan Wang, Yi Mu,
``Addressing and Privacy Support for 6LoWPAN,"
IEEE Sensors Journal, Vol. 15, Issue 9, 2015, pp.51935201
 Fuchun Guo, Willy Susilo and Yi Mu,
``Generalized Closest Substring Encryption,"
Designs, Codes and Cryptography,
DOI: 10.1007/s1062301500684. (accepted: 16 March 2015).
 Nan Li, Yi Mu, Willy Susilo and Vijay Varadharajan,
``Shared RFID Ownership Transfer Profocols,"
Journal of Computer Standards & Interfaces, Vol. 42, 95104, 2015.
 Hui Lin, Li Xu, Yi Mu and Wei Wu,
``A reliable recommendation and privacypreserving based crosslayer
reputation mechanism for mobile cloud computing,"
Future Generation Computer Systems 52 (2015) pp.125136
 Xixiang Lv, Yi Mu and Hui Li,
``Key Management for Smart Grid based on Asymmetric Keywrapping,"
International Journal of Computer Mathematics,
Vol. 92, No. 3, pp 498512, 2015
 Jinguang Han, Willy Susilo, Yi Mu and Jianying Zhou,
``Improving Privacy and Security in Decentralized CiphertextPolicy
Attributebased Encryption,"
IEEE Transactions on Information Forensics & Security, 10(3), pp.665678, 2015
 Hui Cui, Yi Mu and Man Ho Au,
``Proof of Retrievability with Public Verifiability Resilient Against RelatedKey
Attacks,"
IET Information Security, 9(1), pp.4349, 2015.
 Yong Yu, Man Ho Au, Yi Mu, Willy Susilo and Huai Wu,
``Secure Delegation of Signing Power from Factorization,"
The Computer Journal, Oxford, 58(4), pp.867877, 2015
(online version: doi: 10.1093/comjnl/bxt144)
 Xinyu Fan, Guomin Yang, Yi Mu and Yong Yu,
``On Indistinguishability in Remote Data Integrity Checking,"
The Computer Journal, Oxford, 58(4), pp.823830, 2015

Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi and Yi Mu,
``Functional Encryption Resilient to HardtoInvert Leakage,"
The Computer Journal, Oxford, 58(4), pp. 735749, (2015) doi:
10.1093/comjnl/bxt105
 Yong Yu, Man Ho Au, Yi Mu, Shaohua Tang, Jian Ren, Willy Susilo, Liju
Dong, ``Enhanced Privacy of a Remote Data Integrity Checking Protocol
for Secure Cloud Storage", International Journal of Information
Security, 14(4), pp.307318, 2015.
 Ibrahim F. Elashry, Yi Mu, Willy Susilo,
``A resilient identitybased authenticated key exchange protocol," Security and
Communication,
Networks 8(13), pp.22792290, 2015
 Xiaonan Wang, Deguang Le, Hongbin Cheng, Yi Mu,
``An IPv6based mobility framework for urban vehicular networks," Int. Journal of Network
Management 25(3), pp.141158, 2015.
 Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Yi Mu, Jianwei Liu,
``Further ideal multipartite access structures from integer polymatroids,"
SCIENCE CHINA
Information Sciences, 58(7), pp.113, 2015.
 Xixiang Lv, Yi Mu and Hui Li,
``Losstolerant Bundle Fragment Authentication for Spacebased DTNs,"
IEEE Transactions on Dependable and Secure Computing,
12(6), pp615625, 2015.
 Yong Yu, Jianhing Ni, Man Ho Au, Yi Mu, Boyang Wang and Hui Li,
``Comments on a Public Auditing Mechanism for Shared Cloud Data Service,"
IEEE Transactions on Services Computing, 8(6), pp. 998999, 2015.
2014
 Jiangshan Yu, Guilin Wang, Yi Mu and Wei Gao,
``An Efficient Generic Framework for ThreeFactor Authentication with Provably Secure
Instantiation,"
IEEE Transactions on Information Forensics & Security,
9(12), pp.23022313 (2014)
 Xiaonan Wang, Yi Mu,
Guangjie Han and Deguang Le,
``A secure IPv6 address configuration protocol for vehicular networks,"
Wireless Personal Communications, Springer, 79(1), pp. 721744 (2014)
 Xiaonan Wang and Yi Mu,
``A secure home healthcare system based on 6LoWPAN WSN,"
International Journal of Interdisciplinary Telecommunications and Networking, 6(3), pp.1526,
2014.
 Fuchun Guo, Yi Mu and Willy Susilo,
``Subset Membership Encryption and Its Applications to Oblivious Transfer,"
IEEE Transactions on Information Forensics & Security,
9(7), pp. 10981107 (2014)
 Ming Tang, Zhenlong Qiu, Hongbo Peng, Xiaobo Hu, Yi Mu, Huanguo
Zhang, ``Toward reverse engineering on secret Sboxes in block ciphers,"
SCIENCE
CHINA Information Sciences 57(3), pp.118 (2014)
 Mingwu Zhang and Yi Mu, ``Key continualleakage resilient broadcast cryptosystem from dual
system in broadcast networks." Frontiers of Computer Science 8(3), 456468, 2014
 Fuchun Guo, Yi Mu, Willy Susilo, Duncan Wong and Vijay Varadharajan, ``CPABE with
ConstantSize Keys for Lightweight Devices,"
IEEE Transactions on Information Forensics & Security,
9(5), pp. 763771, 2014
 Xixiang Lv, Yi Mu, and Hui Li, ``Losstolerant authentication with digital signatures,"
Security and
Communication Networks 7(11), pp.20542062 (2014)
 Guomin Yang, Ghik How Tan, Yi Mu, Willy Susilo
and Duncan Wang,
``Identity Based Identification from Algebraic Coding Theory,"
Theoretical Computer Science, Vol. 520, 6 Feb. 2014, pp. 5161,
http://dx.doi.org/10.1016/j.tcs.2013.09.008
 Xixiang Lv, Yi Mu and Hui Li,
``Noninteractive Key Establishment for Bundle Security Protocol of Space DTNs,"
IEEE Transactions on Information Forensics & Security, Vol. 9, No. 1, Jan. 2014,
pp. 513
 Jinguang Han, Willy Susilo and Yi Mu,
``IdentityBased Secure Distributed Data Storage Schemes,"
IEEE Transactions on Computers, 520, pp. 5161, 2014.
http://doi.ieeecomputersociety.org/10.1109/TC.2013.26
 Xiaonan Wang and Yi Mu,
``A secure mobility support scheme for 6LoWPAN wireless sensor networks,"
Security and Communication Networks, Wiley, 7(3), pp. 641652, 2014,
DOI: 10.1002/sec.765
 Yong Yu, Yi Mu, Willy Susilo and Man Ho Au,
``Security Pitfalls of an Efficient Threshold Proxy Signature Scheme for Mobile Agents,"
Information Processing Letters, Vol. 111 (12), pp. 58, 2014
 Yong Yu, Lei Niu, Guomin Yang, Yi Mu and Willy Susilo,
``On the security of auditing mechanisms for secure cloud storage,"
Future Generation Computer Systems, Vol. 30, January 2014, pp. 127132,
http://dx.doi.org/10.1016/j.future.2013.05.005
 Yanling Lian, Xinyi Huang and Yi Mu,
``SA3: SelfAdaptive Anonymous Authentication for
Dynamic Authentication Policies,"
Future Generation Computer Systems, Vol. 30, January, 2014, pp. 133139,
http://dx.doi.org/10.1016/j.future.2013.06.007
 Tsz Hon Yuen, Willy Susilo and Yi Mu,
``Towards a
Cryptographic Treatment of Publish/Subscribe Systems,"
Journal of Computer Security, Vol. 22, No. 2, 2014, pp. 3367
 Hao Gao, Jun Yan and Yi Mu,
``Trustoriented QoSaware Composite Service Selection based on Genetic Algorithms,"
Concurrency and Computation: Practice and Experience,
Vol. 26, Issue 2, Feb. 2014, pp. 500515
(online version: DOI: 10.1002/cpe.3015)
 Yong Yu, Jianbing Ni, Haomiao Yang, Yi Mu, and Willy Susilo,
``Efficient public key encryption with revocable keyword search,"
Security and Communication Networks, Wiley, 7(3), pp. 641652, 2014
DOI: 10.1002/sec.790
 Hui Cui, Yi Mu, Man Ho Au, ``Anonymous broadcast encryption with an untrusted
gateway.
International Journal of Security and Networks, 9(1), pp. 2029, 2014.
 Jinguang Han, Willy Susilo, Yi Mu and Jun Yan,
``Attributebased Data Transfer with Filtering Scheme in Cloud Computing,"
The Computer Journal, Oxford, 57(4), pp. 579591, 2014.
doi: 10.1093/comjnl/bxt039
 Fuchun Guo, Yi Mu, Willy Susilo, and
Vijay Varadharajan, ``ServerAided Signature
Verification for Lightweight Devices,"
The Computer Journal, 57(4), pp. 579591, 2013, doi: 10.1093/comjnl/bxt003

Tim Wellsmore, Yi Mu, Jennifer Seberry and Fuchun Guo,
``Efficient Authentication and Integrity Protection for the Border Gateway Protocol,"
International Journal of Security and Networks, 9(4), pp. 234243 (2014)
 Chang Xu, Hua Gao, Yi Mu and Zhoujun Li,
``AffiliationHiding Authenticated Asymmetric Group Key Agreement
based on Short Signature," The Computer Journal, Oxford,
57(10), pp.15801590 (2014)
doi: 10.1093/comjnl/bxt098
 Jianbing Ni, Yong Yu and Yi Mu,
``On the Security of an Efficient Dynamic Auditing Protocol in Cloud
Storage,"
IEEE Transactions on the Transactions on Parallel and Distributed Systems,
25(10), pp.27602761 (2014)
http://doi.ieeecomputersociety.org/10.1109/TPDS.2013.199
 Hui Chu, Yi Mu and Man Ho Au,
``Signcryption Secure Against Linear RelatedKey Attacks,"
The Computer Journal, Oxford, 57(10), pp.14721483 (2014)
doi: 10.1093/comjnl/bxt076
2013
 Hui Cui, Yi Mu and Man Ho Au,
``Robust and FunctionPrivate Anonymous IdentityBased Encryption,"
International Journal of Security and Networks, 2013 (accepted, 5 Oct. 2013)
 Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi and Yi Mu,
``Tokenleakage Tolerant Innerproduct Encryption and
Application in Privacypreserving Twoparty
Point/polynomial Evaluations in Mobility Environments,"
The Computer Journal, Oxford, (accepted, 23 July 2013)
 Hui Cui, Yi Mu, and Fuchun Guo,
``ServerAided IdentityBased Anonymous Broadcast Encryption,"
International Journal of Security and Networks,
2013 Vol.8, No.1, pp.2939
 Ahmad M. Elshamy, Ahmed N. Z. Rashed, Abd ElNaser A. Mohamed, Osama S.
Faragallah, Yi Mu, Saleh A. Alshebeili and F. E. Abd ElSamie1,
``Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase
Encoding," the IEEE/OSA Journal of Lightwave Technology,
Vol. 31, Issue 15, 1 Aug. 2013, pp.25332539
 Shams Qazi, Raad Raad, Yi Mu and Willy Susilo,
``Securing DSR against Wormhole attacks in Multirate Ad Hoc Networks,"
Journal of Network and Computer Applications,
Volume 36, Issue 2, March 2013, pp. 582592
 Xing Su, Minjie Zhang, Yi Mu, and Quan Bai,
``A Robust Trust Model for Service Oriented Systems,"
Journal of Computer and System Sciences, 99 (2013), pp. 596608
 Songqin Miao, Futai Zhang, Sujuan Lu, and Yi Mu,
``On Security of A Certificateless Signcryption Scheme,"
Information Sciences 232, 2013, pp. 475481.
 Hua Guo, Chang Xu, Yanqing Yao, Zhoujun Li and Yi Mu,
`` Efficient and Dynamic Key Management for Multiple Identities in Identitybased Systems,"
Information Sciences 221, 2013, pp. 579590.
 Jinguang Han, Willy Susilo and Yi Mu, ``IdentityBased Data Storage in Cloud Computing,"
Future Generation
Computer
Systems, vol. 29, no. 3, 2013, pp. 673681.
 Xiaonan Wang and Yi Mu,
``A secure IPv6 address configuration scheme for MANET,"
Journal of Security and Communication Networks, Vol. 6, Issue 6, pp.777789, 2013
(online:
DOI: 10.1002/sec.611)
 Chang Xu, Hua Guo, Zhoujun Li, and Yi Mu,
``New Construction of AffiliationHiding Authenticated Group Key Agreement,"
Journal of Security and Communication Networks, Vol. 6, Issue 6, pp. 723734, 2013
(online: DOI: 10.1002/sec.606)
 Man Ho Au, Willy Susilo, Yi Mu, and Sherman Chow,
``ConstantSize Dynamic kTimes Anonymous
Authentication," the IEEE Systems Journal, Special Issue on Security and Privacy of Complex Systems,"
(First published online, 10.1109/JSYST.2012.2221931), Vol. 7, Issue 2, June 2013,
pp.249261
2012
 Jinguang Han, Willy Susilo, Yi Mu and Jun Yan,
``New Constructions of OSBE Schemes and Their Applications in Oblivious Access Control,"
International Journal of Information Security, vol. 11,
no. 6, 2012, pp. 389401.
 Ying Sun, Yong Yu, Yi Mu, ``Further Analysis of a Practical
Hierarchical
IdentityBased Encryption Scheme,"
IEICE Transactions 95D(6): 2012, pp. 16901693.
 Tang Ming, Qiu ZhenLong, Gao Si, Yi Mu, Liu ShuBo, Zhang
HuanGuo and Jin YingZhen, ``Polar differential power
attacks and evaluation," Science China, Information Sciences,
55 (2012), no. 7, pp. 15881604, MR2947842
 Jinguang Han, Willy Susilo, Yi Mu and Jun Yan,
``Attributebased Oblivious Access Control,"
The Computer Journal, Oxford, vol. 55, no. 10,
2012, pp. 12021215
 Chang Xu, Zhoujun Li, Yi Mu, and Hua Guo,
"AffiliationHiding Authenticated Asymmetric
Group Key Agreement,"
The Computer Journal, Oxford, vol. 55, no. 10,
2012, pp. 11801191.
 Yong Yu, Yi Mu, Quilin Wang, Q. Xia, and Bo Yang
``An Improved Certificateless
Signature Scheme Provably Secure in the Standard Model,"
IET Information Security, Vol. 6, Issue 2, June 2012, pp. 102110.
 Miao Zhou, Yi Mu, Willy Susilo, and Jun Yan, and Liju Dong,
``Privacy Enhanced Data Outsourcing in the Cloud,"
Journal of Network and Computer Applications,
vol. 35, no. 4, 2012, pp. 13671373.
 Jinguang Han, Willy Susilo, Yi Mu, and Jun Yan,
``PrivacyPreserving Decentralized KeyPolicy AttributeBased Encryption,"
IEEE Transactions on Parallel and Distributed Systems,
vol. 23, no. 11, 2012, pp. 21502162.
 Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang, Li Xu,
``Provably Secure Construction of Certificatebased Encryption from Certificateless
Encryption,"
The Computer Journal, Oxford,
vol. 55, no. 10, 2012, pp. 11571168.
 Fuchun Guo, Yi Mu, and Willy Susilo,
``Efficient and Secure StoredValue Cards with Leakage Resilience,"
Computers and Electrical Engineering, vol 38, no. 2, 2012, pp.370380
 Hua Guo, Chang Xu, Yi Mu and Zhoujun Li, ``A Provably Secure Authenticated Key
Agreement Protocol for Wireless Communications," Computers and Electrical
Engineering, vol. 38, no. 3, 2012, pp. 563572.
 Jinguang Han, Willy Susilo, Yi Mu, and Jun Yan,
``Efficient Oblivious Transfers with Access Control,"
Computers and Mathematics with Applications, vol. 63,
no. 4, 2012, pp. 827837.
 Peishun Wang, Yi Mu, Willy Susilo and Jun Yan,
``Privacy Preserving Protocol for Service Aggregation in Cloud Computing,"
Software: Practice and Experience, vol. 42. no. 4, 2012, pp467483.
 Yong Yu, Yi Mu, Willy Susilo and Ying Sun,
``Provably secure proxy signature scheme from factorization,"
Journal of Mathematical and Computer Modelling, vol. 55, no. 34,
2012, pp. 11601168.
 Xinyi Huang, Yi Mu, Willy Susilo, Duncan Wong, Wei Wu,
``Certificateless Signatures: New Schemes and Security Models,"
The Computer Journal, Oxford, vol. 55, no. 4, 2012, pp. 457474.
2011
 Jun Zhang, Yang Xiang, Wanlei Zhou, Lei Ye and Yi Mu,
``Secure Image Retrieval Based on Visual Content and Watermarking Protocol,"
The Computer Journal, Oxford, Vol. 54, No. 10, pp. 16611674
 Yong Yu, Yi Mu, Guilin Wang, Ying Sun,
``Cryptanalysis of an Offline Electronic Cash Scheme based on Proxy Blind Signature,"
The Computer Journal, Oxford, Vol. 54, No. 10, pp. 16451651
 Fuchun Guo, Yi Mu, and Willy Susilo,
``Improving Security of qSDH Based Digital Signatures,"
Journal of Systems and Software, Vol. 84, No. 10, pp.17831790, 2011
 Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, and Yang Xiang,
``Optimistic Fair Exchange with Strong ResolutionAmbiguity,"
IEEE Journal on Selected Areas in Communications,
Special Issue on Advances in Digital Forensics for Communications and networking,
Vol. 29, No. 7, August 2011, pp. 14911502.
 Hua Guo, Zhoujun Li, Yi Mu, Fan Zhang, Chuankun Wu, Jikan Teng,
``"An Efficient Dynamic Authenticated Key Exchange Protocol with Selectable
Identities,"
Journal of Computers and Mathematics with Applications, 61(9): pp. 25182527 (2011)
 Xing Su, Minjie Zhang, Yi Mu, Quan Bai,
``Trustbased Service Provider Selection in Serviceoriented Environments,"
International Journal of Computer Science and Network Security,
Vol. 11, Issue 10. 2011, pp. 19.
 Ying Sun, Chunxiang Xu, Yong Yu, Yi Mu,
``Strongly Unforgeable Proxy Signature Scheme Secure in the
Standard Model," Journal of Systems and Software,
vol. 84, no. 9, 2011, pp. 14711479.
 Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang,
``Provably Secure ServerAided Verification Signatures,"
Journal of Computers and Mathematics with Applications,
61(7): pp. 17051723, 2011.
 Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Jianying Zhou, and Robert H. Deng,
``Preserving Transparency and Accountability in Optimistic Fair
Exchange of Digital Signatures," IEEE Transactions on Forensics and Security,
6(2): pp. 498512 (2011)
 Fuchun Guo, Yi Mu, Willy Susilo,
``Short Signatures with A Tighter Security Reduction without Random Oracles,"
The Computer Journal,vol. 54, Issue 4, pp. 513524, 2011.
 Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li,
``An Efficient and NonInteractive Hierarchical Key Agreement Protocol,"
Computers and Security, 30(1), pp. 436446, 2011.
 Ching Yu Ng, Willy Susilo, Yi Mu And Rei SafaviNaini.
``Practical RFID Ownership Transfer Scheme,"
Jourmal of Computer Security, Special Issue on RFID System Security,
19(2): pp. 319341, 2011.
 Hua Guo, Yi Mu, Zhoujun Li, Xiyong Zhang, ``Provably Secure IdentityBased
Authenticated Key Agreement Protocols with Malicious PKGs," Information Sciences,
Volume 181, Issue 3, 1 February 2011, pp. 628647.
 Qi Zhang, Yi Mu, and Minjie Zhang,
``Attributebased Authyentication for MultiAgent
Systems with Dynamic Groups,"
Computer Communications,
Volume 34, Issue 3, 15 March 2011, pp. 436446
 Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li, ``Authenticated Key Exchange
Protocol with
Selectable Identities,'' Journal of Wireless Communications and Mobile
Computing, 11(2), pp. 226239. 2011 (DOI: 10.1002/wcm.971)
2010
 Tsz Hon Yuen, Willy Susilo, Yi Mu,
``How to Construct IdentityBased Signatures without the Key Escrow Problem,"
International Journal of Information Security,
Vol. 9, No. 4, pp.297311, 2010
 Pairat Thorncharoensri, Qiong huang, Willy Susilo, Man Ho Au, Yi Mu, Duncan
Wong,
``Escrowed Deniable Identification Schemes,"
International Journal of Security and Its Applications,
Vol. 4, No. 1, January 2010, pp. 4967
 Futai Zhang, Sujuan Li, Songqin Miao, Yi Mu, Willy Susilo, and Xinyi Huang,
``Cryptanalysis on Two Certificateless Signature Schemes,"
International Journal of Computers, Communications & Control,
Vol. V, No. 4, 2010, pp. 586591.
 Hong Yuan, Futai Zhang, Xinyi Huang, Yi Mu, Willy Susilo, Lei Zhang,
``Certificateless Threshold Signature Scheme from Bilinear Pairings,"
Information Sciences, Vol. 180, Issue 23, 2010, pp. 47144728.
 Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li, ``Enhanced McCullaghBarreto
identitybased key
exchange protocols with master key forward security,"
International Journal of Security and Networks,
Vol. 5, Issue 2/3, pp. 173187, 2010.
 Qi Zhang, Yi Mu,
Minjie Zhang, Robert H. Deng,
``Secure Mobile Agents with Controlled Resources," Journal of Concurrency and
Computation:
Practice and Experience, Wiley,
DOI: 10.1002/cpe.1618
 Li Xu, Sisheng Cheng, Xinyi Huang, and Yi Mu,
``Pseudonym and bloom filter based secure and anonymouse DSR protocol in
wireless and hoc network,"
International Journal of Security and Networks, Vol. 5, No. 1, 2010, pp.3544
 Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu,
``Constructions of CertificateBased Signature Secure against Key Replacement Attacks,"
Journal of Computer Security, 18(3): 421449, 2010
2009
 Shuang Chang, Duncan S. Wong, Yi Mu, and Zhenfeng Zhang,
``Certificateless Threshold Ring Signature,"
Information Sciences, Elsevier, vol. 179, No. 20, 2009, pp. 36853696
 Xiaofeng Chen, Fangguo Zhang, and Yi Mu,
"IdentityBased Universal Designated Verifier Signature Proof System,"
International Journal of Network Security, Vol. 8, No. 1, 2009, pp. 5258
 Yong Yu, Chunxiang Xu, Xinyi Huang,
and Yi Mu, ``An efficient anonymous proxy signature scheme with provable security,"
Journal of Computer standard & interface,
31(2),
pp. 348353, 2009.
2008
 Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei,
Willy Susilo, Yi Mu, Hyunrok Lee, and Kwangjo Kim,
``Efficient generic online/offline (threshold) signatures
without key exposure,'' Information Sciences 178(21): 41924203 (2008)
 Fuchun Guo, Yi Mu, and Zhide Chen,
``MultiIdentity Management for IdentityBased Cryptography,"
Journal of Discrete Mathematical Sciences & Cryptography,
11 (6), pp. 639672, 2008.
 Hua Guo, Zhoujun Li, Yi Mu, and Xiyong Zhang, ``Cryptanalysis of Simple ThreeParty
Key Exchange Protocol," Journal of Computers and Security 27(12): 1621, 2008.
 Fangguo Zhang, Xiaofeng Chen, Yi Mu, and Willy Susilo,
``A New and Efficient Signature on Commitment Values,"
International Journal of Network Security (IJNS), Vol. 7 No. 1, 2008, pp. 101106
 Xinyi Huang, Willy Susilo, Yi Mu, and Wei Wu, ``Secure Universal Designated Verifier
Signature without Random Oracles," International Journal of Information Security,
7(3), 6
pages 171183. Springer, 2008
 Jiguo Li, Xinyi Huang, Yi Mu, and Wei Wu,
``Cryptanalysis and Improvement of an Efficient Certificateless
Signature Scheme," Journal of Communications and Networks,
10(1), pp. 1017, 2008
2007
 Dennis Y. W. Liu, Joseph K. Liu,
Yi Mu, Willy Susilo, and Duncan S. Wong ``Revocable Ring Signature,"
Journal of Computer Science and Technology, 22(6): 785794 Nov. 2007.
 Bo Qin, Qinhong Wu, Willy Susilo, Yi Mu,
Yumin Wang, and ZhengTao Jiang,
``A novel short signature without random oracles,"
Chinese Journal of Electronics, 16(4), pp. 707710, 2007.
 Bo Qin, Qinhong Wu, Willy Susilo, Yi Mu, and Yumin Wang,
``Short Group Signatures without Random Oracles,"
Journal of Computer Science and Technology, 22 (6), 805821, 2007
 Xinyi Huang, Willy Susilo, and Yi Mu,
"Breaking and Repairing Trapdoorfree Group Signature Schemes from Asiacrypt 2004,"
Journal of Computer Science and Technology, Vol. 42, No. 1, January 2007, pp. 7174.
 Jing Wu, Jennifer Seberry, Yi Mu,
``Temporal Authorizations Scheme for XML Document,"
WSEAS Transactions on Computers,
Issue 2, Volume 6, February 2007, pp262267.
 Pairat Thorncharoensri, Tianbing Xia, and Yi Mu,
``How to Find the Sufficient Collision Conditions for
Haval128 Pass 3 by Backward Analysis,"
International Journal of Network Security (IJNS), Vol. 4, No. 2, 2007, pp138148.
 Xinyi Huang, Willy Susilo, Yi Mu and Futai Zhang,
"Short Designated Verifier Signature Scheme and Its Identitybased Variant,"
International Joural of Network Security (IJNS), Vol. 42, No. 1, January 2007, pp. 7174.
2006 and older
 Yiqun Chen, Willy Susilo, and Yi Mu,
"Convertible IdentityBased Anonymous Designated Ring
Signatures," International Journal of Security and Networks (IJSN),
Vol. 1 No. 3/4, 2006, pp. 218  225.
 Shidi Xu, Yi Mu and Willy Susilo, ``Authenticated AODV
Routing Protocol Using OneTime Signature and
Transitive Signature Schemes," Journal of Networks (JNW) Vol. 1 Issue 1,
Academy Publisher, ISSN:17962056, pp. 4753, May 2006.
 Khin Than Win, Willy Susilo, and Yi Mu,
"Personal Health Record Systems and their Security Protection,"
Journal of Medical Systems, Springer, 2006. ISSN: 01485598 (Paper) 1573689X (Online).
 Willy Susilo, Fangguo Zhang, and Yi Mu,
"PrivacyEnhanced Internet Storage: NonInteractive
Publicly Verifiable 1outofn Encryption Schemes,"
International Journal of Computer
Science and Network Security (IJCSNS), Vol. 5 No. 12, 2005, pp. 99  114.
 Yi Gao, Yi Mu, and Willy Susilo, "A New Client Puzzle Scheme Against DoS/DDoS Attacks,"
International Journal of Computer Science and Network Security (IJCSNS),
Vol.5, No.10, pp. 189200, 2005.
 Ching Yu Ng, Yi Mu and Willy Susilo. "An Identitybased Broadcast
Encryption Scheme for Mobile AdHoc Networks," Journal of
Telecommunications and Information Technology,
Special Issue on Multimedia Communications, Vol. 1, pp2429, 2005
 Willy Susilo and Yi Mu,
"Provably Secure FailStop Signature Schemes Based on RSA,"
Special Issue on Multimedia Networking and Wireless Communications of the International Journal of
Wireless and Mobile Computing, Volume 1, Issue 1, 2005, pp 5360.
 Junqi Zhang, Vijay Varadharajan, and Yi Mu, "Secure Distribution and
Access of XML Documents,"
the Special Issue on Advanced Networking and Applications for New Computing Paradigm,
International Journal of High Performance Computing and Networking (IJHPCN), Vol. 3,
Nos. 5/6, 2005 pp356365.
 Yi Mu, Willy Susilo, and Yanxia Lin, ``Identitybased delegated signatures,",
Journal of Communications of the CCISA (Selected topics of cryptography), Vol. 9, 2003, pp. 3143.
 Yi Mu, Junqi Zhang, Vijay Varadharajan, and YanXia Lin,
``Robust NonInteractive Oblivious Transfer,"
IEEE Communications Letters, Volume 7, No. 4, 2003,
pp. 153155.
 Yi Mu and Vijay Varadharajan, ``Group Cryptography:
Signature and Encryption," Journal of Informatica, Volume 26, 2002, pp. 249254.
 Vijay Varadharajan, Khanh Quoc Nguyen, Yi Mu, "On the design of
efficient RSAbased offline electronic cash scheme,"
Journal of Theoretical Computer Science
(226) 12 (1999) pp. 173184. 17 September 1999.
 Yi Mu, Jennifer Seberry, and Yuliang Zheng, "Shared
cryptographic bits via quantized quadrature phase amplitudes of light,"
Journal of Optics Communications, Vol 123, pp. 344352, 1996.
 Yi Mu, ``Spontaneous emission spectra via cavityenhanced
coherent population trapping in a threelevel system,"
Journal of Optics Communications, 111, 334 (1994)
 Yi Mu, ``Bistability and intensity squeezing
in the twophoton laser without inversion,"
Physical Review A, 49, 5142 (1994)
 Yi Mu and Craig M. Savage, ``Phasesensitive abovethreshold
laser amplifiers,"
Physical Review A, 49, 4093 (1994)
 Yi Mu and Craig M. Savage,
``Oneatom lasers,"
Physical Review A, 46, 5944
(1992)
(see News in Nature,
Experiment)
 Yi Mu and Craig M. Savage, ``Parametric amplifiers in phase noise
limited optical Communications," Journal of the Optical Society of
America B, 9, 65 (1992).
 Tu Nan Chang and Yi Mu, ``Energy levels
and transition probabilities of
bound excited states of Belike N IV,"
Journal of Quantitative Spectroscopy Radiative
Transfer, 44, 413 (1990).
Refereed Conference Papers:
back to top
2017
 Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, and Yi Mu,
Optimal Security Reductions for Unique
Signatures: Bypassing Impossibilities with A Counterexample, Crypto 2017,
Lecture Notes in Computer Science. Springer

Shiwei Zhang, Yi Mu, Guomin Yang, Xiaofen Wang:
Hierarchical Functional Encryption for Linear Transformations. ACISP (1)
Lecture Notes in Computer Science, vol 10342. Springer, 2017: 2343
 Shengmin Xu, Guomin Yang, Yi Mu, Willy Susilo:
Mergeable and Revocable IdentityBased Encryption. ACISP (1), Lecture Notes in Computer Science, vol 10342. Springer, 2017:
147167
 Tong Wu, Sha Ma, Yi Mu, Shengke Zeng:
IDBased Encryption with Equality Test Against Insider Attack. ACISP (1), Lecture Notes in Computer Science, vol 10342. Springer,
2017: 168183
 Yangguang Tian, Shiwei Zhang, Guomin Yang, Yi Mu, Yong Yu:
PrivacyPreserving ktime Authenticated Secret Handshakes. ACISP (2), Lecture Notes in Computer Science, vol 10342. Springer,
2017: 281300

Fatemeh Razaeibagha and Yi Mu: Access Control Policy Combination from Similarity
Analysis for Secure Privacypreserved EHR Systems, Trustcom 2017
 Shu Cheng, Vijay Varadharajan, Yi Mu, Willy Susilo:
An efficient and provably secure RFID grouping proof protocol. ACSW 2017: 71:171:7
2016
 Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, and Mingwu Zhang,
``Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions,"
Asiacrypt 2016, Lecture Notes in Computer Science 10031, Springer, pp.844876, 2016
 Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, and Guomin Yang,
``Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction,"
Asiacrypt 2016, Lecture Notes in Computer Science 10031, Springer, pp.745776, 2016
 Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo,
``Strongly LeakageResilient Authenticated Key Exchange," Lecture Notes in Computer Science 9610, CTRSA 2016,
pp.1936, 2016.
 Willy Susilo, Rongmao Chen, Funchun Guo, Guomin Yang, Yi Mu and YangWai Chow,
``Recipient Revocable IdentityBased Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the
Plaintext," AsiaCCS 2016, pp.201210
 Tao Xiang, Xiaoguo Li, Fei Chen and Yi Mu, `` Bilateralsecure Signature by Key Evolving," AisaCCS 2016. pp.523532
 Xiaofen Wang and Yi Mu,
``Contentbased Encryption,"
Australasian Conference on Information Security and Privacy (ACISP 2016),
Lecture Notes in Computer Science 9722, Part I, Springer Verlag, pp. 5772.
 Jianchang Lai, Yi Mu, Fuchun Gao, Willy Susilo and Rongmao Chen,
``Anonymous IdentityBased Broadcast Encryption with Revocation for File Sharing,"
Australasian Conference on Information Secuirty and Privacy (ACISP 2016),
Lecture Notes in Computer Science 9722, Part I, Springer Verlag, pp.223242.
(
full
version
)
 Rongmao Chen, Yi Mu, Willy Suosilo, Guomin Yang, Fuchun Guo and Mingwu Zhang,
``OneRound Strong Oblivious
SignatureBased Envelope,"
Australasian Conference on Information Security and Privacy (ACISP 2016),
Lecture Notes in Computer Science 9722, Part II, Springer Verlag, pp.320.
 Peng Jiang, Yi Mu, Fuchun Guo and Qiaoyan Wen,
``Public Key Encryption with Authorized Keyword Search,"
Australasian Conference on Information Security and Privacy (ACISP 2016),
Lecture Notes in Computer Science 9722, Part II, Springer Verlag, pp.170186.
 Yinhao Jiang, Willy Suosilo, Yi Mu and Fuchun Guo,
``CiphertextPolicy AttributeBased Encryption with KeyAbuse
Resistance,"
Australasian Conference on Information Security and Privacy (ACISP 2016),
Lecture Notes in Computer Science 9722, Part I, Springer Verlag, pp.477494.
 Shiwei Zhang, Guomin Yang and Yi Mu,
``Linear Encryption with Keyword Search,"
Australasian Conference on Information Security and Privacy (ACISP 2016),
Lecture Notes in Computer Science 9722, Part II, Springer Verlag, pp.187206.
(
full
version
)
 Shengmin Xu, Guomin Yang, Yi Mu and Sha Ma,
``Proxy Signature with Revocation,"
Australasian Conference on Information Security and Privacy (ACISP 2016),
Lecture Notes in Computer Science 9722, Part II, Springer Verlag, pp.2136.
 Shiwei Zhang, Yi Mu and Guomin Yang,
``Acchieving INDCCA Security for Functional Encryption for Innet Products,"
Inscrypt 2017
2015
 Yong Yu, Yafang Zhang, Yi Mu, Willy Susilo and Hongyu Liu,
``Provably Secure Identity based Provable DataPossession,"
Provsec 2015, Lecture Notes in Computer Science 9451, Springer Verlag,
pp. 310325, 2015.
 Shiwei Zhang, Yi Mu, and Guomin Yang,
``Threshold Broadcast Encryption with Keyword Search,"
Inscrypt 2015 (accepted, 10 Oct. 2015)
 Jianchang Lai, Yi Mu, Fuchun Guo and Willy Susilo,
``Improved IdentityBased Online/Offline Encryption,"
Australasian Conference on Information Security and Privacy (ACISP 2015),
Lecture Notes in Computer Science 9144, Springer Verlag, pp. 160173
 Yiteng Feng, Yi Mu, Guomin Yang and Joseph K. Liu,
``A New Public Remote Integrity Checking Scheme with User Privacy,"
Australasian Conference on Information Security and Privacy (ACISP 2015),
Lecture Notes in Computer Science 9144, Springer Verlag, pp. 377394

Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo and Xiaofen Wang,
``A New General Framework for Secure Public Key Encryption with Keyword Search,"
Australasian Conference on Information Securoity and Privacy (ACISP 2015),
Lecture Notes in Computer Science 9144, Springer Verlag, pp. 5976
 Jun Yan, Hao Gao and Yi Mu,
``Business Rule Driven Composite Service Optimisation and Selection,"
IEEE International Conference on Services Computing (SCC2015),
pp. 4956, 2015
2014
 Weiwei Liu, Yi Mu and Guomin Yang,
``An Efficient Privacypreserving Ecoupon System,"
Inscrypt 2014, Lecture Notes in Computer Science 8957, Springer, pp.315, 2014
 Ibrahim Elashry, Yi Mu and Willy Suililo,
``An Efficient Variant of BonehGentryHamburg's Identitybased Encryption without
Pairing," The 15th International Workshop on Information Security Applications
(WISA 2014), Lecture Notes in Computer Science 8909, Springer, pp.257268, 2014
 Fuchun Guo, Willy Susilo and Yi Mu,
``Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption,"
ACM Conference on Computer and Communications Security (ACM CCS) 2014, pp.14301432.
 Hui Cui, Yi Mu and Man Ho Au,
``Complete Robustness in IdentityBased Encryption,"
ProvSec 2014, Lecture Notes in Computer Science 8782, pp.342349.
 Yong Yu, Yi Mu, Jianbing Ni, Jiang Deng and Ke Huang,
``Identity PrivacyPreserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage,"
NSS 2014, pp.2840.
 Ibrahim Elashry, Yi Mu and Willy Susilo, ``JhanwarBarua's Identitybased Encryption Revisit,"
NSS 2014, pp.271284.
 Weiwei Liu, Yi Mu and Guomin Yang,
``AttributeBased Signing Right Delegation,"
NSS 2014, pp.323334
 Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, and ManHo Au.
``PPDCPABE: privacypreserving decentralized cipherpolicy
attributebased encryption," European
Symposium on
Research in Computer Security  ESORICS'14, pp.7390.
 Kefeng Wang, Yi Mu, Willy Susilo and Fuchun Guo,
``AttributeBased Signature with Message Recovery," ISPEC 2014,
Lecture Notes in Computer Science 8434, Springer Verlag, pp. 433447, 2014
 Nan Li, Yi Mu, Willy Susilo, fuchun Guo and Vijay Varadharajan,
``Privacypreserving Authorized RFID
Authentication Protocols," RFIDSec 2014, Lecture Notes in Computer Science 8651,
pp.108122.
 Jiannan Wei, Guomin Yang, Yi Mu, ``Anonymous Proxy Signature with Restricted
Traceability," TrustCom 2014, IEEE, pp.575581
 Jun Yan, Hao Gao, Yi Mu: Attribute Based Service Customization and Selection,"
7th {IEEE} International Conference on ServiceOriented Computing
and Applications (SOCA), IEEE,
2014, pp. 5764
2013
 Hui Cui, Yi Mu and Man Ho Au,
``Anonymous Signcryption Secure Against Linear RelatedKey Attacks,"
Lecture Notes in Computer Science 8209, ProvSec 2013, pp. 165183
 Wei Wei Liu, Guomin Yang and Yi Mu,
``ktime Proxy Signature: Formal Definition and Efficient Construction,"
Lecture Notes in Computer Science 8209, ProvSec 2013, pp. 154164
 Ibrahim Elashry, Yi Mu and Willy Susilo,
``Generic Mediated Encryption,"
SecureComm 2013, Lecture Notes of the Institute for Computer Sciences (LNICST) 127,
2013, pp. 154168
 Hui Cui, Yi Mu and Man Ho Au,
``PublicKey Encryption Resilient to Linear RelatedKey Attacks,"
SecureComm 2013, Lecture Notes of the Institute for Computer Sciences (LNICST) 127, 2013,
pp. 182196
 Nan Li, Yi Mu, Willy Susilo and Vijay Varadharajan,
``On RFID Authentication Protocols with WideStrong Privacy,"
RFIDsec Asia, IOS Press, 2013, pp. 316

Shu Cheng, Vijay Varadharajan, Yi Mu and Willy Susilo,
``A Secure Elliptic Curve based RFID Ownership Transfer Scheme with Controlled Delegation,"
RFIDsec Asia, IOS Press, 2013, pp. 3143
 Fuchun Guo, Yi Mu, Willy Susilo, and Vijay Varadharajan,
``Membership Encryption and Its Applications,"
Australasian Conference on Information Secuiryt and Privacy (ACISP 2013),
Lecture Notes in Computer Science 7959, Springer Verlag,
2013, pp. 219234.
 Guomin Yang, Yi Mu, Willy Susilo, and Duncan S. Wong,
``Leakage Resilient Authenticated Key Exchange
Secure in The Auxiliary Input
Model,"
Information Security Practice and Experience (ISPEC 20013), Lecture Notes in Computer
Science 7863,
Springer Verlag, 2013, pp. 204217.
 Kefeng Wang, Yi Mu, and Willy Susilo, ``Identitybased Multisignature with Message Recovery,"
Information Security Practice and Experience (ISPEC 20013), Lecture Notes in Computer Science 7863,
Springer Verlag, 2013, pp. 91104
 Nan Li, Yi Mu, Willy Susilo, and Vijay Varadharajan, ``Secure RFID Ownership Transfer Protocols,"
Information Security Practice and Experience (ISPEC 20013), Lecture Notes in Computer Science 7863,
Springer Verlag, 2013, pp. 189203
 Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, and Yi Mu, ``Leakageresilient Attributebased
Encryption with Fast Decryption: Models, Analysis and
Constructions,"
Information Security Practice and Experience (ISPEC 20013), Lecture Notes in Computer Science 7863,
Springer Verlag, 2013, pp. 7590.
 Hui Cui, Yi Mu and Man Ho Au,
``Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps,"
12th IEEE International Conference on
Trust, Security and Privacy in Computing and Communications (TrustCom 2013),
pp. 704711
 Miao Zhou, Yi Mu, Willy Susilo and Man Ho Au,
``PrivacyEnhanced Keyword Search in Clouds,"
12th IEEE International Conference on
Trust, Security and Privacy in Computing and Communications (TrustCom 2013),
pp. 447451
2012
 Fuchun Guo, Yi Mu, Willy Susilo and Vaijay Varadharajan,
``A Precomputable Signature Scheme with Efficient Verification for RFID,"
Information Security Practice and Experience (ISPEC 20012), Lecture Notes in Computer Science 7232,
Springer Verlag, 2012, pp. 116
 Pairat Thorncharoensri, Willy Susilo and Yi Mu,
``Multilevel Controlled Signature,"
the 13rd International Workshop on Information Security Applications (WISA 2012), Lecture
Notes in Computer Science 7690, Springer Verlag, 2012, pp. 96110.
 Fuchun Guo, Yi Mu and Willy Susilo,
``IdentityBased Traitor Tracing with Short Private Key and Short Ciphertext,"
17th European Symposium on Research in Computer Security (ESORICS 2012),
Lecture Notes in Computer Science 7459, Springer Verlag, 2012, pp. 609626.
 Jiangshan Yu, Guilin Wang, Yi Mu.
``Provably Secure Sing Signon Scheme in Distributed Systems and Networks,"
the 11th IEEE International Conference on Trust, Security and Privacy in
Computing and Communications (IEEE TrustCom12), pp. 271278
2011
 Nan Li, Yi Mu and Willy Susilo,
"Efficient SelfCertified Signatures with Batch Verification,"
Inscrypt 2011, Lecture Notes in Computer Science 7537, Springer Velag,
2012, pp. 179194.
 Miao Zhou, Yi Mu, Willy Susilo and Jun Yan,
``PiracyPreserved Access Control for Cloud Computing,"
IEEE TrustCom 2011, pp. 8390
 Quan Bai, Xing Su, Qing Liu, Andrew Terhorst, Minjie Zhang, Yi Mu,
``CaseBased Trust Evaluation from Provenance Information,"
IEEE TrustCom 2011, pp. 336343
 Xing Su, Minjie Zhang, Yi Mu and Quan Bai, ``GTrust: An Innovated Trust Model for Group Services Selection in
Webbased Serviceoriented Environments," The 12th International Conference on Web
Information System Engineering (WISE 2011),
Lecture Notes in Computer Science 6997, Springer Verlag,
2011, pp. 306313
 Lei Qu, Quilin Wang, and Yi Mu,
``Optimistic Fair Exchange of Ring signatures,"
7th International ICST Conference on Security and Privacy in Communication Networks
(SecureComm 2011),
September 79 2011, London
 Man Ho Au, Willy Susilo, and Yi Mu,
``Electronic Cash with Anonymous User Suspension,"
16th Australasian Conference on Information Secuiryt and Privacy (ACISP 2011),
Australia, Lecture Notes in Computer Science 6812, SpringerVerlag, 2011,
pp. 172188
 Hao Gao, Jun Yan, and Yi Mu
``Web Service Selection based on Similarity Evaluation,"
The 8th International Conference on Services Computing (SCC 2011),
July 49, 2011, Washington DC, USA, IEEE, pp. 322329
 Yikai Wang, Yi Mu and Minjie Zhang,
``PolicyBased Authentication for Mobile Agents,"
Information Security Practice and Experience (ISPEC 2011), Lecture Notes in Computer Science 6672,
Springer Verlag, 2011, pp. 123137.
 Nan Li, Yi Mu and Willy Susilo, ``SelfCertified Ring Signatures,"
ACM Symposium on Information, Computer and Communications Security (AisaCCS 2011),
ACM Press, 2011, pp. 396400
 Liju Dong, Yi Mu, Willy Susilo, Peishun Wang, Jun Yan,
``A Privacy Policy Framework for Service Aggregation with P3P,"
The Sixth International Conference on Internet and Web Applications and
Services (ICIW 2011), Xpert Publishing Services, Netherlands, 2011,
pp. 171177.
2010
 Man Ho Au, Willy Susilo, and Yi Mu,
``ProofofKnowledge of Representation of Committed
Value and Its Applications,"
15th Australasian Conference on Information Security and Privacy (ACISP 2010),
Lecture Notes in Computer Science 6168, SpringerVerlag, pp. 352369
 Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu,
``Enhanced Security Notions for DedicatedKey Hash Functions: Definitions and Relationships,"
Fast Software Encryption (FSE 2010), Lecture Notes in Computer Science 6147,
Springer Verlag, 2010, pp. 192211.
 Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Yi Mu, Kwangjo Kim.
``Threeround
Abusefree Optimistic Contract Signing With Everlasting Secrecy,"
Financial Cryptography and Data Security (FC 2010), Lecture Notes in Computer Science 6052,
Springer Verlag, 2010, pp. 304311.
 Ching Yu Ng, Willy Susilo, Yi Mu, and Rei SafaviNaini,
``Practical RFID Ownership Transfer Scheme,"
RFIDsec'10Asia, Cryptology and Information Security Series Volume 4,
2010, pp. 3347
 Fei Bi and Yi Mu, ``Efficient RFID Authentication Scheme for Supply Chain
Applications,"
Trustcom 2010, IEEE, pp. 583588.
 Xing Su, Minjie Zhang, Yi Mu, and Kwang Mong Sim,
``PBTrust: A PriorityBased Trust Model for Service Selection in General
ServiceOriented Environments," Trustcom 2010, IEEE, pp. 841848.
 Fuchun Guo, Yi Mu, and Willy Susilo,
``Efficient Online/Offline Signatures with Computational
Leakage Resilience in Online Phase,"
Inscrypt 2010, LNCS, Springer (accepted).
 Tsz Go Yuen, Willy Susilo, and Yi Mu,
``Cryptographic Treatment of Publish/Subscribe Systems,"
Cryptology and Network Security (CANS 2010), LNCS 6467, Springer,
2010, pp. 201220
 Jinguang Han, Yi Mu, Willy Susilo, Jun Yan, ``A Generic Construction for Dynamic Single
Signon," SecureComm, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 50 (LNICST 50), pp. 181198. Springer,
2010.
 Hao Guo, Jun Yan, and Yi Mu, ``Dynamic Trust Model for Federated
Identity
Management,"
the IFIP International Workshop on Network and System Security (NSS 2010),
IEEE Computer Society, pp. 5661.
 Peishun Wang, Yi Mu, Willy Susilo, Jun Yan,
``Constructing an Authentication Token to Access External Services in
Service
Aggregation,"
The 7th International Conference on Services Computing (SOC 2010),
July 510, 2010, Miami, USA. IEEE Computer, pp. 321328.
 Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiao,
``Further Observations on Optimistic Fair Exchange Protocols in the
Multiuser Setting,"
13th International Conference on Practice and Theory in
Public Key Cryptography, Lecture Notes in Computer Science 6056,
2010, pp.124141.
 Peishun Wang, Liju Dong, Yi Mu, Willy Susilo, Jun Yan,
``A Logical Framework for Matching Privacy Policies in Service
Aggregation,"
the 14th International Conference on Computer Supported Cooperative Work
in Design (IEEE
CSCWD 2010), April 1416, 2010, Shanghai, China. pp. 166171, IEEE.
2009
 Fuchun Guo, Yi Mu and Willy Susilo, ``How to Prove Security of A Signature with A Tighter Security
Reduction,"
ProvSec 2009, Lecture Notes in Computer Science 5848, Springer Verlag, 2009, pp. 90103.
 Man Ho Au, Willy Susilo and Yi Mu,
``Is the Notion of Divisible Online/Offline Signatures Stronger
than Online/Offline Signatures,"
ProvSec 2009, Lecture Notes in Computer Science 5848, Springer Verlag, 2009, pp. 129139.
 Hua Guo, Yi Mu, Xiyong Zhang and Zhoujun Li,
``ServerControlled IdentityBased Authenticated Key Exchange,"
ProvSec 2009, Lecture Notes in Computer Science 5848, Springer Verlag, 2009, pp. 214229
 Tsz Hon Yuen, Willy Susilo and Yi Mu,
``How to Construct IdentityBased Signatures without Key Escrow
Problem," Sixth European Workshop on Public Key Services, Applications and Infrastructures
(EuroPKI 2009), SpringerVerlag, 2009
 Pairat Thorncharoensri and Willy Susilo and Yi Mu, ``Policycontrolled Signature," in Proc. of
Eleventh International Conference on Information and Communications Security,
Lecture Notes in Computer Science, Springer Verlag, 2009, pp. 91106.
 Pairat Thorncharoensri, Qiong huang, Willy Susilo, Man Ho Au, Yi Mu, Duncan Wong,
``Escrowed Deniable Identification Schemes," SecTech 2009,
Lecture Notes in Computer Science, Springer Verlag, 2009 (accepted).
 Ching Yu Ng, Willy Susilo, Yi Mu, and Rei SafaviNaini,
``New Privacy Results on Synchronized RFID Authentication
Protocols Against Tag Tracing,"
14th European Symposium on Research in Computer Security (ESORICS'08),
Lecture Notes in Computer Science, Springer Verlag, 2009 (accepted)
 Hua Guo, Xiyong Zhang, Yi Mu, and Zhoujun Li,
``An Efficient Certificateless Encryption Scheme in the Standard Model,"
The 2009 International Conference on Network and System Security, IEEE,
2009, pp. 302309
 Qi Zhang, Yi Mu, Minjie Zhang, and Robert H. Deng,
``Secure Mobile Agents with Designated Hosts,"
The 2009 International Conference on Network and System Security, IEEE,
2009, pp. 286293
 Pairat Thorncharoensri and Willy Susilo and Yi Mu,
``ThresholdSigners Universal Designated Verifier Signatures,"
The Forth International Workshop on Security (IWSEC 2009),
Lecture Notes in Computer Science 5824, Springer Verlag, pp. 89109
 Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu,
``Analysis of
PropertyPreservation Capabilities of the ROX and ESh Hash Domain Extenders,"
14th Australasian Conference (ACISP 2009),
Australia, Lecture Notes in Computer Science 5594, SpringerVerlag, 2009, pp. 153170.
 Tsz Hon Yuen, Qiong Huang, Yi Mu, Willy Susilo, Duncan S. Wong and Guomin Yang,
``Efficient NonInteractive Range Proof,"
The 15th International Computing and Combinatorics Conference (COCOON 2009),
July 1315, 2009. Niagara Falls, New York, U.S.A.
Lecture Notes in Computer Science 5609,
Springer Verlag, pp. 138147.
 Hua Guo, Yi Mu, Xiyong Zhang and Zhoujun Li,
``Novel and Efficient IdentityBased Authenticated Key Agreement Protocols From Weil Pairings,"
The 6th International Conference on Ubiquitous Intelligence and Computing (UIC09),
Lecture Notes in Computer Science 5585,
Springer Verlag, pp. 310324.
 Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu,
``Enhanced Target Collision Resistant Hash Functions Revisited,"
Fast Software Encryption (FSE 2009), Lecture Notes in Computer Science 5665,
Springer Verlag, pp. 327344.
 Qianhong Wu, Yi Mu, Willy Susilo, Josep Domingo, and Qin Bo,
``Asymmetric Group Key Agreement," Advances in Cryptology 
Eurocrypt 2009, Lecture Notes in Computer Science 5479, Springer Verlag,
pp153170
 Man Ho Au and Patrick P. Tsang and Willy Susilo and Yi Mu,
``Dynamic Multiversal Accumulators and Their Application to AttributeBased Anonymous Credential Systems,"
CTRSA 2009, Lecture Notes in Computer Science 5473, Springer Verlag, pp. 295308.
2008
 Bo Qin, Qianhong Wu, Willy Susilo, and Yi Mu,
``Publicly Verifable Privacypreserving Group Decryption,"
Inscrypt 2008, Beijing, Lecture Notes in Computer Science 5487, Springer Verlag, pp. 7283.
 Shams Qazi, Yi Mu, and Willy Susilo,
``Securing wireless mesh networks with ticketbased authentication,"
2nd International Conference on
Signal Processing and Communication Systems (ICSPCS'2008), IEEE, 2008
 Qianhong Wu, Bo Qin, Yi Mu, and Willy Susilo
``Privacy for Private Key in Signature,"
Inscrypt 2008, Beijing, Lecture Notes in Computer Science 5487, Springer Verlag, pp. 8495.
 Pairat Thorncharoensri, Willy Susilo and Yi Mu,
``How to Balance Privacy with Authenticity,"
The 11th International Conference on Information Security
and Cryptology (ICISC 2008), Lecture Notes in Computer Science 5461, SpringerVerlag, 2008,
pp. 184201..
 Dong Dong Sun, Yi Mu, Willy Susilo, Xinyi Huang, ``IdentityBased Online/Offline Signcryption,"
the 2008 IFIP International Workshop on Network and System Security (NSS 2008), Shanghai, China (2008)
 Dong Dong Sun, Yi Mu, and Willy Susilo, ``A Generic Construction of IdentityBased Online/Offline Signcryption,"
2008 IEEE International Workshop on Cyberspace Safety and Security (CCS 2008), Sydney, Australia (2008)
 Wei Wu, Yi Mu, Willy Susilo, and Xinyi Huang,
``CertificateBased Signatures: New Definitions and A Generic Construction from Certificateless Signatures,"
the 9th International Workshop on Information Security Applications (WISA 2008), Korea,
Lecture Notes in Computer Science 5379, Springer Verlag, 2009, pp. 99114
 Wei Wu, Yi Mu, Willy Susilo, and Xinyi Huang,
``ServerAided Verification Signatures: Definitions and New Constructions,"
Provable Security (ProvSec 2008), Lecture Notes in Computer Science 141155 , Springer Verlag,
2008, pp.141155.
 Fuchun Guo and Yi Mu, ``Optimal Online/Offline Signature: How to Sign a Message Without Online Computation,"
Provable Security (ProvSec 2008), Lecture Notes in Computer Science 141155, Springer Verlag, 2008, pp.98111.
 Tsz Hon Yuen, Willy Susilo, Joseph K. Liu and Yi Mu,
``Sanitizable Signatures Revisited",
Cryptology and Network Security (CANS 2008),
Lecture Notes in Computer Science 5339, Springer Verlag (accepted)
 Fuchun Guo, Yi Mu, and Zhide Chen,
``Efficient Batch Verification of Short Signatures for
A Singlesigner Setting Without Random Oracles,"
the Third International Workshop on Security (IWSEC 2008),
Lecture Notes in Computer Science 5312, Springer Verlag,
2008, pp.4963.
 Ching Yu Ng, Willy Susilo, Yi Mu, and Rei SafaviNaini,
`` RFID Privacy Models Revisited,"
13th European Symposium on Research in Computer Security (ESORICS'08),
Lecture Notes in Computer Science 5283, Springer Verlag,
2008, pp.251266.
 Zhongren Liu, Li Xu, Zhide Chen, Yi Mu, and Fuchun Guo,
``Hierarchical IdentityBased Online/Offline Encryption,"
International Symposium on Electronic Commerce and Security,
ISECS 2008 (accepted)
 Fuchun Guo, Yi Mu, and Zhide Chen,
``IdentityBased Online/Offline Encryption,"
Financial Cryptography and Data Security (FC 2008),
Lecture Notes in Computer Science 5143, Springer Verlag,
2008, pp.247261.
 Man Ho Au, Willy Susilo, and Yi Mu,
``Practical Anonymous Divisible ECash From Bounded Accumulators,"
Financial Cryptography and Data Security (FC 2008),
Lecture Notes in Computer Science 5143, Springer Verlag,
2008, pp.287301.
 Yi Mu, Duncan Wong, Liqun Chen, Willy Susilo, and Qianhong Wu,
``Concurrent Signatures without a Conventional Keystone,"
International Workshop on Coding and Cryptology, Wuyishan, China, World Scientific Press, 2008,
pp. 196213.
 Qiong Ren, Yi Mu, and Willy Susilo,
``Mitigating Phishing with IDbased Online/Offline Authentication,"
Australasian Computer Security Conference (AISC2008),
January 2225, Wollongong, Australia, 2008, pp. 59–64.
2007
 Lan Zhou, Willy Susilo, and Yi Mu,
``New Construction of Group Secret Handshakes Based on Pairings,"
The 9th International Conference on
Information and Communications Security
(ICICS2007), Zhengzhou, Henan, China, Lecture Notes in Computer Science 4861,
Springer Verlag, 2007, pp. 5768.
 Dennis Y. W. Liu and Duncan S. Wong and Xinyi Huang and Guilin Wang and Qiong Huang and Yi Mu and Willy Susilo,
``Formal Definition and Construction of Nominative Signature,"
The 9th International Conference on
Information and Communications Security
(ICICS2007), Zhengzhou, Henan, China, Lecture Notes in Computer Science 4861,
Springer Verlag, 2007, pp. 5768.
 Xinyi Huang, Yi Mu, Willy Susilo and Wei Wu,
``A Generic Construction for Universally Convertible Undeniable Signatures,"
The 6th International Conference on Cryptology and Network Security (CANS 2007),
Lecture Notes in Computer Science 4856, Springer Verlag, 2007, pp. 1533.
 Fuchun Guo, Yi Mu, and Zhide Chen,
``Mutative IdentityBased Signatures or Dynamic Credentials without Random Oracles,"
The 6th International Conference on Cryptology and Network Security (CANS 2007),
Lecture Notes in Computer Science 4856, Springer Verlag, 2007 (accepted)
 Fuchun Guo, Yi Mu, Zhide Chen, and Li Xu,
``MultiIdentity SingleKey Decryption without Random Oracles,"
Inscrypt 2007, Xining, China, Lecture Notes in Computer Science,
Springer Verlag, 2007 (accepted)
 Wei Wu, Yi Mu, Willy Susilo and Xinyi Huang,
``Provably Secure Identitybased Undeniable Signatures with Selective and Universal Convertibility"
Inscrypt 2007, Xining, China, Lecture Notes in Computer Science,
Springer Verlag, 2007 (accepted)

Wei Wu, Yi Mu, Willy Susilo and Xinyi Huang,
``Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction,"
The 8th International Workshop on Information
Security Applications (WISA 2007), Jeju Island, Korea
August 2729, 2007, Lecture Notes in Computer Science,
Springer Verlag, 2007 (accepted)
 Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong, and Yi Mu,
``Nominative Signature from Ring Signature,"
International Workshop on Security (IWSEC2007),
Nara, Japan, October 29  31, 2007,
Lecture Notes in Computer Science, SpringerVerlag, 2007.
(accepted)
 Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu,
``CertificateBased Signature: Security Model and Efficient Construction,"
Fourth European PKI Workshop Theory and Practice (PKI 2007),
2830 June, 2007, Mallorca, Balearic Islands, Spain,
Lecture Notes in Computer Science 4582, SpringerVerlag, 2007,
pp. 110125.
 Man Ho Au, Willy Susilo, and Yi Mu,
``Practical Compact ECash,"
Information Security and Privacy, 12th Australasian Conference, ACISP 2007,
24 July 2007, Townsville, Queensland,
Australia, Lecture Notes in Computer Science 4586, SpringerVerlag, 2007, pp. 431445.
 Xinyi Huang, Yi Mu, Willy Susilo, Duncan Wong, Wei Wu,
``Certificateless Signature Revisited,"
Information Security and Privacy, 12th Australasian Conference, ACISP 2007,
24 July 2007, Townsville, Queensland,
Australia, Lecture Notes in Computer Science 4586, SpringerVerlag, 2007, pp. 308322.
 Xinyi Huang, Yi Mu, Willy Susilo and Wei Wu,
``Provably Secure Pairingbased Convertible Undeniable Signature with Short Signature Length,"
International Conference on Pairingbased Cryptography (Pairing 2007),
July 24, 2007, Tokyo, Japan, Lecture Notes in Computer Science, Springer Verlag,
(accepted)
 Fuchun Guo, Yi Mu, and Zhide Chen,
``IdentityBased Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key,"
International Conference on Pairingbased Cryptography (Pairing 2007),
July 24, 2007, Tokyo, Japan, Lecture Notes in Computer Science, Springer Verlag,
(accepted)
 Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu,
``Efficient Generic Online/Offline Signatures Without Key Exposure,"
5th International Conference on
Applied Cryptography and Network Security (ACNS'07), 58 June, 2007,
Zhuhai, China, LNCS 4521, Springer Verlag, pp. 1830.
 Huafei Zhu, Willy Susilo and Yi Mu.
``Multiparty standalone and setupfree verifiably committed signatures."
International Conference on Theory and Practice of PublicKey Cryptography 2007 (PKC'07),
Lecture Notes in Computer Science 4450, Springer Verlag, 2007, pp. 134149
 Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S.
Wong, and Guomin Yang, ``Malicious KGC Attacks in Certificateless Cryptography,"
2007 ACM Symposium on Information, Computer and Communications Security (ASIACCS'07)
Singapore, March 2022, 2007, ACM Press (accepted)
 Man Ho Au, Qianhong Wu, Willy Susilo and Yi Mu,
``Compact ECash from Bounded Accumulator,"
RSA Conference 2007, Cryptographers' Track (CTRSA 2007),
Lecture Notes in Computer Science, SpringerVerlag, 2007, pp. 178195.
 Yi Mu, Willy Susilo and Huafei Zhu,
``Compact Sequential Aggregate Signatures,"
The 22nd ACM Symposium on Applied Computing (Security Track), 1115 March 2007,
Seoul, Korea, ACM Press, 2007, pp.249253.

Qiong Ren, Yi Mu, and Willy Susilo, ``Mitigating Phishing by a New IDbased Chameleon Hash without Key Exposure,"
AusCERT 2007 R&D, 2025 May 2007, Gold Coast, Australia. (accepted)
 Qiong Ren, Yi Mu, and Willy Susilo,
``SEFAP: An Email System for AntiPhishing,"
The 6th IEEE International Conference on Computer and Information Science
(ICIS 2007), July 1113, 2007, Melbourne, Australia, IEEE Press. (accepted)
 Yong Li, Willy Susilo, Yi Mu, and Dingyi Pei,
``Designated Verifier Signature: Definition, Framework and New Constructions,"
The 4th International Conference on Ubiquitous Intelligence and Computing (UIC07),
Hong Kong, China, July 1113, 2007, Lecture Notes in Computer Science,
Springer Verlag (accepted)
 Shuo Zheng, Luke McAven, and Yi Mu, ``First price sealed bid eauction without auctioneers,"
International Wireless Communications and Mobile Computing Conference 2007 (IWCMC 2007),
August 1216, 2007, Honolulu, Hawaii,
USA, ACM. (accepted)
 Jianwei Chen, Li Xu, and Yi Mu,
``A New Group Rekeying Scheme based on tPacking
Designs for Ad Hoc Networks," The Second International Conference
on Scalable Information Systems (INFOSCALE 2007),
June 68, 2007, Suzhou, China, ACM Press, (accepted)
 Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin,
``Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection,"
The 4th International Conference on Autonomic and Trusted Computing (ATC07),
Hong Kong, China, July 1113, 2007, Lecture Notes in Computer Science,
Springer Verlag (accepted)
 Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang,
The 4th International Conference on Autonomic and Trusted Computing (ATC07),
``Identitybased Proxy Signature from Pairings,"
Hong Kong, China, July 1113, 2007, Lecture Notes in Computer Science,
Springer Verlag (accepted)
2006
 Xinyi Huang, Willy Susilo, Yi Mu and Wei Wu,
``Universal Designated Verifier Signature without Delegatability,"
Eighth International Conference on Information and Communications Security (ICICS '06),
December 47, 2006, Raleigh, North Carolina, USA,
Lecture Notes in Computer Science 4307, Springer Verlage, pp. 479  498.

Willy Susilo, Wei Wu, Yi Mu and Xinyi Huang.
On the ``NonDelegatability" Notion of Designated Verifier Signature Schemes,
The 5th International Workshop for Applied PKC (IWAP 2006),
Lecture Notes in Computer Science, SpringerVerlag, 2006 (accepted).
 Wei Wu, Xinyi Huang, Willy Susilo, Yi Mu and Jennifer Seberry.
``Proxy Signature Scheme: New Constructions based on Computational DiffieHellman Problem
and Their Stronger Security Notions,"
The 5th International Workshop for Applied PKC (IWAP 2006),
Lecture Notes in Computer Science, SpringerVerlag, 2006 (accepted)
 Xinyi Huang, Willy Susilo, Yi Mu and Wei Wu.
``Proxy Signature without Random Oracles,"
The Second International Conference on Mobile Ad Hoc and Sensor Networks (MSN 2006),
Lecture Notes in Computer Science 4325, SpringerVerlag, 2006, pp. 473  484.
 Lan Zhou, Willy Susilo and Yi Mu,
``Efficient IDbased Authenticated Group Key Agreement from Bilinear Pairings,"
The Second International Conference on Mobile Ad Hoc and Sensor Networks (MSN 2006),
Lecture Notes in Computer Science 4325, SpringerVerlag, 2006, pp. 521  532
 Tao Mai, Willy Susilo and Yi Mu, ``Novel Stream Authentication Scheme for Securing Voice over IP,"
The 5th Workshop on the Internet,
Telecommunications and Signal Processing (WITSP 2006), 2006 (accept).
 Fangguo zhang, Xiaofeng Chen, Willy Susilo and Yi Mu,
``A New Signature Scheme Without Random Oracles from Bilinear Pairings,"
VietCrypt 2006, Hanoi, Vietnam, LNCS 4341, Springer Verlag, pp. 6780.
 Qianhong Wu, Willy Susilo, Yi Mu and Fangguo Zhang,
``Ad Hoc Group Signatures,"
in Proc. of the First International Workshop on Security (IWSEC 2006),
Japan, Lecture Notes in Computer Science 4266,
SpringerVerlag, 2006, pp. 120  135.
 Man Ho Au, Willy Susilo, and Yi Mu,
``ConstantSize Dynamic kTAA," in Proc. of
Fifth Conference on Security and Cryptography for Networks (SCN 2006), Maiori, Italy,
LNCS 4116, Springer Verlag, 2006, pp. 111125.
 Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang,
"Restricted Universal Designated Verifier Signature,"
The 3rd International Conference on Ubiquitous Intelligence and Computing (UIC06),
Wuhan and Three Gorges, China, LNCS 4159, Springer Verlag, 2006, pp. 874  882.
 Fuchun Guo, Zhide Chen, and Yi Mu, ``Trust Negotiation with Trust Parameters,"
International Conference on Computational Intelligence and Security (CIS'06),
Guangzhou, China, IEEE Press, 2006 (accepted)
 Junqi Zhang, Vijay Varadharajan, and Yi Mu,
"IDbased Secure PIMSM Schemes,"
The IASTED International Conference on Communication Systems and Applications (CSA 2006),
Banff, Canada, 2006. pp190195
 Yun Chen, Weijian Chen, Yi Mu, Xin Chen, Min Liu,
``ServerAided Public Key Generation Protocols on Lowpower Devices for Adhoc Networks,"
the 6th International Conference on ITS Telecommunications (ITST2006),
June 2123, 2006 in Chengdu, China, IEEE Press, pp.710714
 Yun Chen, Xin Chen, and Yi Mu, ``A ParrallelKey Generation Algorithm for Efficient
DiffieHellman Key Agreement,"
International Conference on Computational Intelligence and Security (CIS'06),
Guangzhou, China, IEEE Press, 2006 (accepted)
 Qianhong Wu, Yi Mu, Willy Susilo, and Fangguo Zhang,
"Efficient Signcryption without Random Oracles,"
The 3rd International Conference on Autonomic and Trusted Computing (ATC 06),
Wuhan and Three Gorges, China, LNCS 4158, Springer Verlag, 2006, pp. 449  458.
 Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, and Yumin Wang,
"ZeroKnowledge Proof of Generalized Compact Knapsacks (or A Novel
Identification/Signature Scheme)," The 3rd International Conference on
Autonomic and Trusted Computing (ATC 06),
Wuhan and Three Gorges, China, LNCS 4158, Springer Verlag, 2006, pp. 531  540.
 Shidi Xu, Yi Mu and Willy Susilo,
"Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security,"
Information Security and Privacy, 11th Australasian Conference, ACISP 2006,
Lecture Notes in Computer Science, SpringerVerlag, 2006, pp. 99  110.

Yiqun Chen, Willy Susilo and Yi Mu,
"Identitybased Anonymous Designated Ring Signatures,"
International Wireless Communications and Mobile Computing Conference (IWCMC 2006),
Computer and Network Security Symposium, ACM, 2006, pp. 189  194.
 Willy Susilo and Yi Mu, "Separable Identitybased Deniable Authentication: Cryptographic Primitive
for Fighting Phishing," EuroPKI2006, Italy, LNCS 4043, Springer, 2006. pp. 6880
 Junqi Zhang. Vijay Varadharajan, and Yi Mu,
"A Scalable Multiservice Group Key Management Scheme,"
International Conference on Internet and Web Applications and
Services/Advanced International Conference on
Telecommunications, AICTICIW '06, IEEE, 2006, pp172178
 Qianhong Wu, Willy Susilo, Yi Mu and Fangguo Zhang,
"Efficient Partially Blind Signatures with Provable Security,"
Applied Cryptography and Information Security 06 (ACIS06),
Lecture Notes in Computer Science 3982, SpringerVerlag, Berlin, 2006, pp345354
 Qianhong Wu, Yi Mu,
Willy Susilo and Fangguo Zhang, "Privately Retrieve Data From Large Databases,"
The 2nd Information Security Practice and Experience Conference (ISPEC 2006),
Lecture Notes
in Computer Science 3903, Springer Verlag, Berlin, 2006, pp. 367  378.
 Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang,
"Short (Identitybased) Strong Designated Verifier Signature Schemes,"
The 2nd Information Security Practice and Experience Conference (ISPEC 2006),
Lecture Notes in Computer Science 3903, Springer Verlag, pp. 214  225.
 Lan Zhou, Willy Susilo, and Yi Mu,
"Threemove Secret Handshakes,"
The 2nd Information Security Practice and Experience Conference (ISPEC 2006),
Lecture Notes in Computer Science 3903, Springer Verlag, pp332342, 2006
 Xinyi Huang, Willy Susilo, Yi Mu and Futai Zhang, "Certificateless
Designated Verifier Signature Schemes," The Second International
Workshop on Security in Networks and Distributed Systems (SNDS 2006),
IEEE Computer, 2006, pp. 15  19, Vol. 2.
 Xiaofeng Chen, Fangguo Zhang, Yi Mu and Willy Susilo,
"Efficient Provably Secure Restrictive Partially Blind
Signatures from Bilinear Pairings. Financial Cryptography
and Data Security (FC'06), Lecture Notes in Computer Science, Springer Verlag, 2006,
pp. 251  265.

Ching Yu Ng, Willy Susilo, and Yi Mu, "Designated Group Credentials,"
ACM Symposium on Information, Computer and Communications Security (AISACCS'06),
Taipei, Taiwan, 2006, ACM Press, pp. 59  65.
 Jing Wu, Jennifer Seberry, and Yi Mu,
``Temporal XML Delegable Authorizations,"
in the proceedings of the WSEAS MultiConference
in Bucharest, Romania, October 1618, 2006
 Xiaofeng Chen, Fangguo Zhang, and Yi Mu,
"IdentityBased Universal Designated Verifier Signature Proof,"
Chinacrypt 2006, Science Press.
 Fuchun Guo, Zhide Chen, Yi Mu, Li Xu, and Shengyuan Zhang, ``Trust and Efficient Negotiation,"
International Conference on Computational Intelligence and Security (CIS'06),
Guangzhou, China, Lecture Notes in Artifiture Intellegent, Springer Verlag, 2007. (accepted)
 Jing Wu, Yi Mu, and Jennifer Seberry,
``Temporal Authorizations Scheme for XML Document",
Proceeding of Data Networks, Communications and Computer(DNCOCO'06), Oct,2006, Bucharest, Nomania
 Shuo Zheng, Luke McAven, and Yi Mu,
``First price sealed bid auction without auctioneers,"
the Fourth International Conference in IT and Application (ICITA 2007),
January 1518, 2007, Harbin, China. IEEE
2005
 Junqi Zhang, Vijay Varadharajan, and Yi Mu,
"An IDbased Access Control Scheme for MOSPF,"
the First International Workshop on Network Architecture and Service Models (NASM'2005),
IEEE. pp2530.
 Qianhong Wu, Fangguo Zhang, Willy Susilo, and Yi Mu, "An Efficient Static Blind Ring Signature
Scheme," The 8th International Conference on Information
Security and Cryptology (ICISC 2005), Lecture Notes in Computer Science,
Springer Verlag, 2005 (pp394406, preproceedings)
 Willy Susilo, Yi Mu and Xinyi Huang,
"Secure Key Extraction in Computer Networks,"
The 8th International Symposium on DSP and Communication Systems
& 4th Workshop on the Internet, Telecommunications and Signal
Processing, (DSPCS'2005 & WITSP'2005), 2005 (accepted)
 Yi Mu, Fangguo Zhang, and Willy Susilo,
"Secure and Anonymous Mobile AdHoc Networks,
IEEE International Conference on Networks
(ICON 2005), IEEE (accepted)

Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang, "On The Security of
Certificateless Signature Schemes from Asiacrypt 2003,"
The 4th International Conference on Cryptology and Network Security (CANS05),
Lecture Notes in Computer Science 3810, Springer Verlag, pp1325, 2005.
 Shidi Xu, Yi Mu, and Willy Susilo,
``Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks,"
The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq`05),
Nagasaki, Japan, Lecture Notes in Computer Science 3823, Springer Verlag,
pp854863, 2005.
 Fangguo Zhang, Willy Susilo, Yi Mu, and Xiaofeng Chen,
``Identitybased Universal Designated Verifier Signatures,"
The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq`05),
Nagasaki, Japan, Lecture Notes in Computer Science 3823, Springer Verlag,
pp825834, 2005.
 Xinyi Huang, Yi Mu, Willy Susilo, and Futai Zhang,
``Short Designated Verifier Proxy Signature from Pairings,"
The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq`05),
Nagasaki, Japan, Lecture Notes in Computer Science, Springer Verlag 3823,
pp835844, 2005.
 Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang and Xiaofeng Chen,
"A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World,"
Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW2005),
Lecture Notes in Computer Science 3823, SpringerVerlags, pp480489, 2005.
 Shidi Xu, Yi Mu and Willy Susilo, "Secure AODV Routing Protocol Using OneTime Signature,"
International Conference on Mobile Adhoc and Sensor Networks (MSN 2005), Lecture Notes in
Computer Science, SpringerVerlag, pp288297, 2005.
 Jing Wu, Yi Mu, Jennifer Seberry, and Chun Ruan, "Access Policy Sheet for Access Control in FineGrained XML,"
The First IFIP Workshop on
Trusted and Autonomic Ubiquitous and Embedded Systems (TAUES 2005), Lecture Notes in Computer Scince 3813,
Springer Verlag, pp12731282, 2005.
 Yi Mu, Willy Susilo, and Xinyi Huang,
"Efficient Broadcast from Trapdoor Functions,"
in Proceedings of the 4th International Workshop for Applied PKI (IWAP'05),
IOS Press, pp240248, 2005
 Yi Gao, Yi Mu and Willy Susilo.
"Preventing DoS Attacks with A New Client Puzzle Scheme,"
The AUUG'2005 Annual Conference, pp. 316, 2005.
 Jian Wen, Yi Mu and Willy Susilo.
"SQL Structure Rebuilder: Preventing SQL Injection Attacks,"
The AUUG'2005 Annual Conference, pp. 225234, 2005.
 Willy Susilo and Yi Mu, "On The Security of Nominative Signatures,"
in Proceedings of ACISP 2005, Lecture Note in Computer Science, Springer Verlag, 2005.
pp. 329335
 Jing Wu, Jennifer Seberry, Yi Mu, Chun Ruan,
"Delegatable Access Control for FineGrained XML," in Proceedings of
the International Workshop on Security in Networks and
Distributed Systems (SNDS 2005), Japan, IEEE Press, 2005, pp. 270274
 Ching Yu Ng, Willy Susilo, Yi Mu,
"Universal Designated Multi Verifier Signature Schemes,"
in Proceedings of
the International Workshop on Security in Networks and
Distributed Systems (SNDS 2005), Japan, IEEE Press,
pp. 305309, 2005.
 Junqi Zhang, Vijay Varadharajan, and Yi Mu,
"A Secure Multicast Architecture and Protocol for MOSPF," in Proc. of
the IASTED International Conference on Networks and Communication Systems (NCS 2005),
pp120125, 2005.
 Willy Susilo and Yi Mu, "Tripartite Concurrent Signatures,"
in Proc. of the 20th IFIP International Information
Security Conference (IFIP/SEC 2005), Chiba, JAPAN, pp. 425441
 Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang,
"Identitybased Ring Signcryption Schemes: Cryptographic Primitives for
Preserving Privacy and Authenticity in the Ubiquitous World,"
in Proc. of The First International Workshop on Ubiquitous Smart Worlds (USW2005),
in conjunction with the 19th IEEE International Conference of AINA2005,
IEEE Computer Society, 2005, pp649654
 Willy Susilo, Fangguo Zhang, and Yi Mu,
"PrivacyEnhanced Internet Storage,"
in Proceedings of The 19th International Conference on
Advanced Information Networking and Applications (AINA 2005), IEEE Computer Society,
2005, pp603608
 Fangguo Zhang, Yi Mu, and Willy Susilo,
"Reducing Security Overhead for Mobile Networks,"
in Proceedings of The 19th International Conference on
Advanced Information Networking and Applications (AINA 2005), IEEE Computer Society,
pp398403, 2005
 Fangguo Zhang, Willy Susilo, and Yi Mu,
"Identitybased Partial Message Recovery Signatures (or How to Shorten IDbased Signatures),"
Financial Cryptography and Data Security (FC'05), Lecture Notes in Computer Science,
Springer Verlag, pp4759, 2005.
2004
 Ching Yu Ng, Yi Mu and Willy Susilo, "A Secure Identitybased Mobile AdHoc Scheme,"
in Proceedings of the 3rd Workshop on the Internet,
Telecommunications and Signal Processing
WITSP'2004, pp112118
 Yi Mu, Willy Susilo, YanXia Lin, and Chun Ruan,
"IdentityBased Authenticated Broadcast Encryption and Distributed Authenticated Encryption,"
in Proc. of
Ninth Asian Computing Science Conference (ASIAN 2004),
Lecture Notes in Computer Science 3321, Springer Verlag, 2004, pp 169181
 Yi Mu, Fangguo Zhang, and Willy Susilo,
"Partial Proxy Signatures,"
in Proc. of Ninth Asian Computing Science Conference (ASIAN 2004),
Lecture Notes in Computer Science 3321, Springer Verlag, 2004, pp 182194
 Junqi Zhang, Vijay Varadharajan, and Yi Mu, "A secure pimsm multicast routing protocol,"
in proc. of the 6th International Workshop on Distributed Computing (IWDC 2004),
Lecture Notes in Computer Science, Springer Verlag, 2004, pp276288
 Weiliang Zhao, Vijay Varadharajan, Yi Mu, ``Fair Trading Protocol
with Offline Anonymous Credit Card Payment,"
Proceeding of WOSIS (Workshop in Security in Information Systems), International
Conference on Enterprise Information Systems (ICEIS2004), April 2004.
 Willy Susilo and Yi Mu,
"Authentication System for Supporting Mobile Multimedia Technologies,"
The Second International
Conference on Advances in Mobile Multimedia (MoMM2004), books@ocg.at book series,
pp393397
 Yi Mu, Fangguo Zhang, and Willy Susilo,
"Privacy Preserved Electronic Commerce in Wireless Mobile Networks,"
The Second International
Conference on Advances in Mobile Multimedia (MoMM2004), books@ocg.at book series,
pp403412
 Willy Susilo, Yi Mu, and Fangguo Zhang,
"Perfect Concurrent Signature Schemes," ICICS 2004, Lecture Notes in Computer Science,
Springer Verlag, 2004, pp1426
 Yi Mu and Willy Susilo, "IdentityBased Instantaneous Broadcast System in
Mobile AdHoc Networks," the 2004 International Workshop on Mobile Systems,
Ecommerce and Agent Technology, USA, 2004, pp3540.
 Jing Wu, Jennifer Seberry and Yi Mu, "Security Markup for Semantic Web,"
15th Australasian Workshop on Combinatorial Algorithms (AWOCA 2004),
New South Wales, Australia, 2004, pp206212.
 Ching Lin, Vijay Varadharajan, Yan Wang, and Yi Mu,
"On Design of a New Trusted Model for Mobile Agent Security",
15th International Conference on
Database and Expert Systems Applications (DEXA 2004), Lecture Notes in Computer Science 3148,
Springer Verlag, 2004, pp6069.
 Willy Susilo, Fangguo Zhang, and Yi Mu,
"Identitybased Strong Designated Verifier Signature Schemes",
in Proceedings of ACISP 2004, Lecture Notes in Computer Science 3108,
Springer Verlag, pp313324
 Willy Susilo and Yi Mu, "Deniable Ring Authentication Revisited,"
in Proceedings of Applied Cryptography and Network Security (ACNS'04),
Lecture Notes in Computer Science 3089, Springer Verlag, 2004, pp. 205219
 Junqi Zhang, Vijay Varadharajan, and Yi Mu,
"Securing XML Document Sources and their Distribution,"
in Proceedings of The 18th International Conference on
Advanced Information Networking and Applications (AINA 2004), Japan, IEEE Press,
pp. 562567.
 Willy Susilo and Yi Mu, "A model of secure dynamic adhoc mobile networks," in Proceedings
of Chinacrypt 2004, Science Press, Beijing, pp. 416425.
2003
 Willy Susilo and Yi Mu, "NonInteractive Deniable Ring Authentication,"
In Proceedings of ICISC 2003, Lecture Notes in Computer Science 2971, Springer
Verlag, pp. 386401, 2003
 Yi Mu, Willy Susilo, and YanXia Lin, ``Identitybased broadcasting,"
in Proceedings of Indocrypt 2003, Lecture Notes in Computer Science
2904, Springer Verlag,
pp. 177190,
2003.
 Yi Mu and Willy Susilo, "Anonymous DigitalCopyrighted Content Distribution,"
The 7th International Symposium On DSP and Communication Systems
and 2nd Workshop on The Internet and Telecommunications and Signal
Processing (DSPCS'03 & WITSP'03), pp. 3237, 2003.
 Willy Susilo and Yi Mu,
"RSAbased FailStop Signature Schemes Revisited,"
in proc. of
International Workshop on Cryptology and Network Security (CANS03), Miami,
2003, pp. 657662.
 Junqi Zhang, Vijay Varadharajan and Yi Mu,
"A Novel Dynamic Key Management Scheme for Secure Multicasting,"
in Proc. of ICON 2003, pp. 391395.
 Willy Susilo and Yi Mu, "On FailStop Verifiable Secret Sharing Schemes,"
in Proceedings of International Conference on Security and Management (SAM'03), USA, 2003. pp. 663667.
 Wieliang Zhao, Vijay Varadharajan and Yi Mu,
``A Secure Mental Poker Protocol over the Internet,"
in Proceedings of the Australasian Information
Security Workshop (AISW 2003), pp. 105109.
2002
 Yi Mu and Vijay Varadharajan,
``An Efficient Internet Credit Card Scheme from the Weil Pairing,"
in Proceedings of International Symposium of Electronic Commerce (ISEC 2002),
USA, IEEE Press, pp. 5863.
 Junqi Zhang, Vijay Varadharajan, and Yi Mu,
``A Secure Object Sharing Scheme for Java Card,"
ICICS 2002, Lecture Notes in Computer Science 2513,
Springer Verlag, 2002. pp. 243251
 Yi Mu, Junqi Zhang, Vijay Varadharajan, "m out of n oblivious transfer,"
ACISP 2002, Lecture Notes in Computer Science 2384, Springer Verlag, 2002. pp. 395405
 Yi Mu and Vijay Varadharajan,
``A complete group cryptographic system,"
in Proceedings of Cryptology and Network Security 2002, USA. pp. 272277.
2001
 Yi Mu and Vijay Varadharajan, "Robust and secure broadcasting,"
in Proceedings of INDOCRYPT2001, Lecture Notes in Computer Science 2247, Springer Verlag, 2001, pp. 223231.
 Yi Mu and Vijay Varadharajan,
"A failstop verifiable secret sharing scheme,"
in Proceedings of Cryptology and Network Security, Taiwan,
2001, pp. 146153.
 Pradeep Ray, Bejoy Cherian, Yi Mu and Bill Vargas,
``Interoperability of Medical Information Systems
Using Java/CORBA and HL7," in Proceedings of International
Health Informatics Conference (HIC2001), Canberra, Australia, July 2001.
 Yi Mu, Khanh Quoc Nguyen and Vijay Varadharajan, ``A fair
electronic cash scheme," in Proceedings of the Second
International Symposium on Electronic Commerce, in Lecture Notes
Computer Science 2040, pp. 2032, Springer Verlag, 2001.
2000
 Yi Mu and Vijay Varadharajan, ``An Internet Anonymous Auction Scheme,"
in Lecture Notes in Computer Science 2015, Springer Verlag, ICISC 2000,
pp. 171182
 Yi Mu and Vijay Varadharajan, ``Distributed Signcryption,"
in Lecture Notes in Computer Science 1977 (Proceedings of
INDOCRYPT 2000), Springer Verlag, 2000, pp. 155164
 Weiliang Zhao, Vijay Varadharajan, and Yi Mu, ``Fair Online
Gambling," in Proceedings of Annual Computer Security
Applications Conference, IEEE Computer Society, ACSAC 2000, pp. 394400.
 Yi Mu and Vijay Varadharajan, "Failstop Confirmer Signatures,"
In Proceedings of 5th Australasian Conference on
Information Security and Privacy (ACISP 2000), Lecture Notes in Computer Science 1841,
Springer Verlag, pp. 368377, 2000
 Yi Mu and Vijay Varadharajan, "Schematic Protection Model Supporting
Access Control Policies," in Proceedings of the 11th Australasian Database Conference
(ADC2000), IEEE Press, 2000.
1999
 Yi Mu, Vijay Varadharajan and K. Q. Nguyen, "Delegated Decryption,"
in Lecture Notes in Computer Science 1746 (Proceedings of Cryptography and
Coding, UK), Springer Verlag, 1999, pp. 258269.
 Khanh Quoc Nguyen, Feng Bao, Yi Mu, and Vijay Varadharajan,
"Zeroknowledge proofs of possession of digital signatures and its
applications," in Lecture Notes in Computer Science, 1726 (Proceedings of
ICICS'99), Springer Verlag, 1999.
 Khanh Quoc Nguyen, Yi Mu, and Vijay Varadharajan,
"Undeniable confirmer signature," in Lecture Notes in Computer
Science 1729 (Proceedings of ISW'99), Springer Verlag, pp. 235246, 1999.
 Khanh Nguyen, Vijay Varadharajan and Yi Mu,
"Batching Proofs of Knowledge and its applications,"
10th International Workshop on Databases and Expert Systems
Applications, IEEE Press, ISBN 0769502814, pp. 844849, 1999.
 Khanh Quoc Nguyen, Yi Mu, and Vijay Varadharajan,
"Divertible ZeroKnowledge Proof of Polynomial Relations and
Blind Group Signature,"
in Proc. of ACISP'99. Lecture Notes in Computer Science, Springer Verlag, pp. 117128, 1999.
1998
 Vijay Varadharajan, Nikhir Kumar, and Yi Mu, "An
approach to designing security model for mobile
agent based systems," in the Proceedings of
GLOBECOM'98, Sydney, 1998.
 Yi Mu and Vijay Varadharajan, "A new scheme of credit based payment for
electronic commerce,"
in the Proceedings of 23rd Local Area Networks Conference,
IEEE Computer Society, October, Boston, pp. 278284, 1998.
 Yi Mu and Vijay Varadharajan, "Anonymous Secure EVoting over a Network,"
in The Proceedings of Annual Computer Security Applications Conference,
IEEE Computer Society, ACSAC'98, pp. 293299, 1998.
 Vijay Varadharajan, Nikhir Kumar, and Yi Mu,
"Security Agent Based Distributed Authorization: An Approach,"
in the Proceedings of the 21st National Information Systems Security
Conference (NISSC'98), Oct. USA, pp. 315328 1998.
 Yi Mu and Vijay Varadharajan "Anonymous Internet Credit Cards,"
in the Proceedings of the 21st National Information Systems Security
Conference (NISSC'98), Oct. USA, pp. 229237, 1998.
 Vijay Varadharajan, Yi Mu and M. Hitchens "Design choice for public
key Kerberos authentication system," in Proceedings of ACSC'98,
Springer Verlag, 1998.
1997
 Vijay Varadharajan and Yi Mu, "Preserving privacy in mobile
communications: A hybrid method," in Proceedings of 1997
IEEE International Conference on Personal Wireless
Communications (ICPWC'97), India, 1997.
 Khanh Quoc Nguyen, Yi Mu, and Vijay Varadharajan,
``MicroDigital Money for Electronic Commerce,''
In Proceedings of Annual Computer Security Applications conference,
IEEE Computer Society, Dec 812, 1997, San Diego California, pp. 28
 Khanh Quoc Nguyen, Vijay Varadharajan, and Yi Mu,
``Secure and efficient digital coins,''
In Proceedings of Annual Computer Security Applications conf,
by IEEE Computer Society, Dec 812, 1997, San Diego California, pp. 915.
 Khanh Quoc Nguyen, Yi Mu, and Vijay Varadharajan,
``Digital coins based on hash chain,''
Proceedings of the 20th National Information Systems Security Conference,
Baltimore, USA, pp. 7279, 1997.
 Khanh Quoc Nguyen, Yi Mu, and Vijay Varadharajan,
"A new digital cash scheme based on blind
NybergRueppel digital signature,"
in Proceedings of the Information Security Workshop, Japan,
Lecture Notes in Computer Science 1396, pp. 313320, 1997
 Khanh Quoc Nguyen, Vijay Varadharajan, and Yi Mu,
"An New Efficient OffLine Anonymous Cash Scheme," in Proceedings of
the Eighth Annual International Symposium on Algorithms and
Computation, Singapore, December 1719,
Lecture Notes in Computer Science 1350, Springer Verlag,
pp. 193201, 1997
 Khanh Quoc Nguyen, Yi Mu, and Vijay Varadharajan,
"OneResponse OffLine Digital Coins,"
in Proceedings of Fourth Annual Workshop on Selected Areas
in Cryptography (SAC'97), Ottawa, August, 1997, pp. 244251.
 Yi Mu, Vijay Varadharajan, and Yan Xia Lin
"New Micropayment
Schemes Based on PayWords," in Proceedings of
2nd Australasian Conference on Information Security and Privacy (ACISP '97),
Lecture Notes in Computer Science 1270, pp. 283293, Springer Verlag, 1997.
 Vijay Varadharajan and Yi Mu, "Logic Based Analysis of Secure Electronic
Payment Protocols," in Proceedings of the Australian Computer Society
Conference, Sydney, pp. 112121 (1997)
1996
 Vijay Varadharajan and Yi Mu, "Design of
Security Protocols for Mobile Systems: Symmetric Key Approach,"
in Proceedings of International Conference on Wireless
Communication, Alberta, Canada, pp. 561568 (1996)
 Yi Mu and Vijay Varadharajan, "On the
design of security protocols for mobile communications," in Proceedings
of ACISP 1996, Lecture Notes in Computer Science 1172, SpringerVerlag,
pp. 134145.
 Yi Mu and Yuliang Zheng, "An alternative
model of quantum key agreement via photon coupling," in Proceedings
of ACISP 1996, Lecture Notes in Computer Science 1172, SpringerVerlag,
pp. 320331.
 Vijay Varadharajan and Yi Mu, "Issues in Securing Electronic Commerce
over Internet," in Proceedings of AUUG & Aisa Pacific World Wide
Web Conference, Australia, pp. 369381, 1996.
 Vijay Varadharajan and Yi Mu, "On the
Design of Secure Electronic Payment Protocols for the Internet,"
in Proceedings of the IEEE Annual Computer Security Applications Conference,
USA, 1996.
 Yi Gao, Willy Susilo, Yi Mu, and Jennifer Seberry,
"Efficient Trapdoor Based Client Puzzle Against DoS Attacks,"
Network Security, S. Huang, D. MacCallum and DZ. Du (eds.), pp. 229250, Springer, 2010
 Xinyi Huang, Willy Susilo, Yi Mu and Wei Wu. Delegating Authentication Power
in Mobile Networks. Security and Privacy in Wireless and Mobile
Computing,
S. Gritzalis, T. Karygiannis and C. Skianis (eds), Troubador
Publishing, June 2008.
 Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen, and Fangguo Zhang,
``Efficient Authentication Schemes for AODV and DSR,"
Book Chapter in Security in Distributed and Networking Systems,
World Scientific Publishing, 2007
 Willy Susilo, Fangguo Zhang and Yi Mu, "Separable Threshold Decryption
for AdHoc Wireless Networks,"
Advances in Ad Hoc Wireless Networks, DZ. Du and G. Xue (eds.),
SpringerVerlag, Berlin, 2006 (accepted).
 Yi Mu, Vijay Varadharajan, and Khanh Quoc Nguyen, "Digital Cash,"
in Advances in Payment Technology for ECommerce,
Springer Verlag, 2003, pp. 171194.
 Vijay Varadharajan and Yi Mu,"Design of Secure EndtoEnd Protocols
for Mobile Systems," in Mobile Communications, Ed. Jose L. Encarnacao
and Kan M. Rabaey (Chapman & Hall, 1996), pp. 258266.
 Craig Savage, and Yi Mu, ``Injection locked
lasers as amplifiers", in ``Quantum
Communications and Measurement,'' ed. V.P. Belavkin et al. (Plenum, 1995)
pp. 503509.
back to top
