HOME   PUBLICATIONS   TEACHING   MY STUDENTS   SERVICE   GRANTS    SCHOOL   UOW    CRYPTO LINK    CFP

 

Google Scholar

DBLP

  

Publications

|Journal Papers | Conference Papers | Book Chapters |

      Edited Book Series:

  1. Willy Susilo and Yi Mu (Eds), "Information Security and Privacy," Proceedings of the 19th Australasia Conference on Information Security and Privacy (ACISP 2014), Lecture Notes in Computer Science, 8544, Springer Verlag, 2014.

  2. Li Xu, Elisa Bertino and Yi Mu (Eds.): Network and System Security - 6th International Conference on Network and System Security (NSS 2012), Wuyishan, Fujian, China, November 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7645, Springer Verlag, 2012

  3. Willy Susilo, Yi Mu and Jennifer Seberry (Eds), "Information Security and Privacy," Proceedings of the 17th Australasian Conference on Information Security and Privacy (ACISP 2012), Lecture Notes in Computer Science 7372 , Springer Verlag, 2012.

  4. Yi Mu, Willy Susilo, and Jennifer Seberry (Eds), "Information Security and Privacy," Proceedings of the 13th Australasian Conference on Information Security and Privacy (ACISP 2008), Lecture Notes in Computer Science, 5107, Springer Verlag, 2008.

  5. Liqun Chen, Yi Mu, Willy Susilo, Information Security Practice and Experience (ISPEC 2008), Lecture Notes in Computer Science 4991, Springer Verlag, 2008

  6. Willy Susilo, Joseph Lui, and Yi Mu (Eds), Provable Security (Provsec 2007), Lecture Notes in Computer Science 4784, Springer Verlag, 2007.

  7. David Pointcheval, Yi Mu, and Kefei Chen (Eds), Cryptology and Network Security (CANS 2006), Lecture Notes in Computer Science 4301, Springer Verlag, 2006.

  8. Xiao Zhou, Oleg Sokolsky, Lu Yan, Eun-Sun Jung, Sili Shao, Yi Mu, Dong-Chun Lee, Daeyound Kim, and Yound-Sik Jeong (Eds), The 2006 IFIP International Conference on Embedded And Ubiquitous Computing (EUC 2006), Lecture Notes in Computer Science 4097, Springer Verlag, 2006

  9. Yvo G. Desmedt, Huaxiong Wang, Yi Mu, and Yongqing Li (Eds), Cryptology and Network Security (CANS 2005), Lecture Notes in Computer Science 3810, Springer Verlag, 2005.

  10. Vijay Varadharajan and Yi Mu (Eds), "Information Security and Privacy," Proceedings of the 6th Australasian Conference on Information Security and Privacy (ACISP 2001), Lecture Notes in Computer Science, 2119, Springer Verlag, 2001.

  11. Vijay Varadharajan and Yi Mu (Eds), "Information and Communication Security," Proceedings of International Conference on Information and Communication Security (ICICS 1999), Lecture Notes in Computer Science, 1726, Springer Verlag, 1999.

  12. Vijay Varadharajan, Josef Pieprzyk and Yi Mu (Eds), "Information Security and Privacy," Proceedings of the 2nd Australasian Conference on Information Security and Privacy (ACISP 1997), Lecture Notes in Computer Science 1270, Springer Verlag, 1997.

    Refereed Journal Papers:                                      back to top


    2017
  1. Pairat Thorncharoensri, Willy Susilo and Yi Mu, ``Policy-controlled signatures and their applications," Computer Standards & Interfances, vol 50, pp. 25-41, 2017

  2. Leyou Zhang, Jingxia Zhang, Yi Mu: Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System. Comput. J. 60(4): 541-554 (2017)

  3. Xiaofen Wang, Yi Mu, Rongmao Chen: Privacy-preserving data search and sharing protocol for social networks through wireless applications. Concurrency and Computation: Practice and Experience 29(7) (2017)

  4. Hongyu Liu, Yi Mu, Jining Zhao, Chunxiang Xu, Huaqun Wang, Leiting Chen, Yong Yu: Identity-based provable data possession revisited: Security analysis and generic construction. Computer Standards & Interfaces 54: 10-19 (2017)

  5. Jiannan Wei, Guomin Yang, Yi Mu: A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange. Int. J. Comput. Math. 94(5): 946-961 (2017)

  6. Jianchang Lai, Yi Mu, Fuchun Guo: Efficient identity-based online/offline encryption and signcryption with short ciphertext. Int. J. Inf. Sec. 16(3): 299-311 (2017)

  7. Peng Jiang, Yi Mu, Fuchun Guo, Qiao-Yan Wen: Private Keyword-Search for Database Systems Against Insider Attacks. J. Comput. Sci. Technol. 32(3): 599-617 (2017)

  8. Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang: Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query. Quantum Information Processing 16(1): 8 (2017)

  9. Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan: Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. IEEE Trans. Dependable Sec. Comput. 14(2): 211-220 (2017)

  10. Weiwei Liu, Yi Mu, Guomin Yang, Yong Yu: Efficient E-coupon systems with strong user privacy. Telecommunication Systems 64(4): 695-708 (2017)

  11. Yuan Zhang, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, Xiaojun Zhang: Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation. IEEE Trans. Information Forensics and Security 12(3): 676-688 (2017)

  12. Ching-Fang Hsu, Lein Harn, Yi Mu, Maoyuan Zhang, Xuan Zhu: Computation-efficient key establishment in wireless group communications. Wireless Networks 23(1): 289-297 (2017)

  13. Yangguang Tian, Guomin Yang, Yi Mu: Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting. Wireless Personal Communications 94(3): 1017-1034 (2017)
    2016
  14. Peng Jiang, Yi Mu, Fuchun Guo, and Xiaofen Wang, ``Online/offline Ciphertext Retrieval on Resource Constrained Devices," The Computer Journal, Oxford, 59(7), pp. 955-969, 2016

  15. Peng Jiang, Yi Mu, Fuchun Guo and Qiaoyan Wen, `` Secure-Channel Free Keyword Search with Authorization in Manager-centric Databases," Computers & Security, http://dx.doi.org/10.1016/j.cose.2016.11.015

  16. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo and Xinyi Huang, ``Strong Authenticated Key Exchange with Auxiliary Inputs" Designs, Codes and Cryptography (accepted, 22 Oct. 2016)

  17. Rongmao Chen, Yi Mu, Guomin Yang, Xinyi Huang and Xiaofen Wang, ``Server-Aided Public Key Encryption with Keyword Search," IEEE Transactions on Information Forensics and Security, 11(12), pp. 2833-1842, 2016

  18. Xiaofen Wang, Yi Mu and Rongmao Chen, `` One-Round Privacy Preserving Meeting Location Determination for Smartphone Applications," IEEE Transactions on Information Forensics and Security, 11(8), pp. 1712-1721, 2016

  19. Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang, ``Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage," IEEE Transactions on Information Forensics and Security 11(4): 789-798 (2016)

  20. Run-hua Shi, Yi Mu, Hong Zhong, Jie Cui, and Shun Zhang, ``Secure Multiparty Quantum Computation for Summation and Multiplication," Scientific Reports, Nature Publishing Group, doi:10.1038/srep19655 (accepted, 8 December 2015)

  21. Jiannan Wei, Guomin Yang and Yi Mu, ``A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange," International Journal of Computer Mathematics, 2016 (http://dx.doi.org/10.1080/00207160.2016.1154951)

  22. Yangguang Tian, Guomin Yang and Yi Mu, ``Privacy-preserving grouping proof with key exchange in the multiple-party setting," Security and Communication Networks, 9(16), pp.3239-3250, 2016

  23. Weiwei Liu, Yi Mu, Guomin Yang and Yong Yu, ``Efficient E-coupon systems with strong user privacy," Telecommunication Systems, 2016, (DOI: 10.1007/s11235-016-0201-3)

  24. Hui Cui, Yi Mu, and Man Ho Au, ``Relations between robustness and RKA security under public-key encryption," Theoretical Computer Science, 628: 78-91 (2016)

  25. Fuchun Guo, Willy Susilo and Yi Mu, ``Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption," IEEE Transactions on Information Forensics and Security, 11(2), 247-257, 2016.

  26. Willy Susilo, Fuchun Guo and Yi Mu, ``Efficient Dynamic Threshold Identity-based Encryption with Constant-size Ciphertext," Theoretical Computer Science, Vol. 609, pp.49-59, 2016.

  27. Jiannan Wei, Guomin Yang, and Yi Mu, ``Anonymous Proxy Signature with Hierarchical Traceability," The Computer Journal, Oxford, 59(4), pp559-569, 2016

  28. Yong Yu, Jianbing Ni, Yi Mu, Guomin Yang, and Willy Susilo, ``Comments on Public Integrity Auditing for Dynamic Data Sharing with Multi-user Modification," IEEE Transactions on Information Forensics and Security, 11(3): 658-659 (2016)

  29. Mingwu Zhang, Yi Mu, Jian Shen and Xinyi Huang, ``Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity," Security and Communication Networks, DOI: 10.1002/sec.1435

  30. Fatemeh Rezaeibagha and Yi Mu, `` Distributed Clinical Data Sharing Via Dynamic Access-Control Policy Transformation," International Journal of Medical Informatics, Vol. 89, pp.25-31, 2016

  31. Fatemeh Rezaeibagha, Yi Mu, Willy Susilo and Khin Than Win, ``Multi-Authority Security Framework for Scalable EHR Systems," International Journal of Medical Engineering and Informatics, 8(4), pp.390-408, 2016

  32. Jianchang Lai, Yi Mu and Fuchun Guo, ``Efficient Identity-Based Online/Offline Encryption and Signcryption with Short Ciphertext," International Journal of Information Security, 2016 (DOI: 10.1007/s10207-016-0320-6)

  33. Leyou Zhang, Zhuanning Wang, Yi Mu and Yupu Hu, ``Fully Secure Hierarchical Inner Product Encryption for Privacy Preserving Keyword Searching in Cloud," International Journal of High Performance Computing and Networking,

  34. Leyou Zhang, Yi Mu, Qing Wu: Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys. The Computer Journal, 59(4), pp.452-461,2016

  35. Xiaofen Wang, Yi Mu and Guozheng Xiao, ``Secure Channel Free ID-Based Searchable Encryption for a Peer-to-Peer Group," Journal of Computer Science and Technology, 31(5), pp.1012-1027, 2016

  36. Run-hua Shi, Yi Mu, Hong Zhong, Jie Cui, and Shun Zhang, ``An efficient quantum scheme for Private Set Intersection," Quantum Information Processing, 15(1), pp.363-371, 2016

  37. Leyou Zhang and Yi Mu, ``Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys," The Computer Journal, Orford, 59(4), pp.452-461, 2016

  38. Mingwu Zhang, Yi Mu, ``Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations," Computer Journal, 59(4), pp.493-507 (2016)

  39. Jiannan Wei, Guomin Yang, and Yi Mu, ``Comments on ''Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks," IEEE Transactions on Wireless Communications, 15(4), pp.3097-3099, 2016


    2015
  40. Run-hua Shi, Yi Mu, Hong Zhong, Jie Cui, and Shun Zhang, ``Two Quantum Protocols for Oblivious Set-member Decision Problem," Scientific Reports, Nature Publishing Group, DOI: 10.1038/srep15914

  41. Run-hua Shi, Yi Mu, Hong Zhong, Shun Zhang, ``Quantum Oblivious Set-member Decision Protocol," Physical Review A 08/2015, 92(2). DOI:10.1103/PhysRevA.92.022309

  42. Rongmao Chen, Yi Mu, Guomin Yang and Fuchun Guo, ``BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication,'' IEEE Transactions on Information Forensics & Security, 10(12), pp.2643-2652, 2015.

  43. Jinguang Han, Willy Susilo, Yi Mu, Man Ho Au and Jie Cao, ``AAC-OT: Accountable Oblivious Transfer with Access Control," IEEE Transactions on Information Forensics & Security, 10(12), pp.2502-2514, 2015.

  44. Mingwu Zhang, Yudi Zhang, Yixin Su, Qiong Huang, Yi Mu, ``Attribute-based hash proof system under learning-with-errors assumption in obfuscator-free and leakage-resilient environments," IEEE System Journal, DOI: 10.1109/JSYST.2015.2435518

  45. Xing Su, Minjie Zhang, and Yi Mu, ``Trust-based Group Services Selection in Web-based Service-oriented Environments," World Wide Web Journal, 19(5), pp.807-832, 10.1007/s11280-015-0362-0,

  46. Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong and Vijay Varadharajan, ``Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices," IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2015.2445760, (accepted, 7 June 2015)

  47. Kefeng Wang, Yi Mu and Willy Susilo, ``Identity-Based Quotable Ring Signature," Information Sciences, vol. 321, 71-89, 2015.

  48. Xiaonan Wang, Yi Mu, ``Addressing and Privacy Support for 6LoWPAN," IEEE Sensors Journal, Vol. 15, Issue 9, 2015, pp.5193-5201

  49. Fuchun Guo, Willy Susilo and Yi Mu, ``Generalized Closest Substring Encryption," Designs, Codes and Cryptography, DOI: 10.1007/s10623-015-0068-4. (accepted: 16 March 2015).

  50. Nan Li, Yi Mu, Willy Susilo and Vijay Varadharajan, ``Shared RFID Ownership Transfer Profocols," Journal of Computer Standards & Interfaces, Vol. 42, 95-104, 2015.

  51. Hui Lin, Li Xu, Yi Mu and Wei Wu, ``A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing," Future Generation Computer Systems 52 (2015) pp.125-136

  52. Xixiang Lv, Yi Mu and Hui Li, ``Key Management for Smart Grid based on Asymmetric Key-wrapping," International Journal of Computer Mathematics, Vol. 92, No. 3, pp 498-512, 2015

  53. Jinguang Han, Willy Susilo, Yi Mu and Jianying Zhou, ``Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-based Encryption," IEEE Transactions on Information Forensics & Security, 10(3), pp.665-678, 2015

  54. Hui Cui, Yi Mu and Man Ho Au, ``Proof of Retrievability with Public Verifiability Resilient Against Related-Key Attacks," IET Information Security, 9(1), pp.43-49, 2015.

  55. Yong Yu, Man Ho Au, Yi Mu, Willy Susilo and Huai Wu, ``Secure Delegation of Signing Power from Factorization," The Computer Journal, Oxford, 58(4), pp.867-877, 2015 (online version: doi: 10.1093/comjnl/bxt144)

  56. Xinyu Fan, Guomin Yang, Yi Mu and Yong Yu, ``On Indistinguishability in Remote Data Integrity Checking," The Computer Journal, Oxford, 58(4), pp.823-830, 2015

  57. Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi and Yi Mu, ``Functional Encryption Resilient to Hard-to-Invert Leakage," The Computer Journal, Oxford, 58(4), pp. 735-749, (2015) doi: 10.1093/comjnl/bxt105

  58. Yong Yu, Man Ho Au, Yi Mu, Shaohua Tang, Jian Ren, Willy Susilo, Liju Dong, ``Enhanced Privacy of a Remote Data Integrity Checking Protocol for Secure Cloud Storage", International Journal of Information Security, 14(4), pp.307-318, 2015.

  59. Ibrahim F. Elashry, Yi Mu, Willy Susilo, ``A resilient identity-based authenticated key exchange protocol," Security and Communication, Networks 8(13), pp.2279-2290, 2015

  60. Xiaonan Wang, Deguang Le, Hongbin Cheng, Yi Mu, ``An IPv6-based mobility framework for urban vehicular networks," Int. Journal of Network Management 25(3), pp.141-158, 2015.

  61. Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Yi Mu, Jianwei Liu, ``Further ideal multipartite access structures from integer polymatroids," SCIENCE CHINA Information Sciences, 58(7), pp.1-13, 2015.

  62. Xixiang Lv, Yi Mu and Hui Li, ``Loss-tolerant Bundle Fragment Authentication for Space-based DTNs," IEEE Transactions on Dependable and Secure Computing, 12(6), pp615-625, 2015.

  63. Yong Yu, Jianhing Ni, Man Ho Au, Yi Mu, Boyang Wang and Hui Li, ``Comments on a Public Auditing Mechanism for Shared Cloud Data Service," IEEE Transactions on Services Computing, 8(6), pp. 998-999, 2015.


    2014
  64. Jiangshan Yu, Guilin Wang, Yi Mu and Wei Gao, ``An Efficient Generic Framework for Three-Factor Authentication with Provably Secure Instantiation," IEEE Transactions on Information Forensics & Security, 9(12), pp.2302-2313 (2014)

  65. Xiaonan Wang, Yi Mu, Guangjie Han and Deguang Le, ``A secure IPv6 address configuration protocol for vehicular networks," Wireless Personal Communications, Springer, 79(1), pp. 721-744 (2014)

  66. Xiaonan Wang and Yi Mu, ``A secure home healthcare system based on 6LoWPAN WSN," International Journal of Interdisciplinary Telecommunications and Networking, 6(3), pp.15-26, 2014.

  67. Fuchun Guo, Yi Mu and Willy Susilo, ``Subset Membership Encryption and Its Applications to Oblivious Transfer," IEEE Transactions on Information Forensics & Security, 9(7), pp. 1098-1107 (2014)

  68. Ming Tang, Zhenlong Qiu, Hongbo Peng, Xiaobo Hu, Yi Mu, Huanguo Zhang, ``Toward reverse engineering on secret S-boxes in block ciphers," SCIENCE CHINA Information Sciences 57(3), pp.1-18 (2014)

  69. Mingwu Zhang and Yi Mu, ``Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks." Frontiers of Computer Science 8(3), 456-468, 2014

  70. Fuchun Guo, Yi Mu, Willy Susilo, Duncan Wong and Vijay Varadharajan, ``CP-ABE with Constant-Size Keys for Lightweight Devices," IEEE Transactions on Information Forensics & Security, 9(5), pp. 763-771, 2014

  71. Xixiang Lv, Yi Mu, and Hui Li, ``Loss-tolerant authentication with digital signatures," Security and Communication Networks 7(11), pp.2054-2062 (2014)

  72. Guomin Yang, Ghik How Tan, Yi Mu, Willy Susilo and Duncan Wang, ``Identity Based Identification from Algebraic Coding Theory," Theoretical Computer Science, Vol. 520, 6 Feb. 2014, pp. 51-61, http://dx.doi.org/10.1016/j.tcs.2013.09.008

  73. Xixiang Lv, Yi Mu and Hui Li, ``Non-interactive Key Establishment for Bundle Security Protocol of Space DTNs," IEEE Transactions on Information Forensics & Security, Vol. 9, No. 1, Jan. 2014, pp. 5-13

  74. Jinguang Han, Willy Susilo and Yi Mu, ``Identity-Based Secure Distributed Data Storage Schemes," IEEE Transactions on Computers, 520, pp. 51-61, 2014. http://doi.ieeecomputersociety.org/10.1109/TC.2013.26

  75. Xiaonan Wang and Yi Mu, ``A secure mobility support scheme for 6LoWPAN wireless sensor networks," Security and Communication Networks, Wiley, 7(3), pp. 641-652, 2014, DOI: 10.1002/sec.765

  76. Yong Yu, Yi Mu, Willy Susilo and Man Ho Au, ``Security Pitfalls of an Efficient Threshold Proxy Signature Scheme for Mobile Agents," Information Processing Letters, Vol. 111 (1-2), pp. 5-8, 2014

  77. Yong Yu, Lei Niu, Guomin Yang, Yi Mu and Willy Susilo, ``On the security of auditing mechanisms for secure cloud storage," Future Generation Computer Systems, Vol. 30, January 2014, pp. 127-132, http://dx.doi.org/10.1016/j.future.2013.05.005

  78. Yanling Lian, Xinyi Huang and Yi Mu, ``SA3: Self-Adaptive Anonymous Authentication for Dynamic Authentication Policies," Future Generation Computer Systems, Vol. 30, January, 2014, pp. 133-139, http://dx.doi.org/10.1016/j.future.2013.06.007

  79. Tsz Hon Yuen, Willy Susilo and Yi Mu, ``Towards a Cryptographic Treatment of Publish/Subscribe Systems," Journal of Computer Security, Vol. 22, No. 2, 2014, pp. 33-67

  80. Hao Gao, Jun Yan and Yi Mu, ``Trust-oriented QoS-aware Composite Service Selection based on Genetic Algorithms," Concurrency and Computation: Practice and Experience, Vol. 26, Issue 2, Feb. 2014, pp. 500-515 (online version: DOI: 10.1002/cpe.3015)

  81. Yong Yu, Jianbing Ni, Haomiao Yang, Yi Mu, and Willy Susilo, ``Efficient public key encryption with revocable keyword search," Security and Communication Networks, Wiley, 7(3), pp. 641-652, 2014 DOI: 10.1002/sec.790

  82. Hui Cui, Yi Mu, Man Ho Au, ``Anonymous broadcast encryption with an untrusted gateway. International Journal of Security and Networks, 9(1), pp. 20-29, 2014.

  83. Jinguang Han, Willy Susilo, Yi Mu and Jun Yan, ``Attribute-based Data Transfer with Filtering Scheme in Cloud Computing," The Computer Journal, Oxford, 57(4), pp. 579-591, 2014. doi: 10.1093/comjnl/bxt039

  84. Fuchun Guo, Yi Mu, Willy Susilo, and Vijay Varadharajan, ``Server-Aided Signature Verification for Lightweight Devices," The Computer Journal, 57(4), pp. 579-591, 2013, doi: 10.1093/comjnl/bxt003

  85. Tim Wellsmore, Yi Mu, Jennifer Seberry and Fuchun Guo, ``Efficient Authentication and Integrity Protection for the Border Gateway Protocol," International Journal of Security and Networks, 9(4), pp. 234-243 (2014)

  86. Chang Xu, Hua Gao, Yi Mu and Zhoujun Li, ``Affiliation-Hiding Authenticated Asymmetric Group Key Agreement based on Short Signature," The Computer Journal, Oxford, 57(10), pp.1580-1590 (2014) doi: 10.1093/comjnl/bxt098

  87. Jianbing Ni, Yong Yu and Yi Mu, ``On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage," IEEE Transactions on the Transactions on Parallel and Distributed Systems, 25(10), pp.2760-2761 (2014) http://doi.ieeecomputersociety.org/10.1109/TPDS.2013.199

  88. Hui Chu, Yi Mu and Man Ho Au, ``Signcryption Secure Against Linear Related-Key Attacks," The Computer Journal, Oxford, 57(10), pp.1472-1483 (2014) doi: 10.1093/comjnl/bxt076


    2013
  89. Hui Cui, Yi Mu and Man Ho Au, ``Robust and Function-Private Anonymous Identity-Based Encryption," International Journal of Security and Networks, 2013 (accepted, 5 Oct. 2013)

  90. Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi and Yi Mu, ``Token-leakage Tolerant Inner-product Encryption and Application in Privacy-preserving Two-party Point/polynomial Evaluations in Mobility Environments," The Computer Journal, Oxford, (accepted, 23 July 2013)

  91. Hui Cui, Yi Mu, and Fuchun Guo, ``Server-Aided Identity-Based Anonymous Broadcast Encryption," International Journal of Security and Networks, 2013 Vol.8, No.1, pp.29-39

  92. Ahmad M. Elshamy, Ahmed N. Z. Rashed, Abd El-Naser A. Mohamed, Osama S. Faragallah, Yi Mu, Saleh A. Alshebeili and F. E. Abd El-Samie1, ``Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase Encoding," the IEEE/OSA Journal of Lightwave Technology, Vol. 31, Issue 15, 1 Aug. 2013, pp.2533-2539

  93. Shams Qazi, Raad Raad, Yi Mu and Willy Susilo, ``Securing DSR against Wormhole attacks in Multirate Ad Hoc Networks," Journal of Network and Computer Applications, Volume 36, Issue 2, March 2013, pp. 582-592

  94. Xing Su, Minjie Zhang, Yi Mu, and Quan Bai, ``A Robust Trust Model for Service Oriented Systems," Journal of Computer and System Sciences, 99 (2013), pp. 596-608

  95. Songqin Miao, Futai Zhang, Sujuan Lu, and Yi Mu, ``On Security of A Certificateless Signcryption Scheme," Information Sciences 232, 2013, pp. 475-481.

  96. Hua Guo, Chang Xu, Yanqing Yao, Zhoujun Li and Yi Mu, `` Efficient and Dynamic Key Management for Multiple Identities in Identity-based Systems," Information Sciences 221, 2013, pp. 579-590.

  97. Jinguang Han, Willy Susilo and Yi Mu, ``Identity-Based Data Storage in Cloud Computing," Future Generation Computer Systems, vol. 29, no. 3, 2013, pp. 673-681.

  98. Xiaonan Wang and Yi Mu, ``A secure IPv6 address configuration scheme for MANET," Journal of Security and Communication Networks, Vol. 6, Issue 6, pp.777-789, 2013 (online: DOI: 10.1002/sec.611)

  99. Chang Xu, Hua Guo, Zhoujun Li, and Yi Mu, ``New Construction of Affiliation-Hiding Authenticated Group Key Agreement," Journal of Security and Communication Networks, Vol. 6, Issue 6, pp. 723-734, 2013 (online: DOI: 10.1002/sec.606)

  100. Man Ho Au, Willy Susilo, Yi Mu, and Sherman Chow, ``Constant-Size Dynamic k-Times Anonymous Authentication," the IEEE Systems Journal, Special Issue on Security and Privacy of Complex Systems," (First published online, 10.1109/JSYST.2012.2221931), Vol. 7, Issue 2, June 2013, pp.249-261


    2012
  101. Jinguang Han, Willy Susilo, Yi Mu and Jun Yan, ``New Constructions of OSBE Schemes and Their Applications in Oblivious Access Control," International Journal of Information Security, vol. 11, no. 6, 2012, pp. 389-401.

  102. Ying Sun, Yong Yu, Yi Mu, ``Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme," IEICE Transactions 95-D(6): 2012, pp. 1690-1693.

  103. Tang Ming, Qiu ZhenLong, Gao Si, Yi Mu, Liu ShuBo, Zhang HuanGuo and Jin YingZhen, ``Polar differential power attacks and evaluation," Science China, Information Sciences, 55 (2012), no. 7, pp. 1588-1604, MR2947842

  104. Jinguang Han, Willy Susilo, Yi Mu and Jun Yan, ``Attribute-based Oblivious Access Control," The Computer Journal, Oxford, vol. 55, no. 10, 2012, pp. 1202-1215

  105. Chang Xu, Zhoujun Li, Yi Mu, and Hua Guo, "Affiliation-Hiding Authenticated Asymmetric Group Key Agreement," The Computer Journal, Oxford, vol. 55, no. 10, 2012, pp. 1180-1191.

  106. Yong Yu, Yi Mu, Quilin Wang, Q. Xia, and Bo Yang ``An Improved Certificateless Signature Scheme Provably Secure in the Standard Model," IET Information Security, Vol. 6, Issue 2, June 2012, pp. 102-110.

  107. Miao Zhou, Yi Mu, Willy Susilo, and Jun Yan, and Liju Dong, ``Privacy Enhanced Data Outsourcing in the Cloud," Journal of Network and Computer Applications, vol. 35, no. 4, 2012, pp. 1367-1373.

  108. Jinguang Han, Willy Susilo, Yi Mu, and Jun Yan, ``Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 11, 2012, pp. 2150-2162.

  109. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang, Li Xu, ``Provably Secure Construction of Certificate-based Encryption from Certificateless Encryption," The Computer Journal, Oxford, vol. 55, no. 10, 2012, pp. 1157-1168.

  110. Fuchun Guo, Yi Mu, and Willy Susilo, ``Efficient and Secure Stored-Value Cards with Leakage Resilience," Computers and Electrical Engineering, vol 38, no. 2, 2012, pp.370-380

  111. Hua Guo, Chang Xu, Yi Mu and Zhoujun Li, ``A Provably Secure Authenticated Key Agreement Protocol for Wireless Communications," Computers and Electrical Engineering, vol. 38, no. 3, 2012, pp. 563-572.

  112. Jinguang Han, Willy Susilo, Yi Mu, and Jun Yan, ``Efficient Oblivious Transfers with Access Control," Computers and Mathematics with Applications, vol. 63, no. 4, 2012, pp. 827-837.

  113. Peishun Wang, Yi Mu, Willy Susilo and Jun Yan, ``Privacy Preserving Protocol for Service Aggregation in Cloud Computing," Software: Practice and Experience, vol. 42. no. 4, 2012, pp467-483.

  114. Yong Yu, Yi Mu, Willy Susilo and Ying Sun, ``Provably secure proxy signature scheme from factorization," Journal of Mathematical and Computer Modelling, vol. 55, no. 3-4, 2012, pp. 1160-1168.

  115. Xinyi Huang, Yi Mu, Willy Susilo, Duncan Wong, Wei Wu, ``Certificateless Signatures: New Schemes and Security Models," The Computer Journal, Oxford, vol. 55, no. 4, 2012, pp. 457-474.


    2011
  116. Jun Zhang, Yang Xiang, Wanlei Zhou, Lei Ye and Yi Mu, ``Secure Image Retrieval Based on Visual Content and Watermarking Protocol," The Computer Journal, Oxford, Vol. 54, No. 10, pp. 1661-1674

  117. Yong Yu, Yi Mu, Guilin Wang, Ying Sun, ``Cryptanalysis of an Off-line Electronic Cash Scheme based on Proxy Blind Signature," The Computer Journal, Oxford, Vol. 54, No. 10, pp. 1645-1651

  118. Fuchun Guo, Yi Mu, and Willy Susilo, ``Improving Security of q-SDH Based Digital Signatures," Journal of Systems and Software, Vol. 84, No. 10, pp.1783-1790, 2011

  119. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, and Yang Xiang, ``Optimistic Fair Exchange with Strong Resolution-Ambiguity," IEEE Journal on Selected Areas in Communications, Special Issue on Advances in Digital Forensics for Communications and networking, Vol. 29, No. 7, August 2011, pp. 1491-1502.

  120. Hua Guo, Zhoujun Li, Yi Mu, Fan Zhang, Chuankun Wu, Jikan Teng, ``"An Efficient Dynamic Authenticated Key Exchange Protocol with Selectable Identities," Journal of Computers and Mathematics with Applications, 61(9): pp. 2518-2527 (2011)

  121. Xing Su, Minjie Zhang, Yi Mu, Quan Bai, ``Trust-based Service Provider Selection in Service-oriented Environments," International Journal of Computer Science and Network Security, Vol. 11, Issue 10. 2011, pp. 1-9.

  122. Ying Sun, Chunxiang Xu, Yong Yu, Yi Mu, ``Strongly Unforgeable Proxy Signature Scheme Secure in the Standard Model," Journal of Systems and Software, vol. 84, no. 9, 2011, pp. 1471-1479.

  123. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang, ``Provably Secure Server-Aided Verification Signatures," Journal of Computers and Mathematics with Applications, 61(7): pp. 1705-1723, 2011.

  124. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Jianying Zhou, and Robert H. Deng, ``Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures," IEEE Transactions on Forensics and Security, 6(2): pp. 498-512 (2011)

  125. Fuchun Guo, Yi Mu, Willy Susilo, ``Short Signatures with A Tighter Security Reduction without Random Oracles," The Computer Journal,vol. 54, Issue 4, pp. 513-524, 2011.

  126. Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li, ``An Efficient and Non-Interactive Hierarchical Key Agreement Protocol," Computers and Security, 30(1), pp. 436-446, 2011.

  127. Ching Yu Ng, Willy Susilo, Yi Mu And Rei Safavi-Naini. ``Practical RFID Ownership Transfer Scheme," Jourmal of Computer Security, Special Issue on RFID System Security, 19(2): pp. 319-341, 2011.

  128. Hua Guo, Yi Mu, Zhoujun Li, Xiyong Zhang, ``Provably Secure Identity-Based Authenticated Key Agreement Protocols with Malicious PKGs," Information Sciences, Volume 181, Issue 3, 1 February 2011, pp. 628-647.

  129. Qi Zhang, Yi Mu, and Minjie Zhang, ``Attribute-based Authyentication for Multi-Agent Systems with Dynamic Groups," Computer Communications, Volume 34, Issue 3, 15 March 2011, pp. 436-446

  130. Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li, ``Authenticated Key Exchange Protocol with Selectable Identities,'' Journal of Wireless Communications and Mobile Computing, 11(2), pp. 226-239. 2011 (DOI: 10.1002/wcm.971)


    2010
  131. Tsz Hon Yuen, Willy Susilo, Yi Mu, ``How to Construct Identity-Based Signatures without the Key Escrow Problem," International Journal of Information Security, Vol. 9, No. 4, pp.297-311, 2010

  132. Pairat Thorncharoensri, Qiong huang, Willy Susilo, Man Ho Au, Yi Mu, Duncan Wong, ``Escrowed Deniable Identification Schemes," International Journal of Security and Its Applications, Vol. 4, No. 1, January 2010, pp. 49-67

  133. Futai Zhang, Sujuan Li, Songqin Miao, Yi Mu, Willy Susilo, and Xinyi Huang, ``Cryptanalysis on Two Certificateless Signature Schemes," International Journal of Computers, Communications & Control, Vol. V, No. 4, 2010, pp. 586-591.

  134. Hong Yuan, Futai Zhang, Xinyi Huang, Yi Mu, Willy Susilo, Lei Zhang, ``Certificateless Threshold Signature Scheme from Bilinear Pairings," Information Sciences, Vol. 180, Issue 23, 2010, pp. 4714-4728.

  135. Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li, ``Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security," International Journal of Security and Networks, Vol. 5, Issue 2/3, pp. 173-187, 2010.

  136. Qi Zhang, Yi Mu, Minjie Zhang, Robert H. Deng, ``Secure Mobile Agents with Controlled Resources," Journal of Concurrency and Computation: Practice and Experience, Wiley, DOI: 10.1002/cpe.1618

  137. Li Xu, Sisheng Cheng, Xinyi Huang, and Yi Mu, ``Pseudonym and bloom filter based secure and anonymouse DSR protocol in wireless and hoc network," International Journal of Security and Networks, Vol. 5, No. 1, 2010, pp.35-44

  138. Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu, ``Constructions of Certificate-Based Signature Secure against Key Replacement Attacks," Journal of Computer Security, 18(3): 421-449, 2010


    2009
  139. Shuang Chang, Duncan S. Wong, Yi Mu, and Zhenfeng Zhang, ``Certificateless Threshold Ring Signature," Information Sciences, Elsevier, vol. 179, No. 20, 2009, pp. 3685-3696

  140. Xiaofeng Chen, Fangguo Zhang, and Yi Mu, "Identity-Based Universal Designated Verifier Signature Proof System," International Journal of Network Security, Vol. 8, No. 1, 2009, pp. 52-58

  141. Yong Yu, Chunxiang Xu, Xinyi Huang, and Yi Mu, ``An efficient anonymous proxy signature scheme with provable security," Journal of Computer standard & interface, 31(2), pp. 348-353, 2009.


    2008
  142. Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, and Kwangjo Kim, ``Efficient generic on-line/off-line (threshold) signatures without key exposure,'' Information Sciences 178(21): 4192-4203 (2008)

  143. Fuchun Guo, Yi Mu, and Zhide Chen, ``Multi-Identity Management for Identity-Based Cryptography," Journal of Discrete Mathematical Sciences & Cryptography, 11 (6), pp. 639-672, 2008.

  144. Hua Guo, Zhoujun Li, Yi Mu, and Xiyong Zhang, ``Cryptanalysis of Simple Three-Party Key Exchange Protocol," Journal of Computers and Security 27(1-2): 16-21, 2008.

  145. Fangguo Zhang, Xiaofeng Chen, Yi Mu, and Willy Susilo, ``A New and Efficient Signature on Commitment Values," International Journal of Network Security (IJNS), Vol. 7 No. 1, 2008, pp. 101-106

  146. Xinyi Huang, Willy Susilo, Yi Mu, and Wei Wu, ``Secure Universal Designated Verifier Signature without Random Oracles," International Journal of Information Security, 7(3), 6 pages 171-183. Springer, 2008

  147. Jiguo Li, Xinyi Huang, Yi Mu, and Wei Wu, ``Cryptanalysis and Improvement of an Efficient Certificateless Signature Scheme," Journal of Communications and Networks, 10(1), pp. 10-17, 2008


    2007
  148. Dennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, and Duncan S. Wong ``Revocable Ring Signature," Journal of Computer Science and Technology, 22(6): 785-794 Nov. 2007.

  149. Bo Qin, Qinhong Wu, Willy Susilo, Yi Mu, Yumin Wang, and Zheng-Tao Jiang, ``A novel short signature without random oracles," Chinese Journal of Electronics, 16(4), pp. 707-710, 2007.

  150. Bo Qin, Qinhong Wu, Willy Susilo, Yi Mu, and Yumin Wang, ``Short Group Signatures without Random Oracles," Journal of Computer Science and Technology, 22 (6), 805-821, 2007

  151. Xinyi Huang, Willy Susilo, and Yi Mu, "Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004," Journal of Computer Science and Technology, Vol. 42, No. 1, January 2007, pp. 71-74.

  152. Jing Wu, Jennifer Seberry, Yi Mu, ``Temporal Authorizations Scheme for XML Document," WSEAS Transactions on Computers, Issue 2, Volume 6, February 2007, pp262-267.

  153. Pairat Thorncharoensri, Tianbing Xia, and Yi Mu, ``How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis," International Journal of Network Security (IJNS), Vol. 4, No. 2, 2007, pp138-148.

  154. Xinyi Huang, Willy Susilo, Yi Mu and Futai Zhang, "Short Designated Verifier Signature Scheme and Its Identity-based Variant," International Joural of Network Security (IJNS), Vol. 42, No. 1, January 2007, pp. 71-74.


    2006 and older
  155. Yiqun Chen, Willy Susilo, and Yi Mu, "Convertible Identity-Based Anonymous Designated Ring Signatures," International Journal of Security and Networks (IJSN), Vol. 1 No. 3/4, 2006, pp. 218 - 225.

  156. Shidi Xu, Yi Mu and Willy Susilo, ``Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes," Journal of Networks (JNW) Vol. 1 Issue 1, Academy Publisher, ISSN:1796-2056, pp. 47-53, May 2006.

  157. Khin Than Win, Willy Susilo, and Yi Mu, "Personal Health Record Systems and their Security Protection," Journal of Medical Systems, Springer, 2006. ISSN: 0148-5598 (Paper) 1573-689X (Online).

  158. Willy Susilo, Fangguo Zhang, and Yi Mu, "Privacy-Enhanced Internet Storage: Non-Interactive Publicly Verifiable 1-out-of-n Encryption Schemes," International Journal of Computer Science and Network Security (IJCSNS), Vol. 5 No. 12, 2005, pp. 99 - 114.

  159. Yi Gao, Yi Mu, and Willy Susilo, "A New Client Puzzle Scheme Against DoS/DDoS Attacks," International Journal of Computer Science and Network Security (IJCSNS), Vol.5, No.10, pp. 189-200, 2005.

  160. Ching Yu Ng, Yi Mu and Willy Susilo. "An Identity-based Broadcast Encryption Scheme for Mobile Ad-Hoc Networks," Journal of Telecommunications and Information Technology, Special Issue on Multimedia Communications, Vol. 1, pp24-29, 2005

  161. Willy Susilo and Yi Mu, "Provably Secure Fail-Stop Signature Schemes Based on RSA," Special Issue on Multimedia Networking and Wireless Communications of the International Journal of Wireless and Mobile Computing, Volume 1, Issue 1, 2005, pp 53-60.

  162. Junqi Zhang, Vijay Varadharajan, and Yi Mu, "Secure Distribution and Access of XML Documents," the Special Issue on Advanced Networking and Applications for New Computing Paradigm, International Journal of High Performance Computing and Networking (IJHPCN), Vol. 3, Nos. 5/6, 2005 pp356-365.

  163. Yi Mu, Willy Susilo, and Yan-xia Lin, ``Identity-based delegated signatures,", Journal of Communications of the CCISA (Selected topics of cryptography), Vol. 9, 2003, pp. 31-43.

  164. Yi Mu, Junqi Zhang, Vijay Varadharajan, and Yan-Xia Lin, ``Robust Non-Interactive Oblivious Transfer," IEEE Communications Letters, Volume 7, No. 4, 2003, pp. 153-155.

  165. Yi Mu and Vijay Varadharajan, ``Group Cryptography: Signature and Encryption," Journal of Informatica, Volume 26, 2002, pp. 249-254.

  166. Vijay Varadharajan, Khanh Quoc Nguyen, Yi Mu, "On the design of efficient RSA-based off-line electronic cash scheme," Journal of Theoretical Computer Science (226) 1-2 (1999) pp. 173-184. 17 September 1999.

  167. Yi Mu, Jennifer Seberry, and Yuliang Zheng, "Shared cryptographic bits via quantized quadrature phase amplitudes of light," Journal of Optics Communications, Vol 123, pp. 344-352, 1996.
  168. Yi Mu, ``Spontaneous emission spectra via cavity-enhanced coherent population trapping in a three-level system," Journal of Optics Communications, 111, 334 (1994)

  169. Yi Mu, ``Bistability and intensity squeezing in the two-photon laser without inversion," Physical Review A, 49, 5142 (1994)

  170. Yi Mu and Craig M. Savage, ``Phase-sensitive above-threshold laser amplifiers," Physical Review A, 49, 4093 (1994)

  171. Yi Mu and Craig M. Savage, ``One-atom lasers," Physical Review A, 46, 5944 (1992) (see News in Nature, Experiment)

  172. Yi Mu and Craig M. Savage, ``Parametric amplifiers in phase noise limited optical Communications," Journal of the Optical Society of America B, 9, 65 (1992).

  173. Tu Nan Chang and Yi Mu, ``Energy levels and transition probabilities of bound excited states of Be-like N IV," Journal of Quantitative Spectroscopy Radiative Transfer, 44, 413 (1990).

    Refereed Conference Papers:                               back to top


    2017
  174. Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, and Yi Mu, Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample, Crypto 2017, Lecture Notes in Computer Science. Springer

  175. Shiwei Zhang, Yi Mu, Guomin Yang, Xiaofen Wang: Hierarchical Functional Encryption for Linear Transformations. ACISP (1) Lecture Notes in Computer Science, vol 10342. Springer, 2017: 23-43

  176. Shengmin Xu, Guomin Yang, Yi Mu, Willy Susilo: Mergeable and Revocable Identity-Based Encryption. ACISP (1), Lecture Notes in Computer Science, vol 10342. Springer, 2017: 147-167

  177. Tong Wu, Sha Ma, Yi Mu, Shengke Zeng: ID-Based Encryption with Equality Test Against Insider Attack. ACISP (1), Lecture Notes in Computer Science, vol 10342. Springer, 2017: 168-183

  178. Yangguang Tian, Shiwei Zhang, Guomin Yang, Yi Mu, Yong Yu: Privacy-Preserving k-time Authenticated Secret Handshakes. ACISP (2), Lecture Notes in Computer Science, vol 10342. Springer, 2017: 281-300

  179. Fatemeh Razaeibagha and Yi Mu: Access Control Policy Combination from Similarity Analysis for Secure Privacy-preserved EHR Systems, Trustcom 2017

  180. Shu Cheng, Vijay Varadharajan, Yi Mu, Willy Susilo: An efficient and provably secure RFID grouping proof protocol. ACSW 2017: 71:1-71:7
    2016
  181. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, and Mingwu Zhang, ``Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions," Asiacrypt 2016, Lecture Notes in Computer Science 10031, Springer, pp.844-876, 2016

  182. Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, and Guomin Yang, ``Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction," Asiacrypt 2016, Lecture Notes in Computer Science 10031, Springer, pp.745-776, 2016

  183. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, ``Strongly Leakage-Resilient Authenticated Key Exchange," Lecture Notes in Computer Science 9610, CT-RSA 2016, pp.19-36, 2016.

  184. Willy Susilo, Rongmao Chen, Funchun Guo, Guomin Yang, Yi Mu and Yang-Wai Chow, ``Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext," AsiaCCS 2016, pp.201-210

  185. Tao Xiang, Xiaoguo Li, Fei Chen and Yi Mu, `` Bilateral-secure Signature by Key Evolving," AisaCCS 2016. pp.523-532

  186. Xiaofen Wang and Yi Mu, ``Content-based Encryption," Australasian Conference on Information Security and Privacy (ACISP 2016), Lecture Notes in Computer Science 9722, Part I, Springer Verlag, pp. 57-72.

  187. Jianchang Lai, Yi Mu, Fuchun Gao, Willy Susilo and Rongmao Chen, ``Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing," Australasian Conference on Information Secuirty and Privacy (ACISP 2016), Lecture Notes in Computer Science 9722, Part I, Springer Verlag, pp.223-242. ( full version )

  188. Rongmao Chen, Yi Mu, Willy Suosilo, Guomin Yang, Fuchun Guo and Mingwu Zhang, ``One-Round Strong Oblivious Signature-Based Envelope," Australasian Conference on Information Security and Privacy (ACISP 2016), Lecture Notes in Computer Science 9722, Part II, Springer Verlag, pp.3-20.

  189. Peng Jiang, Yi Mu, Fuchun Guo and Qiaoyan Wen, ``Public Key Encryption with Authorized Keyword Search," Australasian Conference on Information Security and Privacy (ACISP 2016), Lecture Notes in Computer Science 9722, Part II, Springer Verlag, pp.170-186.

  190. Yinhao Jiang, Willy Suosilo, Yi Mu and Fuchun Guo, ``Ciphertext-Policy Attribute-Based Encryption with Key-Abuse Resistance," Australasian Conference on Information Security and Privacy (ACISP 2016), Lecture Notes in Computer Science 9722, Part I, Springer Verlag, pp.477-494.

  191. Shiwei Zhang, Guomin Yang and Yi Mu, ``Linear Encryption with Keyword Search," Australasian Conference on Information Security and Privacy (ACISP 2016), Lecture Notes in Computer Science 9722, Part II, Springer Verlag, pp.187-206. ( full version )

  192. Shengmin Xu, Guomin Yang, Yi Mu and Sha Ma, ``Proxy Signature with Revocation," Australasian Conference on Information Security and Privacy (ACISP 2016), Lecture Notes in Computer Science 9722, Part II, Springer Verlag, pp.21-36.

  193. Shiwei Zhang, Yi Mu and Guomin Yang, ``Acchieving IND-CCA Security for Functional Encryption for Innet Products," Inscrypt 2017
    2015
  194. Yong Yu, Yafang Zhang, Yi Mu, Willy Susilo and Hongyu Liu, ``Provably Secure Identity based Provable DataPossession," Provsec 2015, Lecture Notes in Computer Science 9451, Springer Verlag, pp. 310-325, 2015.

  195. Shiwei Zhang, Yi Mu, and Guomin Yang, ``Threshold Broadcast Encryption with Keyword Search," Inscrypt 2015 (accepted, 10 Oct. 2015)

  196. Jianchang Lai, Yi Mu, Fuchun Guo and Willy Susilo, ``Improved Identity-Based Online/Offline Encryption," Australasian Conference on Information Security and Privacy (ACISP 2015), Lecture Notes in Computer Science 9144, Springer Verlag, pp. 160-173

  197. Yiteng Feng, Yi Mu, Guomin Yang and Joseph K. Liu, ``A New Public Remote Integrity Checking Scheme with User Privacy," Australasian Conference on Information Security and Privacy (ACISP 2015), Lecture Notes in Computer Science 9144, Springer Verlag, pp. 377-394

  198. Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo and Xiaofen Wang, ``A New General Framework for Secure Public Key Encryption with Keyword Search," Australasian Conference on Information Securoity and Privacy (ACISP 2015), Lecture Notes in Computer Science 9144, Springer Verlag, pp. 59-76

  199. Jun Yan, Hao Gao and Yi Mu, ``Business Rule Driven Composite Service Optimisation and Selection," IEEE International Conference on Services Computing (SCC2015), pp. 49-56, 2015


    2014
  200. Weiwei Liu, Yi Mu and Guomin Yang, ``An Efficient Privacy-preserving E-coupon System," Inscrypt 2014, Lecture Notes in Computer Science 8957, Springer, pp.3-15, 2014

  201. Ibrahim Elashry, Yi Mu and Willy Suililo, ``An Efficient Variant of Boneh-Gentry-Hamburg's Identity-based Encryption without Pairing," The 15th International Workshop on Information Security Applications (WISA 2014), Lecture Notes in Computer Science 8909, Springer, pp.257-268, 2014

  202. Fuchun Guo, Willy Susilo and Yi Mu, ``Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption," ACM Conference on Computer and Communications Security (ACM CCS) 2014, pp.1430-1432.

  203. Hui Cui, Yi Mu and Man Ho Au, ``Complete Robustness in Identity-Based Encryption," ProvSec 2014, Lecture Notes in Computer Science 8782, pp.342-349.

  204. Yong Yu, Yi Mu, Jianbing Ni, Jiang Deng and Ke Huang, ``Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage," NSS 2014, pp.28-40.

  205. Ibrahim Elashry, Yi Mu and Willy Susilo, ``Jhanwar-Barua's Identity-based Encryption Revisit," NSS 2014, pp.271-284.

  206. Weiwei Liu, Yi Mu and Guomin Yang, ``Attribute-Based Signing Right Delegation," NSS 2014, pp.323-334

  207. Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, and Man-Ho Au. ``PPDCP-ABE: privacy-preserving decentralized cipher-policy attribute-based encryption," European Symposium on Research in Computer Security - ESORICS'14, pp.73-90.

  208. Kefeng Wang, Yi Mu, Willy Susilo and Fuchun Guo, ``Attribute-Based Signature with Message Recovery," ISPEC 2014, Lecture Notes in Computer Science 8434, Springer Verlag, pp. 433-447, 2014

  209. Nan Li, Yi Mu, Willy Susilo, fuchun Guo and Vijay Varadharajan, ``Privacy-preserving Authorized RFID Authentication Protocols," RFIDSec 2014, Lecture Notes in Computer Science 8651, pp.108-122.

  210. Jiannan Wei, Guomin Yang, Yi Mu, ``Anonymous Proxy Signature with Restricted Traceability," TrustCom 2014, IEEE, pp.575-581

  211. Jun Yan, Hao Gao, Yi Mu: Attribute Based Service Customization and Selection," 7th {IEEE} International Conference on Service-Oriented Computing and Applications (SOCA), IEEE, 2014, pp. 57-64
    2013
  212. Hui Cui, Yi Mu and Man Ho Au, ``Anonymous Signcryption Secure Against Linear Related-Key Attacks," Lecture Notes in Computer Science 8209, ProvSec 2013, pp. 165-183

  213. Wei Wei Liu, Guomin Yang and Yi Mu, ``k-time Proxy Signature: Formal Definition and Efficient Construction," Lecture Notes in Computer Science 8209, ProvSec 2013, pp. 154-164

  214. Ibrahim Elashry, Yi Mu and Willy Susilo, ``Generic Mediated Encryption," SecureComm 2013, Lecture Notes of the Institute for Computer Sciences (LNICST) 127, 2013, pp. 154-168

  215. Hui Cui, Yi Mu and Man Ho Au, ``Public-Key Encryption Resilient to Linear Related-Key Attacks," SecureComm 2013, Lecture Notes of the Institute for Computer Sciences (LNICST) 127, 2013, pp. 182-196

  216. Nan Li, Yi Mu, Willy Susilo and Vijay Varadharajan, ``On RFID Authentication Protocols with Wide-Strong Privacy," RFIDsec Asia, IOS Press, 2013, pp. 3-16

  217. Shu Cheng, Vijay Varadharajan, Yi Mu and Willy Susilo, ``A Secure Elliptic Curve based RFID Ownership Transfer Scheme with Controlled Delegation," RFIDsec Asia, IOS Press, 2013, pp. 31-43

  218. Fuchun Guo, Yi Mu, Willy Susilo, and Vijay Varadharajan, ``Membership Encryption and Its Applications," Australasian Conference on Information Secuiryt and Privacy (ACISP 2013), Lecture Notes in Computer Science 7959, Springer Verlag, 2013, pp. 219-234.

  219. Guomin Yang, Yi Mu, Willy Susilo, and Duncan S. Wong, ``Leakage Resilient Authenticated Key Exchange Secure in The Auxiliary Input Model," Information Security Practice and Experience (ISPEC 20013), Lecture Notes in Computer Science 7863, Springer Verlag, 2013, pp. 204-217.

  220. Kefeng Wang, Yi Mu, and Willy Susilo, ``Identity-based Multisignature with Message Recovery," Information Security Practice and Experience (ISPEC 20013), Lecture Notes in Computer Science 7863, Springer Verlag, 2013, pp. 91-104

  221. Nan Li, Yi Mu, Willy Susilo, and Vijay Varadharajan, ``Secure RFID Ownership Transfer Protocols," Information Security Practice and Experience (ISPEC 20013), Lecture Notes in Computer Science 7863, Springer Verlag, 2013, pp. 189-203

  222. Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, and Yi Mu, ``Leakage-resilient Attribute-based Encryption with Fast Decryption: Models, Analysis and Constructions," Information Security Practice and Experience (ISPEC 20013), Lecture Notes in Computer Science 7863, Springer Verlag, 2013, pp. 75-90.

  223. Hui Cui, Yi Mu and Man Ho Au, ``Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps," 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), pp. 704-711

  224. Miao Zhou, Yi Mu, Willy Susilo and Man Ho Au, ``Privacy-Enhanced Keyword Search in Clouds," 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), pp. 447-451
    2012
  225. Fuchun Guo, Yi Mu, Willy Susilo and Vaijay Varadharajan, ``A Pre-computable Signature Scheme with Efficient Verification for RFID," Information Security Practice and Experience (ISPEC 20012), Lecture Notes in Computer Science 7232, Springer Verlag, 2012, pp. 1-16

  226. Pairat Thorncharoensri, Willy Susilo and Yi Mu, ``Multi-level Controlled Signature," the 13rd International Workshop on Information Security Applications (WISA 2012), Lecture Notes in Computer Science 7690, Springer Verlag, 2012, pp. 96-110.

  227. Fuchun Guo, Yi Mu and Willy Susilo, ``Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext," 17th European Symposium on Research in Computer Security (ESORICS 2012), Lecture Notes in Computer Science 7459, Springer Verlag, 2012, pp. 609-626.

  228. Jiangshan Yu, Guilin Wang, Yi Mu. ``Provably Secure Sing Sign-on Scheme in Distributed Systems and Networks," the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), pp. 271-278


    2011
  229. Nan Li, Yi Mu and Willy Susilo, "Efficient Self-Certified Signatures with Batch Verification," Inscrypt 2011, Lecture Notes in Computer Science 7537, Springer Velag, 2012, pp. 179-194.

  230. Miao Zhou, Yi Mu, Willy Susilo and Jun Yan, ``Piracy-Preserved Access Control for Cloud Computing," IEEE TrustCom 2011, pp. 83-90

  231. Quan Bai, Xing Su, Qing Liu, Andrew Terhorst, Minjie Zhang, Yi Mu, ``Case-Based Trust Evaluation from Provenance Information," IEEE TrustCom 2011, pp. 336-343

  232. Xing Su, Minjie Zhang, Yi Mu and Quan Bai, ``GTrust: An Innovated Trust Model for Group Services Selection in Web-based Service-oriented Environments," The 12th International Conference on Web Information System Engineering (WISE 2011), Lecture Notes in Computer Science 6997, Springer Verlag, 2011, pp. 306-313

  233. Lei Qu, Quilin Wang, and Yi Mu, ``Optimistic Fair Exchange of Ring signatures," 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2011), September 7-9 2011, London

  234. Man Ho Au, Willy Susilo, and Yi Mu, ``Electronic Cash with Anonymous User Suspension," 16th Australasian Conference on Information Secuiryt and Privacy (ACISP 2011), Australia, Lecture Notes in Computer Science 6812, Springer-Verlag, 2011, pp. 172-188

  235. Hao Gao, Jun Yan, and Yi Mu ``Web Service Selection based on Similarity Evaluation," The 8th International Conference on Services Computing (SCC 2011), July 4-9, 2011, Washington DC, USA, IEEE, pp. 322-329

  236. Yikai Wang, Yi Mu and Minjie Zhang, ``Policy-Based Authentication for Mobile Agents," Information Security Practice and Experience (ISPEC 2011), Lecture Notes in Computer Science 6672, Springer Verlag, 2011, pp. 123-137.

  237. Nan Li, Yi Mu and Willy Susilo, ``Self-Certified Ring Signatures," ACM Symposium on Information, Computer and Communications Security (AisaCCS 2011), ACM Press, 2011, pp. 396-400

  238. Liju Dong, Yi Mu, Willy Susilo, Peishun Wang, Jun Yan, ``A Privacy Policy Framework for Service Aggregation with P3P," The Sixth International Conference on Internet and Web Applications and Services (ICIW 2011), Xpert Publishing Services, Netherlands, 2011, pp. 171-177.
    2010
  239. Man Ho Au, Willy Susilo, and Yi Mu, ``Proof-of-Knowledge of Representation of Committed Value and Its Applications," 15th Australasian Conference on Information Security and Privacy (ACISP 2010), Lecture Notes in Computer Science 6168, Springer-Verlag, pp. 352-369

  240. Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu, ``Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships," Fast Software Encryption (FSE 2010), Lecture Notes in Computer Science 6147, Springer Verlag, 2010, pp. 192-211.

  241. Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Yi Mu, Kwangjo Kim. ``Three-round Abuse-free Optimistic Contract Signing With Everlasting Secrecy," Financial Cryptography and Data Security (FC 2010), Lecture Notes in Computer Science 6052, Springer Verlag, 2010, pp. 304-311.

  242. Ching Yu Ng, Willy Susilo, Yi Mu, and Rei Safavi-Naini, ``Practical RFID Ownership Transfer Scheme," RFIDsec'10-Asia, Cryptology and Information Security Series Volume 4, 2010, pp. 33-47

  243. Fei Bi and Yi Mu, ``Efficient RFID Authentication Scheme for Supply Chain Applications," Trustcom 2010, IEEE, pp. 583-588.

  244. Xing Su, Minjie Zhang, Yi Mu, and Kwang Mong Sim, ``PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented Environments," Trustcom 2010, IEEE, pp. 841-848.

  245. Fuchun Guo, Yi Mu, and Willy Susilo, ``Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase," Inscrypt 2010, LNCS, Springer (accepted).

  246. Tsz Go Yuen, Willy Susilo, and Yi Mu, ``Cryptographic Treatment of Publish/Subscribe Systems," Cryptology and Network Security (CANS 2010), LNCS 6467, Springer, 2010, pp. 201-220

  247. Jinguang Han, Yi Mu, Willy Susilo, Jun Yan, ``A Generic Construction for Dynamic Single Sign-on," SecureComm, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 50 (LNICST 50), pp. 181-198. Springer, 2010.

  248. Hao Guo, Jun Yan, and Yi Mu, ``Dynamic Trust Model for Federated Identity Management," the IFIP International Workshop on Network and System Security (NSS 2010), IEEE Computer Society, pp. 56-61.

  249. Peishun Wang, Yi Mu, Willy Susilo, Jun Yan, ``Constructing an Authentication Token to Access External Services in Service Aggregation," The 7th International Conference on Services Computing (SOC 2010), July 5-10, 2010, Miami, USA. IEEE Computer, pp. 321-328.

  250. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiao, ``Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting," 13th International Conference on Practice and Theory in Public Key Cryptography, Lecture Notes in Computer Science 6056, 2010, pp.124-141.

  251. Peishun Wang, Liju Dong, Yi Mu, Willy Susilo, Jun Yan, ``A Logical Framework for Matching Privacy Policies in Service Aggregation," the 14th International Conference on Computer Supported Cooperative Work in Design (IEEE CSCWD 2010), April 14-16, 2010, Shanghai, China. pp. 166-171, IEEE.
    2009
  252. Fuchun Guo, Yi Mu and Willy Susilo, ``How to Prove Security of A Signature with A Tighter Security Reduction," ProvSec 2009, Lecture Notes in Computer Science 5848, Springer Verlag, 2009, pp. 90-103.

  253. Man Ho Au, Willy Susilo and Yi Mu, ``Is the Notion of Divisible On-line/Off-line Signatures Stronger than On-line/Off-line Signatures," ProvSec 2009, Lecture Notes in Computer Science 5848, Springer Verlag, 2009, pp. 129-139.

  254. Hua Guo, Yi Mu, Xiyong Zhang and Zhoujun Li, ``Server-Controlled Identity-Based Authenticated Key Exchange," ProvSec 2009, Lecture Notes in Computer Science 5848, Springer Verlag, 2009, pp. 214-229

  255. Tsz Hon Yuen, Willy Susilo and Yi Mu, ``How to Construct Identity-Based Signatures without Key Escrow Problem," Sixth European Workshop on Public Key Services, Applications and Infrastructures (EuroPKI 2009), Springer-Verlag, 2009

  256. Pairat Thorncharoensri and Willy Susilo and Yi Mu, ``Policy-controlled Signature," in Proc. of Eleventh International Conference on Information and Communications Security, Lecture Notes in Computer Science, Springer Verlag, 2009, pp. 91-106.

  257. Pairat Thorncharoensri, Qiong huang, Willy Susilo, Man Ho Au, Yi Mu, Duncan Wong, ``Escrowed Deniable Identification Schemes," SecTech 2009, Lecture Notes in Computer Science, Springer Verlag, 2009 (accepted).

  258. Ching Yu Ng, Willy Susilo, Yi Mu, and Rei Safavi-Naini, ``New Privacy Results on Synchronized RFID Authentication Protocols Against Tag Tracing," 14th European Symposium on Research in Computer Security (ESORICS'08), Lecture Notes in Computer Science, Springer Verlag, 2009 (accepted)

  259. Hua Guo, Xiyong Zhang, Yi Mu, and Zhoujun Li, ``An Efficient Certificateless Encryption Scheme in the Standard Model," The 2009 International Conference on Network and System Security, IEEE, 2009, pp. 302-309

  260. Qi Zhang, Yi Mu, Minjie Zhang, and Robert H. Deng, ``Secure Mobile Agents with Designated Hosts," The 2009 International Conference on Network and System Security, IEEE, 2009, pp. 286-293

  261. Pairat Thorncharoensri and Willy Susilo and Yi Mu, ``Threshold-Signers Universal Designated Verifier Signatures," The Forth International Workshop on Security (IWSEC 2009), Lecture Notes in Computer Science 5824, Springer Verlag, pp. 89-109

  262. Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu, ``Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders," 14th Australasian Conference (ACISP 2009), Australia, Lecture Notes in Computer Science 5594, Springer-Verlag, 2009, pp. 153-170.

  263. Tsz Hon Yuen, Qiong Huang, Yi Mu, Willy Susilo, Duncan S. Wong and Guomin Yang, ``Efficient Non-Interactive Range Proof," The 15th International Computing and Combinatorics Conference (COCOON 2009), July 13-15, 2009. Niagara Falls, New York, U.S.A. Lecture Notes in Computer Science 5609, Springer Verlag, pp. 138-147.

  264. Hua Guo, Yi Mu, Xiyong Zhang and Zhoujun Li, ``Novel and Efficient Identity-Based Authenticated Key Agreement Protocols From Weil Pairings," The 6th International Conference on Ubiquitous Intelligence and Computing (UIC-09), Lecture Notes in Computer Science 5585, Springer Verlag, pp. 310-324.

  265. Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu, ``Enhanced Target Collision Resistant Hash Functions Revisited," Fast Software Encryption (FSE 2009), Lecture Notes in Computer Science 5665, Springer Verlag, pp. 327-344.

  266. Qianhong Wu, Yi Mu, Willy Susilo, Josep Domingo, and Qin Bo, ``Asymmetric Group Key Agreement," Advances in Cryptology - Eurocrypt 2009, Lecture Notes in Computer Science 5479, Springer Verlag, pp153-170

  267. Man Ho Au and Patrick P. Tsang and Willy Susilo and Yi Mu, ``Dynamic Multiversal Accumulators and Their Application to Attribute-Based Anonymous Credential Systems," CT-RSA 2009, Lecture Notes in Computer Science 5473, Springer Verlag, pp. 295-308.


    2008
  268. Bo Qin, Qianhong Wu, Willy Susilo, and Yi Mu, ``Publicly Verifable Privacy-preserving Group Decryption," Inscrypt 2008, Beijing, Lecture Notes in Computer Science 5487, Springer Verlag, pp. 72-83.

  269. Shams Qazi, Yi Mu, and Willy Susilo, ``Securing wireless mesh networks with ticket-based authentication," 2nd International Conference on Signal Processing and Communication Systems (ICSPCS'2008), IEEE, 2008

  270. Qianhong Wu, Bo Qin, Yi Mu, and Willy Susilo ``Privacy for Private Key in Signature," Inscrypt 2008, Beijing, Lecture Notes in Computer Science 5487, Springer Verlag, pp. 84-95.

  271. Pairat Thorncharoensri, Willy Susilo and Yi Mu, ``How to Balance Privacy with Authenticity," The 11th International Conference on Information Security and Cryptology (ICISC 2008), Lecture Notes in Computer Science 5461, Springer-Verlag, 2008, pp. 184-201..

  272. Dong Dong Sun, Yi Mu, Willy Susilo, Xinyi Huang, ``Identity-Based On-line/Off-line Signcryption," the 2008 IFIP International Workshop on Network and System Security (NSS 2008), Shanghai, China (2008)

  273. Dong Dong Sun, Yi Mu, and Willy Susilo, ``A Generic Construction of Identity-Based Online/Offline Signcryption," 2008 IEEE International Workshop on Cyberspace Safety and Security (CCS 2008), Sydney, Australia (2008)

  274. Wei Wu, Yi Mu, Willy Susilo, and Xinyi Huang, ``Certificate-Based Signatures: New Definitions and A Generic Construction from Certificateless Signatures," the 9th International Workshop on Information Security Applications (WISA 2008), Korea, Lecture Notes in Computer Science 5379, Springer Verlag, 2009, pp. 99-114

  275. Wei Wu, Yi Mu, Willy Susilo, and Xinyi Huang, ``Server-Aided Verification Signatures: Definitions and New Constructions," Provable Security (ProvSec 2008), Lecture Notes in Computer Science 141-155 , Springer Verlag, 2008, pp.141-155.

  276. Fuchun Guo and Yi Mu, ``Optimal Online/Offline Signature: How to Sign a Message Without Online Computation," Provable Security (ProvSec 2008), Lecture Notes in Computer Science 141-155, Springer Verlag, 2008, pp.98-111.

  277. Tsz Hon Yuen, Willy Susilo, Joseph K. Liu and Yi Mu, ``Sanitizable Signatures Revisited", Cryptology and Network Security (CANS 2008), Lecture Notes in Computer Science 5339, Springer Verlag (accepted)

  278. Fuchun Guo, Yi Mu, and Zhide Chen, ``Efficient Batch Verification of Short Signatures for A Single-signer Setting Without Random Oracles," the Third International Workshop on Security (IWSEC 2008), Lecture Notes in Computer Science 5312, Springer Verlag, 2008, pp.49-63.

  279. Ching Yu Ng, Willy Susilo, Yi Mu, and Rei Safavi-Naini, `` RFID Privacy Models Revisited," 13th European Symposium on Research in Computer Security (ESORICS'08), Lecture Notes in Computer Science 5283, Springer Verlag, 2008, pp.251-266.

  280. Zhongren Liu, Li Xu, Zhide Chen, Yi Mu, and Fuchun Guo, ``Hierarchical Identity-Based Online/Offline Encryption," International Symposium on Electronic Commerce and Security, ISECS 2008 (accepted)

  281. Fuchun Guo, Yi Mu, and Zhide Chen, ``Identity-Based Online/Offline Encryption," Financial Cryptography and Data Security (FC 2008), Lecture Notes in Computer Science 5143, Springer Verlag, 2008, pp.247-261.

  282. Man Ho Au, Willy Susilo, and Yi Mu, ``Practical Anonymous Divisible E-Cash From Bounded Accumulators," Financial Cryptography and Data Security (FC 2008), Lecture Notes in Computer Science 5143, Springer Verlag, 2008, pp.287-301.

  283. Yi Mu, Duncan Wong, Liqun Chen, Willy Susilo, and Qianhong Wu, ``Concurrent Signatures without a Conventional Keystone," International Workshop on Coding and Cryptology, Wuyishan, China, World Scientific Press, 2008, pp. 196-213.

  284. Qiong Ren, Yi Mu, and Willy Susilo, ``Mitigating Phishing with ID-based Online/Offline Authentication," Australasian Computer Security Conference (AISC2008), January 22-25, Wollongong, Australia, 2008, pp. 59–64.
    2007
  285. Lan Zhou, Willy Susilo, and Yi Mu, ``New Construction of Group Secret Handshakes Based on Pairings," The 9th International Conference on Information and Communications Security (ICICS2007), Zhengzhou, Henan, China, Lecture Notes in Computer Science 4861, Springer Verlag, 2007, pp. 57-68.

  286. Dennis Y. W. Liu and Duncan S. Wong and Xinyi Huang and Guilin Wang and Qiong Huang and Yi Mu and Willy Susilo, ``Formal Definition and Construction of Nominative Signature," The 9th International Conference on Information and Communications Security (ICICS2007), Zhengzhou, Henan, China, Lecture Notes in Computer Science 4861, Springer Verlag, 2007, pp. 57-68.

  287. Xinyi Huang, Yi Mu, Willy Susilo and Wei Wu, ``A Generic Construction for Universally Convertible Undeniable Signatures," The 6th International Conference on Cryptology and Network Security (CANS 2007), Lecture Notes in Computer Science 4856, Springer Verlag, 2007, pp. 15-33.

  288. Fuchun Guo, Yi Mu, and Zhide Chen, ``Mutative Identity-Based Signatures or Dynamic Credentials without Random Oracles," The 6th International Conference on Cryptology and Network Security (CANS 2007), Lecture Notes in Computer Science 4856, Springer Verlag, 2007 (accepted)

  289. Fuchun Guo, Yi Mu, Zhide Chen, and Li Xu, ``Multi-Identity Single-Key Decryption without Random Oracles," Inscrypt 2007, Xining, China, Lecture Notes in Computer Science, Springer Verlag, 2007 (accepted)

  290. Wei Wu, Yi Mu, Willy Susilo and Xinyi Huang, ``Provably Secure Identity-based Undeniable Signatures with Selective and Universal Convertibility" Inscrypt 2007, Xining, China, Lecture Notes in Computer Science, Springer Verlag, 2007 (accepted)

  291. Wei Wu, Yi Mu, Willy Susilo and Xinyi Huang, ``Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction," The 8th International Workshop on Information Security Applications (WISA 2007), Jeju Island, Korea August 27-29, 2007, Lecture Notes in Computer Science, Springer Verlag, 2007 (accepted)

  292. Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong, and Yi Mu, ``Nominative Signature from Ring Signature," International Workshop on Security (IWSEC2007), Nara, Japan, October 29 - 31, 2007, Lecture Notes in Computer Science, Springer-Verlag, 2007. (accepted)

  293. Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu, ``Certificate-Based Signature: Security Model and Efficient Construction," Fourth European PKI Workshop Theory and Practice (PKI 2007), 28-30 June, 2007, Mallorca, Balearic Islands, Spain, Lecture Notes in Computer Science 4582, Springer-Verlag, 2007, pp. 110-125.

  294. Man Ho Au, Willy Susilo, and Yi Mu, ``Practical Compact E-Cash," Information Security and Privacy, 12th Australasian Conference, ACISP 2007, 2-4 July 2007, Townsville, Queensland, Australia, Lecture Notes in Computer Science 4586, Springer-Verlag, 2007, pp. 431-445.

  295. Xinyi Huang, Yi Mu, Willy Susilo, Duncan Wong, Wei Wu, ``Certificateless Signature Revisited," Information Security and Privacy, 12th Australasian Conference, ACISP 2007, 2-4 July 2007, Townsville, Queensland, Australia, Lecture Notes in Computer Science 4586, Springer-Verlag, 2007, pp. 308-322.

  296. Xinyi Huang, Yi Mu, Willy Susilo and Wei Wu, ``Provably Secure Pairing-based Convertible Undeniable Signature with Short Signature Length," International Conference on Pairing-based Cryptography (Pairing 2007), July 2-4, 2007, Tokyo, Japan, Lecture Notes in Computer Science, Springer Verlag, (accepted)

  297. Fuchun Guo, Yi Mu, and Zhide Chen, ``Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key," International Conference on Pairing-based Cryptography (Pairing 2007), July 2-4, 2007, Tokyo, Japan, Lecture Notes in Computer Science, Springer Verlag, (accepted)

  298. Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu, ``Efficient Generic On-line/Off-line Signatures Without Key Exposure," 5th International Conference on Applied Cryptography and Network Security (ACNS'07), 5-8 June, 2007, Zhuhai, China, LNCS 4521, Springer Verlag, pp. 18-30.

  299. Huafei Zhu, Willy Susilo and Yi Mu. ``Multi-party stand-alone and setup-free verifiably committed signatures." International Conference on Theory and Practice of Public-Key Cryptography 2007 (PKC'07), Lecture Notes in Computer Science 4450, Springer Verlag, 2007, pp. 134-149

  300. Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, and Guomin Yang, ``Malicious KGC Attacks in Certificateless Cryptography," 2007 ACM Symposium on Information, Computer and Communications Security (ASIACCS'07) Singapore, March 20-22, 2007, ACM Press (accepted)

  301. Man Ho Au, Qianhong Wu, Willy Susilo and Yi Mu, ``Compact E-Cash from Bounded Accumulator," RSA Conference 2007, Cryptographers' Track (CT-RSA 2007), Lecture Notes in Computer Science, Springer-Verlag, 2007, pp. 178-195.

  302. Yi Mu, Willy Susilo and Huafei Zhu, ``Compact Sequential Aggregate Signatures," The 22nd ACM Symposium on Applied Computing (Security Track), 11-15 March 2007, Seoul, Korea, ACM Press, 2007, pp.249-253.

  303. Qiong Ren, Yi Mu, and Willy Susilo, ``Mitigating Phishing by a New ID-based Chameleon Hash without Key Exposure," AusCERT 2007 R&D, 20-25 May 2007, Gold Coast, Australia. (accepted)

  304. Qiong Ren, Yi Mu, and Willy Susilo, ``SEFAP: An Email System for Anti-Phishing," The 6th IEEE International Conference on Computer and Information Science (ICIS 2007), July 11-13, 2007, Melbourne, Australia, IEEE Press. (accepted)

  305. Yong Li, Willy Susilo, Yi Mu, and Dingyi Pei, ``Designated Verifier Signature: Definition, Framework and New Constructions," The 4th International Conference on Ubiquitous Intelligence and Computing (UIC-07), Hong Kong, China, July 11-13, 2007, Lecture Notes in Computer Science, Springer Verlag (accepted)

  306. Shuo Zheng, Luke McAven, and Yi Mu, ``First price sealed bid e-auction without auctioneers," International Wireless Communications and Mobile Computing Conference 2007 (IWCMC 2007), August 12-16, 2007, Honolulu, Hawaii, USA, ACM. (accepted)

  307. Jianwei Chen, Li Xu, and Yi Mu, ``A New Group Rekeying Scheme based on t-Packing Designs for Ad Hoc Networks," The Second International Conference on Scalable Information Systems (INFOSCALE 2007), June 6-8, 2007, Suzhou, China, ACM Press, (accepted)

  308. Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin, ``Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection," The 4th International Conference on Autonomic and Trusted Computing (ATC-07), Hong Kong, China, July 11-13, 2007, Lecture Notes in Computer Science, Springer Verlag (accepted)

  309. Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang, The 4th International Conference on Autonomic and Trusted Computing (ATC-07), ``Identity-based Proxy Signature from Pairings," Hong Kong, China, July 11-13, 2007, Lecture Notes in Computer Science, Springer Verlag (accepted)
    2006
  310. Xinyi Huang, Willy Susilo, Yi Mu and Wei Wu, ``Universal Designated Verifier Signature without Delegatability," Eighth International Conference on Information and Communications Security (ICICS '06), December 4-7, 2006, Raleigh, North Carolina, USA, Lecture Notes in Computer Science 4307, Springer Verlage, pp. 479 - 498.

  311. Willy Susilo, Wei Wu, Yi Mu and Xinyi Huang. On the ``Non-Delegatability" Notion of Designated Verifier Signature Schemes, The 5th International Workshop for Applied PKC (IWAP 2006), Lecture Notes in Computer Science, Springer-Verlag, 2006 (accepted).

  312. Wei Wu, Xinyi Huang, Willy Susilo, Yi Mu and Jennifer Seberry. ``Proxy Signature Scheme: New Constructions based on Computational Diffie-Hellman Problem and Their Stronger Security Notions," The 5th International Workshop for Applied PKC (IWAP 2006), Lecture Notes in Computer Science, Springer-Verlag, 2006 (accepted)

  313. Xinyi Huang, Willy Susilo, Yi Mu and Wei Wu. ``Proxy Signature without Random Oracles," The Second International Conference on Mobile Ad Hoc and Sensor Networks (MSN 2006), Lecture Notes in Computer Science 4325, Springer-Verlag, 2006, pp. 473 - 484.

  314. Lan Zhou, Willy Susilo and Yi Mu, ``Efficient ID-based Authenticated Group Key Agreement from Bilinear Pairings," The Second International Conference on Mobile Ad Hoc and Sensor Networks (MSN 2006), Lecture Notes in Computer Science 4325, Springer-Verlag, 2006, pp. 521 - 532

  315. Tao Mai, Willy Susilo and Yi Mu, ``Novel Stream Authentication Scheme for Securing Voice over IP," The 5th Workshop on the Internet, Telecommunications and Signal Processing (WITSP 2006), 2006 (accept).

  316. Fangguo zhang, Xiaofeng Chen, Willy Susilo and Yi Mu, ``A New Signature Scheme Without Random Oracles from Bilinear Pairings," VietCrypt 2006, Hanoi, Vietnam, LNCS 4341, Springer Verlag, pp. 67-80.

  317. Qianhong Wu, Willy Susilo, Yi Mu and Fangguo Zhang, ``Ad Hoc Group Signatures," in Proc. of the First International Workshop on Security (IWSEC 2006), Japan, Lecture Notes in Computer Science 4266, Springer-Verlag, 2006, pp. 120 - 135.

  318. Man Ho Au, Willy Susilo, and Yi Mu, ``Constant-Size Dynamic k-TAA," in Proc. of Fifth Conference on Security and Cryptography for Networks (SCN 2006), Maiori, Italy, LNCS 4116, Springer Verlag, 2006, pp. 111-125.

  319. Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang, "Restricted Universal Designated Verifier Signature," The 3rd International Conference on Ubiquitous Intelligence and Computing (UIC-06), Wuhan and Three Gorges, China, LNCS 4159, Springer Verlag, 2006, pp. 874 - 882.

  320. Fuchun Guo, Zhide Chen, and Yi Mu, ``Trust Negotiation with Trust Parameters," International Conference on Computational Intelligence and Security (CIS'06), Guangzhou, China, IEEE Press, 2006 (accepted)

  321. Junqi Zhang, Vijay Varadharajan, and Yi Mu, "ID-based Secure PIM-SM Schemes," The IASTED International Conference on Communication Systems and Applications (CSA 2006), Banff, Canada, 2006. pp190-195

  322. Yun Chen, Weijian Chen, Yi Mu, Xin Chen, Min Liu, ``Server-Aided Public Key Generation Protocols on Low-power Devices for Ad-hoc Networks," the 6th International Conference on ITS Telecommunications (ITST2006), June 21-23, 2006 in Chengdu, China, IEEE Press, pp.710-714

  323. Yun Chen, Xin Chen, and Yi Mu, ``A ParrallelKey Generation Algorithm for Efficient Diffie-Hellman Key Agreement," International Conference on Computational Intelligence and Security (CIS'06), Guangzhou, China, IEEE Press, 2006 (accepted)

  324. Qianhong Wu, Yi Mu, Willy Susilo, and Fangguo Zhang, "Efficient Signcryption without Random Oracles," The 3rd International Conference on Autonomic and Trusted Computing (ATC 06), Wuhan and Three Gorges, China, LNCS 4158, Springer Verlag, 2006, pp. 449 - 458.

  325. Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, and Yumin Wang, "Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme)," The 3rd International Conference on Autonomic and Trusted Computing (ATC 06), Wuhan and Three Gorges, China, LNCS 4158, Springer Verlag, 2006, pp. 531 - 540.

  326. Shidi Xu, Yi Mu and Willy Susilo, "Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security," Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Lecture Notes in Computer Science, Springer-Verlag, 2006, pp. 99 - 110.

  327. Yiqun Chen, Willy Susilo and Yi Mu, "Identity-based Anonymous Designated Ring Signatures," International Wireless Communications and Mobile Computing Conference (IWCMC 2006), Computer and Network Security Symposium, ACM, 2006, pp. 189 - 194.

  328. Willy Susilo and Yi Mu, "Separable Identity-based Deniable Authentication: Cryptographic Primitive for Fighting Phishing," EuroPKI-2006, Italy, LNCS 4043, Springer, 2006. pp. 68-80

  329. Junqi Zhang. Vijay Varadharajan, and Yi Mu, "A Scalable Multi-service Group Key Management Scheme," International Conference on Internet and Web Applications and Services/Advanced International Conference on Telecommunications, AICT-ICIW '06, IEEE, 2006, pp172-178

  330. Qianhong Wu, Willy Susilo, Yi Mu and Fangguo Zhang, "Efficient Partially Blind Signatures with Provable Security," Applied Cryptography and Information Security 06 (ACIS06), Lecture Notes in Computer Science 3982, Springer-Verlag, Berlin, 2006, pp345-354

  331. Qianhong Wu, Yi Mu, Willy Susilo and Fangguo Zhang, "Privately Retrieve Data From Large Databases," The 2nd Information Security Practice and Experience Conference (ISPEC 2006), Lecture Notes in Computer Science 3903, Springer Verlag, Berlin, 2006, pp. 367 - 378.

  332. Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang, "Short (Identity-based) Strong Designated Verifier Signature Schemes," The 2nd Information Security Practice and Experience Conference (ISPEC 2006), Lecture Notes in Computer Science 3903, Springer Verlag, pp. 214 - 225.

  333. Lan Zhou, Willy Susilo, and Yi Mu, "Three-move Secret Handshakes," The 2nd Information Security Practice and Experience Conference (ISPEC 2006), Lecture Notes in Computer Science 3903, Springer Verlag, pp332-342, 2006

  334. Xinyi Huang, Willy Susilo, Yi Mu and Futai Zhang, "Certificateless Designated Verifier Signature Schemes," The Second International Workshop on Security in Networks and Distributed Systems (SNDS 2006), IEEE Computer, 2006, pp. 15 - 19, Vol. 2.

  335. Xiaofeng Chen, Fangguo Zhang, Yi Mu and Willy Susilo, "Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. Financial Cryptography and Data Security (FC'06), Lecture Notes in Computer Science, Springer Verlag, 2006, pp. 251 - 265.

  336. Ching Yu Ng, Willy Susilo, and Yi Mu, "Designated Group Credentials," ACM Symposium on Information, Computer and Communications Security (AISACCS'06), Taipei, Taiwan, 2006, ACM Press, pp. 59 - 65.

  337. Jing Wu, Jennifer Seberry, and Yi Mu, ``Temporal XML Delegable Authorizations," in the proceedings of the WSEAS Multi-Conference in Bucharest, Romania, October 16-18, 2006

  338. Xiaofeng Chen, Fangguo Zhang, and Yi Mu, "Identity-Based Universal Designated Verifier Signature Proof," Chinacrypt 2006, Science Press.
  339. Fuchun Guo, Zhide Chen, Yi Mu, Li Xu, and Shengyuan Zhang, ``Trust and Efficient Negotiation," International Conference on Computational Intelligence and Security (CIS'06), Guangzhou, China, Lecture Notes in Artifiture Intellegent, Springer Verlag, 2007. (accepted)

  340. Jing Wu, Yi Mu, and Jennifer Seberry, ``Temporal Authorizations Scheme for XML Document", Proceeding of Data Networks, Communications and Computer(DNCOCO'06), Oct,2006, Bucharest, Nomania

  341. Shuo Zheng, Luke McAven, and Yi Mu, ``First price sealed bid auction without auctioneers," the Fourth International Conference in IT and Application (ICITA 2007), January 15-18, 2007, Harbin, China. IEEE
    2005
  342. Junqi Zhang, Vijay Varadharajan, and Yi Mu, "An ID-based Access Control Scheme for MOSPF," the First International Workshop on Network Architecture and Service Models (NASM'2005), IEEE. pp25-30.

  343. Qianhong Wu, Fangguo Zhang, Willy Susilo, and Yi Mu, "An Efficient Static Blind Ring Signature Scheme," The 8th International Conference on Information Security and Cryptology (ICISC 2005), Lecture Notes in Computer Science, Springer Verlag, 2005 (pp394-406, pre-proceedings)

  344. Willy Susilo, Yi Mu and Xinyi Huang, "Secure Key Extraction in Computer Networks," The 8th International Symposium on DSP and Communication Systems & 4th Workshop on the Internet, Telecommunications and Signal Processing, (DSPCS'2005 & WITSP'2005), 2005 (accepted)

  345. Yi Mu, Fangguo Zhang, and Willy Susilo, "Secure and Anonymous Mobile Ad-Hoc Networks, IEEE International Conference on Networks (ICON 2005), IEEE (accepted)

  346. Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang, "On The Security of Certificateless Signature Schemes from Asiacrypt 2003," The 4th International Conference on Cryptology and Network Security (CANS05), Lecture Notes in Computer Science 3810, Springer Verlag, pp13-25, 2005.

  347. Shidi Xu, Yi Mu, and Willy Susilo, ``Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks," The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq`05), Nagasaki, Japan, Lecture Notes in Computer Science 3823, Springer Verlag, pp854-863, 2005.

  348. Fangguo Zhang, Willy Susilo, Yi Mu, and Xiaofeng Chen, ``Identity-based Universal Designated Verifier Signatures," The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq`05), Nagasaki, Japan, Lecture Notes in Computer Science 3823, Springer Verlag, pp825-834, 2005.

  349. Xinyi Huang, Yi Mu, Willy Susilo, and Futai Zhang, ``Short Designated Verifier Proxy Signature from Pairings," The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq`05), Nagasaki, Japan, Lecture Notes in Computer Science, Springer Verlag 3823, pp835-844, 2005.

  350. Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang and Xiaofeng Chen, "A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World," Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW2005), Lecture Notes in Computer Science 3823, Springer-Verlags, pp480-489, 2005.

  351. Shidi Xu, Yi Mu and Willy Susilo, "Secure AODV Routing Protocol Using One-Time Signature," International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2005), Lecture Notes in Computer Science, Springer-Verlag, pp288-297, 2005.

  352. Jing Wu, Yi Mu, Jennifer Seberry, and Chun Ruan, "Access Policy Sheet for Access Control in Fine-Grained XML," The First IFIP Workshop on Trusted and Autonomic Ubiquitous and Embedded Systems (TAUES 2005), Lecture Notes in Computer Scince 3813, Springer Verlag, pp1273-1282, 2005.

  353. Yi Mu, Willy Susilo, and Xinyi Huang, "Efficient Broadcast from Trapdoor Functions," in Proceedings of the 4th International Workshop for Applied PKI (IWAP'05), IOS Press, pp240-248, 2005

  354. Yi Gao, Yi Mu and Willy Susilo. "Preventing DoS Attacks with A New Client Puzzle Scheme," The AUUG'2005 Annual Conference, pp. 3-16, 2005.

  355. Jian Wen, Yi Mu and Willy Susilo. "SQL Structure Rebuilder: Preventing SQL Injection Attacks," The AUUG'2005 Annual Conference, pp. 225-234, 2005.

  356. Willy Susilo and Yi Mu, "On The Security of Nominative Signatures," in Proceedings of ACISP 2005, Lecture Note in Computer Science, Springer Verlag, 2005. pp. 329-335

  357. Jing Wu, Jennifer Seberry, Yi Mu, Chun Ruan, "Delegatable Access Control for Fine-Grained XML," in Proceedings of the International Workshop on Security in Networks and Distributed Systems (SNDS 2005), Japan, IEEE Press, 2005, pp. 270-274

  358. Ching Yu Ng, Willy Susilo, Yi Mu, "Universal Designated Multi Verifier Signature Schemes," in Proceedings of the International Workshop on Security in Networks and Distributed Systems (SNDS 2005), Japan, IEEE Press, pp. 305-309, 2005.

  359. Junqi Zhang, Vijay Varadharajan, and Yi Mu, "A Secure Multicast Architecture and Protocol for MOSPF," in Proc. of the IASTED International Conference on Networks and Communication Systems (NCS 2005), pp120-125, 2005.

  360. Willy Susilo and Yi Mu, "Tripartite Concurrent Signatures," in Proc. of the 20th IFIP International Information Security Conference (IFIP/SEC 2005), Chiba, JAPAN, pp. 425-441

  361. Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang, "Identity-based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World," in Proc. of The First International Workshop on Ubiquitous Smart Worlds (USW2005), in conjunction with the 19th IEEE International Conference of AINA2005, IEEE Computer Society, 2005, pp649-654

  362. Willy Susilo, Fangguo Zhang, and Yi Mu, "Privacy-Enhanced Internet Storage," in Proceedings of The 19th International Conference on Advanced Information Networking and Applications (AINA 2005), IEEE Computer Society, 2005, pp603-608

  363. Fangguo Zhang, Yi Mu, and Willy Susilo, "Reducing Security Overhead for Mobile Networks," in Proceedings of The 19th International Conference on Advanced Information Networking and Applications (AINA 2005), IEEE Computer Society, pp398-403, 2005

  364. Fangguo Zhang, Willy Susilo, and Yi Mu, "Identity-based Partial Message Recovery Signatures (or How to Shorten ID-based Signatures)," Financial Cryptography and Data Security (FC'05), Lecture Notes in Computer Science, Springer Verlag, pp47-59, 2005.
    2004
  365. Ching Yu Ng, Yi Mu and Willy Susilo, "A Secure Identity-based Mobile Ad-Hoc Scheme," in Proceedings of the 3rd Workshop on the Internet, Telecommunications and Signal Processing WITSP'2004, pp112-118

  366. Yi Mu, Willy Susilo, Yan-Xia Lin, and Chun Ruan, "Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption," in Proc. of Ninth Asian Computing Science Conference (ASIAN 2004), Lecture Notes in Computer Science 3321, Springer Verlag, 2004, pp 169-181

  367. Yi Mu, Fangguo Zhang, and Willy Susilo, "Partial Proxy Signatures," in Proc. of Ninth Asian Computing Science Conference (ASIAN 2004), Lecture Notes in Computer Science 3321, Springer Verlag, 2004, pp 182-194

  368. Junqi Zhang, Vijay Varadharajan, and Yi Mu, "A secure pim-sm multicast routing protocol," in proc. of the 6th International Workshop on Distributed Computing (IWDC 2004), Lecture Notes in Computer Science, Springer Verlag, 2004, pp276-288

  369. Weiliang Zhao, Vijay Varadharajan, Yi Mu, ``Fair Trading Protocol with Off-line Anonymous Credit Card Payment," Proceeding of WOSIS (Workshop in Security in Information Systems), International Conference on Enterprise Information Systems (ICEIS2004), April 2004.

  370. Willy Susilo and Yi Mu, "Authentication System for Supporting Mobile Multimedia Technologies," The Second International Conference on Advances in Mobile Multimedia (MoMM2004), books@ocg.at book series, pp393-397

  371. Yi Mu, Fangguo Zhang, and Willy Susilo, "Privacy Preserved Electronic Commerce in Wireless Mobile Networks," The Second International Conference on Advances in Mobile Multimedia (MoMM2004), books@ocg.at book series, pp403-412

  372. Willy Susilo, Yi Mu, and Fangguo Zhang, "Perfect Concurrent Signature Schemes," ICICS 2004, Lecture Notes in Computer Science, Springer Verlag, 2004, pp14-26

  373. Yi Mu and Willy Susilo, "Identity-Based Instantaneous Broadcast System in Mobile Ad-Hoc Networks," the 2004 International Workshop on Mobile Systems, E-commerce and Agent Technology, USA, 2004, pp35-40.

  374. Jing Wu, Jennifer Seberry and Yi Mu, "Security Mark-up for Semantic Web," 15th Australasian Workshop on Combinatorial Algorithms (AWOCA 2004), New South Wales, Australia, 2004, pp206-212.

  375. Ching Lin, Vijay Varadharajan, Yan Wang, and Yi Mu, "On Design of a New Trusted Model for Mobile Agent Security", 15th International Conference on Database and Expert Systems Applications (DEXA 2004), Lecture Notes in Computer Science 3148, Springer Verlag, 2004, pp60-69.

  376. Willy Susilo, Fangguo Zhang, and Yi Mu, "Identity-based Strong Designated Verifier Signature Schemes", in Proceedings of ACISP 2004, Lecture Notes in Computer Science 3108, Springer Verlag, pp313-324

  377. Willy Susilo and Yi Mu, "Deniable Ring Authentication Revisited," in Proceedings of Applied Cryptography and Network Security (ACNS'04), Lecture Notes in Computer Science 3089, Springer Verlag, 2004, pp. 205-219

  378. Junqi Zhang, Vijay Varadharajan, and Yi Mu, "Securing XML Document Sources and their Distribution," in Proceedings of The 18th International Conference on Advanced Information Networking and Applications (AINA 2004), Japan, IEEE Press, pp. 562-567.

  379. Willy Susilo and Yi Mu, "A model of secure dynamic ad-hoc mobile networks," in Proceedings of Chinacrypt 2004, Science Press, Beijing, pp. 416-425.
    2003
  380. Willy Susilo and Yi Mu, "Non-Interactive Deniable Ring Authentication," In Proceedings of ICISC 2003, Lecture Notes in Computer Science 2971, Springer Verlag, pp. 386-401, 2003

  381. Yi Mu, Willy Susilo, and Yan-Xia Lin, ``Identity-based broadcasting," in Proceedings of Indocrypt 2003, Lecture Notes in Computer Science 2904, Springer Verlag, pp. 177-190, 2003.

  382. Yi Mu and Willy Susilo, "Anonymous Digital-Copyrighted Content Distribution," The 7th International Symposium On DSP and Communication Systems and 2nd Workshop on The Internet and Telecommunications and Signal Processing (DSPCS'03 & WITSP'03), pp. 32-37, 2003.

  383. Willy Susilo and Yi Mu, "RSA-based Fail-Stop Signature Schemes Revisited," in proc. of International Workshop on Cryptology and Network Security (CANS03), Miami, 2003, pp. 657-662.

  384. Junqi Zhang, Vijay Varadharajan and Yi Mu, "A Novel Dynamic Key Management Scheme for Secure Multicasting," in Proc. of ICON 2003, pp. 391-395.

  385. Willy Susilo and Yi Mu, "On Fail-Stop Verifiable Secret Sharing Schemes," in Proceedings of International Conference on Security and Management (SAM'03), USA, 2003. pp. 663-667.

  386. Wieliang Zhao, Vijay Varadharajan and Yi Mu, ``A Secure Mental Poker Protocol over the Internet," in Proceedings of the Australasian Information Security Workshop (AISW 2003), pp. 105-109.
    2002
  387. Yi Mu and Vijay Varadharajan, ``An Efficient Internet Credit Card Scheme from the Weil Pairing," in Proceedings of International Symposium of Electronic Commerce (ISEC 2002), USA, IEEE Press, pp. 58-63.

  388. Junqi Zhang, Vijay Varadharajan, and Yi Mu, ``A Secure Object Sharing Scheme for Java Card," ICICS 2002, Lecture Notes in Computer Science 2513, Springer Verlag, 2002. pp. 243-251

  389. Yi Mu, Junqi Zhang, Vijay Varadharajan, "m out of n oblivious transfer," ACISP 2002, Lecture Notes in Computer Science 2384, Springer Verlag, 2002. pp. 395-405

  390. Yi Mu and Vijay Varadharajan, ``A complete group cryptographic system," in Proceedings of Cryptology and Network Security 2002, USA. pp. 272-277.
    2001
  391. Yi Mu and Vijay Varadharajan, "Robust and secure broadcasting," in Proceedings of INDOCRYPT2001, Lecture Notes in Computer Science 2247, Springer Verlag, 2001, pp. 223-231.

  392. Yi Mu and Vijay Varadharajan, "A fail-stop verifiable secret sharing scheme," in Proceedings of Cryptology and Network Security, Taiwan, 2001, pp. 146-153.

  393. Pradeep Ray, Bejoy Cherian, Yi Mu and Bill Vargas, ``Interoperability of Medical Information Systems Using Java/CORBA and HL7," in Proceedings of International Health Informatics Conference (HIC2001), Canberra, Australia, July 2001.

  394. Yi Mu, Khanh Quoc Nguyen and Vijay Varadharajan, ``A fair electronic cash scheme," in Proceedings of the Second International Symposium on Electronic Commerce, in Lecture Notes Computer Science 2040, pp. 20-32, Springer Verlag, 2001.
    2000
  395. Yi Mu and Vijay Varadharajan, ``An Internet Anonymous Auction Scheme," in Lecture Notes in Computer Science 2015, Springer Verlag, ICISC 2000, pp. 171-182

  396. Yi Mu and Vijay Varadharajan, ``Distributed Signcryption," in Lecture Notes in Computer Science 1977 (Proceedings of INDOCRYPT 2000), Springer Verlag, 2000, pp. 155-164

  397. Weiliang Zhao, Vijay Varadharajan, and Yi Mu, ``Fair Online Gambling," in Proceedings of Annual Computer Security Applications Conference, IEEE Computer Society, ACSAC 2000, pp. 394-400.

  398. Yi Mu and Vijay Varadharajan, "Fail-stop Confirmer Signatures," In Proceedings of 5th Australasian Conference on Information Security and Privacy (ACISP 2000), Lecture Notes in Computer Science 1841, Springer Verlag, pp. 368-377, 2000

  399. Yi Mu and Vijay Varadharajan, "Schematic Protection Model Supporting Access Control Policies," in Proceedings of the 11th Australasian Database Conference (ADC2000), IEEE Press, 2000.
    1999
  400. Yi Mu, Vijay Varadharajan and K. Q. Nguyen, "Delegated Decryption," in Lecture Notes in Computer Science 1746 (Proceedings of Cryptography and Coding, UK), Springer Verlag, 1999, pp. 258-269.

  401. Khanh Quoc Nguyen, Feng Bao, Yi Mu, and Vijay Varadharajan, "Zero-knowledge proofs of possession of digital signatures and its applications," in Lecture Notes in Computer Science, 1726 (Proceedings of ICICS'99), Springer Verlag, 1999.

  402. Khanh Quoc Nguyen, Yi Mu, and Vijay Varadharajan, "Undeniable confirmer signature," in Lecture Notes in Computer Science 1729 (Proceedings of ISW'99), Springer Verlag, pp. 235-246, 1999.

  403. Khanh Nguyen, Vijay Varadharajan and Yi Mu, "Batching Proofs of Knowledge and its applications," 10th International Workshop on Databases and Expert Systems Applications, IEEE Press, ISBN 0-7695-0281-4, pp. 844-849, 1999.

  404. Khanh Quoc Nguyen, Yi Mu, and Vijay Varadharajan, "Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature," in Proc. of ACISP'99. Lecture Notes in Computer Science, Springer Verlag, pp. 117-128, 1999.
    1998
  405. Vijay Varadharajan, Nikhir Kumar, and Yi Mu, "An approach to designing security model for mobile agent based systems," in the Proceedings of GLOBECOM'98, Sydney, 1998.

  406. Yi Mu and Vijay Varadharajan, "A new scheme of credit based payment for electronic commerce," in the Proceedings of 23rd Local Area Networks Conference, IEEE Computer Society, October, Boston, pp. 278-284, 1998.

  407. Yi Mu and Vijay Varadharajan, "Anonymous Secure E-Voting over a Network," in The Proceedings of Annual Computer Security Applications Conference, IEEE Computer Society, ACSAC'98, pp. 293-299, 1998.

  408. Vijay Varadharajan, Nikhir Kumar, and Yi Mu, "Security Agent Based Distributed Authorization: An Approach," in the Proceedings of the 21st National Information Systems Security Conference (NISSC'98), Oct. USA, pp. 315-328 1998.

  409. Yi Mu and Vijay Varadharajan "Anonymous Internet Credit Cards," in the Proceedings of the 21st National Information Systems Security Conference (NISSC'98), Oct. USA, pp. 229-237, 1998.

  410. Vijay Varadharajan, Yi Mu and M. Hitchens "Design choice for public key Kerberos authentication system," in Proceedings of ACSC'98, Springer Verlag, 1998.
    1997
  411. Vijay Varadharajan and Yi Mu, "Preserving privacy in mobile communications: A hybrid method," in Proceedings of 1997 IEEE International Conference on Personal Wireless Communications (ICPWC'97), India, 1997.

  412. Khanh Quoc Nguyen, Yi Mu, and Vijay Varadharajan, ``Micro-Digital Money for Electronic Commerce,'' In Proceedings of Annual Computer Security Applications conference, IEEE Computer Society, Dec 8-12, 1997, San Diego California, pp. 2-8

  413. Khanh Quoc Nguyen, Vijay Varadharajan, and Yi Mu, ``Secure and efficient digital coins,'' In Proceedings of Annual Computer Security Applications conf, by IEEE Computer Society, Dec 8-12, 1997, San Diego California, pp. 9-15.

  414. Khanh Quoc Nguyen, Yi Mu, and Vijay Varadharajan, ``Digital coins based on hash chain,'' Proceedings of the 20th National Information Systems Security Conference, Baltimore, USA, pp. 72-79, 1997.

  415. Khanh Quoc Nguyen, Yi Mu, and Vijay Varadharajan, "A new digital cash scheme based on blind Nyberg-Rueppel digital signature," in Proceedings of the Information Security Workshop, Japan, Lecture Notes in Computer Science 1396, pp. 313-320, 1997

  416. Khanh Quoc Nguyen, Vijay Varadharajan, and Yi Mu, "An New Efficient Off-Line Anonymous Cash Scheme," in Proceedings of the Eighth Annual International Symposium on Algorithms and Computation, Singapore, December 17-19, Lecture Notes in Computer Science 1350, Springer Verlag, pp. 193-201, 1997

  417. Khanh Quoc Nguyen, Yi Mu, and Vijay Varadharajan, "One-Response Off-Line Digital Coins," in Proceedings of Fourth Annual Workshop on Selected Areas in Cryptography (SAC'97), Ottawa, August, 1997, pp. 244-251.

  418. Yi Mu, Vijay Varadharajan, and Yan Xia Lin "New Micropayment Schemes Based on PayWords," in Proceedings of 2nd Australasian Conference on Information Security and Privacy (ACISP '97), Lecture Notes in Computer Science 1270, pp. 283-293, Springer Verlag, 1997.
  419. Vijay Varadharajan and Yi Mu, "Logic Based Analysis of Secure Electronic Payment Protocols," in Proceedings of the Australian Computer Society Conference, Sydney, pp. 112-121 (1997)

  420. 1996
  421. Vijay Varadharajan and Yi Mu, "Design of Security Protocols for Mobile Systems: Symmetric Key Approach," in Proceedings of International Conference on Wireless Communication, Alberta, Canada, pp. 561-568 (1996)
  422. Yi Mu and Vijay Varadharajan, "On the design of security protocols for mobile communications," in Proceedings of ACISP 1996, Lecture Notes in Computer Science 1172, Springer-Verlag, pp. 134-145.
  423. Yi Mu and Yuliang Zheng, "An alternative model of quantum key agreement via photon coupling," in Proceedings of ACISP 1996, Lecture Notes in Computer Science 1172, Springer-Verlag, pp. 320-331.
  424. Vijay Varadharajan and Yi Mu, "Issues in Securing Electronic Commerce over Internet," in Proceedings of AUUG & Aisa Pacific World Wide Web Conference, Australia, pp. 369-381, 1996.
  425. Vijay Varadharajan and Yi Mu, "On the Design of Secure Electronic Payment Protocols for the Internet," in Proceedings of the IEEE Annual Computer Security Applications Conference, USA, 1996.
  426. Book Chapters:                                                back to top

  427. Yi Gao, Willy Susilo, Yi Mu, and Jennifer Seberry, "Efficient Trapdoor Based Client Puzzle Against DoS Attacks," Network Security, S. Huang, D. MacCallum and D-Z. Du (eds.), pp. 229-250, Springer, 2010

  428. Xinyi Huang, Willy Susilo, Yi Mu and Wei Wu. Delegating Authentication Power in Mobile Networks. Security and Privacy in Wireless and Mobile Computing, S. Gritzalis, T. Karygiannis and C. Skianis (eds), Troubador Publishing, June 2008.

  429. Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen, and Fangguo Zhang, ``Efficient Authentication Schemes for AODV and DSR," Book Chapter in Security in Distributed and Networking Systems, World Scientific Publishing, 2007

  430. Willy Susilo, Fangguo Zhang and Yi Mu, "Separable Threshold Decryption for Ad-Hoc Wireless Networks," Advances in Ad Hoc Wireless Networks, D-Z. Du and G. Xue (eds.), Springer-Verlag, Berlin, 2006 (accepted).

  431. Yi Mu, Vijay Varadharajan, and Khanh Quoc Nguyen, "Digital Cash," in Advances in Payment Technology for E-Commerce, Springer Verlag, 2003, pp. 171-194.

  432. Vijay Varadharajan and Yi Mu,"Design of Secure End-to-End Protocols for Mobile Systems," in Mobile Communications, Ed. Jose L. Encarnacao and Kan M. Rabaey (Chapman & Hall, 1996), pp. 258-266.
  433. Craig Savage, and Yi Mu, ``Injection locked lasers as amplifiers", in ``Quantum Communications and Measurement,'' ed. V.P. Belavkin et al. (Plenum, 1995) pp. 503-509.

                                                            back to top