The SCEAS System
| |||||||

## Search the dblp DataBase
Yi Mu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Yi Mu, Vijay Varadharajan
**Fail-Stop Confirmer Signatures.**[Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:368-377 [Conf] - Yi Mu, Vijay Varadharajan
**On the design of security protocols for mobile communications.**[Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:134-145 [Conf] - Yi Mu, Vijay Varadharajan, Yan-Xia Lin
**New Micropayment Schemes Based on PayWords.**[Citation Graph (0, 0)][DBLP] ACISP, 1997, pp:283-293 [Conf] - Yi Mu, Yuliang Zheng
**An alternative model of quantum key agreement via photon coupling.**[Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:320-331 [Conf] - Yi Mu, Junqi Zhang, Vijay Varadharajan
**m out of n Oblivious Transfer.**[Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:395-405 [Conf] - Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
**Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature.**[Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:117-128 [Conf] - Willy Susilo, Yi Mu
**On the Security of Nominative Signatures.**[Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:329-335 [Conf] - Willy Susilo, Fangguo Zhang, Yi Mu
**Identity-Based Strong Designated Verifier Signature Schemes.**[Citation Graph (0, 0)][DBLP] ACISP, 2004, pp:313-324 [Conf] - Shidi Xu, Yi Mu, Willy Susilo
**Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.**[Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:99-110 [Conf] - Willy Susilo, Yi Mu
**Deniable Ring Authentication Revisited.**[Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:149-163 [Conf] - Yi Mu, Vijay Varadharajan
**Anonymous Secure E-Voting Over a Network.**[Citation Graph (0, 0)][DBLP] ACSAC, 1998, pp:293-299 [Conf] - Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
**Micro-Digital Money for Electronic Commerce.**[Citation Graph (0, 0)][DBLP] ACSAC, 1997, pp:2-8 [Conf] - Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
**Secure and Efficient Digital Coins.**[Citation Graph (0, 0)][DBLP] ACSAC, 1997, pp:9-15 [Conf] - Vijay Varadharajan, Yi Mu
**On The Design Of Secure Electronic Payment Schemes For Internet.**[Citation Graph (0, 0)][DBLP] ACSAC, 1996, pp:78-87 [Conf] - Weiliang Zhao, Vijay Varadharajan, Yi Mu
**Fair On-line Gambling.**[Citation Graph (0, 0)][DBLP] ACSAC, 2000, pp:394-400 [Conf] - Weiliang Zhao, Vijay Varadharajan, Yi Mu
**A Secure Mental Poker Protocol Over The Internet.**[Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2003, pp:105-109 [Conf] - Yi Mu, Vijay Varadharajan
**Towards a Protection Model for Supporting Multiple Access Control Policies.**[Citation Graph (0, 0)][DBLP] Australasian Database Conference, 2000, pp:107-114 [Conf] - Junqi Zhang, Vijay Varadharajan, Yi Mu
**A Scalable Multi-service Group Key Management Scheme.**[Citation Graph (0, 0)][DBLP] AICT/ICIW, 2006, pp:172- [Conf] - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
**Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World.**[Citation Graph (0, 0)][DBLP] AINA, 2005, pp:649-654 [Conf] - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
**Certificateless Designated Verifier Signature Schemes.**[Citation Graph (0, 0)][DBLP] AINA (2), 2006, pp:15-19 [Conf] - Willy Susilo, Fangguo Zhang, Yi Mu
**Privacy-Enhanced Internet Storage.**[Citation Graph (0, 0)][DBLP] AINA, 2005, pp:603-608 [Conf] - Fangguo Zhang, Yi Mu, Willy Susilo
**Reducing Security Overhead for Mobile Networks.**[Citation Graph (0, 0)][DBLP] AINA, 2005, pp:398-403 [Conf] - Junqi Zhang, Vijay Varadharajan, Yi Mu
**Securing XML Document Sources and Their Distribution.**[Citation Graph (0, 0)][DBLP] AINA (1), 2004, pp:562-567 [Conf] - Yi Mu, Willy Susilo, Yan-Xia Lin, Chun Ruan
**Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption.**[Citation Graph (0, 0)][DBLP] ASIAN, 2004, pp:169-181 [Conf] - Yi Mu, Fangguo Zhang, Willy Susilo
**Deniable Partial Proxy Signatures.**[Citation Graph (0, 0)][DBLP] ASIAN, 2004, pp:182-194 [Conf] - Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang
**Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).**[Citation Graph (0, 0)][DBLP] ATC, 2006, pp:531-540 [Conf] - Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
**Efficient Signcryption Without Random Oracles.**[Citation Graph (0, 0)][DBLP] ATC, 2006, pp:449-458 [Conf] - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
**On the Security of Certificateless Signature Schemes from Asiacrypt 2003.**[Citation Graph (0, 0)][DBLP] CANS, 2005, pp:13-25 [Conf] - Ching Yu Ng, Willy Susilo, Yi Mu
**Designated group credentials.**[Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:59-65 [Conf] - Willy Susilo, Yi Mu
**On Fail-Stop Verifiable Secret Sharing Schemes.**[Citation Graph (0, 0)][DBLP] Security and Management, 2003, pp:663-667 [Conf] - Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
**Compact E-Cash from Bounded Accumulator.**[Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:178-195 [Conf] - Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu
**Batching Proofs of Knowledge and Its Applications.**[Citation Graph (0, 0)][DBLP] DEXA Workshop, 1999, pp:844-849 [Conf] - Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang
**Short Designated Verifier Proxy Signature from Pairings.**[Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:835-844 [Conf] - Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen
**A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World.**[Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:480-489 [Conf] - Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan
**Access Policy Sheet for Access Control in Fine-Grained XML.**[Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:1273-1282 [Conf] - Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen
**Identity-Based Universal Designated Verifier Signatures.**[Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:825-834 [Conf] - Shidi Xu, Yi Mu, Willy Susilo
**Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks.**[Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:854-863 [Conf] - Willy Susilo, Yi Mu
**Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing.**[Citation Graph (0, 0)][DBLP] EuroPKI, 2006, pp:68-80 [Conf] - Fangguo Zhang, Willy Susilo, Yi Mu
**Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures).**[Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:45-56 [Conf] - Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo
**Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.**[Citation Graph (0, 0)][DBLP] Financial Cryptography, 2006, pp:251-265 [Conf] - Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
**Efficient Partially Blind Signatures with Provable Security.**[Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:345-354 [Conf] - Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu
**Universal Designated Verifier Signature Without Delegatability.**[Citation Graph (0, 0)][DBLP] ICICS, 2006, pp:479-498 [Conf] - Willy Susilo, Yi Mu, Fangguo Zhang
**Perfect Concurrent Signature Schemes.**[Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:14-26 [Conf] - Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan
**Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications.**[Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:103-118 [Conf] - Junqi Zhang, Vijay Varadharajan, Yi Mu
**A Secure Object Sharing Scheme for Java Card.**[Citation Graph (0, 0)][DBLP] ICICS, 2002, pp:243-251 [Conf] - Yi Mu, Vijay Varadharajan
**An Internet Anonymous Auction Scheme.**[Citation Graph (0, 0)][DBLP] ICISC, 2000, pp:171-182 [Conf] - Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu
**An Efficient Static Blind Ring Signature Scheme.**[Citation Graph (0, 0)][DBLP] ICISC, 2005, pp:410-423 [Conf] - Willy Susilo, Yi Mu
**Non-interactive Deniable Ring Authentication.**[Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:386-401 [Conf] - Ching Yu Ng, Willy Susilo, Yi Mu
**Universal Designated Multi Verifier Signature Schemes.**[Citation Graph (0, 0)][DBLP] ICPADS (2), 2005, pp:305-309 [Conf] - Jing Wu, Jennifer Seberry, Yi Mu, Chun Ruan
**Delegatable Access Control for Fine-Grained XML.**[Citation Graph (0, 0)][DBLP] ICPADS (2), 2005, pp:270-274 [Conf] - Vijay Varadharajan, Yi Mu
**Design of Secure End-toEnd Protocols for Mobile Systems.**[Citation Graph (0, 0)][DBLP] IFIP World Conference on Mobile Communications, 1996, pp:258-266 [Conf] - Yi Mu, Vijay Varadharajan, Khanh Quoc Nguyen
**Delegated Decryption.**[Citation Graph (0, 0)][DBLP] IMA Int. Conf., 1999, pp:258-269 [Conf] - Yi Mu, Willy Susilo, Yan-Xia Lin
**Identity-Based Broadcasting.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:177-190 [Conf] - Yi Mu, Vijay Varadharajan
**Distributed Signcryption.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2000, pp:155-164 [Conf] - Yi Mu, Vijay Varadharajan
**Robust and Secure Broadcasting.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2001, pp:223-231 [Conf] - Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu
**A New Efficient Off-line Anonymous Cash Scheme.**[Citation Graph (0, 0)][DBLP] ISAAC, 1997, pp:193-201 [Conf] - Yi Mu, Khanh Quoc Nguyen, Vijay Varadharajan
**A Fair Electronic Cash Scheme.**[Citation Graph (0, 0)][DBLP] ISEC, 2001, pp:20-32 [Conf] - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
**Short (Identity-Based) Strong Designated Verifier Signature Schemes.**[Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:214-225 [Conf] - Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
**Privately Retrieve Data from Large Databases.**[Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:367-378 [Conf] - Lan Zhou, Willy Susilo, Yi Mu
**Three-Round Secret Handshakes Based on ElGamal and DSA.**[Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:332-342 [Conf] - Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
**A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature.**[Citation Graph (0, 0)][DBLP] ISW, 1997, pp:313-320 [Conf] - Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
**Undeniable Confirmer Signature.**[Citation Graph (0, 0)][DBLP] ISW, 1999, pp:235-246 [Conf] - Junqi Zhang, Vijay Varadharajan, Yi Mu
**A Secure PIM-SM Multicast Routing Protocol.**[Citation Graph (0, 0)][DBLP] IWDC, 2004, pp:276-288 [Conf] - Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
**Ad Hoc Group Signatures.**[Citation Graph (0, 0)][DBLP] IWSEC, 2006, pp:120-135 [Conf] - Yi Mu, Vijay Varadharajan
**A New Scheme of Credit based Payment for Electronic Commerce.**[Citation Graph (0, 0)][DBLP] LCN, 1998, pp:278-0 [Conf] - Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu
**Proxy Signature Without Random Oracles.**[Citation Graph (0, 0)][DBLP] MSN, 2006, pp:473-484 [Conf] - Shidi Xu, Yi Mu, Willy Susilo
**Secure AODV Routing Protocol Using One-Time Signature.**[Citation Graph (0, 0)][DBLP] MSN, 2005, pp:288-297 [Conf] - Lan Zhou, Willy Susilo, Yi Mu
**Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings.**[Citation Graph (0, 0)][DBLP] MSN, 2006, pp:521-532 [Conf] - Yi Mu, Willy Susilo, Huafei Zhu
**Compact sequential aggregate signatures.**[Citation Graph (0, 0)][DBLP] SAC, 2007, pp:249-253 [Conf] - Man Ho Au, Willy Susilo, Yi Mu
**Constant-Size Dynamic**[Citation Graph (0, 0)][DBLP]*k*-TAA. SCN, 2006, pp:111-125 [Conf] - Willy Susilo, Yi Mu
**Tripartite Concurrent Signatures.**[Citation Graph (0, 0)][DBLP] SEC, 2005, pp:425-442 [Conf] - Ching Lin, Vijay Varadharajan, Yan Wang, Yi Mu
**On the Design of a New Trust Model for Mobile Agent Security.**[Citation Graph (0, 0)][DBLP] TrustBus, 2004, pp:60-69 [Conf] - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
**Restricted Universal Designated Verifier Signature.**[Citation Graph (0, 0)][DBLP] UIC, 2006, pp:874-882 [Conf] - Junqi Zhang, Vijay Varadharajan, Yi Mu
**ID-based Secure PIM-SM Schemes.**[Citation Graph (0, 0)][DBLP] Wireless and Optical Communications, 2006, pp:190-195 [Conf] - Yi Mu, Beddhu Murali, Junfeng Gu
**Volumetric Color Image Compression Using SET Partitioning Methods.**[Citation Graph (0, 0)][DBLP] IPCV, 2006, pp:445-450 [Conf] - Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu
**A New Signature Scheme Without Random Oracles from Bilinear Pairings.**[Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:67-80 [Conf] - Yi Mu, Vijay Varadharajan
**Group Cryptography: Signature and Encryption.**[Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal] - Vijay Varadharajan, Khanh Quoc Nguyen, Yi Mu
**On the Design of Efficient RSA-based Off-line Electronic Cash Schemes.**[Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1999, v:226, n:1-2, pp:173-184 [Journal] - Qiong Ren, Yi Mu, Willy Susilo
**SEFAP: An Email System for Anti-Phishing.**[Citation Graph (0, 0)][DBLP] ACIS-ICIS, 2007, pp:782-787 [Conf] - Man Ho Au, Willy Susilo, Yi Mu
**Practical Compact E-Cash.**[Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:431-445 [Conf] - Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu
**Certificateless Signature Revisited.**[Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:308-322 [Conf] - Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu
**Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.**[Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:18-30 [Conf] - Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang
**Identity-Based Proxy Signature from Pairings.**[Citation Graph (0, 0)][DBLP] ATC, 2007, pp:22-31 [Conf] - Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin
**Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection.**[Citation Graph (0, 0)][DBLP] ATC, 2007, pp:32-41 [Conf] - Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu
**A Generic Construction for Universally-Convertible Undeniable Signatures.**[Citation Graph (0, 0)][DBLP] CANS, 2007, pp:15-33 [Conf] - Fuchun Guo, Yi Mu, Zhide Chen
**Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles.**[Citation Graph (0, 0)][DBLP] CANS, 2007, pp:1-14 [Conf] - Fuchun Guo, Zhide Chen, Yi Mu, Li Xu, Shengyuan Zhang
**Secure and Efficient Trust Negotiation.**[Citation Graph (0, 0)][DBLP] CIS, 2006, pp:374-384 [Conf] - Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu
**Certificate-Based Signature: Security Model and Efficient Construction.**[Citation Graph (0, 0)][DBLP] EuroPKI, 2007, pp:110-125 [Conf] - Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
**Efficient Partially Blind Signatures with Provable Security.**[Citation Graph (0, 0)][DBLP] ICCSA (3), 2007, pp:1096-1105 [Conf] - Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo
**Formal Definition and Construction of Nominative Signature.**[Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:57-68 [Conf] - Lan Zhou, Willy Susilo, Yi Mu
**New Construction of Group Secret Handshakes Based on Pairings.**[Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:16-30 [Conf] - Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong, Yi Mu
**Nominative Signature from Ring Signature.**[Citation Graph (0, 0)][DBLP] IWSEC, 2007, pp:396-411 [Conf] - Huafei Zhu, Willy Susilo, Yi Mu
**Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:134-149 [Conf] - Yong Li 0002, Willy Susilo, Yi Mu, Dingyi Pei
**Designated Verifier Signature: Definition, Framework and New Constructions.**[Citation Graph (0, 0)][DBLP] UIC, 2007, pp:1191-1200 [Conf] - Shuo Zheng, Luke McAven, Yi Mu
**First price sealed bid auction without auctioneers.**[Citation Graph (0, 0)][DBLP] IWCMC, 2007, pp:127-131 [Conf] - Yiqun Chen, Willy Susilo, Yi Mu
**Identity-based anonymous designated ring signatures.**[Citation Graph (0, 0)][DBLP] IWCMC, 2006, pp:189-194 [Conf] - Fuchun Guo, Yi Mu, Zhide Chen
**Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key.**[Citation Graph (0, 0)][DBLP] Pairing, 2007, pp:392-406 [Conf] - Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu
**Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length.**[Citation Graph (0, 0)][DBLP] Pairing, 2007, pp:367-391 [Conf] - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
**Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004.**[Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:1, pp:71-74 [Journal] **Constructing an Authentication Token to Access External Services in Service Aggregation.**[Citation Graph (, )][DBLP]**Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders.**[Citation Graph (, )][DBLP]**Sanitizable Signatures Revisited.**[Citation Graph (, )][DBLP]**Privacy for Private Key in Signatures.**[Citation Graph (, )][DBLP]**Multi-Identity Single-Key Decryption without Random Oracles.**[Citation Graph (, )][DBLP]**Publicly Verifiable Privacy-Preserving Group Decryption.**[Citation Graph (, )][DBLP]**Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.**[Citation Graph (, )][DBLP]**Efficient Non-interactive Range Proof.**[Citation Graph (, )][DBLP]**Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.**[Citation Graph (, )][DBLP]**RFID Privacy Models Revisited.**[Citation Graph (, )][DBLP]**New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing.**[Citation Graph (, )][DBLP]**Asymmetric Group Key Agreement.**[Citation Graph (, )][DBLP]**Identity-Based Online/Offline Encryption.**[Citation Graph (, )][DBLP]**Practical Anonymous Divisible E-Cash from Bounded Accumulators.**[Citation Graph (, )][DBLP]**Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy.**[Citation Graph (, )][DBLP]**Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.**[Citation Graph (, )][DBLP]**Enhanced Target Collision Resistant Hash Functions Revisited.**[Citation Graph (, )][DBLP]**Policy-Controlled Signatures.**[Citation Graph (, )][DBLP]**How to Balance Privacy with Authenticity.**[Citation Graph (, )][DBLP]**A Generic Construction of Identity-Based Online/Offline Signcryption.**[Citation Graph (, )][DBLP]**Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles.**[Citation Graph (, )][DBLP]**Universal Designated Verifier Signatures with Threshold-Signers.**[Citation Graph (, )][DBLP]**Identity-Based On-Line/Off-Line Signcryption.**[Citation Graph (, )][DBLP]**Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.**[Citation Graph (, )][DBLP]**Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings.**[Citation Graph (, )][DBLP]**Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.**[Citation Graph (, )][DBLP]**Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.**[Citation Graph (, )][DBLP]**Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles.**[Citation Graph (, )][DBLP]**Optimal Online/Offline Signature: How to Sign a Message without Online Computation.**[Citation Graph (, )][DBLP]**Server-Aided Verification Signatures: Definitions and New Constructions.**[Citation Graph (, )][DBLP]**How to Prove Security of a Signature with a Tighter Security Reduction.**[Citation Graph (, )][DBLP]**Server-Controlled Identity-Based Authenticated Key Exchange.**[Citation Graph (, )][DBLP]**Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?**[Citation Graph (, )][DBLP]**A new group rekeying scheme based on t-packing designs for ad hoc networks.**[Citation Graph (, )][DBLP]**Hierarchical Identity-Based Online/Offline Encryption.**[Citation Graph (, )][DBLP]**Secure Mobile Agents with Designated Hosts.**[Citation Graph (, )][DBLP]**An Efficient Certificateless Encryption Scheme in the Standard Model.**[Citation Graph (, )][DBLP]**Open-Source Tools for Immersive Environmental Visualization.**[Citation Graph (, )][DBLP]**Cryptanalysis of simple three-party key exchange protocol.**[Citation Graph (, )][DBLP]
Search in 0.060secs, Finished in 0.067secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |