Search the dblp DataBase
Yi Mu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yi Mu , Vijay Varadharajan Fail-Stop Confirmer Signatures. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:368-377 [Conf ] Yi Mu , Vijay Varadharajan On the design of security protocols for mobile communications. [Citation Graph (0, 0)][DBLP ] ACISP, 1996, pp:134-145 [Conf ] Yi Mu , Vijay Varadharajan , Yan-Xia Lin New Micropayment Schemes Based on PayWords. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:283-293 [Conf ] Yi Mu , Yuliang Zheng An alternative model of quantum key agreement via photon coupling. [Citation Graph (0, 0)][DBLP ] ACISP, 1996, pp:320-331 [Conf ] Yi Mu , Junqi Zhang , Vijay Varadharajan m out of n Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:395-405 [Conf ] Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:117-128 [Conf ] Willy Susilo , Yi Mu On the Security of Nominative Signatures. [Citation Graph (0, 0)][DBLP ] ACISP, 2005, pp:329-335 [Conf ] Willy Susilo , Fangguo Zhang , Yi Mu Identity-Based Strong Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:313-324 [Conf ] Shidi Xu , Yi Mu , Willy Susilo Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:99-110 [Conf ] Willy Susilo , Yi Mu Deniable Ring Authentication Revisited. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:149-163 [Conf ] Yi Mu , Vijay Varadharajan Anonymous Secure E-Voting Over a Network. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:293-299 [Conf ] Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan Micro-Digital Money for Electronic Commerce. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:2-8 [Conf ] Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan Secure and Efficient Digital Coins. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:9-15 [Conf ] Vijay Varadharajan , Yi Mu On The Design Of Secure Electronic Payment Schemes For Internet. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:78-87 [Conf ] Weiliang Zhao , Vijay Varadharajan , Yi Mu Fair On-line Gambling. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:394-400 [Conf ] Weiliang Zhao , Vijay Varadharajan , Yi Mu A Secure Mental Poker Protocol Over The Internet. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:105-109 [Conf ] Yi Mu , Vijay Varadharajan Towards a Protection Model for Supporting Multiple Access Control Policies. [Citation Graph (0, 0)][DBLP ] Australasian Database Conference, 2000, pp:107-114 [Conf ] Junqi Zhang , Vijay Varadharajan , Yi Mu A Scalable Multi-service Group Key Management Scheme. [Citation Graph (0, 0)][DBLP ] AICT/ICIW, 2006, pp:172- [Conf ] Xinyi Huang , Willy Susilo , Yi Mu , Futai Zhang Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:649-654 [Conf ] Xinyi Huang , Willy Susilo , Yi Mu , Futai Zhang Certificateless Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP ] AINA (2), 2006, pp:15-19 [Conf ] Willy Susilo , Fangguo Zhang , Yi Mu Privacy-Enhanced Internet Storage. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:603-608 [Conf ] Fangguo Zhang , Yi Mu , Willy Susilo Reducing Security Overhead for Mobile Networks. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:398-403 [Conf ] Junqi Zhang , Vijay Varadharajan , Yi Mu Securing XML Document Sources and Their Distribution. [Citation Graph (0, 0)][DBLP ] AINA (1), 2004, pp:562-567 [Conf ] Yi Mu , Willy Susilo , Yan-Xia Lin , Chun Ruan Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. [Citation Graph (0, 0)][DBLP ] ASIAN, 2004, pp:169-181 [Conf ] Yi Mu , Fangguo Zhang , Willy Susilo Deniable Partial Proxy Signatures. [Citation Graph (0, 0)][DBLP ] ASIAN, 2004, pp:182-194 [Conf ] Bo Qin , Qianhong Wu , Willy Susilo , Yi Mu , Yumin Wang Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:531-540 [Conf ] Qianhong Wu , Yi Mu , Willy Susilo , Fangguo Zhang Efficient Signcryption Without Random Oracles. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:449-458 [Conf ] Xinyi Huang , Willy Susilo , Yi Mu , Futai Zhang On the Security of Certificateless Signature Schemes from Asiacrypt 2003. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:13-25 [Conf ] Ching Yu Ng , Willy Susilo , Yi Mu Designated group credentials. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:59-65 [Conf ] Willy Susilo , Yi Mu On Fail-Stop Verifiable Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:663-667 [Conf ] Man Ho Au , Qianhong Wu , Willy Susilo , Yi Mu Compact E-Cash from Bounded Accumulator. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2007, pp:178-195 [Conf ] Khanh Quoc Nguyen , Vijay Varadharajan , Yi Mu Batching Proofs of Knowledge and Its Applications. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1999, pp:844-849 [Conf ] Xinyi Huang , Yi Mu , Willy Susilo , Futai Zhang Short Designated Verifier Proxy Signature from Pairings. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:835-844 [Conf ] Xinyi Huang , Yi Mu , Willy Susilo , Fangguo Zhang , Xiaofeng Chen A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:480-489 [Conf ] Jing Wu , Yi Mu , Jennifer Seberry , Chun Ruan Access Policy Sheet for Access Control in Fine-Grained XML. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:1273-1282 [Conf ] Fangguo Zhang , Willy Susilo , Yi Mu , Xiaofeng Chen Identity-Based Universal Designated Verifier Signatures. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:825-834 [Conf ] Shidi Xu , Yi Mu , Willy Susilo Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:854-863 [Conf ] Willy Susilo , Yi Mu Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:68-80 [Conf ] Fangguo Zhang , Willy Susilo , Yi Mu Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2005, pp:45-56 [Conf ] Xiaofeng Chen , Fangguo Zhang , Yi Mu , Willy Susilo Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2006, pp:251-265 [Conf ] Qianhong Wu , Willy Susilo , Yi Mu , Fangguo Zhang Efficient Partially Blind Signatures with Provable Security. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:345-354 [Conf ] Xinyi Huang , Willy Susilo , Yi Mu , Wei Wu Universal Designated Verifier Signature Without Delegatability. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:479-498 [Conf ] Willy Susilo , Yi Mu , Fangguo Zhang Perfect Concurrent Signature Schemes. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:14-26 [Conf ] Khanh Quoc Nguyen , Feng Bao , Yi Mu , Vijay Varadharajan Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:103-118 [Conf ] Junqi Zhang , Vijay Varadharajan , Yi Mu A Secure Object Sharing Scheme for Java Card. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:243-251 [Conf ] Yi Mu , Vijay Varadharajan An Internet Anonymous Auction Scheme. [Citation Graph (0, 0)][DBLP ] ICISC, 2000, pp:171-182 [Conf ] Qianhong Wu , Fangguo Zhang , Willy Susilo , Yi Mu An Efficient Static Blind Ring Signature Scheme. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:410-423 [Conf ] Willy Susilo , Yi Mu Non-interactive Deniable Ring Authentication. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:386-401 [Conf ] Ching Yu Ng , Willy Susilo , Yi Mu Universal Designated Multi Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP ] ICPADS (2), 2005, pp:305-309 [Conf ] Jing Wu , Jennifer Seberry , Yi Mu , Chun Ruan Delegatable Access Control for Fine-Grained XML. [Citation Graph (0, 0)][DBLP ] ICPADS (2), 2005, pp:270-274 [Conf ] Vijay Varadharajan , Yi Mu Design of Secure End-toEnd Protocols for Mobile Systems. [Citation Graph (0, 0)][DBLP ] IFIP World Conference on Mobile Communications, 1996, pp:258-266 [Conf ] Yi Mu , Vijay Varadharajan , Khanh Quoc Nguyen Delegated Decryption. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:258-269 [Conf ] Yi Mu , Willy Susilo , Yan-Xia Lin Identity-Based Broadcasting. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2003, pp:177-190 [Conf ] Yi Mu , Vijay Varadharajan Distributed Signcryption. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:155-164 [Conf ] Yi Mu , Vijay Varadharajan Robust and Secure Broadcasting. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:223-231 [Conf ] Khanh Quoc Nguyen , Vijay Varadharajan , Yi Mu A New Efficient Off-line Anonymous Cash Scheme. [Citation Graph (0, 0)][DBLP ] ISAAC, 1997, pp:193-201 [Conf ] Yi Mu , Khanh Quoc Nguyen , Vijay Varadharajan A Fair Electronic Cash Scheme. [Citation Graph (0, 0)][DBLP ] ISEC, 2001, pp:20-32 [Conf ] Xinyi Huang , Willy Susilo , Yi Mu , Futai Zhang Short (Identity-Based) Strong Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP ] ISPEC, 2006, pp:214-225 [Conf ] Qianhong Wu , Yi Mu , Willy Susilo , Fangguo Zhang Privately Retrieve Data from Large Databases. [Citation Graph (0, 0)][DBLP ] ISPEC, 2006, pp:367-378 [Conf ] Lan Zhou , Willy Susilo , Yi Mu Three-Round Secret Handshakes Based on ElGamal and DSA. [Citation Graph (0, 0)][DBLP ] ISPEC, 2006, pp:332-342 [Conf ] Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. [Citation Graph (0, 0)][DBLP ] ISW, 1997, pp:313-320 [Conf ] Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan Undeniable Confirmer Signature. [Citation Graph (0, 0)][DBLP ] ISW, 1999, pp:235-246 [Conf ] Junqi Zhang , Vijay Varadharajan , Yi Mu A Secure PIM-SM Multicast Routing Protocol. [Citation Graph (0, 0)][DBLP ] IWDC, 2004, pp:276-288 [Conf ] Qianhong Wu , Willy Susilo , Yi Mu , Fangguo Zhang Ad Hoc Group Signatures. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:120-135 [Conf ] Yi Mu , Vijay Varadharajan A New Scheme of Credit based Payment for Electronic Commerce. [Citation Graph (0, 0)][DBLP ] LCN, 1998, pp:278-0 [Conf ] Xinyi Huang , Willy Susilo , Yi Mu , Wei Wu Proxy Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP ] MSN, 2006, pp:473-484 [Conf ] Shidi Xu , Yi Mu , Willy Susilo Secure AODV Routing Protocol Using One-Time Signature. [Citation Graph (0, 0)][DBLP ] MSN, 2005, pp:288-297 [Conf ] Lan Zhou , Willy Susilo , Yi Mu Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] MSN, 2006, pp:521-532 [Conf ] Yi Mu , Willy Susilo , Huafei Zhu Compact sequential aggregate signatures. [Citation Graph (0, 0)][DBLP ] SAC, 2007, pp:249-253 [Conf ] Man Ho Au , Willy Susilo , Yi Mu Constant-Size Dynamic k -TAA. [Citation Graph (0, 0)][DBLP ] SCN, 2006, pp:111-125 [Conf ] Willy Susilo , Yi Mu Tripartite Concurrent Signatures. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:425-442 [Conf ] Ching Lin , Vijay Varadharajan , Yan Wang , Yi Mu On the Design of a New Trust Model for Mobile Agent Security. [Citation Graph (0, 0)][DBLP ] TrustBus, 2004, pp:60-69 [Conf ] Xinyi Huang , Willy Susilo , Yi Mu , Futai Zhang Restricted Universal Designated Verifier Signature. [Citation Graph (0, 0)][DBLP ] UIC, 2006, pp:874-882 [Conf ] Junqi Zhang , Vijay Varadharajan , Yi Mu ID-based Secure PIM-SM Schemes. [Citation Graph (0, 0)][DBLP ] Wireless and Optical Communications, 2006, pp:190-195 [Conf ] Yi Mu , Beddhu Murali , Junfeng Gu Volumetric Color Image Compression Using SET Partitioning Methods. [Citation Graph (0, 0)][DBLP ] IPCV, 2006, pp:445-450 [Conf ] Fangguo Zhang , Xiaofeng Chen , Willy Susilo , Yi Mu A New Signature Scheme Without Random Oracles from Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] VIETCRYPT, 2006, pp:67-80 [Conf ] Yi Mu , Vijay Varadharajan Group Cryptography: Signature and Encryption. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal ] Vijay Varadharajan , Khanh Quoc Nguyen , Yi Mu On the Design of Efficient RSA-based Off-line Electronic Cash Schemes. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1999, v:226, n:1-2, pp:173-184 [Journal ] Qiong Ren , Yi Mu , Willy Susilo SEFAP: An Email System for Anti-Phishing. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:782-787 [Conf ] Man Ho Au , Willy Susilo , Yi Mu Practical Compact E-Cash. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:431-445 [Conf ] Xinyi Huang , Yi Mu , Willy Susilo , Duncan S. Wong , Wei Wu Certificateless Signature Revisited. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:308-322 [Conf ] Xiaofeng Chen , Fangguo Zhang , Willy Susilo , Yi Mu Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. [Citation Graph (0, 0)][DBLP ] ACNS, 2007, pp:18-30 [Conf ] Wei Wu , Yi Mu , Willy Susilo , Jennifer Seberry , Xinyi Huang Identity-Based Proxy Signature from Pairings. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:22-31 [Conf ] Qianhong Wu , Willy Susilo , Yi Mu , Bo Qin Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:32-41 [Conf ] Xinyi Huang , Yi Mu , Willy Susilo , Wei Wu A Generic Construction for Universally-Convertible Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] CANS, 2007, pp:15-33 [Conf ] Fuchun Guo , Yi Mu , Zhide Chen Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. [Citation Graph (0, 0)][DBLP ] CANS, 2007, pp:1-14 [Conf ] Fuchun Guo , Zhide Chen , Yi Mu , Li Xu , Shengyuan Zhang Secure and Efficient Trust Negotiation. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:374-384 [Conf ] Jiguo Li , Xinyi Huang , Yi Mu , Willy Susilo , Qianhong Wu Certificate-Based Signature: Security Model and Efficient Construction. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2007, pp:110-125 [Conf ] Qianhong Wu , Willy Susilo , Yi Mu , Fangguo Zhang Efficient Partially Blind Signatures with Provable Security. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2007, pp:1096-1105 [Conf ] Dennis Y. W. Liu , Duncan S. Wong , Xinyi Huang , Guilin Wang , Qiong Huang , Yi Mu , Willy Susilo Formal Definition and Construction of Nominative Signature. [Citation Graph (0, 0)][DBLP ] ICICS, 2007, pp:57-68 [Conf ] Lan Zhou , Willy Susilo , Yi Mu New Construction of Group Secret Handshakes Based on Pairings. [Citation Graph (0, 0)][DBLP ] ICICS, 2007, pp:16-30 [Conf ] Dennis Y. W. Liu , Shuang Chang , Duncan S. Wong , Yi Mu Nominative Signature from Ring Signature. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:396-411 [Conf ] Huafei Zhu , Willy Susilo , Yi Mu Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:134-149 [Conf ] Yong Li 0002 , Willy Susilo , Yi Mu , Dingyi Pei Designated Verifier Signature: Definition, Framework and New Constructions. [Citation Graph (0, 0)][DBLP ] UIC, 2007, pp:1191-1200 [Conf ] Shuo Zheng , Luke McAven , Yi Mu First price sealed bid auction without auctioneers. [Citation Graph (0, 0)][DBLP ] IWCMC, 2007, pp:127-131 [Conf ] Yiqun Chen , Willy Susilo , Yi Mu Identity-based anonymous designated ring signatures. [Citation Graph (0, 0)][DBLP ] IWCMC, 2006, pp:189-194 [Conf ] Fuchun Guo , Yi Mu , Zhide Chen Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. [Citation Graph (0, 0)][DBLP ] Pairing, 2007, pp:392-406 [Conf ] Xinyi Huang , Yi Mu , Willy Susilo , Wei Wu Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. [Citation Graph (0, 0)][DBLP ] Pairing, 2007, pp:367-391 [Conf ] Xinyi Huang , Willy Susilo , Yi Mu , Futai Zhang Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2007, v:22, n:1, pp:71-74 [Journal ] Constructing an Authentication Token to Access External Services in Service Aggregation. [Citation Graph (, )][DBLP ] Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. [Citation Graph (, )][DBLP ] Sanitizable Signatures Revisited. [Citation Graph (, )][DBLP ] Privacy for Private Key in Signatures. [Citation Graph (, )][DBLP ] Multi-Identity Single-Key Decryption without Random Oracles. [Citation Graph (, )][DBLP ] Publicly Verifiable Privacy-Preserving Group Decryption. [Citation Graph (, )][DBLP ] Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. [Citation Graph (, )][DBLP ] Efficient Non-interactive Range Proof. [Citation Graph (, )][DBLP ] Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. [Citation Graph (, )][DBLP ] RFID Privacy Models Revisited. [Citation Graph (, )][DBLP ] New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. [Citation Graph (, )][DBLP ] Asymmetric Group Key Agreement. [Citation Graph (, )][DBLP ] Identity-Based Online/Offline Encryption. [Citation Graph (, )][DBLP ] Practical Anonymous Divisible E-Cash from Bounded Accumulators. [Citation Graph (, )][DBLP ] Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. [Citation Graph (, )][DBLP ] Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships. [Citation Graph (, )][DBLP ] Enhanced Target Collision Resistant Hash Functions Revisited. [Citation Graph (, )][DBLP ] Policy-Controlled Signatures. [Citation Graph (, )][DBLP ] How to Balance Privacy with Authenticity. [Citation Graph (, )][DBLP ] A Generic Construction of Identity-Based Online/Offline Signcryption. [Citation Graph (, )][DBLP ] Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles. [Citation Graph (, )][DBLP ] Universal Designated Verifier Signatures with Threshold-Signers. [Citation Graph (, )][DBLP ] Identity-Based On-Line/Off-Line Signcryption. [Citation Graph (, )][DBLP ] Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. [Citation Graph (, )][DBLP ] Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings. [Citation Graph (, )][DBLP ] Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. [Citation Graph (, )][DBLP ] Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. [Citation Graph (, )][DBLP ] Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles. [Citation Graph (, )][DBLP ] Optimal Online/Offline Signature: How to Sign a Message without Online Computation. [Citation Graph (, )][DBLP ] Server-Aided Verification Signatures: Definitions and New Constructions. [Citation Graph (, )][DBLP ] How to Prove Security of a Signature with a Tighter Security Reduction. [Citation Graph (, )][DBLP ] Server-Controlled Identity-Based Authenticated Key Exchange. [Citation Graph (, )][DBLP ] Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? [Citation Graph (, )][DBLP ] A new group rekeying scheme based on t-packing designs for ad hoc networks. [Citation Graph (, )][DBLP ] Hierarchical Identity-Based Online/Offline Encryption. [Citation Graph (, )][DBLP ] Secure Mobile Agents with Designated Hosts. [Citation Graph (, )][DBLP ] An Efficient Certificateless Encryption Scheme in the Standard Model. [Citation Graph (, )][DBLP ] Open-Source Tools for Immersive Environmental Visualization. [Citation Graph (, )][DBLP ] Cryptanalysis of simple three-party key exchange protocol. [Citation Graph (, )][DBLP ] Search in 0.036secs, Finished in 0.045secs