The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yi Mu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yi Mu, Vijay Varadharajan
    Fail-Stop Confirmer Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:368-377 [Conf]
  2. Yi Mu, Vijay Varadharajan
    On the design of security protocols for mobile communications. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:134-145 [Conf]
  3. Yi Mu, Vijay Varadharajan, Yan-Xia Lin
    New Micropayment Schemes Based on PayWords. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:283-293 [Conf]
  4. Yi Mu, Yuliang Zheng
    An alternative model of quantum key agreement via photon coupling. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:320-331 [Conf]
  5. Yi Mu, Junqi Zhang, Vijay Varadharajan
    m out of n Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:395-405 [Conf]
  6. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
    Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:117-128 [Conf]
  7. Willy Susilo, Yi Mu
    On the Security of Nominative Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:329-335 [Conf]
  8. Willy Susilo, Fangguo Zhang, Yi Mu
    Identity-Based Strong Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:313-324 [Conf]
  9. Shidi Xu, Yi Mu, Willy Susilo
    Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:99-110 [Conf]
  10. Willy Susilo, Yi Mu
    Deniable Ring Authentication Revisited. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:149-163 [Conf]
  11. Yi Mu, Vijay Varadharajan
    Anonymous Secure E-Voting Over a Network. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:293-299 [Conf]
  12. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
    Micro-Digital Money for Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:2-8 [Conf]
  13. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
    Secure and Efficient Digital Coins. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:9-15 [Conf]
  14. Vijay Varadharajan, Yi Mu
    On The Design Of Secure Electronic Payment Schemes For Internet. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:78-87 [Conf]
  15. Weiliang Zhao, Vijay Varadharajan, Yi Mu
    Fair On-line Gambling. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:394-400 [Conf]
  16. Weiliang Zhao, Vijay Varadharajan, Yi Mu
    A Secure Mental Poker Protocol Over The Internet. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:105-109 [Conf]
  17. Yi Mu, Vijay Varadharajan
    Towards a Protection Model for Supporting Multiple Access Control Policies. [Citation Graph (0, 0)][DBLP]
    Australasian Database Conference, 2000, pp:107-114 [Conf]
  18. Junqi Zhang, Vijay Varadharajan, Yi Mu
    A Scalable Multi-service Group Key Management Scheme. [Citation Graph (0, 0)][DBLP]
    AICT/ICIW, 2006, pp:172- [Conf]
  19. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:649-654 [Conf]
  20. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Certificateless Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:15-19 [Conf]
  21. Willy Susilo, Fangguo Zhang, Yi Mu
    Privacy-Enhanced Internet Storage. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:603-608 [Conf]
  22. Fangguo Zhang, Yi Mu, Willy Susilo
    Reducing Security Overhead for Mobile Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:398-403 [Conf]
  23. Junqi Zhang, Vijay Varadharajan, Yi Mu
    Securing XML Document Sources and Their Distribution. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:562-567 [Conf]
  24. Yi Mu, Willy Susilo, Yan-Xia Lin, Chun Ruan
    Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2004, pp:169-181 [Conf]
  25. Yi Mu, Fangguo Zhang, Willy Susilo
    Deniable Partial Proxy Signatures. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2004, pp:182-194 [Conf]
  26. Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang
    Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:531-540 [Conf]
  27. Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
    Efficient Signcryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:449-458 [Conf]
  28. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    On the Security of Certificateless Signature Schemes from Asiacrypt 2003. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:13-25 [Conf]
  29. Ching Yu Ng, Willy Susilo, Yi Mu
    Designated group credentials. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:59-65 [Conf]
  30. Willy Susilo, Yi Mu
    On Fail-Stop Verifiable Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:663-667 [Conf]
  31. Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
    Compact E-Cash from Bounded Accumulator. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:178-195 [Conf]
  32. Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu
    Batching Proofs of Knowledge and Its Applications. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1999, pp:844-849 [Conf]
  33. Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang
    Short Designated Verifier Proxy Signature from Pairings. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:835-844 [Conf]
  34. Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen
    A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:480-489 [Conf]
  35. Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan
    Access Policy Sheet for Access Control in Fine-Grained XML. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1273-1282 [Conf]
  36. Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen
    Identity-Based Universal Designated Verifier Signatures. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:825-834 [Conf]
  37. Shidi Xu, Yi Mu, Willy Susilo
    Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:854-863 [Conf]
  38. Willy Susilo, Yi Mu
    Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:68-80 [Conf]
  39. Fangguo Zhang, Willy Susilo, Yi Mu
    Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:45-56 [Conf]
  40. Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo
    Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:251-265 [Conf]
  41. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
    Efficient Partially Blind Signatures with Provable Security. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:345-354 [Conf]
  42. Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu
    Universal Designated Verifier Signature Without Delegatability. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:479-498 [Conf]
  43. Willy Susilo, Yi Mu, Fangguo Zhang
    Perfect Concurrent Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:14-26 [Conf]
  44. Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan
    Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:103-118 [Conf]
  45. Junqi Zhang, Vijay Varadharajan, Yi Mu
    A Secure Object Sharing Scheme for Java Card. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:243-251 [Conf]
  46. Yi Mu, Vijay Varadharajan
    An Internet Anonymous Auction Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:171-182 [Conf]
  47. Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu
    An Efficient Static Blind Ring Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:410-423 [Conf]
  48. Willy Susilo, Yi Mu
    Non-interactive Deniable Ring Authentication. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:386-401 [Conf]
  49. Ching Yu Ng, Willy Susilo, Yi Mu
    Universal Designated Multi Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:305-309 [Conf]
  50. Jing Wu, Jennifer Seberry, Yi Mu, Chun Ruan
    Delegatable Access Control for Fine-Grained XML. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:270-274 [Conf]
  51. Vijay Varadharajan, Yi Mu
    Design of Secure End-toEnd Protocols for Mobile Systems. [Citation Graph (0, 0)][DBLP]
    IFIP World Conference on Mobile Communications, 1996, pp:258-266 [Conf]
  52. Yi Mu, Vijay Varadharajan, Khanh Quoc Nguyen
    Delegated Decryption. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:258-269 [Conf]
  53. Yi Mu, Willy Susilo, Yan-Xia Lin
    Identity-Based Broadcasting. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:177-190 [Conf]
  54. Yi Mu, Vijay Varadharajan
    Distributed Signcryption. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:155-164 [Conf]
  55. Yi Mu, Vijay Varadharajan
    Robust and Secure Broadcasting. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:223-231 [Conf]
  56. Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu
    A New Efficient Off-line Anonymous Cash Scheme. [Citation Graph (0, 0)][DBLP]
    ISAAC, 1997, pp:193-201 [Conf]
  57. Yi Mu, Khanh Quoc Nguyen, Vijay Varadharajan
    A Fair Electronic Cash Scheme. [Citation Graph (0, 0)][DBLP]
    ISEC, 2001, pp:20-32 [Conf]
  58. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Short (Identity-Based) Strong Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:214-225 [Conf]
  59. Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
    Privately Retrieve Data from Large Databases. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:367-378 [Conf]
  60. Lan Zhou, Willy Susilo, Yi Mu
    Three-Round Secret Handshakes Based on ElGamal and DSA. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:332-342 [Conf]
  61. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
    A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:313-320 [Conf]
  62. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
    Undeniable Confirmer Signature. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:235-246 [Conf]
  63. Junqi Zhang, Vijay Varadharajan, Yi Mu
    A Secure PIM-SM Multicast Routing Protocol. [Citation Graph (0, 0)][DBLP]
    IWDC, 2004, pp:276-288 [Conf]
  64. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
    Ad Hoc Group Signatures. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:120-135 [Conf]
  65. Yi Mu, Vijay Varadharajan
    A New Scheme of Credit based Payment for Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    LCN, 1998, pp:278-0 [Conf]
  66. Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu
    Proxy Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:473-484 [Conf]
  67. Shidi Xu, Yi Mu, Willy Susilo
    Secure AODV Routing Protocol Using One-Time Signature. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:288-297 [Conf]
  68. Lan Zhou, Willy Susilo, Yi Mu
    Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:521-532 [Conf]
  69. Yi Mu, Willy Susilo, Huafei Zhu
    Compact sequential aggregate signatures. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:249-253 [Conf]
  70. Man Ho Au, Willy Susilo, Yi Mu
    Constant-Size Dynamic k-TAA. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:111-125 [Conf]
  71. Willy Susilo, Yi Mu
    Tripartite Concurrent Signatures. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:425-442 [Conf]
  72. Ching Lin, Vijay Varadharajan, Yan Wang, Yi Mu
    On the Design of a New Trust Model for Mobile Agent Security. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:60-69 [Conf]
  73. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Restricted Universal Designated Verifier Signature. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:874-882 [Conf]
  74. Junqi Zhang, Vijay Varadharajan, Yi Mu
    ID-based Secure PIM-SM Schemes. [Citation Graph (0, 0)][DBLP]
    Wireless and Optical Communications, 2006, pp:190-195 [Conf]
  75. Yi Mu, Beddhu Murali, Junfeng Gu
    Volumetric Color Image Compression Using SET Partitioning Methods. [Citation Graph (0, 0)][DBLP]
    IPCV, 2006, pp:445-450 [Conf]
  76. Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu
    A New Signature Scheme Without Random Oracles from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:67-80 [Conf]
  77. Yi Mu, Vijay Varadharajan
    Group Cryptography: Signature and Encryption. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal]
  78. Vijay Varadharajan, Khanh Quoc Nguyen, Yi Mu
    On the Design of Efficient RSA-based Off-line Electronic Cash Schemes. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:226, n:1-2, pp:173-184 [Journal]
  79. Qiong Ren, Yi Mu, Willy Susilo
    SEFAP: An Email System for Anti-Phishing. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:782-787 [Conf]
  80. Man Ho Au, Willy Susilo, Yi Mu
    Practical Compact E-Cash. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:431-445 [Conf]
  81. Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu
    Certificateless Signature Revisited. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:308-322 [Conf]
  82. Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu
    Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:18-30 [Conf]
  83. Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang
    Identity-Based Proxy Signature from Pairings. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:22-31 [Conf]
  84. Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin
    Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:32-41 [Conf]
  85. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu
    A Generic Construction for Universally-Convertible Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:15-33 [Conf]
  86. Fuchun Guo, Yi Mu, Zhide Chen
    Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:1-14 [Conf]
  87. Fuchun Guo, Zhide Chen, Yi Mu, Li Xu, Shengyuan Zhang
    Secure and Efficient Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:374-384 [Conf]
  88. Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu
    Certificate-Based Signature: Security Model and Efficient Construction. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:110-125 [Conf]
  89. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
    Efficient Partially Blind Signatures with Provable Security. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1096-1105 [Conf]
  90. Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo
    Formal Definition and Construction of Nominative Signature. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:57-68 [Conf]
  91. Lan Zhou, Willy Susilo, Yi Mu
    New Construction of Group Secret Handshakes Based on Pairings. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:16-30 [Conf]
  92. Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong, Yi Mu
    Nominative Signature from Ring Signature. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:396-411 [Conf]
  93. Huafei Zhu, Willy Susilo, Yi Mu
    Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:134-149 [Conf]
  94. Yong Li 0002, Willy Susilo, Yi Mu, Dingyi Pei
    Designated Verifier Signature: Definition, Framework and New Constructions. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:1191-1200 [Conf]
  95. Shuo Zheng, Luke McAven, Yi Mu
    First price sealed bid auction without auctioneers. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2007, pp:127-131 [Conf]
  96. Yiqun Chen, Willy Susilo, Yi Mu
    Identity-based anonymous designated ring signatures. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:189-194 [Conf]
  97. Fuchun Guo, Yi Mu, Zhide Chen
    Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. [Citation Graph (0, 0)][DBLP]
    Pairing, 2007, pp:392-406 [Conf]
  98. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu
    Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. [Citation Graph (0, 0)][DBLP]
    Pairing, 2007, pp:367-391 [Conf]
  99. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:71-74 [Journal]

  100. Constructing an Authentication Token to Access External Services in Service Aggregation. [Citation Graph (, )][DBLP]


  101. Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. [Citation Graph (, )][DBLP]


  102. Sanitizable Signatures Revisited. [Citation Graph (, )][DBLP]


  103. Privacy for Private Key in Signatures. [Citation Graph (, )][DBLP]


  104. Multi-Identity Single-Key Decryption without Random Oracles. [Citation Graph (, )][DBLP]


  105. Publicly Verifiable Privacy-Preserving Group Decryption. [Citation Graph (, )][DBLP]


  106. Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. [Citation Graph (, )][DBLP]


  107. Efficient Non-interactive Range Proof. [Citation Graph (, )][DBLP]


  108. Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. [Citation Graph (, )][DBLP]


  109. RFID Privacy Models Revisited. [Citation Graph (, )][DBLP]


  110. New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. [Citation Graph (, )][DBLP]


  111. Asymmetric Group Key Agreement. [Citation Graph (, )][DBLP]


  112. Identity-Based Online/Offline Encryption. [Citation Graph (, )][DBLP]


  113. Practical Anonymous Divisible E-Cash from Bounded Accumulators. [Citation Graph (, )][DBLP]


  114. Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. [Citation Graph (, )][DBLP]


  115. Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships. [Citation Graph (, )][DBLP]


  116. Enhanced Target Collision Resistant Hash Functions Revisited. [Citation Graph (, )][DBLP]


  117. Policy-Controlled Signatures. [Citation Graph (, )][DBLP]


  118. How to Balance Privacy with Authenticity. [Citation Graph (, )][DBLP]


  119. A Generic Construction of Identity-Based Online/Offline Signcryption. [Citation Graph (, )][DBLP]


  120. Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles. [Citation Graph (, )][DBLP]


  121. Universal Designated Verifier Signatures with Threshold-Signers. [Citation Graph (, )][DBLP]


  122. Identity-Based On-Line/Off-Line Signcryption. [Citation Graph (, )][DBLP]


  123. Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. [Citation Graph (, )][DBLP]


  124. Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings. [Citation Graph (, )][DBLP]


  125. Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. [Citation Graph (, )][DBLP]


  126. Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. [Citation Graph (, )][DBLP]


  127. Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles. [Citation Graph (, )][DBLP]


  128. Optimal Online/Offline Signature: How to Sign a Message without Online Computation. [Citation Graph (, )][DBLP]


  129. Server-Aided Verification Signatures: Definitions and New Constructions. [Citation Graph (, )][DBLP]


  130. How to Prove Security of a Signature with a Tighter Security Reduction. [Citation Graph (, )][DBLP]


  131. Server-Controlled Identity-Based Authenticated Key Exchange. [Citation Graph (, )][DBLP]


  132. Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? [Citation Graph (, )][DBLP]


  133. A new group rekeying scheme based on t-packing designs for ad hoc networks. [Citation Graph (, )][DBLP]


  134. Hierarchical Identity-Based Online/Offline Encryption. [Citation Graph (, )][DBLP]


  135. Secure Mobile Agents with Designated Hosts. [Citation Graph (, )][DBLP]


  136. An Efficient Certificateless Encryption Scheme in the Standard Model. [Citation Graph (, )][DBLP]


  137. Open-Source Tools for Immersive Environmental Visualization. [Citation Graph (, )][DBLP]


  138. Cryptanalysis of simple three-party key exchange protocol. [Citation Graph (, )][DBLP]


Search in 0.106secs, Finished in 0.113secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002