default search action
Yi Mu 0001
Person information
- affiliation: City University of Macau, Macau
- affiliation (former): Fujian Normal University, Fuzhou, China
- affiliation (former): University of Wollongong, NSW, Australia
- affiliation (former): Macquarie University, Sydney, NSW, Australia
- affiliation (former): University of Western Sydney, NSW, Australia
- affiliation (PhD 1994): Australian National University, Canberra, ACT, Australia
Other persons with the same name
- Yi Mu
- Yi Mu 0002 — Desert Research Institute, Reno, NV, USA
- Yi Mu 0003 — Ocean University of China, Qingdao, China
- Yi Mu 0004 — Xi'an Jiaotong University, Department of Earth and Environmental Sciences, China
- Yi Mu 0005 — University of Illinois at Urbana-Champaign, Urbana, IL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j287]Yizhao Zhu, Lanxiang Chen, Yi Mu:
Practical and malicious private set intersection with improved efficiency. Theor. Comput. Sci. 991: 114443 (2024) - [j286]Ke Huang, Yi Mu, Fatemeh Rezaeibagha, Xiaosong Zhang, Xiong Li, Sheng Cao:
Monero With Multi-Grained Redaction. IEEE Trans. Dependable Secur. Comput. 21(1): 241-253 (2024) - [j285]Mengdi Hu, Lanxiang Chen, Gaolin Chen, Yi Mu, Robert H. Deng:
A Pruned Pendant Vertex Based Index for Shortest Distance Query Under Structured Encrypted Graph. IEEE Trans. Inf. Forensics Secur. 19: 6351-6363 (2024) - [j284]Xiangqian Kong, Lanxiang Chen, Yizhao Zhu, Yi Mu:
Efficient Public-Key Searchable Encryption Scheme From PSI With Scalable Proxy Servers. IEEE Trans. Serv. Comput. 17(6): 3527-3540 (2024) - [c238]Qinghua Deng, Lanxiang Chen, Yizhao Zhu, Yi Mu:
Volume Hiding Conjunctive Searchable Symmetric Encryption over Cloud. CyberC 2024: 142-188 - 2023
- [j283]Yanwei Zhou, Zhaolong Wang, Zirui Qiao, Ying Wang, Bo Yang, Yi Mu, Mingwu Zhang:
Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption. Comput. J. 66(4): 924-940 (2023) - [j282]Yanwei Zhou, Bo Yang, Zirui Qiao, Zhe Xia, Mingwu Zhang, Yi Mu:
Leakage-resilient identity-based cryptography from minimal assumptions. Des. Codes Cryptogr. 91(11): 3757-3801 (2023) - [j281]Tianshuai Zhang, Leyou Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
Redactable Blockchain-Enabled Hierarchical Access Control Framework for Data Sharing in Electronic Medical Records. IEEE Syst. J. 17(2): 1962-1973 (2023) - [j280]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen, Leyou Zhang:
Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT. IEEE Trans. Cloud Comput. 11(1): 217-228 (2023) - [j279]Xiaoguo Li, Tao Xiang, Yi Mu, Fuchun Guo, Zhongyuan Yao:
C-Wall: Conflict-Resistance in Privacy-Preserving Cloud Storage. IEEE Trans. Cloud Comput. 11(2): 1911-1926 (2023) - [j278]Lanxiang Chen, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng:
Authenticable Data Analytics Over Encrypted Data in the Cloud. IEEE Trans. Inf. Forensics Secur. 18: 1800-1813 (2023) - [j277]Ruonan Ma, Leyou Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
BE-TRDSS: Blockchain-Enabled Secure and Efficient Traceable-Revocable Data-Sharing Scheme in Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(11): 10821-10830 (2023) - [j276]Lanxiang Chen, Lingfang Zeng, Yi Mu, Leilei Chen:
Global Combination and Clustering Based Differential Privacy Mixed Data Publishing. IEEE Trans. Knowl. Data Eng. 35(11): 11437-11448 (2023) - [j275]Lanxiang Chen, Yujie Xue, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng:
CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data. IEEE Trans. Serv. Comput. 16(2): 1011-1022 (2023) - [j274]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen, Leyou Zhang:
Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT. IEEE Trans. Serv. Comput. 16(3): 1664-1672 (2023) - 2022
- [j273]Lanxiang Chen, Qingxiao Fu, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Min-Shiang Hwang:
Blockchain-based random auditor committee for integrity verification. Future Gener. Comput. Syst. 131: 183-193 (2022) - [j272]Jian Su, Leyou Zhang, Yi Mu:
BA-RMKABSE: Blockchain-aided Ranked Multi-keyword Attribute-based Searchable Encryption with Hiding Policy for Smart Health System. Future Gener. Comput. Syst. 132: 299-309 (2022) - [j271]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaoming Huang, Yongcheng Gong:
Blockchain-based deduplication with arbitration and incentives. IET Inf. Secur. 16(6): 401-416 (2022) - [j270]Leyou Zhang, Tianshuai Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
Secure Decentralized Attribute-Based Sharing of Personal Health Records With Blockchain. IEEE Internet Things J. 9(14): 12482-12496 (2022) - [j269]Leyou Zhang, Ye Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
A Secure and Efficient Decentralized Access Control Scheme Based on Blockchain for Vehicular Social Networks. IEEE Internet Things J. 9(18): 17938-17952 (2022) - [j268]Yujie Xue, Lanxiang Chen, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng:
Structured encryption for knowledge graphs. Inf. Sci. 605: 43-70 (2022) - [j267]Manli Yuan, Yi Mu, Fatemeh Rezaeibagha, Li Xu, Xinyi Huang:
Controllable software licensing system for sub-licensing. J. Inf. Secur. Appl. 64: 103061 (2022) - [j266]Ye Zhang, Leyou Zhang, Qing Wu, Yi Mu:
Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9216-9227 (2022) - [j265]Qing Wu, Taotao Lai, Leyou Zhang, Yi Mu, Fatemeh Rezaeibagha:
Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud. J. Syst. Archit. 129: 102569 (2022) - [j264]Leyou Zhang, Chuchu Zhao, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth. J. Syst. Archit. 130: 102654 (2022) - [j263]Zhongyuan Yao, Yi Mu:
Publicly verifiable secure communication with user and data privacy. Pers. Ubiquitous Comput. 26(3): 863-879 (2022) - [j262]Leyou Zhang, Xuehuang Gao, Li Kang, Pengfei Liang, Yi Mu:
Distributed Ciphertext-Policy Attribute-Based Encryption With Enhanced Collusion Resilience and Privacy Preservation. IEEE Syst. J. 16(1): 735-746 (2022) - [j261]Qing Wu, Liangjun Li, Leyou Zhang, Yi Mu, Fatemeh Rezaeibagha:
Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing. IEEE Syst. J. 16(4): 5533-5543 (2022) - [j260]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaojiang Du:
Bidirectional and Malleable Proof-of-Ownership for Large File in Cloud Storage. IEEE Trans. Cloud Comput. 10(4): 2351-2365 (2022) - [j259]Jinhua Ma, Xinyi Huang, Yi Mu, Robert H. Deng:
Authenticated Data Redaction With Accountability and Transparency. IEEE Trans. Dependable Secur. Comput. 19(1): 149-160 (2022) - [j258]Anmin Fu, Zhenzhu Chen, Yi Mu, Willy Susilo, Yinxia Sun, Jie Wu:
Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization. IEEE Trans. Serv. Comput. 15(1): 266-278 (2022) - [j257]Xiaoguo Li, Tao Xiang, Shangwei Guo, Hongwei Li, Yi Mu:
Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data. IEEE Trans. Serv. Comput. 15(5): 2954-2968 (2022) - [j256]Leyou Zhang, Wenting You, Yi Mu:
Secure Outsourced Attribute-Based Sharing Framework for Lightweight Devices in Smart Health Systems. IEEE Trans. Serv. Comput. 15(5): 3019-3030 (2022) - 2021
- [j255]Haixia Chen, Xinyi Huang, Wei Wu, Yi Mu:
Privacy-Aware Image Authentication from Cryptographic Primitives. Comput. J. 64(8): 1178-1192 (2021) - [j254]Yangguang Tian, Yingjiu Li, Yi Mu, Guomin Yang:
Unlinkable and Revocable Secret Handshake. Comput. J. 64(8): 1303-1314 (2021) - [j253]Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Novel generic construction of leakage-resilient PKE scheme with CCA security. Des. Codes Cryptogr. 89(7): 1575-1614 (2021) - [j252]Ximeng Liu, Yi Mu, Jianting Ning, Qingchen Zhang:
Securing the Internet-of-Things: Advances, challenges, future trends. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j251]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Leyou Zhang:
Enhanced bitcoin with two-factor authentication. Int. J. Inf. Comput. Secur. 16(3/4): 292-306 (2021) - [j250]Leyou Zhang, Yadi Ye, Yi Mu:
Multiauthority Access Control With Anonymous Authentication for Personal Health Record. IEEE Internet Things J. 8(1): 156-167 (2021) - [j249]Wenjie Yang, Shangpeng Wang, Yi Mu:
An Enhanced Certificateless Aggregate Signature Without Pairings for E-Healthcare System. IEEE Internet Things J. 8(6): 5000-5008 (2021) - [j248]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen:
Secure and Efficient Data Aggregation for IoT Monitoring Systems. IEEE Internet Things J. 8(10): 8056-8063 (2021) - [j247]Leyou Zhang, Jun Wang, Yi Mu:
Privacy-Preserving Flexible Access Control for Encrypted Data in Internet of Things. IEEE Internet Things J. 8(19): 14731-14745 (2021) - [j246]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Leyou Zhang, Xinyi Huang:
Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors. IEEE Internet Things J. 8(24): 17669-17677 (2021) - [j245]Lei Zhou, Anmin Fu, Yi Mu, Huaqun Wang, Shui Yu, Yinxia Sun:
Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system. Inf. Sci. 545: 254-276 (2021) - [j244]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaojiang Du:
Scalable and redactable blockchain with update and anonymity. Inf. Sci. 546: 25-41 (2021) - [j243]Ke Huang, Yi Mu, Fatemeh Rezaeibagha, Xiaosong Zhang, Ting Chen:
Building Blockchains with Secure and Practical Public-Key Cryptographic Algorithms: Background, Motivations and Example. IEEE Netw. 35(6): 240-246 (2021) - [j242]Gongcheng Hu, Leyou Zhang, Yi Mu, Xiaoxu Gao:
An Expressive "Test-Decrypt-Verify" Attribute-Based Encryption Scheme With Hidden Policy for Smart Medical Cloud. IEEE Syst. J. 15(1): 365-376 (2021) - [j241]Tong Wu, Guomin Yang, Yi Mu, Fuchun Guo, Robert H. Deng:
Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model. IEEE Trans. Dependable Secur. Comput. 18(2): 563-575 (2021) - [c237]Yadi Ye, Leyou Zhang, Wenting You, Yi Mu:
Secure Decentralized Access Control Policy for Data Sharing in Smart Grid. INFOCOM Workshops 2021: 1-6 - [e14]Wanlei Zhou, Yi Mu:
Advances in Web-Based Learning - ICWL 2021 - 20th International Conference, ICWL 2021, Macau, China, November 13-14, 2021, Proceedings. Lecture Notes in Computer Science 13103, Springer 2021, ISBN 978-3-030-90784-6 [contents] - 2020
- [j240]Leyou Zhang, Juan Ren, Yi Mu, Baocang Wang:
Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid. IEEE Access 8: 23294-23307 (2020) - [j239]Leyou Zhang, Jian Su, Yi Mu:
Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage. IEEE Access 8: 104344-104356 (2020) - [j238]Leyou Zhang, Jun Wang, Yi Mu:
Secure and Privacy-Preserving Attribute-Based Sharing Framework in Vehicles Ad Hoc Networks. IEEE Access 8: 116781-116795 (2020) - [j237]Da-Zhi Sun, Yi Mu:
On the Security of Symmetric Encryption Against Mass Surveillance. IEEE Access 8: 175625-175636 (2020) - [j236]Leyou Zhang, Xuehuang Gao, Yi Mu:
Secure Data Sharing With Lightweight Computation in E-Health. IEEE Access 8: 209630-209643 (2020) - [j235]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu:
An improved Durandal signature scheme. Sci. China Inf. Sci. 63(3) (2020) - [j234]Haixia Chen, Xinyi Huang, Wei Wu, Yi Mu:
Efficient and secure image authentication with robustness and versatility. Sci. China Inf. Sci. 63(12) (2020) - [j233]Zhen Zhao, Ge Wu, Fuchun Guo, Willy Susilo, Yi Mu, Baocang Wang, Yupu Hu:
Black-Box Accountable Authority Identity-Based Revocation System. Comput. J. 63(4): 525-535 (2020) - [j232]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaofen Wang, Jingwei Li, Qi Xia, Jing Qin:
EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud. IEEE Internet Things J. 7(2): 882-892 (2020) - [j231]Shengke Zeng, Yi Mu, Hongjie Zhang, Mingxing He:
A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy. Inf. Sci. 516: 331-345 (2020) - [j230]Tong Wu, Guomin Yang, Yi Mu, Rongmao Chen, Shengmin Xu:
Privacy-enhanced remote data integrity checking with updatable timestamp. Inf. Sci. 527: 210-226 (2020) - [j229]Leyou Zhang, Yilei Cui, Yi Mu:
Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing. IEEE Syst. J. 14(1): 387-397 (2020) - [j228]Ke Huang, Xiaosong Zhang, Xiaofen Wang, Yi Mu, Fatemeh Rezaeibagha, Guangquan Xu, Hao Wang, Xi Zheng, Guomin Yang, Qi Xia, Xiaojiang Du:
HUCDO: A Hybrid User-centric Data Outsourcing Scheme. ACM Trans. Cyber Phys. Syst. 4(3): 35:1-35:23 (2020) - [j227]Yanwei Zhou, Bo Yang, Tao Wang, Yi Mu:
Novel updatable identity-based hash proof system and its applications. Theor. Comput. Sci. 804: 1-28 (2020) - [j226]Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security. Theor. Comput. Sci. 809: 277-295 (2020) - [j225]Yinxia Sun, Yi Mu, Willy Susilo, Futai Zhang, Anmin Fu:
Revocable identity-based encryption with server-aided ciphertext evolution. Theor. Comput. Sci. 815: 11-24 (2020) - [j224]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu, Huaxiong Wang:
A code-based signature scheme from the Lyubashevsky framework. Theor. Comput. Sci. 835: 15-30 (2020) - [j223]Xueqiao Liu, Guomin Yang, Yi Mu, Robert H. Deng:
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 17(6): 1322-1332 (2020) - [j222]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaojiang Du, Nadra Guizani:
Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain. IEEE Trans. Ind. Informatics 16(4): 2677-2686 (2020) - [j221]Yi Mu, Fatemeh Rezaeibagha, Ke Huang:
Policy-Driven Blockchain and Its Applications for Transport Systems. IEEE Trans. Serv. Comput. 13(2): 230-240 (2020) - [c236]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Yi Mu:
Improvement of Attribute-Based Encryption Using Blakley Secret Sharing. ACISP 2020: 631-641 - [i22]Yadi Ye, Leyou Zhang, Yi Mu, Wenting You:
Secure Decentralized Access Control Policy for Data Sharing in Smart Grid. IACR Cryptol. ePrint Arch. 2020: 1567 (2020)
2010 – 2019
- 2019
- [j220]Leyou Zhang, Gongcheng Hu, Yi Mu, Fatemeh Rezaeibagha:
Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System. IEEE Access 7: 33202-33213 (2019) - [j219]Wenjie Yang, Shangpeng Wang, Xinyi Huang, Yi Mu:
On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments. IEEE Access 7: 91074-91079 (2019) - [j218]Wenjie Yang, Shangpeng Wang, Wei Wu, Yi Mu:
Top-Level Secure Certificateless Signature Against Malicious-But-Passive KGC. IEEE Access 7: 112870-112878 (2019) - [j217]Fatemeh Rezaeibagha, Yi Mu, Xinyi Huang, Wenjie Yang, Ke Huang:
Fully Secure Lightweight Certificateless Signature Scheme for IIoT. IEEE Access 7: 144433-144443 (2019) - [j216]Fatemeh Rezaeibagha, Yi Mu:
Efficient Micropayment of Cryptocurrency from Blockchains. Comput. J. 62(4): 507-517 (2019) - [j215]Yanwei Zhou, Bo Yang, Yi Mu:
Continuous leakage-resilient identity-based encryption with leakage amplification. Des. Codes Cryptogr. 87(9): 2061-2090 (2019) - [j214]Guomin Yang, Rongmao Chen, Yi Mu, Willy Susilo, Fuchun Guo, Jie Li:
Strongly leakage resilient authenticated key exchange, revisited. Des. Codes Cryptogr. 87(12): 2885-2911 (2019) - [j213]Shengmin Xu, Guomin Yang, Yi Mu, Ximeng Liu:
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Future Gener. Comput. Syst. 97: 284-294 (2019) - [j212]Yanwei Zhou, Bo Yang, Yi Mu, Tao Wang, Xin Wang:
Identity-based encryption resilient to continuous key leakage. IET Inf. Secur. 13(5): 426-434 (2019) - [j211]Fatemeh Rezaeibagha, Yi Mu, Shiwei Zhang, Xiaofen Wang:
Provably Secure (Broadcast) Homomorphic Signcryption. Int. J. Found. Comput. Sci. 30(4): 511-529 (2019) - [j210]Zhongyuan Yao, Yi Mu:
ACE with Compact Ciphertext Size and Decentralized Sanitizers. Int. J. Found. Comput. Sci. 30(4): 531-549 (2019) - [j209]Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo, Futai Zhang:
Threshold privacy-preserving cloud auditing with multiple uploaders. Int. J. Inf. Sec. 18(3): 321-331 (2019) - [j208]Peng Jiang, Jianchang Lai, Fuchun Guo, Willy Susilo, Man Ho Au, Guomin Yang, Yi Mu, Rongmao Chen:
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters. Inf. Sci. 472: 35-52 (2019) - [j207]Shengmin Xu, Guomin Yang, Yi Mu:
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Inf. Sci. 479: 116-134 (2019) - [j206]Yangguang Tian, Yingjiu Li, Guomin Yang, Willy Susilo, Yi Mu, Hui Cui, Yinghui Zhang:
DABKE: Secure deniable attribute-based key exchange framework. J. Comput. Secur. 27(2): 259-275 (2019) - [j205]Yong Yu, Yi Mu:
Advances of Provable Security Techniques. J. Univers. Comput. Sci. 25(3): 154-157 (2019) - [j204]Yanwei Zhou, Bo Yang, Zhe Xia, Yi Mu, Tao Wang:
Anonymous and Updatable Identity-Based Hash Proof System. IEEE Syst. J. 13(3): 2818-2829 (2019) - [j203]Peng Jiang, Fuchun Guo, Yi Mu:
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems. Theor. Comput. Sci. 767: 51-72 (2019) - [j202]Yanwei Zhou, Bo Yang, Yi Mu:
The generic construction of continuous leakage-resilient identity-based cryptosystems. Theor. Comput. Sci. 772: 1-45 (2019) - [j201]Ke Huang, Xiaosong Zhang, Yi Mu, Xiaofen Wang, Guomin Yang, Xiaojiang Du, Fatemeh Rezaeibagha, Qi Xia, Mohsen Guizani:
Building Redactable Consortium Blockchain for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 15(6): 3670-3679 (2019) - [j200]Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo, Futai Zhang:
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users. Wirel. Pers. Commun. 106(3): 1161-1182 (2019) - [c235]Wenwen Yan, Anmin Fu, Yi Mu, Zhe Xia, Shui Yu, Boyu Kuang:
EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices. IoT S&P@CCS 2019: 2-7 - [c234]Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo, Weizhi Meng:
Provably Secure Group Authentication in the Asynchronous Communication Model. ICICS 2019: 324-340 - [c233]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Hua Shen, Yi Mu:
Provably Secure Proactive Secret Sharing Without the Adjacent Assumption. ProvSec 2019: 247-264 - [c232]Xin Chen, Xinyi Huang, Yi Mu, Ding Wang:
A Typo-Tolerant Password Authentication Scheme with Targeted Error Correction. TrustCom/BigDataSE 2019: 546-553 - [e13]Yi Mu, Robert H. Deng, Xinyi Huang:
Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings. Lecture Notes in Computer Science 11829, Springer 2019, ISBN 978-3-030-31577-1 [contents] - 2018
- [b1]Fuchun Guo, Willy Susilo, Yi Mu:
Introduction to Security Reduction. Springer 2018, ISBN 978-3-319-93048-0, pp. 1-253 - [j199]Leyou Zhang, Pengfei Liang, Yi Mu:
Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption. IEEE Access 6: 12736-12745 (2018) - [j198]Jiannan Wei, Xiaojie Wang, Nan Li, Guomin Yang, Yi Mu:
A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks. IEEE Access 6: 43776-43784 (2018) - [j197]Yanwei Zhou, Bo Yang, Yi Mu, Zhe Xia:
Continuous leakage-resilient access control for wireless sensor networks. Ad Hoc Networks 80: 41-53 (2018) - [j196]Yanwei Zhou, Bo Yang, Yi Mu:
Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles. Comput. J. 61(4): 586-600 (2018) - [j195]Jianchang Lai, Yi Mu, Fuchun Guo, Peng Jiang, Sha Ma:
Identity-Based Broadcast Encryption for Inner Products. Comput. J. 61(8): 1240-1251 (2018) - [j194]Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo:
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener. Comput. Syst. 78: 720-729 (2018) - [j193]Xiaonan Wang, Zhengxiong Dou, Yi Mu:
CCN framework with privacy support. IET Inf. Secur. 12(2): 157-164 (2018) - [j192]Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu:
Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud. Int. J. High Perform. Comput. Netw. 11(1): 45-54 (2018) - [j191]