Yi Mu

According to our database1, Yi Mu
  • authored at least 440 papers between 1996 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
New Approach for Privacy-Aware Location-Based Service Communications.
Wireless Personal Communications, 2018

Security of Grouping-Proof Authentication Protocol for Distributed RFID Systems.
IEEE Wireless Commun. Letters, 2018

Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud.
IEEE Trans. Information Forensics and Security, 2018

Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost.
Theor. Comput. Sci., 2018

Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure.
Personal and Ubiquitous Computing, 2018

Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure.
Personal and Ubiquitous Computing, 2018

A New Revocable and Re-Delegable Proxy Signature and Its Application.
J. Comput. Sci. Technol., 2018

Practical and secure telemedicine systems for user mobility.
Journal of Biomedical Informatics, 2018

Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks.
J. Inf. Sec. Appl., 2018

Witness-based searchable encryption.
Inf. Sci., 2018

A Generic Scheme of plaintext-checkable database encryption.
Inf. Sci., 2018

Privacy-enhanced attribute-based private information retrieval.
Inf. Sci., 2018

Certificate-based Smooth Projective Hashing and Its Applications.
I. J. Network Security, 2018

Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts.
Int. J. Inf. Sec., 2018

Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud.
IJHPCN, 2018

CCN framework with privacy support.
IET Information Security, 2018

Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing.
Future Generation Comp. Syst., 2018

Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles.
Comput. J., 2018

Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption.
IEEE Access, 2018

Introduction to Security Reduction
Springer, ISBN: 978-3-319-93048-0, 2018

2017
Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications.
Wireless Personal Communications, 2017

Privacy-Preserving Data Packet Filtering Protocol with Source IP Authentication.
Wireless Personal Communications, 2017

Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting.
Wireless Personal Communications, 2017

Privacy-Preserving Mutual Authentication in RFID with Designated Readers.
Wireless Personal Communications, 2017

Computation-efficient key establishment in wireless group communications.
Wireless Networks, 2017

Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
IEEE Trans. Information Forensics and Security, 2017

EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
IEEE Trans. Information Forensics and Security, 2017

Efficient E-coupon systems with strong user privacy.
Telecommunication Systems, 2017

Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices.
IEEE Trans. Dependable Sec. Comput., 2017

A Generic Table Recomputation-Based Higher-Order Masking.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2017

Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments.
IEEE Systems Journal, 2017

Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query.
Quantum Information Processing, 2017

Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city.
Personal and Ubiquitous Computing, 2017

Private Keyword-Search for Database Systems Against Insider Attacks.
J. Comput. Sci. Technol., 2017

Communication security and privacy support in 6LoWPAN.
J. Inf. Sec. Appl., 2017

Continuous Leakage Resilient Lossy Trapdoor Functions.
Information, 2017

Efficient identity-based online/offline encryption and signcryption with short ciphertext.
Int. J. Inf. Sec., 2017

One-Round Attribute-Based Key Exchange in the Multi-Party Setting.
Int. J. Found. Comput. Sci., 2017

Revocable hierarchical identity-based encryption over lattice for pay-TV systems.
IJES, 2017

A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange.
Int. J. Comput. Math., 2017

Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
IACR Cryptology ePrint Archive, 2017

Strong Authenticated Key Exchange with Auxiliary Inputs.
IACR Cryptology ePrint Archive, 2017

A note on the strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptography, 2017

Strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptography, 2017

Policy-controlled signatures and their applications.
Computer Standards & Interfaces, 2017

Identity-based provable data possession revisited: Security analysis and generic construction.
Computer Standards & Interfaces, 2017

Privacy-preserving data search and sharing protocol for social networks through wireless applications.
Concurrency and Computation: Practice and Experience, 2017

Secure-channel free keyword search with authorization in manager-centric databases.
Computers & Security, 2017

Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System.
Comput. J., 2017

Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization.
Comput. J., 2017

Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server.
IEEE Access, 2017

Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Deniable Ring Authentication Based on Projective Hash Functions.
Proceedings of the Provable Security, 2017

Provably Secure Homomorphic Signcryption.
Proceedings of the Provable Security, 2017

Group-Based Source-Destination Verifiable Encryption with Blacklist Checking.
Proceedings of the Information Security Practice and Experience, 2017

Fuzzy Extractors for Biometric Identification.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

An efficient and provably secure RFID grouping proof protocol.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

Hierarchical Functional Encryption for Linear Transformations.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Mergeable and Revocable Identity-Based Encryption.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

ID-Based Encryption with Equality Test Against Insider Attack.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Privacy-Preserving k-time Authenticated Secret Handshakes.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Trust-based group services selection in web-based service-oriented environments.
World Wide Web, 2016

Comments on "Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks".
IEEE Trans. Wireless Communications, 2016

Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
IEEE Trans. Information Forensics and Security, 2016

One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications.
IEEE Trans. Information Forensics and Security, 2016

Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption.
IEEE Trans. Information Forensics and Security, 2016

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage.
IEEE Trans. Information Forensics and Security, 2016

Server-Aided Public Key Encryption With Keyword Search.
IEEE Trans. Information Forensics and Security, 2016

Efficient dynamic threshold identity-based encryption with constant-size ciphertext.
Theor. Comput. Sci., 2016

Relations between robustness and RKA security under public-key encryption.
Theor. Comput. Sci., 2016

CCA2 secure public-key encryption scheme tolerating continual leakage attacks.
Security and Communication Networks, 2016

Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity.
Security and Communication Networks, 2016

An efficient privacy-preserving aggregation and billing protocol for smart grid.
Security and Communication Networks, 2016

Privacy-preserving grouping proof with key exchange in the multiple-party setting.
Security and Communication Networks, 2016

Centralized keyword search on encrypted data for cloud applications.
Security and Communication Networks, 2016

An efficient quantum scheme for Private Set Intersection.
Quantum Information Processing, 2016

Privacy-Preserving and Secure Sharing of PHR in the Cloud.
J. Medical Systems, 2016

Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group.
J. Comput. Sci. Technol., 2016

Quantum private set intersection cardinality and its application to anonymous authentication.
Inf. Sci., 2016

Distributed clinical data sharing via dynamic access-control policy transformation.
I. J. Medical Informatics, 2016

Multi-authority security framework for scalable EHR systems.
IJMEI, 2016

Message from the Guest Editors.
Int. J. Inf. Sec., 2016

Privacy-enhanced distance computation with applications.
IJESDF, 2016

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
IACR Cryptology ePrint Archive, 2016

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
IACR Cryptology ePrint Archive, 2016

Strongly Leakage-Resilient Authenticated Key Exchange.
IACR Cryptology ePrint Archive, 2016

Generalized closest substring encryption.
Des. Codes Cryptography, 2016

Recent advances in security and privacy in large-scale networks.
Concurrency and Computation: Practice and Experience, 2016

Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys.
Comput. J., 2016

Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations.
Comput. J., 2016

Anonymous Proxy Signature with Hierarchical Traceability.
Comput. J., 2016

Online/Offline Ciphertext Retrieval on Resource Constrained Devices.
Comput. J., 2016

One-Round Attribute-Based Key Exchange in the Multi-party Setting.
Proceedings of the Provable Security, 2016

Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage.
Proceedings of the Provable Security, 2016

Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update.
Proceedings of the Provable Security, 2016

A Privacy Preserving Source Verifiable Encryption Scheme.
Proceedings of the Information Security Practice and Experience, 2016

Privacy-Preserving Cloud Auditing with Multiple Uploaders.
Proceedings of the Information Security Practice and Experience, 2016

Preserving User Location Privacy for Location-Based Service.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

Strongly Leakage-Resilient Authenticated Key Exchange.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Achieving IND-CCA Security for Functional Encryption for Inner Products.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Bilateral-secure Signature by Key Evolving.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Linear Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Proxy Signature with Revocation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Content-Based Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Public Key Encryption with Authorized Keyword Search.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

One-Round Strong Oblivious Signature-Based Envelope.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Comments on a Public Auditing Mechanism for Shared Cloud Data Service.
IEEE Trans. Services Computing, 2015

Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption.
IEEE Trans. Information Forensics and Security, 2015

AAC-OT: Accountable Oblivious Transfer With Access Control.
IEEE Trans. Information Forensics and Security, 2015

BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication.
IEEE Trans. Information Forensics and Security, 2015

Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs.
IEEE Trans. Dependable Sec. Comput., 2015

Mediated Encryption: Analysis and Design.
ICST Trans. Security Safety, 2015

Vulnerabilities of an ECC-based RFID authentication scheme.
Security and Communication Networks, 2015

A resilient identity-based authenticated key exchange protocol.
Security and Communication Networks, 2015

Recent Advances in Security and Privacy in Big Data.
J. UCS, 2015

Identity-based quotable ring signature.
Inf. Sci., 2015

An IPv6-based mobility framework for urban vehicular networks.
Int. Journal of Network Management, 2015

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage.
Int. J. Inf. Sec., 2015

Key management for Smart Grid based on asymmetric key-wrapping.
Int. J. Comput. Math., 2015

Proof of retrievability with public verifiability resilient against related-key attacks.
IET Information Security, 2015

A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing.
Future Generation Comp. Syst., 2015

Shared RFID ownership transfer protocols.
Computer Standards & Interfaces, 2015

Functional Encryption Resilient to Hard-to-Invert Leakage.
Comput. J., 2015

Secure Delegation of Signing Power from Factorization.
Comput. J., 2015

On Indistinguishability in Remote Data Integrity Checking.
Comput. J., 2015

Further ideal multipartite access structures from integer polymatroids.
SCIENCE CHINA Information Sciences, 2015

Hierarchical ID-Based Searchable Encryption with Constant Size Ciphertext in Cloud.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Provably Secure Identity Based Provable Data Possession.
Proceedings of the Provable Security, 2015

Threshold Broadcast Encryption with Keyword Search.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

Anonymous Yoking-Group Proofs.
Proceedings of the 10th ACM Symposium on Information, 2015

Improved Identity-Based Online/Offline Encryption.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

A New Public Remote Integrity Checking Scheme with User Privacy.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

A New General Framework for Secure Public Key Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

Business Rule Driven Composite Service Optimisation and Selection.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

Fully Secure Hierarchical Inner Product Encryption for Privacy Preserving Keyword Searching in Cloud.
Proceedings of the 10th International Conference on P2P, 2015

2014
A Secure IPv6 Address Configuration Protocol for Vehicular Networks.
Wireless Personal Communications, 2014

On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage.
IEEE Trans. Parallel Distrib. Syst., 2014

An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation.
IEEE Trans. Information Forensics and Security, 2014

Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs.
IEEE Trans. Information Forensics and Security, 2014

CP-ABE With Constant-Size Keys for Lightweight Devices.
IEEE Trans. Information Forensics and Security, 2014

Subset Membership Encryption and Its Applications to Oblivious Transfer.
IEEE Trans. Information Forensics and Security, 2014

Identity based identification from algebraic coding theory.
Theor. Comput. Sci., 2014

Identity-Based Secure DistributedData Storage Schemes.
IEEE Trans. Computers, 2014

Efficient public key encryption with revocable keyword search.
Security and Communication Networks, 2014

A secure mobility support scheme for 6LoWPAN wireless sensor networks.
Security and Communication Networks, 2014

Loss-tolerant authentication with digital signatures.
Security and Communication Networks, 2014

Towards a cryptographic treatment of publish/subscribe systems.
Journal of Computer Security, 2014

Security pitfalls of an efficient threshold proxy signature scheme for mobile agents.
Inf. Process. Lett., 2014

Efficient authentication and integrity protection for the border gateway protocol.
IJSN, 2014

Anonymous broadcast encryption with an untrusted gateway.
IJSN, 2014

A Secure Home Healthcare System Based on 6LoWPAN WSN.
IJITN, 2014

PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption.
IACR Cryptology ePrint Archive, 2014

On the security of auditing mechanisms for secure cloud storage.
Future Generation Comp. Syst., 2014

SA3: Self-adaptive anonymous authentication for dynamic authentication policies.
Future Generation Comp. Syst., 2014

Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks.
Frontiers Comput. Sci., 2014

Security of new generation computing systems.
Concurrency and Computation: Practice and Experience, 2014

Trust-oriented QoS-aware composite service selection based on genetic algorithms.
Concurrency and Computation: Practice and Experience, 2014

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature.
Comput. J., 2014

Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing.
Comput. J., 2014

Server-Aided Signature Verification for Lightweight Devices.
Comput. J., 2014

Signcryption Secure Against Linear Related-Key Attacks.
Comput. J., 2014

Fair Multi-signature.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

An Efficient Variant of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Anonymous Proxy Signature with Restricted Traceability.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Attribute Based Service Customization and Selection.
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014

Privacy-Preserving Authorized RFID Authentication Protocols.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

Complete Robustness in Identity-Based Encryption.
Proceedings of the Provable Security - 8th International Conference, 2014

Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage.
Proceedings of the Network and System Security - 8th International Conference, 2014

Attribute-Based Signing Right Delegation.
Proceedings of the Network and System Security - 8th International Conference, 2014

Jhanwar-Barua's Identity-Based Encryption Revisited.
Proceedings of the Network and System Security - 8th International Conference, 2014

Attribute-Based Signature with Message Recovery.
Proceedings of the Information Security Practice and Experience, 2014

PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2014, 2014

An Efficient Privacy-Preserving E-coupon System.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Constant-Size Dynamic $k$ -Times Anonymous Authentication.
IEEE Systems Journal, 2013

New construction of affiliation-hiding authenticated group key agreement.
Security and Communication Networks, 2013

A secure IPv6 address configuration scheme for a MANET.
Security and Communication Networks, 2013

Securing DSR against wormhole attacks in multirate ad hoc networks.
J. Network and Computer Applications, 2013

A robust trust model for service-oriented systems.
J. Comput. Syst. Sci., 2013

Key distribution for heterogeneous public-key cryptosystems.
Journal of Communications and Networks, 2013

On security of a certificateless signcryption scheme.
Inf. Sci., 2013

Efficient and dynamic key management for multiple identities in identity-based systems.
Inf. Sci., 2013

Server-aided identity-based anonymous broadcast encryption.
IJSN, 2013

Advanced computer mathematics based cryptography and security technologies.
Int. J. Comput. Math., 2013

Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction.
IACR Cryptology ePrint Archive, 2013

Identity-based data storage in cloud computing.
Future Generation Comp. Syst., 2013

Privacy-Enhanced Keyword Search in Clouds.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Identity-Based Mediated RSA Revisited.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Generic Mediated Encryption.
Proceedings of the Security and Privacy in Communication Networks, 2013

Public-Key Encryption Resilient to Linear Related-Key Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2013

On RFID Authentication Protocols with Wide-Strong Privacy.
Proceedings of the Radio Frequency Identification System Security, 2013

A Secure Elliptic Curve based RFID Ownership Transfer Scheme with Controlled Delegation.
Proceedings of the Radio Frequency Identification System Security, 2013

k-time Proxy Signature: Formal Definition and Efficient Construction.
Proceedings of the Provable Security - 7th International Conference, 2013

Anonymous Signcryption against Linear Related-Key Attacks.
Proceedings of the Provable Security - 7th International Conference, 2013

Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
Proceedings of the Information Security Practice and Experience, 2013

Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model.
Proceedings of the Information Security Practice and Experience, 2013

Identity-Based Multisignature with Message Recovery.
Proceedings of the Information Security Practice and Experience, 2013

Secure RFID Ownership Transfer Protocols.
Proceedings of the Information Security Practice and Experience, 2013

Anonymous Identity-Based Broadcast Encryption with Adaptive Security.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Membership Encryption and Its Applications.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
IEEE Trans. Parallel Distrib. Syst., 2012

Privacy preserving protocol for service aggregation in cloud computing.
Softw., Pract. Exper., 2012

Provably secure proxy signature scheme from factorization.
Mathematical and Computer Modelling, 2012

Privacy enhanced data outsourcing in the cloud.
J. Network and Computer Applications, 2012

New constructions of OSBE schemes and their applications in oblivious access control.
Int. J. Inf. Sec., 2012

Improved certificateless signature scheme provably secure in the standard model.
IET Information Security, 2012

Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme.
IEICE Transactions, 2012

Efficient oblivious transfers with access control.
Computers & Mathematics with Applications, 2012

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement.
Comput. J., 2012

A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Comput. J., 2012

Certificateless Signatures: New Schemes and Security Models.
Comput. J., 2012

Attribute-Based Oblivious Access Control.
Comput. J., 2012

A provably secure authenticated key agreement protocol for wireless communications.
Computers & Electrical Engineering, 2012

Efficient and secure stored-value cards with leakage resilience.
Computers & Electrical Engineering, 2012

Multi-Level Controlled Signature.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Pre-computable Signature Scheme with Efficient Verification for RFID.
Proceedings of the Information Security Practice and Experience, 2012

Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Authenticated key exchange protocol with selectable identities.
Wireless Communications and Mobile Computing, 2011

Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Information Forensics and Security, 2011

Strongly unforgeable proxy signature scheme secure in the standard model.
Journal of Systems and Software, 2011

Improving security of q-SDH based digital signatures.
Journal of Systems and Software, 2011

Optimistic Fair Exchange with Strong Resolution-Ambiguity.
IEEE Journal on Selected Areas in Communications, 2011

Practical RFID ownership transfer scheme.
Journal of Computer Security, 2011

Provably secure identity-based authenticated key agreement protocols with malicious private key generators.
Inf. Sci., 2011

Secure mobile agents with controlled resources.
Concurrency and Computation: Practice and Experience, 2011

An efficient and non-interactive hierarchical key agreement protocol.
Computers & Security, 2011

Attribute-based authentication for multi-agent systems with dynamic groups.
Computer Communications, 2011

Provably secure server-aided verification signatures.
Computers & Mathematics with Applications, 2011

An efficient dynamic authenticated key exchange protocol with selectable identities.
Computers & Mathematics with Applications, 2011

Secure Image Retrieval Based on Visual Content and Watermarking Protocol.
Comput. J., 2011

Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature.
Comput. J., 2011

Short Signatures with a Tighter Security Reduction Without Random Oracles.
Comput. J., 2011

GTrust: An Innovated Trust Model for Group Services Selection in Web-Based Service-Oriented Environments.
Proceedings of the Web Information System Engineering - WISE 2011, 2011

Privacy-Preserved Access Control for Cloud Computing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Case-Based Trust Evaluation from Provenance Information.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Optimistic Fair Exchange of Ring Signatures.
Proceedings of the Security and Privacy in Communication Networks, 2011

Policy-Based Authentication for Mobile Agents.
Proceedings of the Information Security Practice and Experience, 2011

Efficient Self-certified Signatures with Batch Verification.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Self-certified ring signatures.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Electronic Cash with Anonymous User Suspension.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

Web Service Selection Based on Similarity Evaluation.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
Constructions of certificate-based signature secure against key replacement attacks.
Journal of Computer Security, 2010

Certificateless threshold signature scheme from bilinear maps.
Inf. Sci., 2010

Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks.
IJSN, 2010

Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security.
IJSN, 2010

How to construct identity-based signatures without the key escrow problem.
Int. J. Inf. Sec., 2010

Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.
IACR Cryptology ePrint Archive, 2010

Special issue of computers and mathematics with applications on "Advances in cryptography, security and applications for future computer science".
Computers & Mathematics with Applications, 2010

A Generic Construction of Dynamic Single Sign-on with Strong Security.
Proceedings of the Security and Privacy in Communication Networks, 2010

Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Proceedings of the Public Key Cryptography, 2010

Dynamic Trust Model for Federated Identity Management.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented Environments.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Efficient RFID Authentication Scheme for Supply Chain Applications.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

A framework for privacy policy management in service aggregation.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Towards a Cryptographic Treatment of Publish/Subscribe Systems.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

Proof-of-Knowledge of Representation of Committed Value and Its Applications.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

Constructing an Authentication Token to Access External Services in Service Aggregation.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010

2009
Certificate-based Signatures Revisited.
J. UCS, 2009

Certificateless Threshold Ring Signature.
Inf. Sci., 2009

Identity-based Universal Designated Verifier Signature Proof System.
I. J. Network Security, 2009

How to Construct Identity-Based Signatures without the Key Escrow Problem.
IACR Cryptology ePrint Archive, 2009

An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions.
IACR Cryptology ePrint Archive, 2009

Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders.
IACR Cryptology ePrint Archive, 2009

Enhanced Target Collision Resistant Hash Functions Revisited.
IACR Cryptology ePrint Archive, 2009

An efficient anonymous proxy signature scheme with provable security.
Computer Standards & Interfaces, 2009

Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009

Server-Controlled Identity-Based Authenticated Key Exchange.
Proceedings of the Provable Security, Third International Conference, 2009

How to Prove Security of a Signature with a Tighter Security Reduction.
Proceedings of the Provable Security, Third International Conference, 2009

Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?
Proceedings of the Provable Security, Third International Conference, 2009

Secure Mobile Agents with Designated Hosts.
Proceedings of the Third International Conference on Network and System Security, 2009

An Efficient Certificateless Encryption Scheme in the Standard Model.
Proceedings of the Third International Conference on Network and System Security, 2009

Universal Designated Verifier Signatures with Threshold-Signers.
Proceedings of the Advances in Information and Computer Security, 2009

Policy-Controlled Signatures.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Enhanced Target Collision Resistant Hash Functions Revisited.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Escrowed Deniable Identification Schemes.
Proceedings of the Security Technology, 2009

How to Construct Identity-Based Signatures without the Key Escrow Problem.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

Asymmetric Group Key Agreement.
Proceedings of the Advances in Cryptology, 2009

New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing.
Proceedings of the Computer Security, 2009

Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.
Proceedings of the Topics in Cryptology, 2009

Efficient Non-interactive Range Proof.
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009

Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Cryptography in Computer System Security.
J. UCS, 2008

Cryptanalysis and improvement of an efficient certificateless signature scheme.
Journal of Communications and Networks, 2008

Efficient generic on-line/off-line (threshold) signatures without key exposure.
Inf. Sci., 2008

A New and Efficient Signature on Commitment Values.
I. J. Network Security, 2008

Short Designated Verifier Signature Scheme and Its Identity-based Variant.
I. J. Network Security, 2008

Secure universal designated verifier signature without random oracles.
Int. J. Inf. Sec., 2008

Constant-Size Dynamic k-TAA.
IACR Cryptology ePrint Archive, 2008

Cryptanalysis of simple three-party key exchange protocol.
Computers & Security, 2008

Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Server-Aided Verification Signatures: Definitions and New Constructions.
Proceedings of the Provable Security, Second International Conference, 2008

Optimal Online/Offline Signature: How to Sign a Message without Online Computation.
Proceedings of the Provable Security, Second International Conference, 2008

Identity-Based On-Line/Off-Line Signcryption.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles.
Proceedings of the Advances in Information and Computer Security, 2008

A Generic Construction of Identity-Based Online/Offline Signcryption.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Hierarchical Identity-Based Online/Offline Encryption.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

How to Balance Privacy with Authenticity.
Proceedings of the Information Security and Cryptology, 2008

Identity-Based Online/Offline Encryption.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Practical Anonymous Divisible E-Cash from Bounded Accumulators.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

RFID Privacy Models Revisited.
Proceedings of the Computer Security, 2008

Privacy for Private Key in Signatures.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Publicly Verifiable Privacy-Preserving Group Decryption.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Sanitizable Signatures Revisited.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Mitigating Phishing with ID-based Online/Offline Authentication.
Proceedings of the Sixth Australasian Information Security Conference, 2008

2007
Short Group Signatures Without Random Oracles.
J. Comput. Sci. Technol., 2007

Revocable Ring Signature.
J. Comput. Sci. Technol., 2007

Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004.
J. Comput. Sci. Technol., 2007

How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis.
I. J. Network Security, 2007

Group Decryption.
IACR Cryptology ePrint Archive, 2007

Nominative Signature: Application, Security Model and Construction.
IACR Cryptology ePrint Archive, 2007

Practical Anonymous Divisible E-Cash From Bounded Accumulators.
IACR Cryptology ePrint Archive, 2007

Practical Compact E-Cash.
IACR Cryptology ePrint Archive, 2007

Open-Source Tools for Immersive Environmental Visualization.
IEEE Computer Graphics and Applications, 2007

Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Designated Verifier Signature: Definition, Framework and New Constructions.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Compact sequential aggregate signatures.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures.
Proceedings of the Public Key Cryptography, 2007

Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length.
Proceedings of the Pairing-Based Cryptography, 2007

Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key.
Proceedings of the Pairing-Based Cryptography, 2007

Nominative Signature from Ring Signature.
Proceedings of the Advances in Information and Computer Security, 2007

First price sealed bid auction without auctioneers.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

A new group rekeying scheme based on t-packing designs for ad hoc networks.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

New Construction of Group Secret Handshakes Based on Pairings.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Formal Definition and Construction of Nominative Signature.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Efficient Partially Blind Signatures with Provable Security.
Proceedings of the Computational Science and Its Applications, 2007

Certificate-Based Signature: Security Model and Efficient Construction.
Proceedings of the Public Key Infrastructure, 2007

Compact E-Cash from Bounded Accumulator.
Proceedings of the Topics in Cryptology, 2007

Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Multi-Identity Single-Key Decryption without Random Oracles.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

A Generic Construction for Universally-Convertible Undeniable Signatures.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Identity-Based Proxy Signature from Pairings.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

Certificateless Signature Revisited.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

Practical Compact E-Cash.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

SEFAP: An Email System for Anti-Phishing.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes.
JNW, 2006

Personal Health Record Systems and Their Security Protection.
J. Medical Systems, 2006

Convertible identity-based anonymous designated ring signatures.
IJSN, 2006

Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.
IACR Cryptology ePrint Archive, 2006

Malicious KGC Attacks in Certificateless Cryptography.
IACR Cryptology ePrint Archive, 2006

ID-based Secure PIM-SM Schemes.
Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006

A New Signature Scheme Without Random Oracles from Bilinear Pairings.
Proceedings of the Progressin Cryptology, 2006

Restricted Universal Designated Verifier Signature.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Constant-Size Dynamic k-TAA.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Proxy Signature Without Random Oracles.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Ad Hoc Group Signatures.
Proceedings of the Advances in Information and Computer Security, 2006

Identity-based anonymous designated ring signatures.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Three-Round Secret Handshakes Based on ElGamal and DSA.
Proceedings of the Information Security Practice and Experience, 2006

Privately Retrieve Data from Large Databases.
Proceedings of the Information Security Practice and Experience, 2006

Short (Identity-Based) Strong Designated Verifier Signature Schemes.
Proceedings of the Information Security Practice and Experience, 2006

Volumetric Color Image Compression Using SET Partitioning Methods.
Proceedings of the 2006 International Conference on Image Processing, 2006

Universal Designated Verifier Signature Without Delegatability.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Efficient Partially Blind Signatures with Provable Security.
Proceedings of the Computational Science and Its Applications, 2006

Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.
Proceedings of the Financial Cryptography and Data Security, 2006

Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing.
Proceedings of the Public Key Infrastructure, 2006

Secure and Efficient Trust Negotiation.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Designated group credentials.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Efficient Signcryption Without Random Oracles.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Certificateless Designated Verifier Signature Schemes.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

A Scalable Multi-service Group Key Management Scheme.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Provably secure fail-stop signature schemes based on RSA.
IJWMC, 2005

Secure distribution and access of XML documents.
IJHPCN, 2005

A New Short Signature Scheme Without Random Oracles from Bilinear Pairings.
IACR Cryptology ePrint Archive, 2005

Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004.
IACR Cryptology ePrint Archive, 2005

Tripartite Concurrent Signatures.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Secure AODV Routing Protocol Using One-Time Signature.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Efficient Broadcast from Trapdoor Functions.
Proceedings of the Applied Public Key Infrastructure, 2005

Delegatable Access Control for Fine-Grained XML.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Universal Designated Multi Verifier Signature Schemes.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

An Efficient Static Blind Ring Signature Scheme.
Proceedings of the Information Security and Cryptology, 2005

Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures).
Proceedings of the Financial Cryptography and Data Security, 2005

Identity-Based Universal Designated Verifier Signatures.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Access Policy Sheet for Access Control in Fine-Grained XML.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Short Designated Verifier Proxy Signature from Pairings.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

On the Security of Certificateless Signature Schemes from Asiacrypt 2003.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Reducing Security Overhead for Mobile Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Privacy-Enhanced Internet Storage.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

On the Security of Nominative Signatures.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
On the Design of a New Trust Model for Mobile Agent Security.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

A Secure PIM-SM Multicast Routing Protocol.
Proceedings of the Distributed Computing, 2004

Perfect Concurrent Signature Schemes.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Deniable Partial Proxy Signatures.
Proceedings of the Advances in Computer Science, 2004

Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption.
Proceedings of the Advances in Computer Science, 2004

Securing XML Document Sources and Their Distribution.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Deniable Ring Authentication Revisited.
Proceedings of the Applied Cryptography and Network Security, 2004

Identity-Based Strong Designated Verifier Signature Schemes.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Robust non-interactive oblivious transfer.
IEEE Communications Letters, 2003

Identity-Based Broadcasting.
Proceedings of the Progress in Cryptology, 2003

A novel dynamic key management scheme for secure multicasting.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Non-interactive Deniable Ring Authentication.
Proceedings of the Information Security and Cryptology, 2003

On Fail-Stop Verifiable Secret Sharing Schemes.
Proceedings of the International Conference on Security and Management, 2003

A Secure Mental Poker Protocol Over The Internet.
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003

2002
Group Cryptography: Signature and Encryption.
Informatica (Slovenia), 2002

A Secure Object Sharing Scheme for Java Card.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

m out of n Oblivious Transfer.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
A Fair Electronic Cash Scheme.
Proceedings of the Topics in Electronic Commerce, Second International Symposium, 2001

Robust and Secure Broadcasting.
Proceedings of the Progress in Cryptology, 2001

2000
Distributed Signcryption.
Proceedings of the Progress in Cryptology, 2000

An Internet Anonymous Auction Scheme.
Proceedings of the Information Security and Cryptology, 2000

Towards a Protection Model for Supporting Multiple Access Control Policies.
Proceedings of the Australasian Database Conference, 2000

Fair On-line Gambling.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

Fail-Stop Confirmer Signatures.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
On the Design of Efficient RSA-based Off-line Electronic Cash Schemes.
Theor. Comput. Sci., 1999

Undeniable Confirmer Signature.
Proceedings of the Information Security, Second International Workshop, 1999

Delegated Decryption.
Proceedings of the Cryptography and Coding, 1999

Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Batching Proofs of Knowledge and Its Applications.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
A New Scheme of Credit based Payment for Electronic Commerce.
Proceedings of the Proceedings 23rd Conference on Local Computer Networks, 1998

Anonymous Secure E-Voting Over a Network.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature.
Proceedings of the Information Security, First International Workshop, 1997

A New Efficient Off-line Anonymous Cash Scheme.
Proceedings of the Algorithms and Computation, 8th International Symposium, 1997

Secure and Efficient Digital Coins.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

Micro-Digital Money for Electronic Commerce.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

New Micropayment Schemes Based on PayWords.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
Design of Secure End-toEnd Protocols for Mobile Systems.
IFIP World Conference on Mobile Communications, 1996

On The Design Of Secure Electronic Payment Schemes For Internet.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

An alternative model of quantum key agreement via photon coupling.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

On the design of security protocols for mobile communications.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996


  Loading...