Stop the war!
Остановите войну!
for scientists:
default search action
Yi Mu 0001
Person information
- affiliation: City University of Macau, Macau
- affiliation (former): Fujian Normal University, Fuzhou, China
- affiliation (former): University of Wollongong, NSW, Australia
- affiliation (former): Macquarie University, Sydney, NSW, Australia
- affiliation (former): University of Western Sydney, NSW, Australia
- affiliation (PhD 1994): Australian National University, Canberra, ACT, Australia
Other persons with the same name
- Yi Mu 0002 — Desert Research Institute, Reno, NV, USA
- Yi Mu 0003 — Ocean University of China, Qingdao, China
- Yi Mu 0004 — Xi'an Jiaotong University, Department of Earth and Environmental Sciences, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j286]Yizhao Zhu, Lanxiang Chen, Yi Mu:
Practical and malicious private set intersection with improved efficiency. Theor. Comput. Sci. 991: 114443 (2024) - [j285]Ke Huang, Yi Mu, Fatemeh Rezaeibagha, Xiaosong Zhang, Xiong Li, Sheng Cao:
Monero With Multi-Grained Redaction. IEEE Trans. Dependable Secur. Comput. 21(1): 241-253 (2024) - [j284]Mengdi Hu, Lanxiang Chen, Gaolin Chen, Yi Mu, Robert H. Deng:
A Pruned Pendant Vertex Based Index for Shortest Distance Query Under Structured Encrypted Graph. IEEE Trans. Inf. Forensics Secur. 19: 6351-6363 (2024) - 2023
- [j283]Yanwei Zhou, Zhaolong Wang, Zirui Qiao, Ying Wang, Bo Yang, Yi Mu, Mingwu Zhang:
Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption. Comput. J. 66(4): 924-940 (2023) - [j282]Yanwei Zhou, Bo Yang, Zirui Qiao, Zhe Xia, Mingwu Zhang, Yi Mu:
Leakage-resilient identity-based cryptography from minimal assumptions. Des. Codes Cryptogr. 91(11): 3757-3801 (2023) - [j281]Tianshuai Zhang, Leyou Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
Redactable Blockchain-Enabled Hierarchical Access Control Framework for Data Sharing in Electronic Medical Records. IEEE Syst. J. 17(2): 1962-1973 (2023) - [j280]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen, Leyou Zhang:
Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT. IEEE Trans. Cloud Comput. 11(1): 217-228 (2023) - [j279]Xiaoguo Li, Tao Xiang, Yi Mu, Fuchun Guo, Zhongyuan Yao:
C-Wall: Conflict-Resistance in Privacy-Preserving Cloud Storage. IEEE Trans. Cloud Comput. 11(2): 1911-1926 (2023) - [j278]Lanxiang Chen, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng:
Authenticable Data Analytics Over Encrypted Data in the Cloud. IEEE Trans. Inf. Forensics Secur. 18: 1800-1813 (2023) - [j277]Ruonan Ma, Leyou Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
BE-TRDSS: Blockchain-Enabled Secure and Efficient Traceable-Revocable Data-Sharing Scheme in Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(11): 10821-10830 (2023) - [j276]Lanxiang Chen, Lingfang Zeng, Yi Mu, Leilei Chen:
Global Combination and Clustering Based Differential Privacy Mixed Data Publishing. IEEE Trans. Knowl. Data Eng. 35(11): 11437-11448 (2023) - [j275]Lanxiang Chen, Yujie Xue, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng:
CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data. IEEE Trans. Serv. Comput. 16(2): 1011-1022 (2023) - [j274]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen, Leyou Zhang:
Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT. IEEE Trans. Serv. Comput. 16(3): 1664-1672 (2023) - 2022
- [j273]Lanxiang Chen, Qingxiao Fu, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Min-Shiang Hwang:
Blockchain-based random auditor committee for integrity verification. Future Gener. Comput. Syst. 131: 183-193 (2022) - [j272]Jian Su, Leyou Zhang, Yi Mu:
BA-RMKABSE: Blockchain-aided Ranked Multi-keyword Attribute-based Searchable Encryption with Hiding Policy for Smart Health System. Future Gener. Comput. Syst. 132: 299-309 (2022) - [j271]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaoming Huang, Yongcheng Gong:
Blockchain-based deduplication with arbitration and incentives. IET Inf. Secur. 16(6): 401-416 (2022) - [j270]Leyou Zhang, Tianshuai Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
Secure Decentralized Attribute-Based Sharing of Personal Health Records With Blockchain. IEEE Internet Things J. 9(14): 12482-12496 (2022) - [j269]Leyou Zhang, Ye Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
A Secure and Efficient Decentralized Access Control Scheme Based on Blockchain for Vehicular Social Networks. IEEE Internet Things J. 9(18): 17938-17952 (2022) - [j268]Yujie Xue, Lanxiang Chen, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng:
Structured encryption for knowledge graphs. Inf. Sci. 605: 43-70 (2022) - [j267]Manli Yuan, Yi Mu, Fatemeh Rezaeibagha, Li Xu, Xinyi Huang:
Controllable software licensing system for sub-licensing. J. Inf. Secur. Appl. 64: 103061 (2022) - [j266]Ye Zhang, Leyou Zhang, Qing Wu, Yi Mu:
Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9216-9227 (2022) - [j265]Qing Wu, Taotao Lai, Leyou Zhang, Yi Mu, Fatemeh Rezaeibagha:
Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud. J. Syst. Archit. 129: 102569 (2022) - [j264]Leyou Zhang, Chuchu Zhao, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth. J. Syst. Archit. 130: 102654 (2022) - [j263]Zhongyuan Yao, Yi Mu:
Publicly verifiable secure communication with user and data privacy. Pers. Ubiquitous Comput. 26(3): 863-879 (2022) - [j262]Leyou Zhang, Xuehuang Gao, Li Kang, Pengfei Liang, Yi Mu:
Distributed Ciphertext-Policy Attribute-Based Encryption With Enhanced Collusion Resilience and Privacy Preservation. IEEE Syst. J. 16(1): 735-746 (2022) - [j261]Qing Wu, Liangjun Li, Leyou Zhang, Yi Mu, Fatemeh Rezaeibagha:
Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing. IEEE Syst. J. 16(4): 5533-5543 (2022) - [j260]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaojiang Du:
Bidirectional and Malleable Proof-of-Ownership for Large File in Cloud Storage. IEEE Trans. Cloud Comput. 10(4): 2351-2365 (2022) - [j259]Jinhua Ma, Xinyi Huang, Yi Mu, Robert H. Deng:
Authenticated Data Redaction With Accountability and Transparency. IEEE Trans. Dependable Secur. Comput. 19(1): 149-160 (2022) - [j258]Anmin Fu, Zhenzhu Chen, Yi Mu, Willy Susilo, Yinxia Sun, Jie Wu:
Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization. IEEE Trans. Serv. Comput. 15(1): 266-278 (2022) - [j257]Xiaoguo Li, Tao Xiang, Shangwei Guo, Hongwei Li, Yi Mu:
Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data. IEEE Trans. Serv. Comput. 15(5): 2954-2968 (2022) - [j256]Leyou Zhang, Wenting You, Yi Mu:
Secure Outsourced Attribute-Based Sharing Framework for Lightweight Devices in Smart Health Systems. IEEE Trans. Serv. Comput. 15(5): 3019-3030 (2022) - 2021
- [j255]Haixia Chen, Xinyi Huang, Wei Wu, Yi Mu:
Privacy-Aware Image Authentication from Cryptographic Primitives. Comput. J. 64(8): 1178-1192 (2021) - [j254]Yangguang Tian, Yingjiu Li, Yi Mu, Guomin Yang:
Unlinkable and Revocable Secret Handshake. Comput. J. 64(8): 1303-1314 (2021) - [j253]Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Novel generic construction of leakage-resilient PKE scheme with CCA security. Des. Codes Cryptogr. 89(7): 1575-1614 (2021) - [j252]Ximeng Liu, Yi Mu, Jianting Ning, Qingchen Zhang:
Securing the Internet-of-Things: Advances, challenges, future trends. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j251]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Leyou Zhang:
Enhanced bitcoin with two-factor authentication. Int. J. Inf. Comput. Secur. 16(3/4): 292-306 (2021) - [j250]Leyou Zhang, Yadi Ye, Yi Mu:
Multiauthority Access Control With Anonymous Authentication for Personal Health Record. IEEE Internet Things J. 8(1): 156-167 (2021) - [j249]Wenjie Yang, Shangpeng Wang, Yi Mu:
An Enhanced Certificateless Aggregate Signature Without Pairings for E-Healthcare System. IEEE Internet Things J. 8(6): 5000-5008 (2021) - [j248]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen:
Secure and Efficient Data Aggregation for IoT Monitoring Systems. IEEE Internet Things J. 8(10): 8056-8063 (2021) - [j247]Leyou Zhang, Jun Wang, Yi Mu:
Privacy-Preserving Flexible Access Control for Encrypted Data in Internet of Things. IEEE Internet Things J. 8(19): 14731-14745 (2021) - [j246]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Leyou Zhang, Xinyi Huang:
Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors. IEEE Internet Things J. 8(24): 17669-17677 (2021) - [j245]Lei Zhou, Anmin Fu, Yi Mu, Huaqun Wang, Shui Yu, Yinxia Sun:
Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system. Inf. Sci. 545: 254-276 (2021) - [j244]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaojiang Du:
Scalable and redactable blockchain with update and anonymity. Inf. Sci. 546: 25-41 (2021) - [j243]Ke Huang, Yi Mu, Fatemeh Rezaeibagha, Xiaosong Zhang, Ting Chen:
Building Blockchains with Secure and Practical Public-Key Cryptographic Algorithms: Background, Motivations and Example. IEEE Netw. 35(6): 240-246 (2021) - [j242]Gongcheng Hu, Leyou Zhang, Yi Mu, Xiaoxu Gao:
An Expressive "Test-Decrypt-Verify" Attribute-Based Encryption Scheme With Hidden Policy for Smart Medical Cloud. IEEE Syst. J. 15(1): 365-376 (2021) - [j241]Tong Wu, Guomin Yang, Yi Mu, Fuchun Guo, Robert H. Deng:
Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model. IEEE Trans. Dependable Secur. Comput. 18(2): 563-575 (2021) - [c237]Yadi Ye, Leyou Zhang, Wenting You, Yi Mu:
Secure Decentralized Access Control Policy for Data Sharing in Smart Grid. INFOCOM Workshops 2021: 1-6 - [e14]Wanlei Zhou, Yi Mu:
Advances in Web-Based Learning - ICWL 2021 - 20th International Conference, ICWL 2021, Macau, China, November 13-14, 2021, Proceedings. Lecture Notes in Computer Science 13103, Springer 2021, ISBN 978-3-030-90784-6 [contents] - 2020
- [j240]Leyou Zhang, Juan Ren, Yi Mu, Baocang Wang:
Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid. IEEE Access 8: 23294-23307 (2020) - [j239]Leyou Zhang, Jian Su, Yi Mu:
Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage. IEEE Access 8: 104344-104356 (2020) - [j238]Leyou Zhang, Jun Wang, Yi Mu:
Secure and Privacy-Preserving Attribute-Based Sharing Framework in Vehicles Ad Hoc Networks. IEEE Access 8: 116781-116795 (2020) - [j237]Da-Zhi Sun, Yi Mu:
On the Security of Symmetric Encryption Against Mass Surveillance. IEEE Access 8: 175625-175636 (2020) - [j236]Leyou Zhang, Xuehuang Gao, Yi Mu:
Secure Data Sharing With Lightweight Computation in E-Health. IEEE Access 8: 209630-209643 (2020) - [j235]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu:
An improved Durandal signature scheme. Sci. China Inf. Sci. 63(3) (2020) - [j234]Haixia Chen, Xinyi Huang, Wei Wu, Yi Mu:
Efficient and secure image authentication with robustness and versatility. Sci. China Inf. Sci. 63(12) (2020) - [j233]Zhen Zhao, Ge Wu, Fuchun Guo, Willy Susilo, Yi Mu, Baocang Wang, Yupu Hu:
Black-Box Accountable Authority Identity-Based Revocation System. Comput. J. 63(4): 525-535 (2020) - [j232]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaofen Wang, Jingwei Li, Qi Xia, Jing Qin:
EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud. IEEE Internet Things J. 7(2): 882-892 (2020) - [j231]Shengke Zeng, Yi Mu, Hongjie Zhang, Mingxing He:
A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy. Inf. Sci. 516: 331-345 (2020) - [j230]Tong Wu, Guomin Yang, Yi Mu, Rongmao Chen, Shengmin Xu:
Privacy-enhanced remote data integrity checking with updatable timestamp. Inf. Sci. 527: 210-226 (2020) - [j229]Leyou Zhang, Yilei Cui, Yi Mu:
Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing. IEEE Syst. J. 14(1): 387-397 (2020) - [j228]Ke Huang, Xiaosong Zhang, Xiaofen Wang, Yi Mu, Fatemeh Rezaeibagha, Guangquan Xu, Hao Wang, Xi Zheng, Guomin Yang, Qi Xia, Xiaojiang Du:
HUCDO: A Hybrid User-centric Data Outsourcing Scheme. ACM Trans. Cyber Phys. Syst. 4(3): 35:1-35:23 (2020) - [j227]Yanwei Zhou, Bo Yang, Tao Wang, Yi Mu:
Novel updatable identity-based hash proof system and its applications. Theor. Comput. Sci. 804: 1-28 (2020) - [j226]Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security. Theor. Comput. Sci. 809: 277-295 (2020) - [j225]Yinxia Sun, Yi Mu, Willy Susilo, Futai Zhang, Anmin Fu:
Revocable identity-based encryption with server-aided ciphertext evolution. Theor. Comput. Sci. 815: 11-24 (2020) - [j224]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu, Huaxiong Wang:
A code-based signature scheme from the Lyubashevsky framework. Theor. Comput. Sci. 835: 15-30 (2020) - [j223]Xueqiao Liu, Guomin Yang, Yi Mu, Robert H. Deng:
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 17(6): 1322-1332 (2020) - [j222]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaojiang Du, Nadra Guizani:
Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain. IEEE Trans. Ind. Informatics 16(4): 2677-2686 (2020) - [j221]Yi Mu, Fatemeh Rezaeibagha, Ke Huang:
Policy-Driven Blockchain and Its Applications for Transport Systems. IEEE Trans. Serv. Comput. 13(2): 230-240 (2020) - [c236]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Yi Mu:
Improvement of Attribute-Based Encryption Using Blakley Secret Sharing. ACISP 2020: 631-641 - [i22]Yadi Ye, Leyou Zhang, Yi Mu, Wenting You:
Secure Decentralized Access Control Policy for Data Sharing in Smart Grid. IACR Cryptol. ePrint Arch. 2020: 1567 (2020)
2010 – 2019
- 2019
- [j220]Leyou Zhang, Gongcheng Hu, Yi Mu, Fatemeh Rezaeibagha:
Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System. IEEE Access 7: 33202-33213 (2019) - [j219]Wenjie Yang, Shangpeng Wang, Xinyi Huang, Yi Mu:
On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments. IEEE Access 7: 91074-91079 (2019) - [j218]Wenjie Yang, Shangpeng Wang, Wei Wu, Yi Mu:
Top-Level Secure Certificateless Signature Against Malicious-But-Passive KGC. IEEE Access 7: 112870-112878 (2019) - [j217]Fatemeh Rezaeibagha, Yi Mu, Xinyi Huang, Wenjie Yang, Ke Huang:
Fully Secure Lightweight Certificateless Signature Scheme for IIoT. IEEE Access 7: 144433-144443 (2019) - [j216]Fatemeh Rezaeibagha, Yi Mu:
Efficient Micropayment of Cryptocurrency from Blockchains. Comput. J. 62(4): 507-517 (2019) - [j215]Yanwei Zhou, Bo Yang, Yi Mu:
Continuous leakage-resilient identity-based encryption with leakage amplification. Des. Codes Cryptogr. 87(9): 2061-2090 (2019) - [j214]Guomin Yang, Rongmao Chen, Yi Mu, Willy Susilo, Fuchun Guo, Jie Li:
Strongly leakage resilient authenticated key exchange, revisited. Des. Codes Cryptogr. 87(12): 2885-2911 (2019) - [j213]Shengmin Xu, Guomin Yang, Yi Mu, Ximeng Liu:
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Future Gener. Comput. Syst. 97: 284-294 (2019) - [j212]Yanwei Zhou, Bo Yang, Yi Mu, Tao Wang, Xin Wang:
Identity-based encryption resilient to continuous key leakage. IET Inf. Secur. 13(5): 426-434 (2019) - [j211]Fatemeh Rezaeibagha, Yi Mu, Shiwei Zhang, Xiaofen Wang:
Provably Secure (Broadcast) Homomorphic Signcryption. Int. J. Found. Comput. Sci. 30(4): 511-529 (2019) - [j210]Zhongyuan Yao, Yi Mu:
ACE with Compact Ciphertext Size and Decentralized Sanitizers. Int. J. Found. Comput. Sci. 30(4): 531-549 (2019) - [j209]Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo, Futai Zhang:
Threshold privacy-preserving cloud auditing with multiple uploaders. Int. J. Inf. Sec. 18(3): 321-331 (2019) - [j208]Peng Jiang, Jianchang Lai, Fuchun Guo, Willy Susilo, Man Ho Au, Guomin Yang, Yi Mu, Rongmao Chen:
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters. Inf. Sci. 472: 35-52 (2019) - [j207]Shengmin Xu, Guomin Yang, Yi Mu:
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Inf. Sci. 479: 116-134 (2019) - [j206]Yangguang Tian, Yingjiu Li, Guomin Yang, Willy Susilo, Yi Mu, Hui Cui, Yinghui Zhang:
DABKE: Secure deniable attribute-based key exchange framework. J. Comput. Secur. 27(2): 259-275 (2019) - [j205]Yong Yu, Yi Mu:
Advances of Provable Security Techniques. J. Univers. Comput. Sci. 25(3): 154-157 (2019) - [j204]Yanwei Zhou, Bo Yang, Zhe Xia, Yi Mu, Tao Wang:
Anonymous and Updatable Identity-Based Hash Proof System. IEEE Syst. J. 13(3): 2818-2829 (2019) - [j203]Peng Jiang, Fuchun Guo, Yi Mu:
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems. Theor. Comput. Sci. 767: 51-72 (2019) - [j202]Yanwei Zhou, Bo Yang, Yi Mu:
The generic construction of continuous leakage-resilient identity-based cryptosystems. Theor. Comput. Sci. 772: 1-45 (2019) - [j201]Ke Huang, Xiaosong Zhang, Yi Mu, Xiaofen Wang, Guomin Yang, Xiaojiang Du, Fatemeh Rezaeibagha, Qi Xia, Mohsen Guizani:
Building Redactable Consortium Blockchain for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 15(6): 3670-3679 (2019) - [j200]Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo, Futai Zhang:
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users. Wirel. Pers. Commun. 106(3): 1161-1182 (2019) - [c235]Wenwen Yan, Anmin Fu, Yi Mu, Zhe Xia, Shui Yu, Boyu Kuang:
EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices. IoT S&P@CCS 2019: 2-7 - [c234]Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo, Weizhi Meng:
Provably Secure Group Authentication in the Asynchronous Communication Model. ICICS 2019: 324-340 - [c233]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Hua Shen, Yi Mu:
Provably Secure Proactive Secret Sharing Without the Adjacent Assumption. ProvSec 2019: 247-264 - [c232]Xin Chen, Xinyi Huang, Yi Mu, Ding Wang:
A Typo-Tolerant Password Authentication Scheme with Targeted Error Correction. TrustCom/BigDataSE 2019: 546-553 - [e13]Yi Mu, Robert H. Deng, Xinyi Huang:
Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings. Lecture Notes in Computer Science 11829, Springer 2019, ISBN 978-3-030-31577-1 [contents] - 2018
- [b1]Fuchun Guo, Willy Susilo, Yi Mu:
Introduction to Security Reduction. Springer 2018, ISBN 978-3-319-93048-0, pp. 1-253 - [j199]Leyou Zhang, Pengfei Liang, Yi Mu:
Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption. IEEE Access 6: 12736-12745 (2018) - [j198]Jiannan Wei, Xiaojie Wang, Nan Li, Guomin Yang, Yi Mu:
A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks. IEEE Access 6: 43776-43784 (2018) - [j197]Yanwei Zhou, Bo Yang, Yi Mu, Zhe Xia:
Continuous leakage-resilient access control for wireless sensor networks. Ad Hoc Networks 80: 41-53 (2018) - [j196]Yanwei Zhou, Bo Yang, Yi Mu:
Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles. Comput. J. 61(4): 586-600 (2018) - [j195]Jianchang Lai, Yi Mu, Fuchun Guo, Peng Jiang, Sha Ma:
Identity-Based Broadcast Encryption for Inner Products. Comput. J. 61(8): 1240-1251 (2018) - [j194]Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo:
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener. Comput. Syst. 78: 720-729 (2018) - [j193]Xiaonan Wang, Zhengxiong Dou, Yi Mu:
CCN framework with privacy support. IET Inf. Secur. 12(2): 157-164 (2018) - [j192]Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu:
Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud. Int. J. High Perform. Comput. Netw. 11(1): 45-54 (2018) - [j191]Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo:
Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts. Int. J. Inf. Sec. 17(4): 463-475 (2018) - [j190]