Browsing by Author Mu, Yi

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 37  next >
TitleAuthor(s)Issue Date
 
AAC-OT: Accountable Oblivious Transfer with Access Control
Journal:IEEE Transactions on Information Forensics and Security
2015
 
Anonymous broadcast encryption with an untrusted gateway
Journal:International Journal of Security and Networks
2014
Anonymous signcryption against linear related-key attacks
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
 
Comments on a Public Auditing Mechanism for Shared Cloud Data Service
Journal:IEEE Transactions on Services Computing
2015
Compact e-cash from bounded accumulator
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
Complete robustness in identity-based encryption
Proceeding/Conference:Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014: Proceedings
2014
Constant-size dynamic k-TAA
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
 
2013
Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
Efficient non-interactive range proof
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
Electronic cash with anonymous user suspension
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
 
2015
 
Escrowed deniable identification schemes
Journal:International Journal of Security and its Applications
2010
Escrowed deniable identification schemes
Proceeding/Conference:Communications in Computer and Information Science
2009
 
How to construct identity-based signatures without the key escrow problem
Journal:International Journal of Information Security
2010
How to construct identity-based signatures without the key escrow problem
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
 
2019
 
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
Journal:IEEE Transactions on Information Forensics and Security
2015
Is the notion of divisible on-line/off-line signatures stronger than on-line/off-line signatures?
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
Malicious KGC attacks in certificateless cryptography
Proceeding/Conference:eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
2007