Browsing by Author Mu, Yi

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 37  next >
TitleAuthor(s)Issue DateViews
 
AAC-OT: Accountable Oblivious Transfer with Access Control
Journal:IEEE Transactions on Information Forensics and Security
2015
14
 
Anonymous broadcast encryption with an untrusted gateway
Journal:International Journal of Security and Networks
2014
Anonymous signcryption against linear related-key attacks
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
 
Comments on a Public Auditing Mechanism for Shared Cloud Data Service
Journal:IEEE Transactions on Services Computing
2015
24
Compact e-cash from bounded accumulator
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
15
Complete robustness in identity-based encryption
Proceeding/Conference:Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014: Proceedings
2014
12
Constant-size dynamic k-TAA
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
11
 
2013
13
Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
Efficient non-interactive range proof
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
18
Electronic cash with anonymous user suspension
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
 
2015
8
 
Escrowed deniable identification schemes
Journal:International Journal of Security and its Applications
2010
Escrowed deniable identification schemes
Proceeding/Conference:Communications in Computer and Information Science
2009
10
How to construct identity-based signatures without the key escrow problem
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
7
 
How to construct identity-based signatures without the key escrow problem
Journal:International Journal of Information Security
2010
14
 
2019
13
 
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
Journal:IEEE Transactions on Information Forensics and Security
2015
21
Is the notion of divisible on-line/off-line signatures stronger than on-line/off-line signatures?
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
7
Malicious KGC attacks in certificateless cryptography
Proceeding/Conference:eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
2007
10