On the security of certificateless signature schemes from Asiacrypt 2003 X Huang, W Susilo, Y Mu, F Zhang Cryptology and Network Security: 4th International Conference, CANS 2005 …, 2005 | 433 | 2005 |
Certificateless signature revisited X Huang, Y Mu, W Susilo, DS Wong, W Wu Australasian Conference on Information Security and Privacy, 308-322, 2007 | 398 | 2007 |
Constant-Size Dynamic k-TAA MH Au, W Susilo, Y Mu Security and Cryptography for Networks: 5th International Conference, SCN …, 2006 | 359 | 2006 |
Malicious KGC attacks in certificateless cryptography MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 292 | 2007 |
Dual-server public-key encryption with keyword search for secure cloud storage R Chen, Y Mu, G Yang, F Guo, X Wang IEEE transactions on information forensics and security 11 (4), 789-798, 2015 | 281 | 2015 |
One-atom lasers Y Mu, CM Savage Physical Review A 46 (9), 5944, 1992 | 266 | 1992 |
Asymmetric group key agreement Q Wu, Y Mu, W Susilo, B Qin, J Domingo-Ferrer Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009 | 253 | 2009 |
Privacy-preserving decentralized key-policy attribute-based encryption J Han, W Susilo, Y Mu, J Yan IEEE transactions on parallel and distributed systems 23 (11), 2150-2162, 2012 | 249 | 2012 |
CP-ABE with constant-size keys for lightweight devices F Guo, Y Mu, W Susilo, DS Wong, V Varadharajan IEEE transactions on information forensics and security 9 (5), 763-771, 2014 | 213 | 2014 |
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption J Han, W Susilo, Y Mu, J Zhou, MHA Au IEEE transactions on information forensics and security 10 (3), 665-678, 2014 | 210 | 2014 |
Identity-based strong designated verifier signature schemes W Susilo, F Zhang, Y Mu Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004 | 201 | 2004 |
Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation Y Zhang, C Xu, X Liang, H Li, Y Mu, X Zhang IEEE Transactions on Information Forensics and Security 12 (3), 676-688, 2016 | 176 | 2016 |
Certificate-based signature: security model and efficient construction J Li, X Huang, Y Mu, W Susilo, Q Wu Public Key Infrastructure: 4th European PKI Workshop: Theory and Practice …, 2007 | 158 | 2007 |
BL-MLE: Block-level message-locked encryption for secure large file deduplication R Chen, Y Mu, G Yang, F Guo IEEE Transactions on Information Forensics and Security 10 (12), 2643-2652, 2015 | 152 | 2015 |
Server-aided public key encryption with keyword search R Chen, Y Mu, G Yang, F Guo, X Huang, X Wang, Y Wang IEEE Transactions on Information Forensics and Security 11 (12), 2833-2842, 2016 | 150 | 2016 |
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing Y Jiang, W Susilo, Y Mu, F Guo Future Generation Computer Systems 78, 720-729, 2018 | 138 | 2018 |
Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems MH Au, PP Tsang, W Susilo, Y Mu Cryptographers’ track at the RSA conference, 295-308, 2009 | 137 | 2009 |
Multi-identity single-key decryption without random oracles F Guo, Y Mu, Z Chen, L Xu Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007 …, 2008 | 133 | 2008 |
Identity-based data storage in cloud computing J Han, W Susilo, Y Mu Future Generation Computer Systems 29 (3), 673-681, 2013 | 128 | 2013 |
Personal health record systems and their security protection KT Win, W Susilo, Y Mu Journal of medical systems 30, 309-315, 2006 | 127 | 2006 |