H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 55 Citations 10,290 468 World Ranking 2201 National Ranking 212

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Computer security
  • Cryptography

His primary areas of study are Computer security, Encryption, Random oracle, Public-key cryptography and Cryptography. His research integrates issues of Scheme and Digital signature in his study of Computer security. In his study, which falls under the umbrella issue of Encryption, Client-side encryption and Message authentication code is strongly linked to Cryptographic primitive.

His Random oracle research focuses on subjects like Signature, which are linked to Certificateless cryptography and Group signature. His research investigates the link between Public-key cryptography and topics such as Theoretical computer science that cross with problems in Computation, Trusted third party and Smart card. His research in Cryptography intersects with topics in ElGamal encryption, Fourier transform, Dual and Artificial intelligence.

His most cited work include:

  • On the security of certificateless signature schemes from asiacrypt 2003 (210 citations)
  • Certificateless signature revisited (202 citations)
  • Malicious KGC attacks in certificateless cryptography (166 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Computer security, Encryption, Theoretical computer science, Cryptography and Public-key cryptography. The various areas that Yi Mu examines in his Computer security study include Scheme and Signature. His Signature study combines topics in areas such as Algorithm and Ring signature, Digital signature.

His Encryption course of study focuses on Access control and Cloud computing. The Theoretical computer science study combines topics in areas such as Hash function and Computation. His Public-key cryptography research integrates issues from Cryptographic primitive and Internet privacy.

He most often published in these fields:

  • Computer security (57.35%)
  • Encryption (27.32%)
  • Theoretical computer science (20.61%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer security (57.35%)
  • Encryption (27.32%)
  • Scheme (18.85%)

In recent papers he was focusing on the following fields of study:

Yi Mu mainly investigates Computer security, Encryption, Scheme, Cryptography and Theoretical computer science. His research on Computer security often connects related areas such as Cloud computing. His Scheme research is multidisciplinary, incorporating elements of Signature, Identity and Algorithm.

His study in Cryptography is interdisciplinary in nature, drawing from both Adversary, Information security and Leakage. His research in Theoretical computer science tackles topics such as Hash function which are related to areas like Blockchain. His biological study spans a wide range of topics, including Standard model and Set.

Between 2016 and 2021, his most popular works were:

  • Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation (66 citations)
  • Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing (52 citations)
  • Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud (33 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Cryptography
  • The Internet

Yi Mu mostly deals with Computer security, Encryption, Cryptography, Ciphertext and Computer network. He regularly ties together related areas like Cloud computing in his Computer security studies. His work deals with themes such as Theoretical computer science, Revocation and Access control, which intersect with Encryption.

In his work, Exponentiation, Identity, Modular arithmetic, Side channel attack and Discrete logarithm is strongly intertwined with Signcryption, which is a subfield of Cryptography. His Ciphertext study combines topics from a wide range of disciplines, such as Construct, Cryptographic primitive and Standard model. His study on Protocol is often connected to Communication channel as part of broader study in Computer network.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

On the security of certificateless signature schemes from asiacrypt 2003

Xinyi Huang;Willy Susilo;Yi Mu;Futai Zhang.
cryptology and network security (2005)

412 Citations

Certificateless signature revisited

Xinyi Huang;Yi Mu;Willy Susilo;Duncan S. Wong.
australasian conference on information security and privacy (2007)

365 Citations

Malicious KGC attacks in certificateless cryptography

Man Ho Au;Yi Mu;Jing Chen;Duncan S. Wong.
computer and communications security (2007)

271 Citations

One-atom lasers.

Yi Mu;C. M. Savage.
Physical Review A (1992)

244 Citations

Asymmetric Group Key Agreement

Qianhong Wu;Yi Mu;Willy Susilo;Bo Qin.
international cryptology conference (2009)

216 Citations

Constant-size dynamic k -TAA

Man Ho Au;Willy Susilo;Yi Mu.
security and cryptography for networks (2006)

198 Citations

Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption

Jinguang Han;W. Susilo;Yi Mu;Jun Yan.
IEEE Transactions on Parallel and Distributed Systems (2012)

198 Citations

Identity-Based Strong Designated Verifier Signature Schemes

Willy Susilo;Fangguo Zhang;Yi Mu.
australasian conference on information security and privacy (2004)

190 Citations

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage

Rongmao Chen;Yi Mu;Guomin Yang;Fuchun Guo.
IEEE Transactions on Information Forensics and Security (2016)

165 Citations

CP-ABE With Constant-Size Keys for Lightweight Devices

Fuchun Guo;Yi Mu;Willy Susilo;Duncan S. Wong.
IEEE Transactions on Information Forensics and Security (2014)

154 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Yi Mu

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 99

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 61

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 53

Man Ho Au

Man Ho Au

University of Hong Kong

Publications: 50

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 49

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 43

Duncan S. Wong

Duncan S. Wong

City University of Hong Kong

Publications: 35

Sherman S. M. Chow

Sherman S. M. Chow

Chinese University of Hong Kong

Publications: 33

Josep Domingo-Ferrer

Josep Domingo-Ferrer

Rovira i Virgili University

Publications: 33

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 32

Debiao He

Debiao He

Wuhan University

Publications: 32

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 31

Jianying Zhou

Jianying Zhou

Singapore University of Technology and Design

Publications: 30

Guomin Yang

Guomin Yang

University of Wollongong

Publications: 29

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 26

Something went wrong. Please try again later.