His primary areas of study are Computer security, Encryption, Random oracle, Public-key cryptography and Cryptography. His research integrates issues of Scheme and Digital signature in his study of Computer security. In his study, which falls under the umbrella issue of Encryption, Client-side encryption and Message authentication code is strongly linked to Cryptographic primitive.
His Random oracle research focuses on subjects like Signature, which are linked to Certificateless cryptography and Group signature. His research investigates the link between Public-key cryptography and topics such as Theoretical computer science that cross with problems in Computation, Trusted third party and Smart card. His research in Cryptography intersects with topics in ElGamal encryption, Fourier transform, Dual and Artificial intelligence.
The scientist’s investigation covers issues in Computer security, Encryption, Theoretical computer science, Cryptography and Public-key cryptography. The various areas that Yi Mu examines in his Computer security study include Scheme and Signature. His Signature study combines topics in areas such as Algorithm and Ring signature, Digital signature.
His Encryption course of study focuses on Access control and Cloud computing. The Theoretical computer science study combines topics in areas such as Hash function and Computation. His Public-key cryptography research integrates issues from Cryptographic primitive and Internet privacy.
Yi Mu mainly investigates Computer security, Encryption, Scheme, Cryptography and Theoretical computer science. His research on Computer security often connects related areas such as Cloud computing. His Scheme research is multidisciplinary, incorporating elements of Signature, Identity and Algorithm.
His study in Cryptography is interdisciplinary in nature, drawing from both Adversary, Information security and Leakage. His research in Theoretical computer science tackles topics such as Hash function which are related to areas like Blockchain. His biological study spans a wide range of topics, including Standard model and Set.
Yi Mu mostly deals with Computer security, Encryption, Cryptography, Ciphertext and Computer network. He regularly ties together related areas like Cloud computing in his Computer security studies. His work deals with themes such as Theoretical computer science, Revocation and Access control, which intersect with Encryption.
In his work, Exponentiation, Identity, Modular arithmetic, Side channel attack and Discrete logarithm is strongly intertwined with Signcryption, which is a subfield of Cryptography. His Ciphertext study combines topics from a wide range of disciplines, such as Construct, Cryptographic primitive and Standard model. His study on Protocol is often connected to Communication channel as part of broader study in Computer network.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
On the security of certificateless signature schemes from asiacrypt 2003
Xinyi Huang;Willy Susilo;Yi Mu;Futai Zhang.
cryptology and network security (2005)
Certificateless signature revisited
Xinyi Huang;Yi Mu;Willy Susilo;Duncan S. Wong.
australasian conference on information security and privacy (2007)
Malicious KGC attacks in certificateless cryptography
Man Ho Au;Yi Mu;Jing Chen;Duncan S. Wong.
computer and communications security (2007)
One-atom lasers.
Yi Mu;C. M. Savage.
Physical Review A (1992)
Asymmetric Group Key Agreement
Qianhong Wu;Yi Mu;Willy Susilo;Bo Qin.
international cryptology conference (2009)
Constant-size dynamic k -TAA
Man Ho Au;Willy Susilo;Yi Mu.
security and cryptography for networks (2006)
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
Jinguang Han;W. Susilo;Yi Mu;Jun Yan.
IEEE Transactions on Parallel and Distributed Systems (2012)
Constant-size dynamic k -TAA
Man Ho Au;Willy Susilo;Yi Mu.
security and cryptography for networks (2006)
Identity-Based Strong Designated Verifier Signature Schemes
Willy Susilo;Fangguo Zhang;Yi Mu.
australasian conference on information security and privacy (2004)
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
Rongmao Chen;Yi Mu;Guomin Yang;Fuchun Guo.
IEEE Transactions on Information Forensics and Security (2016)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Wollongong
Singapore Management University
University of Newcastle Australia
Fujian Normal University
University of Hong Kong
Sun Yat-sen University
Beihang University
City University of Hong Kong
Wuhan University
Xidian University
Loughborough University
University of Sussex
University of California, Riverside
Agricultural Research Service
Medical University of Vienna
University of Coimbra
Central South University
University of Hong Kong
National Center for Atmospheric Research
University of Montreal
University of California, Irvine
Newcastle University
University College London
The University of Texas Southwestern Medical Center
Yale University
University of Leicester