His primary areas of study are Computer security, Encryption, Random oracle, Public-key cryptography and Cryptography. His research integrates issues of Scheme and Digital signature in his study of Computer security. In his study, which falls under the umbrella issue of Encryption, Client-side encryption and Message authentication code is strongly linked to Cryptographic primitive.
His Random oracle research focuses on subjects like Signature, which are linked to Certificateless cryptography and Group signature. His research investigates the link between Public-key cryptography and topics such as Theoretical computer science that cross with problems in Computation, Trusted third party and Smart card. His research in Cryptography intersects with topics in ElGamal encryption, Fourier transform, Dual and Artificial intelligence.
The scientist’s investigation covers issues in Computer security, Encryption, Theoretical computer science, Cryptography and Public-key cryptography. The various areas that Yi Mu examines in his Computer security study include Scheme and Signature. His Signature study combines topics in areas such as Algorithm and Ring signature, Digital signature.
His Encryption course of study focuses on Access control and Cloud computing. The Theoretical computer science study combines topics in areas such as Hash function and Computation. His Public-key cryptography research integrates issues from Cryptographic primitive and Internet privacy.
Yi Mu mainly investigates Computer security, Encryption, Scheme, Cryptography and Theoretical computer science. His research on Computer security often connects related areas such as Cloud computing. His Scheme research is multidisciplinary, incorporating elements of Signature, Identity and Algorithm.
His study in Cryptography is interdisciplinary in nature, drawing from both Adversary, Information security and Leakage. His research in Theoretical computer science tackles topics such as Hash function which are related to areas like Blockchain. His biological study spans a wide range of topics, including Standard model and Set.
Yi Mu mostly deals with Computer security, Encryption, Cryptography, Ciphertext and Computer network. He regularly ties together related areas like Cloud computing in his Computer security studies. His work deals with themes such as Theoretical computer science, Revocation and Access control, which intersect with Encryption.
In his work, Exponentiation, Identity, Modular arithmetic, Side channel attack and Discrete logarithm is strongly intertwined with Signcryption, which is a subfield of Cryptography. His Ciphertext study combines topics from a wide range of disciplines, such as Construct, Cryptographic primitive and Standard model. His study on Protocol is often connected to Communication channel as part of broader study in Computer network.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
On the security of certificateless signature schemes from asiacrypt 2003
Xinyi Huang;Willy Susilo;Yi Mu;Futai Zhang.
cryptology and network security (2005)
Certificateless signature revisited
Xinyi Huang;Yi Mu;Willy Susilo;Duncan S. Wong.
australasian conference on information security and privacy (2007)
Malicious KGC attacks in certificateless cryptography
Man Ho Au;Yi Mu;Jing Chen;Duncan S. Wong.
computer and communications security (2007)
One-atom lasers.
Yi Mu;C. M. Savage.
Physical Review A (1992)
Asymmetric Group Key Agreement
Qianhong Wu;Yi Mu;Willy Susilo;Bo Qin.
international cryptology conference (2009)
Constant-size dynamic k -TAA
Man Ho Au;Willy Susilo;Yi Mu.
security and cryptography for networks (2006)
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
Jinguang Han;W. Susilo;Yi Mu;Jun Yan.
IEEE Transactions on Parallel and Distributed Systems (2012)
Identity-Based Strong Designated Verifier Signature Schemes
Willy Susilo;Fangguo Zhang;Yi Mu.
australasian conference on information security and privacy (2004)
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
Rongmao Chen;Yi Mu;Guomin Yang;Fuchun Guo.
IEEE Transactions on Information Forensics and Security (2016)
CP-ABE With Constant-Size Keys for Lightweight Devices
Fuchun Guo;Yi Mu;Willy Susilo;Duncan S. Wong.
IEEE Transactions on Information Forensics and Security (2014)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
University of Wollongong
University of Wollongong
University of Newcastle Australia
Fujian Normal University
University of Hong Kong
Sun Yat-sen University
Beihang University
City University of Hong Kong
University of Southern California
Xidian University
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: