D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 56 Citations 10,997 600 World Ranking 2715 National Ranking 269

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Computer security
  • Cryptography

His primary areas of study are Computer security, Encryption, Random oracle, Public-key cryptography and Cryptography. His research integrates issues of Scheme and Digital signature in his study of Computer security. In his study, which falls under the umbrella issue of Encryption, Client-side encryption and Message authentication code is strongly linked to Cryptographic primitive.

His Random oracle research focuses on subjects like Signature, which are linked to Certificateless cryptography and Group signature. His research investigates the link between Public-key cryptography and topics such as Theoretical computer science that cross with problems in Computation, Trusted third party and Smart card. His research in Cryptography intersects with topics in ElGamal encryption, Fourier transform, Dual and Artificial intelligence.

His most cited work include:

  • On the security of certificateless signature schemes from asiacrypt 2003 (210 citations)
  • Certificateless signature revisited (202 citations)
  • Malicious KGC attacks in certificateless cryptography (166 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Computer security, Encryption, Theoretical computer science, Cryptography and Public-key cryptography. The various areas that Yi Mu examines in his Computer security study include Scheme and Signature. His Signature study combines topics in areas such as Algorithm and Ring signature, Digital signature.

His Encryption course of study focuses on Access control and Cloud computing. The Theoretical computer science study combines topics in areas such as Hash function and Computation. His Public-key cryptography research integrates issues from Cryptographic primitive and Internet privacy.

He most often published in these fields:

  • Computer security (57.35%)
  • Encryption (27.32%)
  • Theoretical computer science (20.61%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer security (57.35%)
  • Encryption (27.32%)
  • Scheme (18.85%)

In recent papers he was focusing on the following fields of study:

Yi Mu mainly investigates Computer security, Encryption, Scheme, Cryptography and Theoretical computer science. His research on Computer security often connects related areas such as Cloud computing. His Scheme research is multidisciplinary, incorporating elements of Signature, Identity and Algorithm.

His study in Cryptography is interdisciplinary in nature, drawing from both Adversary, Information security and Leakage. His research in Theoretical computer science tackles topics such as Hash function which are related to areas like Blockchain. His biological study spans a wide range of topics, including Standard model and Set.

Between 2016 and 2021, his most popular works were:

  • Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation (66 citations)
  • Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing (52 citations)
  • Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud (33 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Cryptography
  • The Internet

Yi Mu mostly deals with Computer security, Encryption, Cryptography, Ciphertext and Computer network. He regularly ties together related areas like Cloud computing in his Computer security studies. His work deals with themes such as Theoretical computer science, Revocation and Access control, which intersect with Encryption.

In his work, Exponentiation, Identity, Modular arithmetic, Side channel attack and Discrete logarithm is strongly intertwined with Signcryption, which is a subfield of Cryptography. His Ciphertext study combines topics from a wide range of disciplines, such as Construct, Cryptographic primitive and Standard model. His study on Protocol is often connected to Communication channel as part of broader study in Computer network.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

On the security of certificateless signature schemes from asiacrypt 2003

Xinyi Huang;Willy Susilo;Yi Mu;Futai Zhang.
cryptology and network security (2005)

429 Citations

Certificateless signature revisited

Xinyi Huang;Yi Mu;Willy Susilo;Duncan S. Wong.
australasian conference on information security and privacy (2007)

379 Citations

Malicious KGC attacks in certificateless cryptography

Man Ho Au;Yi Mu;Jing Chen;Duncan S. Wong.
computer and communications security (2007)

276 Citations

One-atom lasers.

Yi Mu;C. M. Savage.
Physical Review A (1992)

244 Citations

Asymmetric Group Key Agreement

Qianhong Wu;Yi Mu;Willy Susilo;Bo Qin.
international cryptology conference (2009)

231 Citations

Constant-size dynamic k -TAA

Man Ho Au;Willy Susilo;Yi Mu.
security and cryptography for networks (2006)

223 Citations

Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption

Jinguang Han;W. Susilo;Yi Mu;Jun Yan.
IEEE Transactions on Parallel and Distributed Systems (2012)

220 Citations

Constant-size dynamic k -TAA

Man Ho Au;Willy Susilo;Yi Mu.
security and cryptography for networks (2006)

198 Citations

Identity-Based Strong Designated Verifier Signature Schemes

Willy Susilo;Fangguo Zhang;Yi Mu.
australasian conference on information security and privacy (2004)

194 Citations

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage

Rongmao Chen;Yi Mu;Guomin Yang;Fuchun Guo.
IEEE Transactions on Information Forensics and Security (2016)

192 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Yi Mu

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 99

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 61

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 53

Man Ho Au

Man Ho Au

University of Hong Kong

Publications: 50

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 49

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 43

Duncan S. Wong

Duncan S. Wong

City University of Hong Kong

Publications: 35

Josep Domingo-Ferrer

Josep Domingo-Ferrer

Rovira i Virgili University

Publications: 33

Sherman S. M. Chow

Sherman S. M. Chow

Chinese University of Hong Kong

Publications: 33

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 32

Debiao He

Debiao He

Wuhan University

Publications: 32

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 31

Jianying Zhou

Jianying Zhou

Singapore University of Technology and Design

Publications: 30

Guomin Yang

Guomin Yang

Singapore Management University

Publications: 29

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 26

Hui Li

Hui Li

Xidian University

Publications: 26

Trending Scientists

Terence C. Mills

Terence C. Mills

Loughborough University

Michael J. Hutchings

Michael J. Hutchings

University of Sussex

G. Darrel Jenerette

G. Darrel Jenerette

University of California, Riverside

Brenda Oppert

Brenda Oppert

Agricultural Research Service

Keiryn L. Bennett

Keiryn L. Bennett

Medical University of Vienna

Milton S. da Costa

Milton S. da Costa

University of Coimbra

Hong Jiang

Hong Jiang

Central South University

Kennedy F. Shortridge

Kennedy F. Shortridge

University of Hong Kong

Barbara A. Emery

Barbara A. Emery

National Center for Atmospheric Research

Paul Cisek

Paul Cisek

University of Montreal

Ramesh Srinivasan

Ramesh Srinivasan

University of California, Irvine

Jeremy R. Parr

Jeremy R. Parr

Newcastle University

Alan Lucas

Alan Lucas

University College London

Orson W. Moe

Orson W. Moe

The University of Texas Southwestern Medical Center

Harold O. Conn

Harold O. Conn

Yale University

Eric Dunning

Eric Dunning

University of Leicester

Something went wrong. Please try again later.