dblp.uni-trier.dewww.uni-trier.de

Yi Mu

University of Wollongong

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
138EEMan Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu: Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. CT-RSA 2009: 295-308
137EEQianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer: Asymmetric Group Key Agreement. EUROCRYPT 2009: 153-170
2008
136 Liqun Chen, Yi Mu, Willy Susilo: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings Springer 2008
135 Yi Mu, Willy Susilo, Jennifer Seberry: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings Springer 2008
134EETsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu: Sanitizable Signatures Revisited. CANS 2008: 80-97
133EEChing Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: RFID Privacy Models Revisited. ESORICS 2008: 251-266
132EEFuchun Guo, Yi Mu, Zhide Chen: Identity-Based Online/Offline Encryption. Financial Cryptography 2008: 247-261
131EEMan Ho Au, Willy Susilo, Yi Mu: Practical Anonymous Divisible E-Cash from Bounded Accumulators. Financial Cryptography 2008: 287-301
130EEPairat Thorncharoensri, Willy Susilo, Yi Mu: How to Balance Privacy with Authenticity. ICISC 2008: 184-201
129EEZhongren Liu, Li Xu, Zhide Chen, Yi Mu, Fuchun Guo: Hierarchical Identity-Based Online/Offline Encryption. ICYCS 2008: 2115-2119
128EEDongdong Sun, Yi Mu, Willy Susilo: A Generic Construction of Identity-Based Online/Offline Signcryption. ISPA 2008: 707-712
127EEFuchun Guo, Yi Mu, Zhide Chen: Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles. IWSEC 2008: 49-63
126EEBo Qin, Qianhong Wu, Willy Susilo, Yi Mu: Publicly Verifiable Privacy-Preserving Group Decryption. Inscrypt 2008: 72-83
125EEQianhong Wu, Bo Qin, Yi Mu, Willy Susilo: Privacy for Private Key in Signatures. Inscrypt 2008: 84-95
124EEWei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Server-Aided Verification Signatures: Definitions and New Constructions. ProvSec 2008: 141-155
123EEFuchun Guo, Yi Mu: Optimal Online/Offline Signature: How to Sign a Message without Online Computation. ProvSec 2008: 98-111
122EEWei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. WISA 2008: 99-114
121EEHua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang: Cryptanalysis of simple three-party key exchange protocol. Computers & Security 27(1-2): 16-21 (2008)
120EEXiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim: Efficient generic on-line/off-line (threshold) signatures without key exposure. Inf. Sci. 178(21): 4192-4203 (2008)
119EEXinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Secure universal designated verifier signature without random oracles. Int. J. Inf. Sec. 7(3): 171-183 (2008)
118 Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008)
2007
117 Willy Susilo, Joseph K. Liu, Yi Mu: Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings Springer 2007
116EEQiong Ren, Yi Mu, Willy Susilo: SEFAP: An Email System for Anti-Phishing. ACIS-ICIS 2007: 782-787
115EEXinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu: Certificateless Signature Revisited. ACISP 2007: 308-322
114EEMan Ho Au, Willy Susilo, Yi Mu: Practical Compact E-Cash. ACISP 2007: 431-445
113EEXiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu: Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. ACNS 2007: 18-30
112EEWei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang: Identity-Based Proxy Signature from Pairings. ATC 2007: 22-31
111EEQianhong Wu, Willy Susilo, Yi Mu, Bo Qin: Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. ATC 2007: 32-41
110EEFuchun Guo, Yi Mu, Zhide Chen: Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. CANS 2007: 1-14
109EEXinyi Huang, Yi Mu, Willy Susilo, Wei Wu: A Generic Construction for Universally-Convertible Undeniable Signatures. CANS 2007: 15-33
108EEMan Ho Au, Qianhong Wu, Willy Susilo, Yi Mu: Compact E-Cash from Bounded Accumulator. CT-RSA 2007: 178-195
107EEJiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu: Certificate-Based Signature: Security Model and Efficient Construction. EuroPKI 2007: 110-125
106EEQianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2007: 1096-1105
105EELan Zhou, Willy Susilo, Yi Mu: New Construction of Group Secret Handshakes Based on Pairings. ICICS 2007: 16-30
104EEDennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo: Formal Definition and Construction of Nominative Signature. ICICS 2007: 57-68
103EEShuo Zheng, Luke McAven, Yi Mu: First price sealed bid auction without auctioneers. IWCMC 2007: 127-131
102EEDennis Y. W. Liu, Shuang Chang, Duncan S. Wong, Yi Mu: Nominative Signature from Ring Signature. IWSEC 2007: 396-411
101EEJianwei Chen, Li Xu, Yi Mu: A new group rekeying scheme based on t-packing designs for ad hoc networks. Infoscale 2007: 54
100EEWei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. Inscrypt 2007: 25-39
99EEFuchun Guo, Yi Mu, Zhide Chen, Li Xu: Multi-Identity Single-Key Decryption without Random Oracles. Inscrypt 2007: 384-398
98EEXinyi Huang, Yi Mu, Willy Susilo, Wei Wu: Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. Pairing 2007: 367-391
97EEFuchun Guo, Yi Mu, Zhide Chen: Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. Pairing 2007: 392-406
96EEHuafei Zhu, Willy Susilo, Yi Mu: Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. Public Key Cryptography 2007: 134-149
95EEYi Mu, Willy Susilo, Huafei Zhu: Compact sequential aggregate signatures. SAC 2007: 249-253
94EEYong Li, Willy Susilo, Yi Mu, Dingyi Pei: Designated Verifier Signature: Definition, Framework and New Constructions. UIC 2007: 1191-1200
93EEWei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. WISA 2007: 16-29
92EEWilliam R. Sherman, Simon Su, Philip A. McDonald, Yi Mu, Frederick C. Harris Jr.: Open-Source Tools for Immersive Environmental Visualization. IEEE Computer Graphics and Applications 27(2): 88-91 (2007)
91EEXinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. J. Comput. Sci. Technol. 22(1): 71-74 (2007)
90EEDennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, Duncan S. Wong: Revocable Ring Signature. J. Comput. Sci. Technol. 22(6): 785-794 (2007)
89EEBo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yu-Min Wang, Zheng-Tao Jiang: Short Group Signatures Without Random Oracles. J. Comput. Sci. Technol. 22(6): 805-821 (2007)
2006
88 Xiaobo Zhou, Oleg Sokolsky, Lu Yan, Eun-Sun Jung, Zili Shao, Yi Mu, Dong Chun Lee, Daeyoung Kim, Young-Sik Jeong, Cheng-Zhong Xu: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings Springer 2006
87 David Pointcheval, Yi Mu, Kefei Chen: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings Springer 2006
86EEShidi Xu, Yi Mu, Willy Susilo: Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. ACISP 2006: 99-110
85EEJunqi Zhang, Vijay Varadharajan, Yi Mu: A Scalable Multi-service Group Key Management Scheme. AICT/ICIW 2006: 172
84EEXinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Certificateless Designated Verifier Signature Schemes. AINA (2) 2006: 15-19
83EEChing Yu Ng, Willy Susilo, Yi Mu: Designated group credentials. ASIACCS 2006: 59-65
82EEQianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang: Efficient Signcryption Without Random Oracles. ATC 2006: 449-458
81EEBo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang: Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). ATC 2006: 531-540
80EEFuchun Guo, Zhide Chen, Yi Mu, Li Xu, Shengyuan Zhang: Secure and Efficient Trust Negotiation. CIS 2006: 374-384
79EEWilly Susilo, Yi Mu: Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. EuroPKI 2006: 68-80
78EEXiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo: Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. Financial Cryptography 2006: 251-265
77EEQianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2006: 345-354
76EEXinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Universal Designated Verifier Signature Without Delegatability. ICICS 2006: 479-498
75 Yi Mu, Beddhu Murali, Junfeng Gu: Volumetric Color Image Compression Using SET Partitioning Methods. IPCV 2006: 445-450
74EEXinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Short (Identity-Based) Strong Designated Verifier Signature Schemes. ISPEC 2006: 214-225
73EELan Zhou, Willy Susilo, Yi Mu: Three-Round Secret Handshakes Based on ElGamal and DSA. ISPEC 2006: 332-342
72EEQianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang: Privately Retrieve Data from Large Databases. ISPEC 2006: 367-378
71EEYiqun Chen, Willy Susilo, Yi Mu: Identity-based anonymous designated ring signatures. IWCMC 2006: 189-194
70EEQianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Ad Hoc Group Signatures. IWSEC 2006: 120-135
69EEXinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Proxy Signature Without Random Oracles. MSN 2006: 473-484
68EELan Zhou, Willy Susilo, Yi Mu: Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings. MSN 2006: 521-532
67EEMan Ho Au, Willy Susilo, Yi Mu: Constant-Size Dynamic k-TAA. SCN 2006: 111-125
66EEXinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Restricted Universal Designated Verifier Signature. UIC 2006: 874-882
65EEFangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu: A New Signature Scheme Without Random Oracles from Bilinear Pairings. VIETCRYPT 2006: 67-80
64 Junqi Zhang, Vijay Varadharajan, Yi Mu: ID-based Secure PIM-SM Schemes. Wireless and Optical Communications 2006: 190-195
63EEYiqun Chen, Willy Susilo, Yi Mu: Convertible identity-based anonymous designated ring signatures. IJSN 1(3/4): 218-225 (2006)
62EEShidi Xu, Yi Mu, Willy Susilo: Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes. JNW 1(1): 47-53 (2006)
2005
61 Yvo Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings Springer 2005
60EEWilly Susilo, Yi Mu: On the Security of Nominative Signatures. ACISP 2005: 329-335
59EEFangguo Zhang, Yi Mu, Willy Susilo: Reducing Security Overhead for Mobile Networks. AINA 2005: 398-403
58EEWilly Susilo, Fangguo Zhang, Yi Mu: Privacy-Enhanced Internet Storage. AINA 2005: 603-608
57EEXinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. AINA 2005: 649-654
56EEXinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: On the Security of Certificateless Signature Schemes from Asiacrypt 2003. CANS 2005: 13-25
55EEJing Wu, Yi Mu, Jennifer Seberry, Chun Ruan: Access Policy Sheet for Access Control in Fine-Grained XML. EUC Workshops 2005: 1273-1282
54EEXinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen: A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. EUC Workshops 2005: 480-489
53EEFangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen: Identity-Based Universal Designated Verifier Signatures. EUC Workshops 2005: 825-834
52EEXinyi Huang, Yi Mu, Willy Susilo, Futai Zhang: Short Designated Verifier Proxy Signature from Pairings. EUC Workshops 2005: 835-844
51EEShidi Xu, Yi Mu, Willy Susilo: Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. EUC Workshops 2005: 854-863
50EEFangguo Zhang, Willy Susilo, Yi Mu: Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). Financial Cryptography 2005: 45-56
49EEQianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu: An Efficient Static Blind Ring Signature Scheme. ICISC 2005: 410-423
48EEJing Wu, Jennifer Seberry, Yi Mu, Chun Ruan: Delegatable Access Control for Fine-Grained XML. ICPADS (2) 2005: 270-274
47EEChing Yu Ng, Willy Susilo, Yi Mu: Universal Designated Multi Verifier Signature Schemes. ICPADS (2) 2005: 305-309
46EEShidi Xu, Yi Mu, Willy Susilo: Secure AODV Routing Protocol Using One-Time Signature. MSN 2005: 288-297
45 Willy Susilo, Yi Mu: Tripartite Concurrent Signatures. SEC 2005: 425-442
44EEJunqi Zhang, Vijay Varadharajan, Yi Mu: Secure distribution and access of XML documents. IJHPCN 3(5/6): 356-365 (2005)
43EEWilly Susilo, Yi Mu: Provably secure fail-stop signature schemes based on RSA. IJWMC 1(1): 53-60 (2005)
2004
42EEWilly Susilo, Fangguo Zhang, Yi Mu: Identity-Based Strong Designated Verifier Signature Schemes. ACISP 2004: 313-324
41EEWilly Susilo, Yi Mu: Deniable Ring Authentication Revisited. ACNS 2004: 149-163
40EEJunqi Zhang, Vijay Varadharajan, Yi Mu: Securing XML Document Sources and Their Distribution. AINA (1) 2004: 562-567
39EEYi Mu, Willy Susilo, Yan-Xia Lin, Chun Ruan: Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. ASIAN 2004: 169-181
38EEYi Mu, Fangguo Zhang, Willy Susilo: Deniable Partial Proxy Signatures. ASIAN 2004: 182-194
37EEWilly Susilo, Yi Mu, Fangguo Zhang: Perfect Concurrent Signature Schemes. ICICS 2004: 14-26
36EEJunqi Zhang, Vijay Varadharajan, Yi Mu: A Secure PIM-SM Multicast Routing Protocol. IWDC 2004: 276-288
35EEChing Lin, Vijay Varadharajan, Yan Wang, Yi Mu: On the Design of a New Trust Model for Mobile Agent Security. TrustBus 2004: 60-69
2003
34EEWeiliang Zhao, Vijay Varadharajan, Yi Mu: A Secure Mental Poker Protocol Over The Internet. ACSW Frontiers 2003: 105-109
33EEWilly Susilo, Yi Mu: Non-interactive Deniable Ring Authentication. ICISC 2003: 386-401
32EEYi Mu, Willy Susilo, Yan-Xia Lin: Identity-Based Broadcasting. INDOCRYPT 2003: 177-190
31 Willy Susilo, Yi Mu: On Fail-Stop Verifiable Secret Sharing Schemes. Security and Management 2003: 663-667
2002
30EEYi Mu, Junqi Zhang, Vijay Varadharajan: m out of n Oblivious Transfer. ACISP 2002: 395-405
29EEJunqi Zhang, Vijay Varadharajan, Yi Mu: A Secure Object Sharing Scheme for Java Card. ICICS 2002: 243-251
28 Yi Mu, Vijay Varadharajan: Group Cryptography: Signature and Encryption. Informatica (Slovenia) 26(3): (2002)
2001
27 Vijay Varadharajan, Yi Mu: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings Springer 2001
26EEYi Mu, Vijay Varadharajan: Robust and Secure Broadcasting. INDOCRYPT 2001: 223-231
25EEYi Mu, Khanh Quoc Nguyen, Vijay Varadharajan: A Fair Electronic Cash Scheme. ISEC 2001: 20-32
2000
24 Yi Mu, Vijay Varadharajan: Fail-Stop Confirmer Signatures. ACISP 2000: 368-377
23EEWeiliang Zhao, Vijay Varadharajan, Yi Mu: Fair On-line Gambling. ACSAC 2000: 394-400
22EEYi Mu, Vijay Varadharajan: Towards a Protection Model for Supporting Multiple Access Control Policies. Australasian Database Conference 2000: 107-114
21EEYi Mu, Vijay Varadharajan: An Internet Anonymous Auction Scheme. ICISC 2000: 171-182
20EEYi Mu, Vijay Varadharajan: Distributed Signcryption. INDOCRYPT 2000: 155-164
1999
19 Vijay Varadharajan, Yi Mu: Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings Springer 1999
18EEKhanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. ACISP 1999: 117-128
17EEKhanh Quoc Nguyen, Vijay Varadharajan, Yi Mu: Batching Proofs of Knowledge and Its Applications. DEXA Workshop 1999: 844-849
16 Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan: Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. ICICS 1999: 103-118
15EEYi Mu, Vijay Varadharajan, Khanh Quoc Nguyen: Delegated Decryption. IMA Int. Conf. 1999: 258-269
14EEKhanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Undeniable Confirmer Signature. ISW 1999: 235-246
13EEVijay Varadharajan, Khanh Quoc Nguyen, Yi Mu: On the Design of Efficient RSA-based Off-line Electronic Cash Schemes. Theor. Comput. Sci. 226(1-2): 173-184 (1999)
1998
12EEYi Mu, Vijay Varadharajan: Anonymous Secure E-Voting Over a Network. ACSAC 1998: 293-299
11EEYi Mu, Vijay Varadharajan: A New Scheme of Credit based Payment for Electronic Commerce. LCN 1998: 278-
1997
10 Vijay Varadharajan, Josef Pieprzyk, Yi Mu: Information Security and Privacy, Second Australasian Conference, ACISP'97, Syndey, NSW, Australia, July 7-9, 1997, Proceedings Springer 1997
9 Yi Mu, Vijay Varadharajan, Yan-Xia Lin: New Micropayment Schemes Based on PayWords. ACISP 1997: 283-293
8EEKhanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Micro-Digital Money for Electronic Commerce. ACSAC 1997: 2-8
7EEKhanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Secure and Efficient Digital Coins. ACSAC 1997: 9-15
6 Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu: A New Efficient Off-line Anonymous Cash Scheme. ISAAC 1997: 193-201
5 Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. ISW 1997: 313-320
1996
4 Yi Mu, Vijay Varadharajan: On the design of security protocols for mobile communications. ACISP 1996: 134-145
3 Yi Mu, Yuliang Zheng: An alternative model of quantum key agreement via photon coupling. ACISP 1996: 320-331
2EEVijay Varadharajan, Yi Mu: On The Design Of Secure Electronic Payment Schemes For Internet. ACSAC 1996: 78-87
1 Vijay Varadharajan, Yi Mu: Design of Secure End-toEnd Protocols for Mobile Systems. IFIP World Conference on Mobile Communications 1996: 258-266

Coauthor Index

1Man Ho Au [67] [108] [114] [131] [138]
2Feng Bao [16]
3Shuang Chang [102]
4Jianwei Chen [101]
5Kefei Chen [87]
6Liqun Chen [118] [136]
7Xiaofeng Chen [53] [54] [65] [78] [113] [120]
8Yiqun Chen [63] [71]
9Zhide Chen [80] [97] [99] [110] [127] [129] [132]
10Ed Dawson [118]
11Yvo Desmedt [61]
12Josep Domingo-Ferrer [137]
13Junfeng Gu [75]
14Fuchun Guo [80] [97] [99] [110] [123] [127] [129] [132]
15Hua Guo [121]
16Frederick C. Harris Jr. [92]
17Qiong Huang [104]
18Xinyi Huang [52] [54] [56] [57] [66] [69] [74] [76] [84] [91] [93] [98] [100] [104] [107] [109] [112] [115] [119] [122] [124]
19Young-Sik Jeong [88]
20Zheng-Tao Jiang [89]
21Eun-Sun Jung [88]
22Daeyoung Kim [88]
23Kwangjo Kim [120]
24Xuejia Lai [118]
25Dong Chun Lee [88]
26Hyunrok Lee [120]
27Jiguo Li [107]
28Yongqing Li [61]
29Zhoujun Li [121]
30Yong Li [94]
31Ching Lin [35]
32Yan-Xia Lin [9] [32] [39]
33Dennis Y. W. Liu [90] [102] [104]
34Joseph K. Liu [90] [117] [134]
35Zhongren Liu [129]
36Masahiro Mambo [118]
37Luke McAven [103]
38Philip A. McDonald [92]
39Atsuko Miyaji [118]
40Beddhu Murali [75]
41Ching Yu Ng [47] [83] [133]
42Khanh Quoc Nguyen [5] [6] [7] [8] [13] [14] [15] [16] [17] [18] [25]
43Dingyi Pei [94]
44Josef Pieprzyk [10]
45David Pointcheval [87] [118]
46Bart Preneel [118]
47Bo Qin [81] [89] [111] [125] [126] [137]
48Qiong Ren [116]
49Chun Ruan [39] [48] [55]
50Reihaneh Safavi-Naini [133]
51Jennifer Seberry (Jennifer Seberry Wallis) [48] [55] [112] [135]
52Zili Shao [88]
53William R. Sherman [92]
54Nigel P. Smart [118]
55Oleg Sokolsky [88]
56Simon Su [92]
57Dongdong Sun [128]
58Willy Susilo [31] [32] [33] [37] [38] [39] [41] [42] [43] [45] [46] [47] [49] [50] [51] [52] [53] [54] [56] [57] [58] [59] [60] [62] [63] [65] [66] [67] [68] [69] [70] [71] [72] [73] [74] [76] [77] [78] [79] [81] [82] [83] [84] [86] [89] [90] [91] [93] [94] [95] [96] [98] [100] [104] [105] [106] [107] [108] [109] [111] [112] [113] [114] [115] [116] [117] [118] [119] [120] [122] [124] [125] [126] [128] [130] [131] [133] [134] [135] [136] [137] [138]
59Pairat Thorncharoensri [130]
60Haibo Tian [120]
61Patrick P. Tsang [138]
62Vijay Varadharajan [1] [2] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [34] [35] [36] [40] [44] [64] [85]
63Guilin Wang [104]
64Huaxiong Wang [61] [118]
65Yan Wang [35]
66Yu-Min Wang [89]
67Yumin Wang [81]
68Baodian Wei [120]
69Duncan S. Wong [90] [102] [104] [115] [118]
70Jing Wu [48] [55]
71Qianhong Wu [49] [70] [72] [77] [81] [82] [89] [106] [107] [108] [111] [125] [126] [137]
72Wei Wu [69] [76] [93] [98] [100] [109] [112] [115] [119] [122] [124]
73Cheng-Zhong Xu [88]
74Li Xu [80] [99] [101] [129]
75Shidi Xu [46] [51] [62] [86]
76Lu Yan [88]
77Tsz Hon Yuen [134]
78Fangguo Zhang [37] [38] [42] [49] [50] [53] [54] [58] [59] [65] [70] [72] [77] [78] [82] [106] [113] [120]
79Futai Zhang [52] [56] [57] [66] [74] [84] [91]
80Junqi Zhang [29] [30] [36] [40] [44] [64] [85]
81Shengyuan Zhang [80]
82Xiyong Zhang [121]
83Weiliang Zhao [23] [34]
84Shuo Zheng [103]
85Yuliang Zheng [3]
86Lan Zhou [68] [73] [105]
87Xiaobo Zhou [88]
88Huafei Zhu [95] [96]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)