![]() |
University of Wollongong
List of publications from the DBLP Bibliography Server - FAQ
| 2009 | ||
|---|---|---|
| 138 | EE | Man Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu: Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. CT-RSA 2009: 295-308 |
| 137 | EE | Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer: Asymmetric Group Key Agreement. EUROCRYPT 2009: 153-170 |
| 2008 | ||
| 136 | Liqun Chen, Yi Mu, Willy Susilo: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings Springer 2008 | |
| 135 | Yi Mu, Willy Susilo, Jennifer Seberry: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings Springer 2008 | |
| 134 | EE | Tsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu: Sanitizable Signatures Revisited. CANS 2008: 80-97 |
| 133 | EE | Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: RFID Privacy Models Revisited. ESORICS 2008: 251-266 |
| 132 | EE | Fuchun Guo, Yi Mu, Zhide Chen: Identity-Based Online/Offline Encryption. Financial Cryptography 2008: 247-261 |
| 131 | EE | Man Ho Au, Willy Susilo, Yi Mu: Practical Anonymous Divisible E-Cash from Bounded Accumulators. Financial Cryptography 2008: 287-301 |
| 130 | EE | Pairat Thorncharoensri, Willy Susilo, Yi Mu: How to Balance Privacy with Authenticity. ICISC 2008: 184-201 |
| 129 | EE | Zhongren Liu, Li Xu, Zhide Chen, Yi Mu, Fuchun Guo: Hierarchical Identity-Based Online/Offline Encryption. ICYCS 2008: 2115-2119 |
| 128 | EE | Dongdong Sun, Yi Mu, Willy Susilo: A Generic Construction of Identity-Based Online/Offline Signcryption. ISPA 2008: 707-712 |
| 127 | EE | Fuchun Guo, Yi Mu, Zhide Chen: Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles. IWSEC 2008: 49-63 |
| 126 | EE | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu: Publicly Verifiable Privacy-Preserving Group Decryption. Inscrypt 2008: 72-83 |
| 125 | EE | Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo: Privacy for Private Key in Signatures. Inscrypt 2008: 84-95 |
| 124 | EE | Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Server-Aided Verification Signatures: Definitions and New Constructions. ProvSec 2008: 141-155 |
| 123 | EE | Fuchun Guo, Yi Mu: Optimal Online/Offline Signature: How to Sign a Message without Online Computation. ProvSec 2008: 98-111 |
| 122 | EE | Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. WISA 2008: 99-114 |
| 121 | EE | Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang: Cryptanalysis of simple three-party key exchange protocol. Computers & Security 27(1-2): 16-21 (2008) |
| 120 | EE | Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim: Efficient generic on-line/off-line (threshold) signatures without key exposure. Inf. Sci. 178(21): 4192-4203 (2008) |
| 119 | EE | Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Secure universal designated verifier signature without random oracles. Int. J. Inf. Sec. 7(3): 171-183 (2008) |
| 118 | Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008) | |
| 2007 | ||
| 117 | Willy Susilo, Joseph K. Liu, Yi Mu: Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings Springer 2007 | |
| 116 | EE | Qiong Ren, Yi Mu, Willy Susilo: SEFAP: An Email System for Anti-Phishing. ACIS-ICIS 2007: 782-787 |
| 115 | EE | Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu: Certificateless Signature Revisited. ACISP 2007: 308-322 |
| 114 | EE | Man Ho Au, Willy Susilo, Yi Mu: Practical Compact E-Cash. ACISP 2007: 431-445 |
| 113 | EE | Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu: Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. ACNS 2007: 18-30 |
| 112 | EE | Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang: Identity-Based Proxy Signature from Pairings. ATC 2007: 22-31 |
| 111 | EE | Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin: Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. ATC 2007: 32-41 |
| 110 | EE | Fuchun Guo, Yi Mu, Zhide Chen: Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. CANS 2007: 1-14 |
| 109 | EE | Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu: A Generic Construction for Universally-Convertible Undeniable Signatures. CANS 2007: 15-33 |
| 108 | EE | Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu: Compact E-Cash from Bounded Accumulator. CT-RSA 2007: 178-195 |
| 107 | EE | Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu: Certificate-Based Signature: Security Model and Efficient Construction. EuroPKI 2007: 110-125 |
| 106 | EE | Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2007: 1096-1105 |
| 105 | EE | Lan Zhou, Willy Susilo, Yi Mu: New Construction of Group Secret Handshakes Based on Pairings. ICICS 2007: 16-30 |
| 104 | EE | Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo: Formal Definition and Construction of Nominative Signature. ICICS 2007: 57-68 |
| 103 | EE | Shuo Zheng, Luke McAven, Yi Mu: First price sealed bid auction without auctioneers. IWCMC 2007: 127-131 |
| 102 | EE | Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong, Yi Mu: Nominative Signature from Ring Signature. IWSEC 2007: 396-411 |
| 101 | EE | Jianwei Chen, Li Xu, Yi Mu: A new group rekeying scheme based on t-packing designs for ad hoc networks. Infoscale 2007: 54 |
| 100 | EE | Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. Inscrypt 2007: 25-39 |
| 99 | EE | Fuchun Guo, Yi Mu, Zhide Chen, Li Xu: Multi-Identity Single-Key Decryption without Random Oracles. Inscrypt 2007: 384-398 |
| 98 | EE | Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu: Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. Pairing 2007: 367-391 |
| 97 | EE | Fuchun Guo, Yi Mu, Zhide Chen: Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. Pairing 2007: 392-406 |
| 96 | EE | Huafei Zhu, Willy Susilo, Yi Mu: Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. Public Key Cryptography 2007: 134-149 |
| 95 | EE | Yi Mu, Willy Susilo, Huafei Zhu: Compact sequential aggregate signatures. SAC 2007: 249-253 |
| 94 | EE | Yong Li, Willy Susilo, Yi Mu, Dingyi Pei: Designated Verifier Signature: Definition, Framework and New Constructions. UIC 2007: 1191-1200 |
| 93 | EE | Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. WISA 2007: 16-29 |
| 92 | EE | William R. Sherman, Simon Su, Philip A. McDonald, Yi Mu, Frederick C. Harris Jr.: Open-Source Tools for Immersive Environmental Visualization. IEEE Computer Graphics and Applications 27(2): 88-91 (2007) |
| 91 | EE | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. J. Comput. Sci. Technol. 22(1): 71-74 (2007) |
| 90 | EE | Dennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, Duncan S. Wong: Revocable Ring Signature. J. Comput. Sci. Technol. 22(6): 785-794 (2007) |
| 89 | EE | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yu-Min Wang, Zheng-Tao Jiang: Short Group Signatures Without Random Oracles. J. Comput. Sci. Technol. 22(6): 805-821 (2007) |
| 2006 | ||
| 88 | Xiaobo Zhou, Oleg Sokolsky, Lu Yan, Eun-Sun Jung, Zili Shao, Yi Mu, Dong Chun Lee, Daeyoung Kim, Young-Sik Jeong, Cheng-Zhong Xu: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings Springer 2006 | |
| 87 | David Pointcheval, Yi Mu, Kefei Chen: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings Springer 2006 | |
| 86 | EE | Shidi Xu, Yi Mu, Willy Susilo: Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. ACISP 2006: 99-110 |
| 85 | EE | Junqi Zhang, Vijay Varadharajan, Yi Mu: A Scalable Multi-service Group Key Management Scheme. AICT/ICIW 2006: 172 |
| 84 | EE | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Certificateless Designated Verifier Signature Schemes. AINA (2) 2006: 15-19 |
| 83 | EE | Ching Yu Ng, Willy Susilo, Yi Mu: Designated group credentials. ASIACCS 2006: 59-65 |
| 82 | EE | Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang: Efficient Signcryption Without Random Oracles. ATC 2006: 449-458 |
| 81 | EE | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang: Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). ATC 2006: 531-540 |
| 80 | EE | Fuchun Guo, Zhide Chen, Yi Mu, Li Xu, Shengyuan Zhang: Secure and Efficient Trust Negotiation. CIS 2006: 374-384 |
| 79 | EE | Willy Susilo, Yi Mu: Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. EuroPKI 2006: 68-80 |
| 78 | EE | Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo: Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. Financial Cryptography 2006: 251-265 |
| 77 | EE | Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2006: 345-354 |
| 76 | EE | Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Universal Designated Verifier Signature Without Delegatability. ICICS 2006: 479-498 |
| 75 | Yi Mu, Beddhu Murali, Junfeng Gu: Volumetric Color Image Compression Using SET Partitioning Methods. IPCV 2006: 445-450 | |
| 74 | EE | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Short (Identity-Based) Strong Designated Verifier Signature Schemes. ISPEC 2006: 214-225 |
| 73 | EE | Lan Zhou, Willy Susilo, Yi Mu: Three-Round Secret Handshakes Based on ElGamal and DSA. ISPEC 2006: 332-342 |
| 72 | EE | Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang: Privately Retrieve Data from Large Databases. ISPEC 2006: 367-378 |
| 71 | EE | Yiqun Chen, Willy Susilo, Yi Mu: Identity-based anonymous designated ring signatures. IWCMC 2006: 189-194 |
| 70 | EE | Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Ad Hoc Group Signatures. IWSEC 2006: 120-135 |
| 69 | EE | Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Proxy Signature Without Random Oracles. MSN 2006: 473-484 |
| 68 | EE | Lan Zhou, Willy Susilo, Yi Mu: Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings. MSN 2006: 521-532 |
| 67 | EE | Man Ho Au, Willy Susilo, Yi Mu: Constant-Size Dynamic k-TAA. SCN 2006: 111-125 |
| 66 | EE | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Restricted Universal Designated Verifier Signature. UIC 2006: 874-882 |
| 65 | EE | Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu: A New Signature Scheme Without Random Oracles from Bilinear Pairings. VIETCRYPT 2006: 67-80 |
| 64 | Junqi Zhang, Vijay Varadharajan, Yi Mu: ID-based Secure PIM-SM Schemes. Wireless and Optical Communications 2006: 190-195 | |
| 63 | EE | Yiqun Chen, Willy Susilo, Yi Mu: Convertible identity-based anonymous designated ring signatures. IJSN 1(3/4): 218-225 (2006) |
| 62 | EE | Shidi Xu, Yi Mu, Willy Susilo: Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes. JNW 1(1): 47-53 (2006) |
| 2005 | ||
| 61 | Yvo Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings Springer 2005 | |
| 60 | EE | Willy Susilo, Yi Mu: On the Security of Nominative Signatures. ACISP 2005: 329-335 |
| 59 | EE | Fangguo Zhang, Yi Mu, Willy Susilo: Reducing Security Overhead for Mobile Networks. AINA 2005: 398-403 |
| 58 | EE | Willy Susilo, Fangguo Zhang, Yi Mu: Privacy-Enhanced Internet Storage. AINA 2005: 603-608 |
| 57 | EE | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. AINA 2005: 649-654 |
| 56 | EE | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: On the Security of Certificateless Signature Schemes from Asiacrypt 2003. CANS 2005: 13-25 |
| 55 | EE | Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan: Access Policy Sheet for Access Control in Fine-Grained XML. EUC Workshops 2005: 1273-1282 |
| 54 | EE | Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen: A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. EUC Workshops 2005: 480-489 |
| 53 | EE | Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen: Identity-Based Universal Designated Verifier Signatures. EUC Workshops 2005: 825-834 |
| 52 | EE | Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang: Short Designated Verifier Proxy Signature from Pairings. EUC Workshops 2005: 835-844 |
| 51 | EE | Shidi Xu, Yi Mu, Willy Susilo: Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. EUC Workshops 2005: 854-863 |
| 50 | EE | Fangguo Zhang, Willy Susilo, Yi Mu: Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). Financial Cryptography 2005: 45-56 |
| 49 | EE | Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu: An Efficient Static Blind Ring Signature Scheme. ICISC 2005: 410-423 |
| 48 | EE | Jing Wu, Jennifer Seberry, Yi Mu, Chun Ruan: Delegatable Access Control for Fine-Grained XML. ICPADS (2) 2005: 270-274 |
| 47 | EE | Ching Yu Ng, Willy Susilo, Yi Mu: Universal Designated Multi Verifier Signature Schemes. ICPADS (2) 2005: 305-309 |
| 46 | EE | Shidi Xu, Yi Mu, Willy Susilo: Secure AODV Routing Protocol Using One-Time Signature. MSN 2005: 288-297 |
| 45 | Willy Susilo, Yi Mu: Tripartite Concurrent Signatures. SEC 2005: 425-442 | |
| 44 | EE | Junqi Zhang, Vijay Varadharajan, Yi Mu: Secure distribution and access of XML documents. IJHPCN 3(5/6): 356-365 (2005) |
| 43 | EE | Willy Susilo, Yi Mu: Provably secure fail-stop signature schemes based on RSA. IJWMC 1(1): 53-60 (2005) |
| 2004 | ||
| 42 | EE | Willy Susilo, Fangguo Zhang, Yi Mu: Identity-Based Strong Designated Verifier Signature Schemes. ACISP 2004: 313-324 |
| 41 | EE | Willy Susilo, Yi Mu: Deniable Ring Authentication Revisited. ACNS 2004: 149-163 |
| 40 | EE | Junqi Zhang, Vijay Varadharajan, Yi Mu: Securing XML Document Sources and Their Distribution. AINA (1) 2004: 562-567 |
| 39 | EE | Yi Mu, Willy Susilo, Yan-Xia Lin, Chun Ruan: Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. ASIAN 2004: 169-181 |
| 38 | EE | Yi Mu, Fangguo Zhang, Willy Susilo: Deniable Partial Proxy Signatures. ASIAN 2004: 182-194 |
| 37 | EE | Willy Susilo, Yi Mu, Fangguo Zhang: Perfect Concurrent Signature Schemes. ICICS 2004: 14-26 |
| 36 | EE | Junqi Zhang, Vijay Varadharajan, Yi Mu: A Secure PIM-SM Multicast Routing Protocol. IWDC 2004: 276-288 |
| 35 | EE | Ching Lin, Vijay Varadharajan, Yan Wang, Yi Mu: On the Design of a New Trust Model for Mobile Agent Security. TrustBus 2004: 60-69 |
| 2003 | ||
| 34 | EE | Weiliang Zhao, Vijay Varadharajan, Yi Mu: A Secure Mental Poker Protocol Over The Internet. ACSW Frontiers 2003: 105-109 |
| 33 | EE | Willy Susilo, Yi Mu: Non-interactive Deniable Ring Authentication. ICISC 2003: 386-401 |
| 32 | EE | Yi Mu, Willy Susilo, Yan-Xia Lin: Identity-Based Broadcasting. INDOCRYPT 2003: 177-190 |
| 31 | Willy Susilo, Yi Mu: On Fail-Stop Verifiable Secret Sharing Schemes. Security and Management 2003: 663-667 | |
| 2002 | ||
| 30 | EE | Yi Mu, Junqi Zhang, Vijay Varadharajan: m out of n Oblivious Transfer. ACISP 2002: 395-405 |
| 29 | EE | Junqi Zhang, Vijay Varadharajan, Yi Mu: A Secure Object Sharing Scheme for Java Card. ICICS 2002: 243-251 |
| 28 | Yi Mu, Vijay Varadharajan: Group Cryptography: Signature and Encryption. Informatica (Slovenia) 26(3): (2002) | |
| 2001 | ||
| 27 | Vijay Varadharajan, Yi Mu: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings Springer 2001 | |
| 26 | EE | Yi Mu, Vijay Varadharajan: Robust and Secure Broadcasting. INDOCRYPT 2001: 223-231 |
| 25 | EE | Yi Mu, Khanh Quoc Nguyen, Vijay Varadharajan: A Fair Electronic Cash Scheme. ISEC 2001: 20-32 |
| 2000 | ||
| 24 | Yi Mu, Vijay Varadharajan: Fail-Stop Confirmer Signatures. ACISP 2000: 368-377 | |
| 23 | EE | Weiliang Zhao, Vijay Varadharajan, Yi Mu: Fair On-line Gambling. ACSAC 2000: 394-400 |
| 22 | EE | Yi Mu, Vijay Varadharajan: Towards a Protection Model for Supporting Multiple Access Control Policies. Australasian Database Conference 2000: 107-114 |
| 21 | EE | Yi Mu, Vijay Varadharajan: An Internet Anonymous Auction Scheme. ICISC 2000: 171-182 |
| 20 | EE | Yi Mu, Vijay Varadharajan: Distributed Signcryption. INDOCRYPT 2000: 155-164 |
| 1999 | ||
| 19 | Vijay Varadharajan, Yi Mu: Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings Springer 1999 | |
| 18 | EE | Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. ACISP 1999: 117-128 |
| 17 | EE | Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu: Batching Proofs of Knowledge and Its Applications. DEXA Workshop 1999: 844-849 |
| 16 | Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan: Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. ICICS 1999: 103-118 | |
| 15 | EE | Yi Mu, Vijay Varadharajan, Khanh Quoc Nguyen: Delegated Decryption. IMA Int. Conf. 1999: 258-269 |
| 14 | EE | Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Undeniable Confirmer Signature. ISW 1999: 235-246 |
| 13 | EE | Vijay Varadharajan, Khanh Quoc Nguyen, Yi Mu: On the Design of Efficient RSA-based Off-line Electronic Cash Schemes. Theor. Comput. Sci. 226(1-2): 173-184 (1999) |
| 1998 | ||
| 12 | EE | Yi Mu, Vijay Varadharajan: Anonymous Secure E-Voting Over a Network. ACSAC 1998: 293-299 |
| 11 | EE | Yi Mu, Vijay Varadharajan: A New Scheme of Credit based Payment for Electronic Commerce. LCN 1998: 278- |
| 1997 | ||
| 10 | Vijay Varadharajan, Josef Pieprzyk, Yi Mu: Information Security and Privacy, Second Australasian Conference, ACISP'97, Syndey, NSW, Australia, July 7-9, 1997, Proceedings Springer 1997 | |
| 9 | Yi Mu, Vijay Varadharajan, Yan-Xia Lin: New Micropayment Schemes Based on PayWords. ACISP 1997: 283-293 | |
| 8 | EE | Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Micro-Digital Money for Electronic Commerce. ACSAC 1997: 2-8 |
| 7 | EE | Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Secure and Efficient Digital Coins. ACSAC 1997: 9-15 |
| 6 | Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu: A New Efficient Off-line Anonymous Cash Scheme. ISAAC 1997: 193-201 | |
| 5 | Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. ISW 1997: 313-320 | |
| 1996 | ||
| 4 | Yi Mu, Vijay Varadharajan: On the design of security protocols for mobile communications. ACISP 1996: 134-145 | |
| 3 | Yi Mu, Yuliang Zheng: An alternative model of quantum key agreement via photon coupling. ACISP 1996: 320-331 | |
| 2 | EE | Vijay Varadharajan, Yi Mu: On The Design Of Secure Electronic Payment Schemes For Internet. ACSAC 1996: 78-87 |
| 1 | Vijay Varadharajan, Yi Mu: Design of Secure End-toEnd Protocols for Mobile Systems. IFIP World Conference on Mobile Communications 1996: 258-266 | |