The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Willy Susilo" ( http://dblp.L3S.de/Authors/Willy_Susilo )

  Author page on DBLP  Author page in RDF  Community of Willy Susilo in ASPL-2

Publication years (Num. hits)
1999-2003 (22) 2004-2005 (38) 2006 (37) 2007 (39) 2008 (31) 2009 (36) 2010 (26) 2011 (30) 2012 (41) 2013 (35) 2014 (44) 2015 (44) 2016 (48) 2017 (28)
Publication types (Num. hits)
article(221) inproceedings(267) proceedings(11)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 200 occurrences of 104 keywords

Results
Found 500 publication records. Showing 499 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Yujue Wang, Qianhong Wu, Bo Qin, Shaohua Tang, Willy Susilo Online/Offline Provable Data Possession. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tao Jiang, Xiaofeng Chen 0001, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou Secure and Efficient Cloud Data Deduplication With Randomized Tag. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jian Shen, Jun Shen, Xiaofeng Chen 0001, Xinyi Huang, Willy Susilo An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. Search on Bibsonomy IEEE Trans. Dependable Sec. Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peng Xu, Xia Gao, Wei Wang 0088, Willy Susilo, Qianhong Wu, Hai Jin Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2017 DBLP  BibTeX  RDF
1Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo Strong Authenticated Key Exchange with Auxiliary Inputs. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2017 DBLP  BibTeX  RDF
1Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2017 DBLP  BibTeX  RDF
1Jorge Munilla, Mike Burmester, Alberto Peinado, Guomin Yang, Willy Susilo RFID Ownership Transfer with Positive Secrecy Capacity Channels. Search on Bibsonomy Sensors The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Yang Xiang, Zoe L. Jiang A general framework for secure sharing of personal health records in cloud system. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Meixia Miao, Jianfeng Wang, Jianfeng Ma, Willy Susilo Publicly verifiable databases with efficient insertion/deletion operations. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yong Yu, Atsuko Miyaji, Man Ho Au, Willy Susilo Cloud computing security and privacy: Standards and regulations. Search on Bibsonomy Computer Standards & Interfaces The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pairat Thorncharoensri, Willy Susilo, Yi Mu Policy-controlled signatures and their applications. Search on Bibsonomy Computer Standards & Interfaces The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chunpeng Ge, Willy Susilo, Jiandong Wang, Liming Fang Identity-based conditional proxy re-encryption with fine grain policy. Search on Bibsonomy Computer Standards & Interfaces The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Fuchun Guo, Qiong Huang Sequence aware functional encryption and its application in searchable encryption. Search on Bibsonomy J. Inf. Sec. Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo, Jin Li Anonymous Announcement System (AAS) for Electric Vehicle in VANETs. Search on Bibsonomy Comput. J. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Yang Zheng A note on the strong authenticated key exchange with auxiliary inputs. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo Strong authenticated key exchange with auxiliary inputs. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wei Wang, Peng Xu, Laurence Tianruo Yang, Willy Susilo, Jinjun Chen Securely Reinforcing Synchronization for Embedded Online Contests. Search on Bibsonomy ACM Trans. Embedded Comput. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michal Kedziora, Yang-Wai Chow, Willy Susilo Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems. Search on Bibsonomy ATIS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au, Surya Nepal An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yang-Wai Chow, Willy Susilo, Guomin Yang Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts. Search on Bibsonomy CDVE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shengmin Xu, Guomin Yang, Yi Mu, Willy Susilo Mergeable and Revocable Identity-Based Encryption. Search on Bibsonomy ACISP (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yang-Wai Chow, Willy Susilo, Joseph Tonien, Wei Zong A QR Code Watermarking Approach Based on the DWT-DCT Technique. Search on Bibsonomy ACISP (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peng Xu, Shuai Liang, Wei Wang 0088, Willy Susilo, Qianhong Wu, Hai Jin Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage. Search on Bibsonomy ACISP (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shu Cheng, Vijay Varadharajan, Yi Mu, Willy Susilo An efficient and provably secure RFID grouping proof protocol. Search on Bibsonomy ACSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nan Li, Fuchun Guo, Yi Mu, Willy Susilo, Surya Nepal Fuzzy Extractors for Biometric Identification. Search on Bibsonomy ICDCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample. Search on Bibsonomy CRYPTO (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yong Yu, Liang Xue, Man Ho Au, Willy Susilo, Jianbing Ni, Yafang Zhang, Athanasios V. Vasilakos, Jian Shen Cloud data integrity checking with an identity-based auditing mechanism from RSA. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yong Yu, Yannan Li, Jianbing Ni, Guomin Yang, Yi Mu, Willy Susilo Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification". Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fuchun Guo, Willy Susilo, Yi Mu Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, Yang Xiang Two-Factor Data Security Protection Mechanism for Cloud Storage System. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong Broadcast encryption with dealership. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Guomin Yang, Willy Susilo, Yi Mu Message from the Guest Editors. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fatemeh Rezaeibagha, Yi Mu, Willy Susilo, Khin Than Win Multi-authority security framework for scalable EHR systems. Search on Bibsonomy IJMEI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo Comments on "Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof". Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Abderrahmane Nitaj, Willy Susilo, Joseph Tonien Dirichlet Product for Boolean Functions. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo Strongly Leakage-Resilient Authenticated Key Exchange. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Lingling Xu, Fangguo Zhang, Willy Susilo, Yamin Wen Solutions to the anti-piracy problem in oblivious transfer. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ilung Pranata, Willy Susilo Are the most popular users always trustworthy? The case of Yelp. Search on Bibsonomy Electronic Commerce Research and Applications The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ye Yang, Jinguang Han, Willy Susilo, Tsz Hon Yuen, Jiguo Li ABKS-CSC: attribute-based keyword search with constant-size ciphertexts. Search on Bibsonomy Security and Communication Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Weiran Liu, Jianwei Liu, Qianhong Wu, Willy Susilo, Hua Deng, Bo Qin SAKE: scalable authenticated key exchange for mobile e-health networks. Search on Bibsonomy Security and Communication Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Sze Ling Yeo, Wun-She Yap, Sherman S. M. Chow, Duncan S. Wong, Willy Susilo Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol. Search on Bibsonomy Comput. J. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Willy Susilo, Tsz Hon Yuen, Man Ho Au, Jun-bin Fang, Zoe L. Jiang, Jianying Zhou Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles. Search on Bibsonomy Comput. J. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles. Search on Bibsonomy Comput. J. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Clémentine Gritti, Willy Susilo, Thomas Plantard Logarithmic size ring signatures without random oracles. Search on Bibsonomy IET Information Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Clémentine Gritti, Willy Susilo, Thomas Plantard Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record. Search on Bibsonomy J. Internet Serv. Inf. Secur. The full citation details ... 2016 DBLP  BibTeX  RDF
1Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey M. Voas, Zhi Quan Zhou Metamorphic Testing for Cybersecurity. Search on Bibsonomy IEEE Computer The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fuchun Guo, Willy Susilo, Yi Mu Generalized closest substring encryption. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Fuchun Guo, Yi Mu Efficient dynamic threshold identity-based encryption with constant-size ciphertext. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo A short ID-based proxy signature scheme. Search on Bibsonomy Int. J. Communication Systems The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhongyi Hu, Raymond Chiong, Ilung Pranata, Willy Susilo, Yukun Bao Identifying malicious web domains using machine learning techniques with online credibility and performance data. Search on Bibsonomy CEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peng Xu, Jun Xu, Wei Wang 0088, Hai Jin, Willy Susilo, Deqing Zou Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds. Search on Bibsonomy AsiaCCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu, Yang-Wai Chow Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext. Search on Bibsonomy AsiaCCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yang-Wai Chow, Willy Susilo, Guomin Yang, Man Ho Au, Cong Wang 0001 Authentication and Transaction Verification Using QR Codes with a Mobile Device. Search on Bibsonomy SpaCCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mandy Li, Willy Susilo, Joseph Tonien Securing Shared Systems. Search on Bibsonomy CDVE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo Privacy-Preserving Cloud Auditing with Multiple Uploaders. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance. Search on Bibsonomy ACISP (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tao Jiang, Xiaofeng Chen 0001, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou Towards Efficient Fully Randomized Message-Locked Encryption. Search on Bibsonomy ACISP (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Kaitai Liang Edit Distance Based Encryption and Its Application. Search on Bibsonomy ACISP (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing. Search on Bibsonomy ACISP (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yang-Wai Chow, Willy Susilo, Guomin Yang, James G. Phillips, Ilung Pranata, Ari Moesriami Barmawi Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing. Search on Bibsonomy ACISP (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, Mingwu Zhang One-Round Strong Oblivious Signature-Based Envelope. Search on Bibsonomy ACISP (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy. Search on Bibsonomy ACISP (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien A New Attack on Three Variants of the RSA Cryptosystem. Search on Bibsonomy ACISP (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo Strongly Leakage-Resilient Authenticated Key Exchange. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update. Search on Bibsonomy ProvSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Cai Li, Jiankun Hu, Josef Pieprzyk, Willy Susilo A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kaitai Liang, Willy Susilo Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kaitai Liang, Willy Susilo, Joseph K. Liu Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Peng Xu, Qianhong Wu, Wei Wang 0088, Willy Susilo, Josep Domingo-Ferrer, Hai Jin Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jongkil Kim, Willy Susilo, Man Ho Au, Jennifer Seberry Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jinguang Han, Willy Susilo, Yi Mu, Man Ho Au, Jie Cao AAC-OT: Accountable Oblivious Transfer With Access Control. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Allen Au Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou k-Times Attribute-Based Anonymous Access Control for Cloud Computing. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Man Ho Au, Willy Susilo, Kaitai Liang, Rongxing Lu, Bala Srinivasan Secure sharing and searching for real-time video data in mobile cloud. Search on Bibsonomy IEEE Network The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yong Yu, Man Ho Au, Yi Mu, Shaohua Tang, Jian Ren, Willy Susilo, Liju Dong Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Clémentine Gritti, Willy Susilo, Thomas Plantard, Rongmao Chen Improvements on Efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2015 DBLP  BibTeX  RDF
1Jung Yeon Hwang, Ku-Young Chang, Hyun Sook Cho, Boyeon Song, Willy Susilo Collusion-resistant convertible ring signature schemes. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan Shared RFID ownership transfer protocols. Search on Bibsonomy Computer Standards & Interfaces The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo A short identity-based proxy ring signature scheme from RSA. Search on Bibsonomy Computer Standards & Interfaces The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Search on Bibsonomy Concurrency and Computation: Practice and Experience The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qiong Huang, Duncan S. Wong, Willy Susilo How to protect privacy in Optimistic Fair Exchange of digital signatures. Search on Bibsonomy Inf. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kefeng Wang, Yi Mu, Willy Susilo Identity-based quotable ring signature. Search on Bibsonomy Inf. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1P. Xu, Q. Wu, W. Wang, Willy Susilo, Josep Domingo-Ferrer, H. Jin Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
1Ibrahim F. Elashry, Yi Mu, Willy Susilo Mediated Encryption: Analysis and Design. Search on Bibsonomy ICST Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yilei Wang, Willy Susilo, Tao Li, Qiuliang Xu File sharing in cloud computing using win stay lose shift strategy. Search on Bibsonomy IJHPCN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo A provably secure identity-based proxy ring signature based on RSA. Search on Bibsonomy Security and Communication Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yilei Wang, Duncan S. Wong, Willy Susilo, Xiaofeng Chen 0001, Qiuliang Xu Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information. Search on Bibsonomy Security and Communication Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ibrahim F. Elashry, Yi Mu, Willy Susilo A resilient identity-based authenticated key exchange protocol. Search on Bibsonomy Security and Communication Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 499 (100 per page; Change: )
Pages: [1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license