The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Willy Susilo" ( http://dblp.L3S.de/Authors/Willy_Susilo )

URL (Homepage):  https://www.uow.edu.au/~wsusilo/  Author page on DBLP  Author page in RDF  Community of Willy Susilo in ASPL-2

Publication years (Num. hits)
1999-2003 (22) 2004-2005 (37) 2006 (37) 2007 (39) 2008 (31) 2009 (36) 2010 (26) 2011 (30) 2012 (41) 2013 (35) 2014 (43) 2015 (43) 2016 (47) 2017 (41) 2018 (10)
Publication types (Num. hits)
article(236) inproceedings(271) proceedings(11)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 200 occurrences of 104 keywords

Results
Found 519 publication records. Showing 518 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jian Shen 0001, Tianqi Zhou, Xiaofeng Chen 0001, Jin Li 0002, Willy Susilo Anonymous and Traceable Group Data Sharing in Cloud Computing. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Da-Zhi Sun, Yi Mu, Willy Susilo Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure. Search on Bibsonomy Personal and Ubiquitous Computing The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Da-Zhi Sun, Yi Mu, Willy Susilo Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure. Search on Bibsonomy Personal and Ubiquitous Computing The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shams Qazi, Raad Raad, Yi Mu, Willy Susilo Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks. Search on Bibsonomy J. Inf. Sec. Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sha Ma, Yi Mu, Willy Susilo A Generic Scheme of plaintext-checkable database encryption. Search on Bibsonomy Inf. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chong-zhi Gao, Qiong Cheng, Pei He, Willy Susilo, Jin Li Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack. Search on Bibsonomy Inf. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Guomin Yang, Fuchun Guo, Qiong Huang Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. Search on Bibsonomy Inf. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhi Quan Zhou, Arnaldo Sinaga, Willy Susilo, Lei Zhao, Kai-Yuan Cai A cost-effective software testing strategy employing online feedback information. Search on Bibsonomy Inf. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au Functional encryption for computational hiding in prime order groups via pair encodings. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mingwu Zhang, Yan Jiang, Yi Mu, Willy Susilo Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server. Search on Bibsonomy IEEE Access The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu, Yi Mu EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yujue Wang, Qianhong Wu, Bo Qin, Shaohua Tang, Willy Susilo Online/Offline Provable Data Possession. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tao Jiang, Xiaofeng Chen 0001, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou Secure and Efficient Cloud Data Deduplication With Randomized Tag. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jian Shen 0001, Jun Shen, Xiaofeng Chen 0001, Xinyi Huang, Willy Susilo An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city. Search on Bibsonomy Personal and Ubiquitous Computing The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. Search on Bibsonomy IEEE Trans. Dependable Sec. Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peng Xu 0003, Xia Gao, Wei Wang 0088, Willy Susilo, Qianhong Wu, Hai Jin Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2017 DBLP  BibTeX  RDF
1Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien A generalized attack on RSA type cryptosystems. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2017 DBLP  BibTeX  RDF
1Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo Strong Authenticated Key Exchange with Auxiliary Inputs. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2017 DBLP  BibTeX  RDF
1Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2017 DBLP  BibTeX  RDF
1Jorge Munilla, Mike Burmester, Alberto Peinado, Guomin Yang, Willy Susilo RFID Ownership Transfer with Positive Secrecy Capacity Channels. Search on Bibsonomy Sensors The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Yang Xiang 0001, Zoe L. Jiang A general framework for secure sharing of personal health records in cloud system. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Meixia Miao, Jianfeng Wang, Jianfeng Ma, Willy Susilo Publicly verifiable databases with efficient insertion/deletion operations. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yong Yu, Atsuko Miyaji, Man Ho Au, Willy Susilo Cloud computing security and privacy: Standards and regulations. Search on Bibsonomy Computer Standards & Interfaces The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pairat Thorncharoensri, Willy Susilo, Yi Mu Policy-controlled signatures and their applications. Search on Bibsonomy Computer Standards & Interfaces The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chunpeng Ge, Willy Susilo, Jiandong Wang, Liming Fang Identity-based conditional proxy re-encryption with fine grain policy. Search on Bibsonomy Computer Standards & Interfaces The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yang-Wai Chow, Willy Susilo, James G. Phillips, Joonsang Baek, Elena Vlahu-Gjorgievska Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview. Search on Bibsonomy JoWUA The full citation details ... 2017 DBLP  BibTeX  RDF
1Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Fuchun Guo, Qiong Huang Sequence aware functional encryption and its application in searchable encryption. Search on Bibsonomy J. Inf. Sec. Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Clémentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
1Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo, Jin Li 0002 Anonymous Announcement System (AAS) for Electric Vehicle in VANETs. Search on Bibsonomy Comput. J. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jinguang Han, Yogachandran Rahulamathavan, Willy Susilo Preface. Search on Bibsonomy Int. J. Found. Comput. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Zheng Yang 0001 A note on the strong authenticated key exchange with auxiliary inputs. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo Strong authenticated key exchange with auxiliary inputs. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien A generalized attack on RSA type cryptosystems. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan Privacy-Preserving Mutual Authentication in RFID with Designated Readers. Search on Bibsonomy Wireless Personal Communications The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wei Wang 0088, Peng Xu 0003, Laurence Tianruo Yang, Willy Susilo, Jinjun Chen Securely Reinforcing Synchronization for Embedded Online Contests. Search on Bibsonomy ACM Trans. Embedded Comput. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michal Kedziora, Yang-Wai Chow, Willy Susilo Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems. Search on Bibsonomy ATIS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au, Surya Nepal An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yang-Wai Chow, Willy Susilo, Guomin Yang Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts. Search on Bibsonomy CDVE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yang-Wai Chow, Willy Susilo, Joonsang Baek Covert QR Codes: How to Hide in the Crowd. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Clémentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shengmin Xu, Guomin Yang, Yi Mu, Willy Susilo Mergeable and Revocable Identity-Based Encryption. Search on Bibsonomy ACISP (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yang-Wai Chow, Willy Susilo, Joseph Tonien, Wei Zong A QR Code Watermarking Approach Based on the DWT-DCT Technique. Search on Bibsonomy ACISP (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peng Xu 0003, Shuai Liang, Wei Wang 0088, Willy Susilo, Qianhong Wu, Hai Jin Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage. Search on Bibsonomy ACISP (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shu Cheng, Vijay Varadharajan, Yi Mu, Willy Susilo An efficient and provably secure RFID grouping proof protocol. Search on Bibsonomy ACSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ru Meng, Yanwei Zhou, Jianting Ning, Kaitai Liang, Jinguang Han, Willy Susilo An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups. Search on Bibsonomy ProvSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yunling Wang, Jianfeng Wang, Shifeng Sun, Joseph K. Liu, Willy Susilo, Xiaofeng Chen 0001 Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. Search on Bibsonomy ProvSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nan Li 0007, Fuchun Guo, Yi Mu, Willy Susilo, Surya Nepal Fuzzy Extractors for Biometric Identification. Search on Bibsonomy ICDCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample. Search on Bibsonomy CRYPTO (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yong Yu, Liang Xue, Man Ho Au, Willy Susilo, Jianbing Ni, Yafang Zhang, Athanasios V. Vasilakos, Jian Shen 0001 Cloud data integrity checking with an identity-based auditing mechanism from RSA. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yong Yu, Yannan Li, Jianbing Ni, Guomin Yang, Yi Mu, Willy Susilo Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification". Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fuchun Guo, Willy Susilo, Yi Mu Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, Yang Xiang 0001 Two-Factor Data Security Protection Mechanism for Cloud Storage System. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong Broadcast encryption with dealership. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Guomin Yang, Willy Susilo, Yi Mu Message from the Guest Editors. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fatemeh Rezaeibagha, Yi Mu, Willy Susilo, Khin Than Win Multi-authority security framework for scalable EHR systems. Search on Bibsonomy IJMEI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Abderrahmane Nitaj, Willy Susilo, Joseph Tonien Dirichlet Product for Boolean Functions. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo Strongly Leakage-Resilient Authenticated Key Exchange. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Lingling Xu, Fangguo Zhang, Willy Susilo, Yamin Wen Solutions to the anti-piracy problem in oblivious transfer. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ilung Pranata, Willy Susilo Are the most popular users always trustworthy? The case of Yelp. Search on Bibsonomy Electronic Commerce Research and Applications The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ye Yang, Jinguang Han, Willy Susilo, Tsz Hon Yuen, Jiguo Li ABKS-CSC: attribute-based keyword search with constant-size ciphertexts. Search on Bibsonomy Security and Communication Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Weiran Liu, Jianwei Liu, Qianhong Wu, Willy Susilo, Hua Deng, Bo Qin SAKE: scalable authenticated key exchange for mobile e-health networks. Search on Bibsonomy Security and Communication Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Sze Ling Yeo, Wun-She Yap, Sherman S. M. Chow, Duncan S. Wong, Willy Susilo Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol. Search on Bibsonomy Comput. J. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Willy Susilo, Tsz Hon Yuen, Man Ho Au, Jun-bin Fang, Zoe L. Jiang, Jianying Zhou 0001 Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles. Search on Bibsonomy Comput. J. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles. Search on Bibsonomy Comput. J. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Clémentine Gritti, Willy Susilo, Thomas Plantard Logarithmic size ring signatures without random oracles. Search on Bibsonomy IET Information Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Clémentine Gritti, Willy Susilo, Thomas Plantard Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record. Search on Bibsonomy J. Internet Serv. Inf. Secur. The full citation details ... 2016 DBLP  BibTeX  RDF
1Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey M. Voas, Zhi Quan Zhou Metamorphic Testing for Cybersecurity. Search on Bibsonomy IEEE Computer The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fuchun Guo, Willy Susilo, Yi Mu Generalized closest substring encryption. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Fuchun Guo, Yi Mu Efficient dynamic threshold identity-based encryption with constant-size ciphertext. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo A short ID-based proxy signature scheme. Search on Bibsonomy Int. J. Communication Systems The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhongyi Hu, Raymond Chiong, Ilung Pranata, Willy Susilo, Yukun Bao Identifying malicious web domains using machine learning techniques with online credibility and performance data. Search on Bibsonomy CEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peng Xu 0003, Jun Xu, Wei Wang 0088, Hai Jin, Willy Susilo, Deqing Zou Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds. Search on Bibsonomy AsiaCCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu, Yang-Wai Chow Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext. Search on Bibsonomy AsiaCCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yang-Wai Chow, Willy Susilo, Guomin Yang, Man Ho Au, Cong Wang 0001 Authentication and Transaction Verification Using QR Codes with a Mobile Device. Search on Bibsonomy SpaCCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mandy Li, Willy Susilo, Joseph Tonien Securing Shared Systems. Search on Bibsonomy CDVE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo Privacy-Preserving Cloud Auditing with Multiple Uploaders. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance. Search on Bibsonomy ACISP (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tao Jiang, Xiaofeng Chen 0001, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou Towards Efficient Fully Randomized Message-Locked Encryption. Search on Bibsonomy ACISP (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Kaitai Liang Edit Distance Based Encryption and Its Application. Search on Bibsonomy ACISP (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing. Search on Bibsonomy ACISP (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yang-Wai Chow, Willy Susilo, Guomin Yang, James G. Phillips, Ilung Pranata, Ari Moesriami Barmawi Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing. Search on Bibsonomy ACISP (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, Mingwu Zhang One-Round Strong Oblivious Signature-Based Envelope. Search on Bibsonomy ACISP (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy. Search on Bibsonomy ACISP (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien A New Attack on Three Variants of the RSA Cryptosystem. Search on Bibsonomy ACISP (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo Strongly Leakage-Resilient Authenticated Key Exchange. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update. Search on Bibsonomy ProvSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Cai Li, Jiankun Hu, Josef Pieprzyk, Willy Susilo A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 518 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license