Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Willy Susilo
2010 – today
- 2013
[j70]Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou: Efficient Linkable and/or Threshold Ring Signature Without Random Oracles. Comput. J. 56(4): 407-421 (2013)
[j69]Jinguang Han, Willy Susilo, Yi Mu: Identity-based data storage in cloud computing. Future Generation Comp. Syst. 29(3): 673-681 (2013)
[j68]Qiong Huang, Duncan S. Wong, Willy Susilo: The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles. Inf. Sci. 228: 222-238 (2013)
[j67]Jong Hwan Park, Kwangsu Lee, Willy Susilo, Dong Hoon Lee: Fully secure hidden vector encryption under standard assumptions. Inf. Sci. 232: 188-207 (2013)
[j66]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang: Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf. Sci. 238: 221-241 (2013)
[j65]Sherman S. M. Chow, Man Ho Au, Willy Susilo: Server-aided signatures verification secure against collusion attack. Inf. Sec. Techn. Report 17(3): 46-57 (2013)
[j64]Shams Qazi, Raad Raad, Yi Mu, Willy Susilo: Securing DSR against wormhole attacks in multirate ad hoc networks. J. Network and Computer Applications 36(2): 582-592 (2013)
[j63]Man Ho Au, Willy Susilo, Yi Mu, Sherman S. M. Chow: Constant-Size Dynamic $k$ -Times Anonymous Authentication. IEEE Systems Journal 7(2): 249-261 (2013)
[j62]Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen: Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction. Theor. Comput. Sci. 469: 1-14 (2013)
[j61]Jorge Munilla, Fuchun Guo, Willy Susilo: Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme. Wireless Personal Communications 72(1): 245-258 (2013)
[c197]Thomas Plantard, Willy Susilo, Zhenfei Zhang: Adaptive Precision Floating Point LLL. ACISP 2013: 104-117
[c196]Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo: Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". ACISP 2013: 187-202
[c195]Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan: Membership Encryption and Its Applications. ACISP 2013: 219-234
[c194]Willy Susilo, Man Ho Au, Yang Wang, Duncan S. Wong: Fairness in Concurrent Signatures Revisited. ACISP 2013: 318-329
[c193]Kefeng Wang, Yi Mu, Willy Susilo: Identity-Based Multisignature with Message Recovery. ISPEC 2013: 91-104
[c192]Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan: Secure RFID Ownership Transfer Protocols. ISPEC 2013: 189-203
[c191]Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong: Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model. ISPEC 2013: 204-217
[i36]Jorge Munilla, Alberto Peinado, Guomin Yang, Willy Susilo: Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model. IACR Cryptology ePrint Archive 2013: 187 (2013)
[i35]Yu-Chi Chen, Raylin Tso, Willy Susilo, Xinyi Huang, Gwoboa Horng: Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes. IACR Cryptology ePrint Archive 2013: 193 (2013)
[i34]Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo: Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". IACR Cryptology ePrint Archive 2013: 230 (2013)
[i33]Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo: A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security. IACR Cryptology ePrint Archive 2013: 236 (2013)- 2012
[j60]Fuchun Guo, Yi Mu, Willy Susilo: Efficient and secure stored-value cards with leakage resilience. Computers & Electrical Engineering 38(2): 370-380 (2012)
[j59]Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu: Certificateless Signatures: New Schemes and Security Models. Comput. J. 55(4): 457-474 (2012)
[j58]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang, Li Xu: A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption. Comput. J. 55(10): 1157-1168 (2012)
[j57]Jinguang Han, Willy Susilo, Yi Mu, Jun Yan: Attribute-Based Oblivious Access Control. Comput. J. 55(10): 1202-1215 (2012)
[j56]Jinguang Han, Willy Susilo, Yi Mu, Jun Yan: Efficient oblivious transfers with access control. Computers & Mathematics with Applications 63(4): 827-837 (2012)
[j55]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang: Hierarchical conditional proxy re-encryption. Computer Standards & Interfaces 34(4): 380-389 (2012)
[j54]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: A new efficient optimistic fair exchange protocol without random oracles. Int. J. Inf. Sec. 11(1): 53-63 (2012)
[j53]Jinguang Han, Willy Susilo, Yi Mu, Jun Yan: New constructions of OSBE schemes and their applications in oblivious access control. Int. J. Inf. Sec. 11(6): 389-401 (2012)
[j52]Miao Zhou, Yi Mu, Willy Susilo, Jun Yan, Liju Dong: Privacy enhanced data outsourcing in the cloud. J. Network and Computer Applications 35(4): 1367-1373 (2012)
[j51]Raylin Tso, Xinyi Huang, Willy Susilo: Strongly secure certificateless short signatures. Journal of Systems and Software 85(6): 1409-1417 (2012)
[j50]Yong Yu, Yi Mu, Willy Susilo, Ying Sun, Yafu Ji: Provably secure proxy signature scheme from factorization. Mathematical and Computer Modelling 55(3-4): 1160-1168 (2012)
[j49]Peishun Wang, Yi Mu, Willy Susilo, Jun Yan: Privacy preserving protocol for service aggregation in cloud computing. Softw., Pract. Exper. 42(4): 467-483 (2012)
[j48]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang: Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theor. Comput. Sci. 462: 39-58 (2012)
[j47]Xiaofeng Chen, Jin Li, Willy Susilo: Efficient Fair Conditional Payments for Outsourcing Computations. IEEE Transactions on Information Forensics and Security 7(6): 1687-1694 (2012)
[j46]Jinguang Han, Willy Susilo, Yi Mu, Jun Yan: Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption. IEEE Trans. Parallel Distrib. Syst. 23(11): 2150-2162 (2012)
[c190]
[c189]Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo: Attacking Animated CAPTCHAs via Character Extraction. CANS 2012: 98-113
[c188]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou: Enhancing Location Privacy for Electric Vehicles (at the Right time). ESORICS 2012: 397-414
[c187]Fuchun Guo, Yi Mu, Willy Susilo: Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext. ESORICS 2012: 609-626
[c186]Zhi Quan Zhou, Arnaldo Sinaga, Willy Susilo: On the Fault-Detection Capabilities of Adaptive Random Test Case Prioritization: Case Studies with Large Test Suites. HICSS 2012: 5584-5593
[c185]Yang-Wai Chow, Willy Susilo, Duncan S. Wong: Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme. ICICS 2012: 10-21
[c184]
[c183]Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, Jianying Zhou: Forward Secure Attribute-Based Signatures. ICICS 2012: 167-177
[c182]Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan: A Pre-computable Signature Scheme with Efficient Verification for RFID. ISPEC 2012: 1-16
[c181]
[c180]Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry: Fault Analysis of the KATAN Family of Block Ciphers. ISPEC 2012: 319-336
[c179]Zhenfei Zhang, Thomas Plantard, Willy Susilo: On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers. ISPEC 2012: 353-368
[c178]Man Ho Au, Apu Kapadia, Willy Susilo: BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation. NDSS 2012
[c177]Willy Susilo, Yang-Wai Chow, Rungrat Wiangsripanawan: Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games. NSS 2012: 291-304
[c176]Yunmei Zhang, Man Ho Au, Guomin Yang, Willy Susilo: (Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack. NSS 2012: 334-347
[c175]Qiong Huang, Duncan S. Wong, Willy Susilo: The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles. Public Key Cryptography 2012: 120-137
[c174]Yunmei Zhang, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo: Efficient Escrow-Free Identity-Based Signature. ProvSec 2012: 161-174
[c173]Mohammad Reza Reyhanitabar, Willy Susilo: On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties. ProvSec 2012: 288-299
[c172]Thomas Plantard, Willy Susilo, Zhenfei Zhang: Lattice Reduction for Modular Knapsack. Selected Areas in Cryptography 2012: 275-286
[c171]
[e7]Willy Susilo, Yi Mu, Jennifer Seberry (Eds.): Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings. Lecture Notes in Computer Science 7372, Springer 2012, ISBN 978-3-642-31447-6
[i32]Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry: Fault Analysis of the KATAN Family of Block Ciphers. IACR Cryptology ePrint Archive 2012: 30 (2012)
[i31]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou: Enhancing Location Privacy for Electric Vehicles (at the right time). IACR Cryptology ePrint Archive 2012: 342 (2012)
[i30]Yang Wang, Man Ho Au, Willy Susilo: Perfect Ambiguous Optimistic Fair Exchange. IACR Cryptology ePrint Archive 2012: 462 (2012)
[i29]Mohammad Reza Reyhanitabar, Willy Susilo: Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles. IACR Cryptology ePrint Archive 2012: 479 (2012)
[i28]Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo: Secure Outsourced Attribute-Based Signatures. IACR Cryptology ePrint Archive 2012: 605 (2012)- 2011
[j45]Fuchun Guo, Yi Mu, Willy Susilo: Short Signatures with a Tighter Security Reduction Without Random Oracles. Comput. J. 54(4): 513-524 (2011)
[j44]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Provably secure server-aided verification signatures. Computers & Mathematics with Applications 61(7): 1705-1723 (2011)
[j43]Jong Hyuk Park, Sheikh Iqbal Ahamed, Willy Susilo, Michela Taufer: Special issue of computer communications on information and future communication security. Computer Communications 34(3): 223-225 (2011)
[j42]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: Efficient strong designated verifier signature schemes without random oracle or with non-delegatability. Int. J. Inf. Sec. 10(6): 373-385 (2011)
[j41]Qiong Huang, Duncan S. Wong, Willy Susilo: Group-oriented fair exchange of signatures. Inf. Sci. 181(16): 3267-3283 (2011)
[j40]Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: Practical RFID ownership transfer scheme. Journal of Computer Security 19(2): 319-341 (2011)
[j39]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiang: Optimistic Fair Exchange with Strong Resolution-Ambiguity. IEEE Journal on Selected Areas in Communications 29(7): 1491-1502 (2011)
[j38]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: Identity-based strong designated verifier signature revisited. Journal of Systems and Software 84(1): 120-129 (2011)
[j37]Fuchun Guo, Yi Mu, Willy Susilo: Improving security of q-SDH based digital signatures. Journal of Systems and Software 84(10): 1783-1790 (2011)
[j36]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang: Interactive conditional proxy re-encryption with fine grain policy. Journal of Systems and Software 84(12): 2293-2302 (2011)
[j35]Xiaofeng Chen, Willy Susilo, Fangguo Zhang, Haibo Tian, Jin Li: Identity-based trapdoor mercurial commitments and applications. Theor. Comput. Sci. 412(39): 5498-5512 (2011)
[j34]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Jianying Zhou, Robert H. Deng: Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures. IEEE Transactions on Information Forensics and Security 6(2): 498-512 (2011)
[j33]Qiong Huang, Duncan S. Wong, Willy Susilo: Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic Fair Exchange. IEEE Transactions on Information Forensics and Security 6(4): 1233-1247 (2011)
[c170]
[c169]Yang-Wai Chow, Willy Susilo: AniCAP: An Animated 3D CAPTCHA Scheme Based on Motion Parallax. CANS 2011: 255-271
[c168]Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou: Threshold ring signature without random oracles. ASIACCS 2011: 261-267
[c167]Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry: Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations. ASIACCS 2011: 296-305
[c166]Willy Susilo, Joonsang Baek: On the security of the identity-based encryption based on DHIES from ASIACCS 2010. ASIACCS 2011: 376-380
[c165]
[c164]Sherman S. M. Chow, Man Ho Au, Willy Susilo: Server-aided signatures verification secure against collusion attack. ASIACCS 2011: 401-405
[c163]Nan Li, Yi Mu, Willy Susilo: Efficient Self-certified Signatures with Batch Verification. Inscrypt 2011: 179-194
[c162]
[c161]Zhenfei Zhang, Thomas Plantard, Willy Susilo: Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes. ICISC 2011: 419-436
[c160]Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Willy Susilo: Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication. INCoS 2011: 100-107
[c159]Michael Rose, Thomas Plantard, Willy Susilo: Improving BDD Cryptosystems in General Lattices. ISPEC 2011: 152-167
[c158]Qiong Huang, Duncan S. Wong, Willy Susilo, Bo Yang: An Efficient Construction of Time-Selective Convertible Undeniable Signatures. ISC 2011: 355-371
[c157]Tsz Hon Yuen, Duncan S. Wong, Willy Susilo, Qiong Huang: Concurrent Signatures with Fully Negotiable Binding Control. ProvSec 2011: 170-187
[e6]Sihan Qing, Willy Susilo, Guilin Wang, Dongmei Liu (Eds.): Information and Communications Security - 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings. Lecture Notes in Computer Science 7043, Springer 2011, ISBN 978-3-642-25242-6- 2010
[j32]Tsz Hon Yuen, Willy Susilo, Yi Mu: How to construct identity-based signatures without the key escrow problem. Int. J. Inf. Sec. 9(4): 297-311 (2010)
[j31]Hong Yuan, Futai Zhang, Xinyi Huang, Yi Mu, Willy Susilo, Lei Zhang: Certificateless threshold signature scheme from bilinear maps. Inf. Sci. 180(23): 4714-4728 (2010)
[j30]Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu: Constructions of certificate-based signature secure against key replacement attacks. Journal of Computer Security 18(3): 421-449 (2010)
[j29]Liming Fang, Willy Susilo, Yongjun Ren, Chunpeng Ge, Jiandong Wang: Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes. JDCTA 4(9): 151-160 (2010)
[j28]Alejandro Enrique Flores Zuniga, Khin Than Win, Willy Susilo: Biometrics for Electronic Health Records. J. Medical Systems 34(5): 975-983 (2010)
[j27]Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee: Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of Systems and Software 83(5): 763-771 (2010)
[c156]Peishun Wang, Yi Mu, Willy Susilo, Jun Yan: Constructing an Authentication Token to Access External Services in Service Aggregation. IEEE SCC 2010: 321-328
[c155]Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim: Identity-Based Chameleon Hash Scheme without Key Exposure. ACISP 2010: 200-215
[c154]Man Ho Au, Willy Susilo, Yi Mu: Proof-of-Knowledge of Representation of Committed Value and Its Applications. ACISP 2010: 352-369
[c153]Tsz Hon Yuen, Willy Susilo, Yi Mu: Towards a Cryptographic Treatment of Publish/Subscribe Systems. CANS 2010: 201-220
[c152]
[c151]Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui Ren: Attribute-based signature and its applications. ASIACCS 2010: 60-69
[c150]Fuchun Guo, Yi Mu, Willy Susilo: Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase. Inscrypt 2010: 455-470
[c149]Peishun Wang, Liju Dong, Yi Mu, Willy Susilo, Jun Yan: A framework for privacy policy management in service aggregation. CSCWD 2010: 166-171
[c148]Yang-Wai Chow, Willy Susilo, Hua-Yu Zhou: CAPTCHA Challenges for Massively Multiplayer Online Games: Mini-game CAPTCHAs. CW 2010: 254-261
[c147]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou: Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. ESORICS 2010: 168-181
[c146]Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu: Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships. FSE 2010: 192-211
[c145]Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry: On the Security of NOEKEON against Side Channel Cube Attacks. ISPEC 2010: 45-55
[c144]Qiong Huang, Duncan S. Wong, Willy Susilo: A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange - (Extended Abstract). Pairing 2010: 41-61
[c143]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiang: Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. Public Key Cryptography 2010: 124-141
[c142]Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong: A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract). ProvSec 2010: 166-183
[c141]
[c140]
[c139]Jinguang Han, Yi Mu, Willy Susilo, Jun Yan: A Generic Construction of Dynamic Single Sign-on with Strong Security. SecureComm 2010: 181-198
[i27]Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu: Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships. IACR Cryptology ePrint Archive 2010: 22 (2010)
2000 – 2009
- 2009
[j26]JungYeon Hwang, Taek-Young Youn, Willy Susilo: Security Vulnerability of ID-Based Key Sharing Schemes. IEICE Transactions 92-A(10): 2641-2643 (2009)
[j25]Jianyong Huang, Jennifer Seberry, Willy Susilo: A five-round algebraic property of AES and its application to the ALPHA-MAC. IJACT 1(4): 264-289 (2009)
[j24]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Certificate-based Signatures Revisited. J. UCS 15(8): 1659-1684 (2009)
[j23]Willy Susilo: Short fail-stop signature scheme based on factorization and discrete logarithm assumptions. Theor. Comput. Sci. 410(8-10): 736-744 (2009)
[c138]Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu: Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. ACISP 2009: 153-170
[c137]Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou: A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. ACNS 2009: 143-155
[c136]Thomas Plantard, Willy Susilo: Broadcast Attacks against Lattice-Based Cryptosystems. ACNS 2009: 456-472
[c135]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang: A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. CANS 2009: 248-258
[c134]Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee: Improved searchable public key encryption with designated tester. ASIACCS 2009: 376-379
[c133]Tsz Hon Yuen, Qiong Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Guomin Yang: Efficient Non-interactive Range Proof. COCOON 2009: 138-147
[c132]Man Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu: Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. CT-RSA 2009: 295-308
[c131]Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. ESORICS 2009: 321-336
[c130]Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer: Asymmetric Group Key Agreement. EUROCRYPT 2009: 153-170
[c129]Tsz Hon Yuen, Willy Susilo, Yi Mu: How to Construct Identity-Based Signatures without the Key Escrow Problem. EuroPKI 2009: 286-301
[c128]Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Au, Yi Mu, Duncan S. Wong: Escrowed Deniable Identification Schemes. FGIT-SecTech 2009: 234-241
[c127]Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu: Enhanced Target Collision Resistant Hash Functions Revisited. FSE 2009: 327-344
[c126]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou: Online/Offline Ring Signature Scheme. ICICS 2009: 80-90
[c125]
[c124]Liang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi: Ranking Attack Graphs with Graph Neural Networks. ISPEC 2009: 345-359
[c123]Pairat Thorncharoensri, Willy Susilo, Yi Mu: Universal Designated Verifier Signatures with Threshold-Signers. IWSEC 2009: 89-109
[c122]Liming Fang, Willy Susilo, Jiandong Wang: Anonymous Conditional Proxy Re-encryption without Random Oracle. ProvSec 2009: 47-60
[c121]Fuchun Guo, Yi Mu, Willy Susilo: How to Prove Security of a Signature with a Tighter Security Reduction. ProvSec 2009: 90-103
[c120]Man Ho Au, Willy Susilo, Yi Mu: Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? ProvSec 2009: 129-139
[c119]Zhi Quan Zhou, Arnaldo Sinaga, Lei Zhao, Willy Susilo, Kai-Yuan Cai: Improving Software Testing Cost-Effectiveness through Dynamic Partitioning. QSIC 2009: 249-258
[c118]Thomas Plantard, Mike Rose, Willy Susilo: Improvement of Lattice-Based Cryptography Using CRT. QuantumComm 2009: 275-282
[c117]Pairat Thorncharoensri, Willy Susilo, Yi Mu: Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles. WISA 2009: 94-108
[e5]Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan (Eds.): Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009. ACM 2009, ISBN 978-1-60558-394-5
[i26]Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu: Enhanced Target Collision Resistant Hash Functions Revisited. IACR Cryptology ePrint Archive 2009: 51 (2009)
[i25]Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu: Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. IACR Cryptology ePrint Archive 2009: 170 (2009)
[i24]Qiong Huang, Duncan S. Wong, Willy Susilo: Group-Oriented Fair Exchange of Signatures. IACR Cryptology ePrint Archive 2009: 324 (2009)
[i23]Qiong Huang, Willy Susilo, Duncan S. Wong: Non-delegatable Identity-based Designated Verifier Signature. IACR Cryptology ePrint Archive 2009: 367 (2009)
[i22]Tsz Hon Yuen, Willy Susilo, Yi Mu: How to Construct Identity-Based Signatures without the Key Escrow Problem. IACR Cryptology ePrint Archive 2009: 421 (2009)
[i21]Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu: An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions. IACR Cryptology ePrint Archive 2009: 506 (2009)
[i20]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability. IACR Cryptology ePrint Archive 2009: 518 (2009)- 2008
[j22]Thomas Plantard, Willy Susilo, Khin Than Win, Qiong Huang: Efficient lattice-based signature scheme. IJACT 1(2): 120-132 (2008)
[j21]Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Secure universal designated verifier signature without random oracles. Int. J. Inf. Sec. 7(3): 171-183 (2008)
[j20]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Short Designated Verifier Signature Scheme and Its Identity-based Variant. I. J. Network Security 6(1): 82-93 (2008)
[j19]Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo: A New and Efficient Signature on Commitment Values. I. J. Network Security 7(1): 100-105 (2008)
[j18]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim: Efficient generic on-line/off-line (threshold) signatures without key exposure. Inf. Sci. 178(21): 4192-4203 (2008)
[j17]Haibo Tian, Willy Susilo, Yang Ming, Yumin Wang: A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles. J. Comput. Sci. Technol. 23(5): 832-842 (2008)
[j16]Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008)
[c116]Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang: Traceable and Retrievable Identity-Based Encryption. ACNS 2008: 94-110
[c115]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: Ambiguous Optimistic Fair Exchange. ASIACRYPT 2008: 74-89
[c114]Tsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu: Sanitizable Signatures Revisited. CANS 2008: 80-97
[c113]Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu: Publicly Verifiable Privacy-Preserving Group Decryption. Inscrypt 2008: 72-83
[c112]Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo: Privacy for Private Key in Signatures. Inscrypt 2008: 84-95
[c111]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. CT-RSA 2008: 106-120
[c110]Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: RFID Privacy Models Revisited. ESORICS 2008: 251-266
[c109]Man Ho Au, Willy Susilo, Yi Mu: Practical Anonymous Divisible E-Cash from Bounded Accumulators. Financial Cryptography 2008: 287-301
[c108]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Public Key Encryption with Keyword Search Revisited. ICCSA (1) 2008: 1249-1259
[c107]Pairat Thorncharoensri, Willy Susilo, Yi Mu: How to Balance Privacy with Authenticity. ICISC 2008: 184-201
[c106]Dongdong Sun, Yi Mu, Willy Susilo: A Generic Construction of Identity-Based Online/Offline Signcryption. ISPA 2008: 707-712
[c105]Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou: Certificate-Based Signature Schemes without Pairings or Random Oracles. ISC 2008: 285-297
[c104]Jianyong Huang, Jennifer Seberry, Willy Susilo: A Five-Round Algebraic Property of the Advanced Encryption Standard. ISC 2008: 316-330
[c103]Dongdong Sun, Xinyi Huang, Yi Mu, Willy Susilo: Identity-Based On-Line/Off-Line Signcryption. NPC Workshops 2008: 34-41
[c102]Thomas Plantard, Willy Susilo, Khin Than Win: A Digital Signature Scheme Based on CVPinfinity. Public Key Cryptography 2008: 288-307
[c101]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Server-Aided Verification Signatures: Definitions and New Constructions. ProvSec 2008: 141-155
[c100]Joonsang Baek, David Galindo, Willy Susilo, Jianying Zhou: Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). SCN 2008: 358-374
[c99]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. WISA 2008: 99-114
[e4]Yi Mu, Willy Susilo, Jennifer Seberry (Eds.): Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings. Lecture Notes in Computer Science 5107, Springer 2008, ISBN 978-3-540-69971-2
[e3]Liqun Chen, Yi Mu, Willy Susilo (Eds.): Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings. Lecture Notes in Computer Science 4991, Springer 2008, ISBN 978-3-540-79103-4
[i19]Man Ho Au, Willy Susilo, Yi Mu: Constant-Size Dynamic $k$-TAA. IACR Cryptology ePrint Archive 2008: 136 (2008)
[i18]Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou: Certificate-Based Signature Schemes without Pairings or Random Oracles. IACR Cryptology ePrint Archive 2008: 275 (2008)
[i17]Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou: A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. IACR Cryptology ePrint Archive 2008: 449 (2008)- 2007
[j15]Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: Comparing and debugging firewall rule tables. IET Information Security 1(4): 143-151 (2007)
[j14]Willy Susilo, Khin Than Win: Securing personal health information access in mobile healthcare environment through short signature schemes. IJMC 5(2): 215-224 (2007)
[j13]Willy Susilo, Hiroaki Kikuchi: Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner. I. J. Network Security 4(3): 288-291 (2007)
[j12]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. J. Comput. Sci. Technol. 22(1): 71-74 (2007)
[j11]Dennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, Duncan S. Wong: Revocable Ring Signature. J. Comput. Sci. Technol. 22(6): 785-794 (2007)
[j10]Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang, Zhengtao Jiang: Short Group Signatures Without Random Oracles. J. Comput. Sci. Technol. 22(6): 805-821 (2007)
[j9]Willy Susilo, Khin Than Win: Security and Access of Health Research Data. J. Medical Systems 31(2): 103-107 (2007)
[c98]
[c97]Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu: Certificateless Signature Revisited. ACISP 2007: 308-322
[c96]
[c95]Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu: Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. ACNS 2007: 18-30
[c94]Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. ACNS 2007: 65-86
[c93]Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks. ACSW Frontiers 2007: 183-191
[c92]Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang: Identity-Based Proxy Signature from Pairings. ATC 2007: 22-31
[c91]Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin: Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. ATC 2007: 32-41
[c90]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu: A Generic Construction for Universally-Convertible Undeniable Signatures. CANS 2007: 15-33
[c89]Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Achieving Mobility and Anonymity in IP-Based Networks. CANS 2007: 60-79
[c88]Joonsang Baek, Willy Susilo, Jianying Zhou: New constructions of fuzzy identity-based encryption. ASIACCS 2007: 368-370
[c87]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. Inscrypt 2007: 25-39
[c86]Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu: Compact E-Cash from Bounded Accumulator. CT-RSA 2007: 178-195
[c85]Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu: Certificate-Based Signature: Security Model and Efficient Construction. EuroPKI 2007: 110-125
[c84]Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2007: 1096-1105
[c83]Lan Zhou, Willy Susilo, Yi Mu: New Construction of Group Secret Handshakes Based on Pairings. ICICS 2007: 16-30
[c82]Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo: Formal Definition and Construction of Nominative Signature. ICICS 2007: 57-68
[c81]Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo: (Convertible) Undeniable Signatures Without Random Oracles. ICICS 2007: 83-97
[c80]Liang Lu, Jeffrey Horton, Reihaneh Safavi-Naini, Willy Susilo: Transport Layer Identification of Skype Traffic. ICOIN 2007: 465-481
[c79]Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen: Certificate Based (Linkable) Ring Signature. ISPEC 2007: 79-92
[c78]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu: Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. Pairing 2007: 367-391
[c77]Huafei Zhu, Willy Susilo, Yi Mu: Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. Public Key Cryptography 2007: 134-149
[c76]
[c75]Yong Li, Willy Susilo, Yi Mu, Dingyi Pei: Designated Verifier Signature: Definition, Framework and New Constructions. UIC 2007: 1191-1200
[c74]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. WISA 2007: 16-29
[e2]Willy Susilo, Joseph K. Liu, Yi Mu (Eds.): Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings. Lecture Notes in Computer Science 4784, Springer 2007, ISBN 978-3-540-75669-9
[i16]Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang: Group Decryption. IACR Cryptology ePrint Archive 2007: 17 (2007)
[i15]Joonsang Baek, Willy Susilo, Jianying Zhou: New Constructions of Fuzzy Identity-Based Encryption. IACR Cryptology ePrint Archive 2007: 47 (2007)
[i14]Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo: Nominative Signature: Application, Security Model and Construction. IACR Cryptology ePrint Archive 2007: 69 (2007)
[i13]Man Ho Au, Willy Susilo, Yi Mu: Practical Compact E-Cash. IACR Cryptology ePrint Archive 2007: 148 (2007)
[i12]Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo: (Convertible) Undeniable Signatures without Random Oracles. IACR Cryptology ePrint Archive 2007: 386 (2007)
[i11]Man Ho Au, Willy Susilo, Yi Mu: Practical Anonymous Divisible E-Cash From Bounded Accumulators. IACR Cryptology ePrint Archive 2007: 459 (2007)- 2006
[j8]Willy Susilo, Khin Than Win: Securing electronic health records with broadcast encryption schemes. IJEH 2(2): 175-184 (2006)
[j7]Yiqun Chen, Willy Susilo, Yi Mu: Convertible identity-based anonymous designated ring signatures. IJSN 1(3/4): 218-225 (2006)
[j6]Khin Than Win, Willy Susilo, Yi Mu: Personal Health Record Systems and Their Security Protection. J. Medical Systems 30(4): 309-315 (2006)
[j5]
[c73]Shidi Xu, Yi Mu, Willy Susilo: Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. ACISP 2006: 99-110
[c72]Man Ho Au, Willy Susilo, Siu-Ming Yiu: Event-Oriented k-Times Revocable-iff-Linked Group Signatures. ACISP 2006: 223-234
[c71]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Certificateless Designated Verifier Signature Schemes. AINA (2) 2006: 15-19
[c70]Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang: Efficient Signcryption Without Random Oracles. ATC 2006: 449-458
[c69]Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang: Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). ATC 2006: 531-540
[c68]Lan Yu, Willy Susilo, Reihaneh Safavi-Naini: X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. CANS 2006: 364-380
[c67]
[c66]Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo: Self-organised group key management for ad hoc networks. ASIACCS 2006: 138-147
[c65]Willy Susilo, Yi Mu: Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. EuroPKI 2006: 68-80
[c64]Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang: Short Linkable Ring Signatures Revisited. EuroPKI 2006: 101-115
[c63]Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo: Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. Financial Cryptography 2006: 251-265
[c62]Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2006: 345-354
[c61]Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Universal Designated Verifier Signature Without Delegatability. ICICS 2006: 479-498
[c60]Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen: Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. INDOCRYPT 2006: 364-378
[c59]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Short (Identity-Based) Strong Designated Verifier Signature Schemes. ISPEC 2006: 214-225
[c58]Lan Zhou, Willy Susilo, Yi Mu: Three-Round Secret Handshakes Based on ElGamal and DSA. ISPEC 2006: 332-342
[c57]Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang: Privately Retrieve Data from Large Databases. ISPEC 2006: 367-378
[c56]Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini: Multi-party Concurrent Signatures. ISC 2006: 131-145
[c55]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. ISC 2006: 217-232
[c54]Yiqun Chen, Willy Susilo, Yi Mu: Identity-based anonymous designated ring signatures. IWCMC 2006: 189-194
[c53]Joseph K. Liu, Willy Susilo, Duncan S. Wong: Ring Signature with Designated Linkability. IWSEC 2006: 104-119
[c52]
[c51]
[c50]
[c49]
[c48]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Restricted Universal Designated Verifier Signature. UIC 2006: 874-882
[c47]Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu: A New Signature Scheme Without Random Oracles from Bilinear Pairings. VIETCRYPT 2006: 67-80
[c46]Sherman S. M. Chow, Willy Susilo, Tsz Hon Yuen: Escrowed Linkability of Ring Signatures and Its Applications. VIETCRYPT 2006: 175-192
[c45]Jianyong Huang, Jennifer Seberry, Willy Susilo: On the Internal Structure of Alpha-MAC. VIETCRYPT 2006: 271-285
[e1]Rajkumar Buyya, Tianchi Ma, Reihaneh Safavi-Naini, Chris Steketee, Willy Susilo (Eds.): The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006. CRPIT 54, Australian Computer Society 2006, ISBN 1-920-68236-8
[i10]Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang: Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. IACR Cryptology ePrint Archive 2006: 236 (2006)
[i9]Sherman S. M. Chow, Willy Susilo: Generic Construction of (Identity-based) Perfect Concurrent Signatures. IACR Cryptology ePrint Archive 2006: 361 (2006)
[i8]Joseph K. Liu, Man Ho Au, Willy Susilo: Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model. IACR Cryptology ePrint Archive 2006: 373 (2006)- 2005
[j4]Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03. Applied Mathematics and Computation 170(2): 1166-1169 (2005)
[j3]
[c44]
[c43]Fangguo Zhang, Yi Mu, Willy Susilo: Reducing Security Overhead for Mobile Networks. AINA 2005: 398-403
[c42]
[c41]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. AINA 2005: 649-654
[c40]Willy Susilo, Russell James Ang, Cameron Allen George McDonald, Jianyong Huang: Personal Firewall for Pocket PC 2003: Design & Implementation. AINA 2005: 661-666
[c39]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). ASIACRYPT 2005: 644-661
[c38]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: On the Security of Certificateless Signature Schemes from Asiacrypt 2003. CANS 2005: 13-25
[c37]Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: On Securing RTP-Based Streaming Content with Firewalls. CANS 2005: 304-319
[c36]Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder: Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. EUC Workshops 2005: 423-432
[c35]Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen: A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. EUC Workshops 2005: 480-489
[c34]Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen: Identity-Based Universal Designated Verifier Signatures. EUC Workshops 2005: 825-834
[c33]Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang: Short Designated Verifier Proxy Signature from Pairings. EUC Workshops 2005: 835-844
[c32]Shidi Xu, Yi Mu, Willy Susilo: Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. EUC Workshops 2005: 854-863
[c31]Fangguo Zhang, Willy Susilo, Yi Mu: Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). Financial Cryptography 2005: 45-56
[c30]Sherman S. M. Chow, Willy Susilo: Generic Construction of (Identity-Based) Perfect Concurrent Signatures. ICICS 2005: 194-206
[c29]Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu: An Efficient Static Blind Ring Signature Scheme. ICISC 2005: 410-423
[c28]Ching Yu Ng, Willy Susilo, Yi Mu: Universal Designated Multi Verifier Signature Schemes. ICPADS (2) 2005: 305-309
[c27]
[c26]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Token-Controlled Public Key Encryption. ISPEC 2005: 386-397
[c25]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Certificateless Public Key Encryption Without Pairing. ISC 2005: 134-148
[c24]
[c23]
[c22]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Public Key Cryptography 2005: 380-397
[c21]
[i7]Xinyi Huang, Willy Susilo, Yi Mu: Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004. IACR Cryptology ePrint Archive 2005: 122 (2005)
[i6]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Public Key Encryption with Keyword Search Revisited. IACR Cryptology ePrint Archive 2005: 191 (2005)
[i5]Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong: A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity. IACR Cryptology ePrint Archive 2005: 326 (2005)
[i4]Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu: A New Short Signature Scheme Without Random Oracles from Bilinear Pairings. IACR Cryptology ePrint Archive 2005: 386 (2005)- 2004
[c20]Willy Susilo, Fangguo Zhang, Yi Mu: Identity-Based Strong Designated Verifier Signature Schemes. ACISP 2004: 313-324
[c19]
[c18]Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo: X2Rep: Enhanced Trust Semantics for the XRep Protocol. ACNS 2004: 205-219
[c17]Yi Mu, Willy Susilo, Yan-Xia Lin, Chun Ruan: Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. ASIAN 2004: 169-181
[c16]
[c15]
[c14]Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. Public Key Cryptography 2004: 277-290
[i3]Yi Mu, Fangguo Zhang, Willy Susilo: On the Ambiguity of Concurrent Signatures. IACR Cryptology ePrint Archive 2004: 96 (2004)- 2003
[c13]Willy Susilo, Yi Mu: On Fail-Stop Verifiable Secret Sharing Schemes. Security and Management 2003: 663-667
[c12]Willy Susilo, Jianyong Huang, Jennifer Seberry: On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). Security and Management 2003: 668-674
[c11]
[c10]
[c9]Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. INDOCRYPT 2003: 191-204
[i2]Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03. IACR Cryptology ePrint Archive 2003: 129 (2003)
[i1]Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: ID-Based Chameleon Hashes from Bilinear Pairings. IACR Cryptology ePrint Archive 2003: 208 (2003)- 2002
[c8]Willy Susilo, Reihaneh Safavi-Naini: An Efficient Fail-Stop Signature Scheme Based on Factorization. ICISC 2002: 62-74- 2001
[j2]Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: An Efficient Construction for Fail-Stop Signature for Long Messages. J. Inf. Sci. Eng. 17(6): 879-898 (2001)
[c7]Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo: On Classifying Conference Key Distribution Protocols. ACISP 2001: 51-59
[c6]Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: How to Construct Fail-Stop Confirmer Signature Schemes. ACISP 2001: 435-444- 2000
[j1]Willy Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry: A New and Efficient Fail-stop Signature Scheme. Comput. J. 43(5): 430-437 (2000)
[c5]Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Key Management for Secure Multicast with Dynamic Controller. ACISP 2000: 178-190
[c4]Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Fail-Stop Signature for Long Messages. INDOCRYPT 2000: 165-177
[c3]Reihaneh Safavi-Naini, Willy Susilo: Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. ISW 2000: 292-307
1990 – 1999
- 1999
[c2]Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. ACISP 1999: 103-116
[c1]Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: RSA-Based Fail-Stop Signature Schemes. ICPP Workshops 1999: 161-166
Coauthor Index
[j69] [j64] [j63] [c195] [c193] [c192] [c191] [j60] [j59] [j58] [j57] [j56] [j53] [j52] [j50] [j49] [j46] [c187] [c182] [c171] [e7] [j45] [j44] [j40] [j39] [j37] [j34] [c170] [c165] [c163] [j32] [j31] [j30] [c156] [c154] [c153] [c150] [c149] [c146] [c143] [c139] [i27] [j24] [c138] [c133] [c132] [c131] [c130] [c129] [c128] [c127] [c125] [c123] [c121] [c120] [c117] [i26] [i25] [i22] [i21] [j21] [j20] [j19] [j18] [j16] [c114] [c113] [c112] [c110] [c109] [c107] [c106] [c103] [c101] [c99] [e4] [e3] [i19] [j12] [j11] [j10] [c98] [c97] [c96] [c95] [c92] [c91] [c90] [c87] [c86] [c85] [c84] [c83] [c82] [c78] [c77] [c76] [c75] [c74] [e2] [i16] [i14] [i13] [i11] [j7] [j6] [j5] [c73] [c71] [c70] [c69] [c67] [c65] [c63] [c62] [c61] [c59] [c58] [c57] [c54] [c52] [c51] [c50] [c49] [c48] [c47] [i10] [j3] [c44] [c43] [c42] [c41] [c38] [c35] [c34] [c33] [c32] [c31] [c29] [c28] [c24] [c23] [c21] [i7] [i4] [c20] [c19] [c17] [c16] [c15] [i3] [c13] [c11] [c10]
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:23 CEST by the dblp team



