Willy Susilo
#63,186
Most Influential Person Now
Australian computer scientist
Willy Susilo's AcademicInfluence.com Rankings
Willy Susilocomputer-science Degrees
Computer Science
#2391
World Rank
#2496
Historical Rank
Information Security
#9
World Rank
#9
Historical Rank
Database
#1251
World Rank
#1319
Historical Rank
Download Badge
Computer Science
Willy Susilo's Degrees
- Bachelors Computer Science University of Wollongong
- Masters Computer Science University of Wollongong
- PhD Computer Science University of Wollongong
Similar Degrees You Can Earn
Why Is Willy Susilo Influential?
(Suggest an Edit or Addition)According to Wikipedia, Willy Susilo is an Australian cybersecurity scientist and cryptographer. He is a Distinguished Professor at the School of Computing and Information Technology, Faculty of Engineering and Information Sciences University of Wollongong, Australia.
Willy Susilo's Published Works
Published Works
- An Efficient Signature Scheme from Bilinear Pairings and Its Applications (2004) (538)
- Public Key Encryption with Keyword Search Revisited (2008) (519)
- Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage (2017) (341)
- An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data (2017) (300)
- On the Security of Certificateless Signature Schemes from Asiacrypt 2003 (2005) (282)
- Attribute-based signature and its applications (2010) (275)
- Certificateless Signature Revisited (2007) (259)
- Trapdoor security in a searchable public-key encryption scheme with a designated tester (2010) (258)
- Certificateless Public Key Encryption Without Pairing (2005) (237)
- Constant-Size Dynamic k-TAA (2006) (225)
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle (2013) (218)
- Anonymous and Traceable Group Data Sharing in Cloud Computing (2018) (217)
- Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract (2007) (209)
- Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment (2020) (207)
- Asymmetric Group Key Agreement (2009) (192)
- Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption (2005) (179)
- Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage (2015) (170)
- An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing (2014) (168)
- Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems (2019) (161)
- Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack (2018) (157)
- CP-ABE With Constant-Size Keys for Lightweight Devices (2014) (154)
- Identity-Based Strong Designated Verifier Signature Schemes (2004) (147)
- Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings (2003) (141)
- Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption (2015) (141)
- Improved searchable public key encryption with designated tester (2009) (130)
- A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing (2014) (125)
- A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing (2015) (125)
- A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security (2013) (124)
- On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search (2006) (122)
- Efficient Fair Conditional Payments for Outsourcing Computations (2012) (122)
- Secure Outsourced Attribute-Based Signatures (2014) (121)
- A Survey of Identity-Based Cryptography (2004) (119)
- Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions (2016) (112)
- Secure Message Communication Protocol Among Vehicles in Smart City (2018) (106)
- Secure searchable public key encryption scheme against keyword guessing attacks (2009) (104)
- Certificate-Based Signature: Security Model and Efficient Construction (2007) (104)
- Improvements on an authentication scheme for vehicular sensor networks (2014) (103)
- Cloud data integrity checking with an identity-based auditing mechanism from RSA (2016) (101)
- Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage (2015) (94)
- Personal Health Record Systems and Their Security Protection (2006) (94)
- Two-Factor Data Security Protection Mechanism for Cloud Storage System (2016) (93)
- Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing (2018) (93)
- Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems (2009) (91)
- Certificate Based (Linkable) Ring Signature (2007) (90)
- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure (2007) (90)
- Identity-based data storage in cloud computing (2013) (90)
- Secure sharing and searching for real-time video data in mobile cloud (2015) (88)
- A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks (2013) (88)
- Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world (2005) (86)
- Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage (2015) (83)
- Short Linkable Ring Signatures Revisited (2006) (83)
- Linkable Ring Signature with Unconditional Anonymity (2014) (82)
- Certificateless Signatures: New Schemes and Security Models (2012) (82)
- Secure and Efficient Cloud Data Deduplication With Randomized Tag (2017) (81)
- Short Designated Verifier Signature Scheme and Its Identity-based Variant (2008) (79)
- A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle (2009) (78)
- A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion (2015) (78)
- New constructions of fuzzy identity-based encryption (2007) (77)
- Identity-Based Proxy Signature from Pairings (2007) (77)
- Blockchain-based fair payment smart contract for public cloud storage auditing (2020) (77)
- PPO-CPQ: A Privacy-Preserving Optimization of Clinical Pathway Query for E-Healthcare Systems (2020) (77)
- Web filtering using text classification (2003) (77)
- Strongly secure certificateless short signatures (2012) (73)
- Certificate-Based Signature Schemes without Pairings or Random Oracles (2008) (73)
- RFID Privacy Models Revisited (2008) (73)
- A New Payment System for Enhancing Location Privacy of Electric Vehicles (2014) (73)
- Perfect Concurrent Signature Schemes (2004) (72)
- Efficient algorithms for secure outsourcing of bilinear pairings (2015) (70)
- Metamorphic Testing for Cybersecurity (2016) (69)
- Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security (2006) (68)
- Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction (2013) (67)
- Proxy Signature Without Random Oracles (2006) (66)
- Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage (2020) (66)
- Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks (2018) (66)
- A Systematic Literature Review on Security and Privacy of Electronic Health Record Systems: Technical Perspectives (2015) (65)
- Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext (2015) (63)
- Designated-server identity-based authenticated encryption with keyword search for encrypted emails (2019) (61)
- Identity-based chameleon hashing and signatures without key exposure (2014) (61)
- k-Times Attribute-Based Anonymous Access Control for Cloud Computing (2015) (60)
- ID-Based Chameleon Hashes from Bilinear Pairings (2003) (60)
- Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures) (2005) (60)
- Practical Anonymous Divisible E-Cash From Bounded Accumulators (2008) (59)
- Revocable Ring Signature (2007) (59)
- Compact E-Cash from Bounded Accumulator (2007) (57)
- A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World (2005) (57)
- Short (Identity-Based) Strong Designated Verifier Signature Schemes (2006) (57)
- Secure Keyword Search and Data Sharing Mechanism for Cloud Computing (2020) (57)
- Non-interactive Deniable Ring Authentication (2003) (56)
- Anonymous Conditional Proxy Re-encryption without Random Oracle (2009) (56)
- Biometrics for Electronic Health Records (2010) (56)
- A general framework for secure sharing of personal health records in cloud system (2017) (56)
- BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation (2012) (55)
- Ambiguous Optimistic Fair Exchange (2008) (55)
- Securing DSR against wormhole attacks in multirate ad hoc networks (2013) (54)
- Efficient generic on-line/off-line (threshold) signatures without key exposure (2008) (54)
- Efficient Linkable and/or Threshold Ring Signature Without Random Oracles (2013) (54)
- Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles (2008) (53)
- Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing (2016) (53)
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search (2012) (51)
- On the security of auditing mechanisms for secure cloud storage (2014) (50)
- Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies (2019) (49)
- Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability (2021) (49)
- Escrowed Linkability of Ring Signatures and Its Applications (2006) (48)
- Certificateless Designated Verifier Signature Schemes (2006) (48)
- Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure (2018) (48)
- Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search (2015) (47)
- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) (2010) (47)
- Universal Designated Multi Verifier Signature Schemes (2005) (46)
- Server-Aided Verification Signatures: Definitions and New Constructions (2008) (46)
- Efficient strong designated verifier signature schemes without random oracle or with non-delegatability (2011) (46)
- Privacy enhanced data outsourcing in the cloud (2012) (46)
- A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks (2018) (46)
- RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud (2019) (46)
- Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature (2006) (45)
- Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature) (2005) (44)
- Traceable and Retrievable Identity-Based Encryption (2008) (43)
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system (2018) (42)
- Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption (2014) (42)
- Constructions of certificate-based signature secure against key replacement attacks (2010) (42)
- Generic Construction of (Identity-based) Perfect Concurrent Signatures (2005) (41)
- New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing (2009) (40)
- A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT (2022) (40)
- Short Designated Verifier Proxy Signature from Pairings (2005) (39)
- Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards (2015) (39)
- Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions (2016) (38)
- How to construct identity-based signatures without the key escrow problem (2009) (38)
- Privacy-Preserved Access Control for Cloud Computing (2011) (38)
- Fully Homomorphic Encryption Using Hidden Ideal Lattice (2013) (38)
- PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption (2014) (38)
- Identity-Based Chameleon Hash Scheme without Key Exposure (2010) (38)
- Interactive three-dimensional visualization of network intrusion detection data for machine learning (2020) (38)
- Identity-based strong designated verifier signature revisited (2011) (38)
- Revocable Attribute-Based Encryption With Data Integrity in Clouds (2022) (38)
- Enhancing Location Privacy for Electric Vehicles (at the Right time) (2012) (37)
- Blockchain-Based Dynamic Provable Data Possession for Smart Cities (2020) (37)
- Secure universal designated verifier signature without random oracles (2008) (37)
- Certificateless threshold signature scheme from bilinear maps (2010) (37)
- An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing (2014) (37)
- Designated Verifier Signature: Definition, Framework and New Constructions (2007) (36)
- Blockchain-based public auditing and secure deduplication with fair arbitration (2020) (36)
- Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption (2004) (36)
- Practical Compact E-Cash (2007) (35)
- Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length (2007) (35)
- Multi-party Concurrent Signatures (2006) (35)
- Strongly Leakage-Resilient Authenticated Key Exchange (2016) (35)
- Efficient public key encryption with revocable keyword search (2014) (35)
- A robust smart card-based anonymous user authentication protocol for wireless communications (2014) (34)
- Online/Offline Provable Data Possession (2017) (34)
- On the Fault-Detection Capabilities of Adaptive Random Test Case Prioritization: Case Studies with Large Test Suites (2012) (34)
- Provably secure proxy signature scheme from factorization (2012) (33)
- A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds (2021) (32)
- A cloud-aided privacy-preserving multi-dimensional data comparison protocol (2021) (32)
- Universal Designated Verifier Signature Without Delegatability (2006) (32)
- Strong authenticated key exchange with auxiliary inputs (2017) (32)
- Identifying malicious web domains using machine learning techniques with online credibility and performance data (2016) (32)
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing (2016) (31)
- X2Rep: Enhanced Trust Semantics for the XRep Protocol (2004) (31)
- Server-aided signatures verification secure against collusion attack (2011) (31)
- Deniable Ring Authentication Revisited (2004) (30)
- Identity-Based Universal Designated Verifier Signatures (2005) (30)
- Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext (2016) (30)
- Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks (2007) (29)
- On the Security of Nominative Signatures (2005) (29)
- Certificate-based Signatures Revisited (2009) (29)
- Constant-Size Dynamic $k$ -Times Anonymous Authentication (2013) (29)
- A New Signature Scheme Without Random Oracles from Bilinear Pairings (2006) (29)
- Reducing security overhead for mobile networks (2005) (28)
- Provably secure server-aided verification signatures (2011) (28)
- Tripartite Concurrent Signatures (2005) (28)
- Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures (2011) (28)
- On the security of text-based 3D CAPTCHAs (2014) (28)
- Three-Round Secret Handshakes Based on ElGamal and DSA (2006) (28)
- A QR Code Watermarking Approach Based on the DWT-DCT Technique (2017) (27)
- Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server (2019) (26)
- Identity-based conditional proxy re-encryption with fine grain policy (2017) (26)
- Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices (2017) (26)
- Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes (2011) (26)
- Functionalities of free and open electronic health record systems (2010) (26)
- Practical RFID ownership transfer scheme (2011) (26)
- Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems (2021) (25)
- A Generic Construction of Dynamic Single Sign-on with Strong Security (2010) (25)
- Event-Oriented k-Times Revocable-iff-Linked Group Signatures (2006) (25)
- Short E-Cash (2005) (24)
- Threshold ring signature without random oracles (2011) (24)
- Securing wireless mesh networks with ticket-based authentication (2008) (24)
- Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03 (2005) (24)
- A ciphertext‐policy attribute‐based proxy re‐encryption scheme for data sharing in public clouds (2015) (24)
- Efficient Partially Blind Signatures with Provable Security (2006) (24)
- Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model (2013) (24)
- Mobile ad-hoc network key management with certificateless cryptography (2008) (24)
- Interactive conditional proxy re-encryption with fine grain policy (2011) (24)
- A Two-Stage Classifier Approach for Network Intrusion Detection (2018) (24)
- Provably Secure Identity Based Provable Data Possession (2015) (24)
- Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations (2011) (24)
- Sanitizable Signatures Revisited (2008) (23)
- A New Short Signature Scheme Without Random Oracles from Bilinear Pairings (2005) (23)
- Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks (2005) (23)
- A Lightweight Privacy-Preserving Fair Meeting Location Determination Scheme (2020) (23)
- Identity-Based On-Line/Off-Line Signcryption (2008) (23)
- Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city (2017) (22)
- Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes (2018) (22)
- Breaking an Animated CAPTCHA Scheme (2012) (22)
- Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes (2006) (22)
- Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings (2006) (22)
- Are the most popular users always trustworthy? The case of Yelp (2016) (22)
- Ring Signature with Designated Linkability (2006) (22)
- A New and Efficient Fail-stop Signature Scheme (2000) (21)
- Fully secure hidden vector encryption under standard assumptions (2013) (21)
- Attribute-Based Oblivious Access Control (2012) (21)
- Proof-of-Knowledge of Representation of Committed Value and Its Applications (2010) (21)
- Cloud computing security and privacy: Standards and regulations (2017) (21)
- Restricted Universal Designated Verifier Signature (2006) (21)
- Ranking Attack Graphs with Graph Neural Networks (2009) (21)
- Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key (2015) (21)
- (Convertible) Undeniable Signatures Without Random Oracles (2007) (20)
- Cooperative Secret Sharing Using QR Codes and Symmetric Keys (2018) (20)
- Subset Membership Encryption and Its Applications to Oblivious Transfer (2014) (20)
- Dual Access Control for Cloud-Based Data Storage and Sharing (2022) (20)
- Security and Access of Health Research Data (2007) (20)
- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures (2009) (20)
- On the Security of NOEKEON against Side Channel Cube Attacks (2010) (20)
- On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers (2012) (20)
- Identity-Based Secure DistributedData Storage Schemes (2014) (20)
- Token-Controlled Public Key Encryption (2005) (20)
- A Lattice-Based Public Key Encryption with Equality Test in Standard Model (2019) (20)
- P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures (2014) (20)
- Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage (2019) (20)
- Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks (2018) (20)
- Membership Encryption and Its Applications (2013) (19)
- Fuzzy Extractors for Biometric Identification (2017) (19)
- Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme (2012) (19)
- Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption (2017) (19)
- An Efficient Static Blind Ring Signature Scheme (2005) (19)
- A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption (2012) (19)
- Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage (2021) (19)
- Breaking a 3D-Based CAPTCHA Scheme (2011) (19)
- A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles (2016) (19)
- Efficient chameleon hash functions in the enhanced collision resistant model (2020) (19)
- Broadcast Attacks against Lattice-Based Cryptosystems (2009) (19)
- Group-oriented fair exchange of signatures (2011) (18)
- Device Identification and Personal Data Attestation in Networks (2018) (18)
- Privacy-Preserving Cloud Auditing with Multiple Uploaders (2016) (18)
- A generalized attack on RSA type cryptosystems (2017) (18)
- Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE (2013) (18)
- Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures (2007) (18)
- AniCAP: An Animated 3D CAPTCHA Scheme Based on Motion Parallax (2011) (18)
- CAPTCHA Design and Security Issues (2018) (18)
- RSA-based fail-stop signature schemes (1999) (18)
- The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles (2012) (18)
- A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT (2019) (18)
- Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts (2018) (18)
- Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy (2015) (17)
- Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization (2019) (17)
- Formal Definition and Construction of Nominative Signature (2007) (17)
- Hierarchical conditional proxy re-encryption (2012) (17)
- Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability (2009) (17)
- Security Analysis of Michael: The IEEE 802.11i Message Integrity Code (2005) (17)
- Self-organised group key management for ad hoc networks (2006) (16)
- Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings (2006) (16)
- Privacy-Preserving Certificateless Cloud Auditing with Multiple Users (2019) (16)
- A short ID‐based proxy signature scheme (2016) (16)
- Security and Privacy for Edge Intelligence in 5G and Beyond Networks: Challenges and Solutions (2021) (16)
- Towards a Cryptographic Treatment of Publish/Subscribe Systems (2010) (16)
- Privacy-Preserving Authorized RFID Authentication Protocols (2014) (16)
- Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes (2018) (16)
- Securing handheld devices (2002) (16)
- Efficient Non-interactive Range Proof (2009) (16)
- Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search (2019) (16)
- Publicly verifiable databases with efficient insertion/deletion operations (2017) (15)
- PLC Code-Level Vulnerabilities (2018) (15)
- Lattice-Based IBE with Equality Test in Standard Model (2019) (15)
- PPO-DFK: A Privacy-Preserving Optimization of Distributed Fractional Knapsack With Application in Secure Footballer Configurations (2021) (15)
- Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data (2015) (15)
- CAPTCHA Challenges for Massively Multiplayer Online Games: Mini-game CAPTCHAs (2010) (15)
- Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview (2017) (15)
- Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample (2017) (15)
- Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme (2013) (15)
- Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication (2011) (15)
- Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes (2013) (15)
- Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext (2012) (15)
- Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model (2019) (15)
- Improved Identity-Based Online/Offline Encryption (2015) (14)
- Ad Hoc Group Signatures (2006) (14)
- STE3D-CAP: Stereoscopic 3D CAPTCHA (2010) (14)
- Witness-based searchable encryption (2018) (14)
- Efficient Hidden Vector Encryption with Constant-Size Ciphertext (2014) (14)
- A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange - (Extended Abstract) (2010) (14)
- Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships (2010) (14)
- Efficient Certificateless Signcryption in the Standard Model: Revisiting Luo and Wan's Scheme from Wireless Personal Communications (2018) (2019) (14)
- Publicly Verifiable Databases With All Efficient Updating Operations (2020) (14)
- Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles (2016) (14)
- Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption (2015) (14)
- Cryptanalysis on Two Certificateless Signature Schemes (2010) (14)
- A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects (2021) (14)
- A Generic Construction of Identity-Based Online/Offline Signcryption (2008) (14)
- Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy (2016) (14)
- Authentication and Transaction Verification Using QR Codes with a Mobile Device (2016) (14)
- Broadcast encryption with dealership (2016) (14)
- Convertible identity-based anonymous designated ring signatures (2006) (13)
- Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility (2007) (13)
- A Digital Signature Scheme Based on CVPinfinity (2008) (13)
- Identity-based anonymous designated ring signatures (2006) (13)
- A New Attack on Three Variants of the RSA Cryptosystem (2016) (13)
- Enhanced Target Collision Resistant Hash Functions Revisited (2009) (13)
- Identity-Based Broadcasting (2003) (13)
- Compact sequential aggregate signatures (2007) (13)
- A digital signature scheme based on CV P (2008) (13)
- Strongly leakage resilient authenticated key exchange, revisited (2019) (13)
- A Visual One-Time Password Authentication Scheme Using Mobile Devices (2014) (13)
- Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt" (2013) (12)
- On the Internal Structure of Alpha-MAC (2006) (12)
- Online/Offline Ring Signature Scheme (2009) (12)
- New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era (2014) (12)
- An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups (2017) (12)
- Short fail-stop signature scheme based on factorization and discrete logarithm assumptions (2009) (12)
- Efficient Semi-static Secure Broadcast Encryption Scheme (2013) (12)
- Perfect Ambiguous Optimistic Fair Exchange (2012) (12)
- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles (2009) (12)
- AAC-OT: Accountable Oblivious Transfer With Access Control (2015) (12)
- A short identity-based proxy ring signature scheme from RSA (2015) (12)
- Attacking Animated CAPTCHAs via Character Extraction (2012) (12)
- Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage (2017) (11)
- Comparing and debugging firewall rule tables (2007) (11)
- Privacy-enhanced attribute-based private information retrieval (2018) (11)
- Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework) (2008) (11)
- EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud (2017) (11)
- Jhanwar-Barua's Identity-Based Encryption Revisited (2014) (11)
- Improvement of Lattice-Based Cryptography Using CRT (2009) (11)
- Lattice-based Signcryption with Equality Test in Standard Model (2020) (11)
- An identity-based Broadcast Encryption Scheme for mobile ad-hoc networks (2006) (11)
- Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves (2018) (11)
- Revocable identity-based encryption with server-aided ciphertext evolution (2020) (11)
- Forward Secure Attribute-Based Signatures (2012) (11)
- A Generic Scheme of plaintext-checkable database encryption (2018) (11)
- Publicly Verifiable Privacy-Preserving Group Decryption (2009) (11)
- An efficient and provably secure RFID grouping proof protocol (2017) (11)
- Generic server-aided secure multi-party computation in cloud computing (2022) (11)
- A new efficient optimistic fair exchange protocol without random oracles (2012) (10)
- Towards Efficient Fully Randomized Message-Locked Encryption (2016) (10)
- Efficient oblivious transfers with access control (2012) (10)
- New Construction of Group Secret Handshakes Based on Pairings (2007) (10)
- Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy (2017) (10)
- Transport Layer Identification of Skype Traffic (2008) (10)
- Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model (2010) (10)
- Towards securing 3G mobile phones (2001) (10)
- Shared RFID ownership transfer protocols (2015) (10)
- An efficient multivariate threshold ring signature scheme (2021) (10)
- A CAPTCHA Scheme Based on the Identification of Character Locations (2014) (10)
- Certificateless aggregate signature scheme secure against fully chosen-key attacks (2020) (10)
- Programmable logic controllers based systems (PLC-BS): vulnerabilities and threats (2019) (10)
- CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud (2018) (10)
- Lattice-based IBE with Equality Test Supporting Flexible Authorization in the Standard Model (2020) (10)
- SEFAP: An Email System for Anti-Phishing (2007) (10)
- LLL for ideal lattices: re-evaluation of the security of Gentry–Halevi’s FHE scheme (2015) (10)
- Vulnerabilities of an ECC-based RFID authentication scheme (2015) (10)
- Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic Fair Exchange (2011) (10)
- Non-delegatable Identity-based Designated Verifier Signature (2009) (10)
- Remark on self-certified group-oriented cryptosystem without combiner (1999) (10)
- Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes (2016) (10)
- Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption (2022) (9)
- Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds (2016) (9)
- Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes (2010) (9)
- Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server (2017) (9)
- Threshold privacy-preserving cloud auditing with multiple uploaders (2018) (9)
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption (2020) (9)
- Fault Analysis of the KATAN Family of Block Ciphers (2012) (9)
- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack (2009) (9)
- Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting (2010) (9)
- POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption (2014) (9)
- Improving BDD Cryptosystems in General Lattices (2011) (9)
- X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks (2006) (9)
- A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups (2016) (9)
- A resilient identity-based authenticated key exchange protocol (2015) (9)
- How to Prove Security of a Signature with a Tighter Security Reduction (2009) (9)
- Nominative Signature: Application, Security Model and Construction (2007) (9)
- Efficient Escrow-Free Identity-Based Signature (2012) (9)
- A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy (2021) (9)
- Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers (2021) (9)
- An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption (2017) (9)
- Improving Software Testing Cost-Effectiveness through Dynamic Partitioning (2009) (8)
- DO-RA: Data-oriented runtime attestation for IoT devices (2020) (8)
- Accountable identity-based encryption with distributed private key generators (2019) (8)
- Leakage-resilient ring signature schemes (2019) (8)
- Policy-controlled signatures and their applications (2017) (8)
- Location privacy in mobile IP (2005) (8)
- Key Management for Secure Multicast with Dynamic Controller (2000) (8)
- An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants (2015) (8)
- Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance (2016) (8)
- Mitigating Phishing with ID-based Online/Offline Authentication (2008) (8)
- Efficient Trapdoor-Based Client Puzzle Against DoS Attacks (2010) (8)
- A Multivariate Blind Ring Signature Scheme (2020) (8)
- Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts (2020) (8)
- A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search (2022) (8)
- (Strong) multidesignated verifiers signatures secure against rogue key attack (2014) (8)
- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders (2009) (8)
- Introduction to Security Reduction (2018) (8)
- A General Construction for Fail-Stop Signature using Authentication Codes (2001) (8)
- Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently (2014) (8)
- Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms (2022) (8)
- Anonymous Announcement System (AAS) for Electric Vehicle in VANETs (2016) (7)
- Secure authorization, access control and data integrity in Bluetooth (2002) (7)
- An Efficient Variant of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing (2014) (7)
- A note on the strong authenticated key exchange with auxiliary inputs (2017) (7)
- Anonymous Single Sign-On Schemes Transformed from Group Signatures (2013) (7)
- Securing electronic health records with broadcast encryption schemes (2006) (7)
- A Blind Signature from Module Latices (2019) (7)
- Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model (2020) (7)
- Robust Authentication Protocol for Dynamic Charging System of Electric Vehicles (2021) (7)
- Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record (2016) (7)
- A Privacy Policy Framework for Service Aggregation with P3P (2011) (7)
- A cost-effective software testing strategy employing online feedback information (2018) (7)
- Optimistic Fair Exchange with Strong Resolution-Ambiguity (2011) (7)
- Logarithmic size ring signatures without random oracles (2016) (7)
- Universal Designated Verifier Signatures with Threshold-Signers (2009) (7)
- Efficient Post-quantum Identity-based Encryption with Equality Test (2020) (7)
- Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups (2019) (7)
- ABKS-CSC: attribute-based keyword search with constant-size ciphertexts (2016) (7)
- Policy-Controlled Signatures (2009) (7)
- Identity-based quotable ring signature (2015) (7)
- PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing (2022) (7)
- Achieving Mobility and Anonymity in IP-Based Networks (2007) (7)
- A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing (2022) (7)
- Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA (2021) (7)
- Ambiguous optimistic fair exchange: Definition and constructions (2015) (7)
- Attribute-based proxy re-signature from standard lattices and its applications (2021) (6)
- Software Engineering for Internet of Things: The Practitioners' Perspective (2021) (6)
- Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment (2018) (6)
- Special issue of computer communications on information and future communication security (2011) (6)
- Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs (2020) (6)
- How to protect privacy in Optimistic Fair Exchange of digital signatures (2015) (6)
- Information security and privacy of health data (2006) (6)
- Fine-grained information flow control using attributes (2019) (6)
- Privacy-Preserving Mutual Authentication in RFID with Designated Readers (2017) (6)
- Subversion in Practice: How to Efficiently Undermine Signatures (2019) (6)
- An Efficient Fail-Stop Signature Scheme Based on Factorization (2002) (6)
- Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing (2021) (6)
- The Wiener Attack on RSA Revisited: A Quest for the Exact Bound (2019) (6)
- Optimally Efficient Secure Scalar Product With Applications in Cloud Computing (2019) (6)
- A generalised bound for the Wiener attack on RSA (2020) (6)
- P2DPI: Practical and Privacy-Preserving Deep Packet Inspection (2021) (6)
- Concurrent Signatures with Fully Negotiable Binding Control (2011) (6)
- Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing (2019) (6)
- Data Security Storage Model of the Internet of Things Based on Blockchain (2021) (6)
- Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction (2016) (6)
- Bestie: Very Practical Searchable Encryption with Forward and Backward Security (2021) (6)
- A New and Efficient Signature on Commitment Values (2008) (6)
- Puncturable Proxy Re-Encryption Supporting to Group Messaging Service (2019) (5)
- An Efficient Construction for Fail-Stop Signature for Long Messages (2001) (5)
- Efficient Signcryption Without Random Oracles (2006) (5)
- Identity-based trapdoor mercurial commitments and applications (2011) (5)
- Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions (2020) (5)
- Secure Single Sign-On Schemes Constructed from Nominative Signatures (2013) (5)
- A 3D Approach for the Visualization of Network Intrusion Detection Data (2018) (5)
- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves (1999) (5)
- A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks (2019) (5)
- Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems (2017) (5)
- A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model (2019) (5)
- A Generic Construction for Universally-Convertible Undeniable Signatures (2007) (5)
- A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles (2008) (5)
- Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (2009) (5)
- RFID Ownership Transfer with Positive Secrecy Capacity Channels (2016) (5)
- Beating Random Test Case Prioritization (2021) (5)
- Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key (2020) (5)
- Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing (2014) (5)
- Identity based identification from algebraic coding theory (2014) (5)
- Utilizing QR codes to verify the visual fidelity of image datasets for machine learning (2021) (5)
- (Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack (2012) (5)
- Dimensionality Reduction and Visualization of Network Intrusion Detection Data (2019) (5)
- Personal firewall for Pocket PC 2003: design & implementation (2005) (5)
- Short Principal Ideal Problem in multicubic fields (2020) (5)
- Sequence aware functional encryption and its application in searchable encryption (2017) (5)
- A Blind Ring Signature Based on the Short Integer Solution Problem (2019) (5)
- Cryptography in Computer System Security (2008) (5)
- Observations on the Message Integrity Code in IEEE802.11Wireless LANs (2004) (5)
- A semantic web vision for an intelligent community transport service brokering system (2016) (4)
- A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations (2021) (4)
- Secure Cloud Auditing with Efficient Ownership Transfer (2020) (4)
- A Secure Elliptic Curve based RFID Ownership Transfer Scheme with Controlled Delegation (2013) (4)
- An Anonymous Authentication System for Pay-As-You-Go Cloud Computing<inline-formula><tex-math notation="LaTeX">$^*$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mo>*</mml:mo></mml:msup></mml:math><inline-graphic xlink:href="susilo-ieq1-3007633.gif"/></alternatives></inline-formula> (2022) (4)
- Decision Tree Evaluation on Sensitive Datasets for Secure E-Healthcare Systems (2022) (4)
- Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception (2020) (4)
- Electronic Cash with Anonymous User Suspension (2011) (4)
- Deniability and forward secrecy of one-round authenticated key exchange (2014) (4)
- Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction (2020) (4)
- Privacy-preserving encryption scheme using DNA parentage test (2015) (4)
- Securing mobile data computing in healthcare (2006) (4)
- Efficient dynamic threshold identity-based encryption with constant-size ciphertext (2016) (4)
- Aggregatable Certificateless Designated Verifier Signature (2020) (4)
- SAKE: scalable authenticated key exchange for mobile e-health networks (2016) (4)
- Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption (2022) (4)
- Secure AODV Routing Protocol Using One-Time Signature (2005) (4)
- Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption (2019) (4)
- Improved Threat Models for the Security of Encrypted and Deniable File Systems (2017) (4)
- Policy controlled system with anonymity (2018) (4)
- Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage (2020) (4)
- Short Signatures with a Tighter Security Reduction Without Random Oracles (2011) (4)
- Blockchain Based Multi-Authority Fine-Grained Access Control System With Flexible Revocation (2021) (4)
- How to Balance Privacy with Authenticity (2009) (4)
- Mitigating phishing by a new ID-based chameleon hash without key exposure (2007) (4)
- Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model (2013) (4)
- Blockchain Assisted Multi-Copy Provable Data Possession With Faults Localization in Multi-Cloud Storage (2022) (4)
- Constructing an Authentication Token to Access External Services in Service Aggregation (2010) (4)
- Threshold-Oriented Optimistic Fair Exchange (2013) (4)
- Anonymous Yoking-Group Proofs (2015) (4)
- Edit Distance Based Encryption and Its Application (2016) (4)
- New proofs of ownership for efficient data deduplication in the adversarial conspiracy model (2021) (4)
- Server-Aided Signature Verification for Lightweight Devices (2014) (4)
- Improvements on Efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy (2015) (4)
- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme (2007) (4)
- Broadcast Authenticated Encryption with Keyword Search (2021) (4)
- Repeated Differential Properties of the AES-128 and AES-256 Key Schedules (2011) (4)
- Efficient and Privacy-Preserving Massive Data Processing for Smart Grids (2021) (4)
- Secure RFID Ownership Transfer Protocols (2013) (4)
- Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction (2007) (4)
- Securing personal health information access in mobile healthcare environment through short signature schemes (2007) (4)
- Verifiable data streaming with efficient update for intelligent automation systems (2021) (4)
- Identity-Based Mediated RSA Revisited (2013) (4)
- Attribute-Based Hierarchical Access Control With Extendable Policy (2022) (4)
- Attribute-based optimistic fair exchange: How to restrict brokers with policies (2014) (4)
- Designated group credentials (2006) (4)
- Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security (2022) (4)
- Provably secure fail-stop signature schemes based on RSA (2005) (4)
- Multi-authority security framework for scalable EHR systems (2016) (4)
- Improving security of q-SDH based digital signatures (2011) (4)
- Private Set Intersection With Authorization Over Outsourced Encrypted Datasets (2021) (4)
- On the security of the identity-based encryption based on DHIES from ASIACCS 2010 (2011) (4)
- Multi-Level Controlled Signature (2012) (3)
- Towards Securing 3G Mobile Phones (extended abstract) (2001) (3)
- Generalized public-key cryptography with tight security (2019) (3)
- A Five-Round Algebraic Property of the Advanced Encryption Standard (2008) (3)
- Advances in Cyber Security: Principles, Techniques, and Applications (2019) (3)
- Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation (2021) (3)
- On Securing RTP-Based Streaming Content with Firewalls (2005) (3)
- A provably secure identity-based proxy ring signature based on RSA (2015) (3)
- Privacy-enhanced Internet storage (2005) (3)
- An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions (2009) (3)
- File sharing in cloud computing using win stay lose shift strategy (2015) (3)
- Improving the Security of the DRS Scheme with Uniformly Chosen Random Noise (2019) (3)
- Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme (2014) (3)
- Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach (2019) (3)
- Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation (2018) (3)
- Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model (2021) (3)
- Efficient Anonymous Multi-group Broadcast Encryption (2020) (3)
- Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual (2021) (3)
- Short Group Signatures Without Random Oracles (2007) (3)
- Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting (2020) (3)
- A framework for privacy policy management in service aggregation (2010) (3)
- Fairness in Concurrent Signatures Revisited (2013) (3)
- Efficient Controlled Signature for a Large Network with Multi Security-level Setting (2019) (3)
- Privacy preserving protocol for service aggregation in cloud computing (2012) (3)
- Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase (2010) (3)
- Lattice Reduction for Modular Knapsack (2012) (3)
- Wildcarded identity-based encryption from lattices (2021) (3)
- Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense (2021) (3)
- Data Access Control in Cloud Computing: Flexible and Receiver Extendable (2022) (3)
- A New Improved AES S-box with Enhanced Properties (2020) (3)
- Attribute-Based Signature with Message Recovery (2014) (3)
- Lattice-based public key encryption with equality test supporting flexible authorization in standard model (2020) (3)
- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization (2000) (3)
- ROSE: Robust Searchable Encryption With Forward and Backward Security (2022) (3)
- FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices (2022) (3)
- On RFID Authentication Protocols with Wide-Strong Privacy (2013) (3)
- Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? (2009) (3)
- Secure and anonymous mobile ad-hoc networks (2005) (3)
- Optimistic fair exchange in the enhanced chosen-key model (2015) (3)
- New constructions of OSBE schemes and their applications in oblivious access control (2012) (2)
- Group Decryption (2007) (2)
- Covert QR Codes: How to Hide in the Crowd (2017) (2)
- Fail-Stop Signature for Long Messages (2000) (2)
- Foundations of Security Reduction (2018) (2)
- Lattice Blind Signatures with Forward Security (2020) (2)
- Black-Box Accountable Authority Identity-Based Revocation System (2020) (2)
- Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters (2019) (2)
- Self-certified ring signatures (2011) (2)
- Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security (2017) (2)
- Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost (2022) (2)
- AI-driven data security and privacy (2020) (2)
- Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions (2019) (2)
- Provably Secure Group Authentication in the Asynchronous Communication Model (2019) (2)
- Identity-Based Linkable Ring Signatures From Lattices (2021) (2)
- <inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing (2015) (2)
- Black-Box Audio Adversarial Example Generation Using Variational Autoencoder (2021) (2)
- Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city (2017) (2)
- Enhancing Goldreich, Goldwasser and Halevi’s scheme with intersecting lattices (2019) (2)
- Efficient Self-certified Signatures with Batch Verification (2011) (2)
- Identity-Based Encryption Without Random Oracles (2018) (2)
- A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups (2016) (2)
- Privacy-preserving file sharing on cloud storage with certificateless signcryption (2022) (2)
- Puncturable Identity-Based Encryption from Lattices (2021) (2)
- Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol (2016) (2)
- Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt’2004 (2007) (2)
- Optimal Verifiable Data Streaming Protocol with Data Auditing (2021) (2)
- Efficient File Sharing in Electronic Health Records (2015) (2)
- Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage (2022) (2)
- Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing (2006) (2)
- Robust distributed privacy-preserving secure aggregation in vehicular communication ∗† by (2012) (2)
- Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model (2020) (2)
- Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure (2018) (2)
- Adaptive Precision Floating Point LLL (2013) (2)
- Recursive Lattice Reduction (2010) (2)
- Privacy-Enhanced Keyword Search in Clouds (2013) (2)
- Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption (2022) (2)
- Escrowed Deniable Identification Schemes (2009) (2)
- Efficient Unique Ring Signature for Blockchain Privacy Protection (2021) (2)
- Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner (2007) (2)
- One-Round Strong Oblivious Signature-Based Envelope (2016) (2)
- Security pitfalls of an efficient threshold proxy signature scheme for mobile agents (2014) (2)
- Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family (2012) (2)
- A five-round algebraic property of AES and its application to the ALPHA-MAC (2009) (2)
- On the General Construction of Tightly Secure Identity-Based Signature Schemes (2020) (2)
- Keyword Attacks and Privacy Preserving in Public-Key-Based Searchable Encryption (2019) (2)
- On digital signatures based on isomorphism problems: QROM security and ring signatures (2022) (2)
- Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks (2021) (2)
- Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings (2008) (2)
- Using Freivalds' Algorithm to Accelerate Lattice-Based Signature Verifications (2019) (2)
- On ideal lattices in multicubic fields (2019) (2)
- Towards Visualizing and Detecting Audio Adversarial Examples for Automatic Speech Recognition (2021) (1)
- Preventing DoS Attacks with a New Client Puzzle Scheme (2005) (1)
- An Efficient Construction of Time-Selective Convertible Undeniable Signatures (2011) (1)
- Deniable Partial Proxy Signatures (2004) (1)
- PPFilter: Provider Privacy-Aware Encrypted Filtering System (2018) (1)
- New constructions of OSBE schemes and their applications in oblivious access control (2012) (1)
- Functional signatures: new definition and constructions (2021) (1)
- Rancang Bangun Model Audit Manajemen Sumber Daya Manusia, Menggunakan Pendekatan Sistem Design of Model Audit of Human Resource Management, Using a Systems Approach (2011) (1)
- Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection (2007) (1)
- Applied methods to detect and prevent vulnerabilities within PLC alarms code (2022) (1)
- Functional Encryption for Pattern Matching with a Hidden String (2022) (1)
- Editorial: Security and privacy protection vs sustainable development (2018) (1)
- Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy (2021) (1)
- Secure Computation of Shared Secrets and Its Applications (2021) (1)
- An Efficient Post‐quantum Identity‐Based Signature (2021) (1)
- Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits (2021) (1)
- An Efficient Key-Policy Attribute-BasedSearchable Encryption in Prime-Order Groups (11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings) (2017) (1)
- Two-Party (Blind) Ring Signatures and Their Applications (2014) (1)
- Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information (2015) (1)
- Hierarchical Identity-Based Signature in Polynomial Rings (2020) (1)
- Combinatorial Constructions of 3- and 4-Secure Codes (2003) (1)
- Secure Computations on Handheld Devices with the Help of an Untrusted Server (2003) (1)
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system (2018) (1)
- A Pre-computable Signature Scheme with Efficient Verification for RFID (2012) (1)
- Protecting peer-to-peer-based massively multiplayer online games (2015) (1)
- Public-Key Encryption Without Random Oracles (2018) (1)
- On the Struggle Bus: A Detailed Security Analysis of the m- tickets App (2020) (1)
- Collusion-Resistance in Optimistic Fair Exchange (2014) (1)
- Targeted Universal Adversarial Perturbations for Automatic Speech Recognition (2021) (1)
- Location Based Encryption (2019) (1)
- Solutions to the anti-piracy problem in oblivious transfer (2016) (1)
- Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts (2017) (1)
- Generating Residue Number System Bases (2021) (1)
- Tight Bound on NewHope Failure Probability (2022) (1)
- The need for deniability in identification schemes (2008) (1)
- An Efficient Construction of Convertible Undeniable Proxy Signatures (2014) (1)
- Securely Reinforcing Synchronization for Embedded Online Contests (2017) (1)
- Threat Models for Analyzing PlausibleDeniability of Deniable File Systems (2017) (1)
- Identity-Based Multisignature with Message Recovery (2013) (1)
- A novel identity-based multi-signature scheme over NTRU lattices (2022) (1)
- Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms (2022) (1)
- Criteria-Based Encryption (2018) (1)
- Design and implementation of a content filtering firewall (2001) (1)
- On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?) (2003) (1)
- VRBC: A Verifiable Redactable Blockchain with Efficient Query and Integrity Auditing (2022) (1)
- Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings (2008) (1)
- Lattice-based public key encryption with equality test in standard model, revisited (2020) (1)
- SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments (2021) (1)
- A New Client Puzzle Scheme Against Dos/DDoS Attacks (2005) (1)
- GAME: Generative-Based Adaptive Model Extraction Attack (2022) (1)
- Securing mobile IP enabled laptop (2003) (1)
- Guest Editorial: Security and Privacy for Contemporary Network Computing Environment (2019) (1)
- Detecting visual spoofing using classical cryptanalysis methods in plagiarism detection systems (2016) (1)
- Efficient lattice-based signature scheme (2008) (1)
- Generic Mediated Encryption (2013) (1)
- Attribute-Based Encryption with Reliable Outsourced Decryption in Cloud Computing Using Smart Contract (2023) (1)
- Security, Privacy, and Trust for Cyberphysical-Social Systems (2019) (1)
- Revisiting Optimistic Fair Exchange Based on Ring Signatures (2014) (1)
- A Model-Driven Approach to Reengineering Processes in Cloud Computing (2021) (1)
- Secure Delegation of Signing Power from Factorization (2015) (1)
- Robust digital signature revisited (2020) (1)
- Concise Mercurial Subvector Commitments: Definitions and Constructions (2021) (1)
- A System Model for Personalized Medication Management (MyMediMan) - The Consumers' Point of View (2018) (1)
- Generic construction for tightly-secure signatures from discrete log (2021) (1)
- Information security and privacy : 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014 : proceedings (2014) (1)
- Collusion-resistant convertible ring signature schemes (2014) (1)
- Protecting an MPLS-based Programmable Virtual Network Using Distributed Firewall (2003) (1)
- Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes (2019) (1)
- Design and Implementation of Personal Firewalls for Handheld Devices (2003) (1)
- Revisiting Security Against the Arbitrator in Optimistic Fair Exchange (2015) (1)
- Delegating authentication power in mobile networks (2009) (1)
- Secure Replication-Based Outsourced Computation Using Smart Contracts (2023) (1)
- Differential Fault Analysis of LEX (2010) (1)
- Lattice-based Unidirectional IBPRE Secure in Standard Model (2020) (1)
- Functional encryption for computational hiding in prime order groups via pair encodings (2018) (1)
- A New Signature Scheme without Random Oracles and Its Applications ? (2006) (1)
- Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009 (2009) (1)
- Chosen-ciphertext lattice-based public key encryption with equality test in standard model (2021) (1)
- Optimal Tightness for Chain-Based Unique Signatures (2022) (0)
- CLAE : a Lightweight AEAD Scheme of Resisting Side Channel Attacks (2019) (0)
- Security Vulnerability of ID-Based Key Sharing Schemes (2009) (0)
- STE 3 D-CAP : stereoscopic 3 D CAPTCHA (2017) (0)
- Contributions to fail-stop signature schemes (2001) (0)
- Visual authentication based on visual cryptography using mobile devices (2017) (0)
- Efficient and Adaptive Procurement Protocol with Purchasing Privacy (2021) (0)
- Fuzzy identity-based encryption: new and efficient schemes (2008) (0)
- Efficient and secure stored-value cards with leakage resilience (2012) (0)
- Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure (2017) (0)
- Provable Security (2013) (0)
- Dirichlet product for boolean functions (2016) (0)
- Functional encryption for computational hiding in prime order groups via pair encodings (2017) (0)
- Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme) (2006) (0)
- A Secure Approach of User Authentication Using Multibiometric Cryptosystem : A Review (2016) (0)
- Privacy-enhanced internet storage: non-interactive publicly verifiable 1-out-of-n encryption schemes (2005) (0)
- Secure Cloud Auditing with Efficient Ownership Transfer (Full Version) (2020) (0)
- PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme (2015) (0)
- On delegatability of MDVS schemes (2021) (0)
- Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme (2013) (0)
- Digital Signatures Without Random Oracles (2018) (0)
- Password Protected Secret Sharing from Lattices (2021) (0)
- Secure and Efficient Communication in VANETs Using Level-Based Access Control (2022) (0)
- A Noise Study of the PSW Signature Family: Patching DRS with Uniform Distribution † (2020) (0)
- The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006 (2006) (0)
- Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More (2022) (0)
- H-infinity adaptive observer enhancements for vehicle chassis dynamics-based navigation sensor fault construction (2020) (0)
- Foundations of Group-Based Cryptography (2018) (0)
- Pattern Matching over Encrypted Data with a Short Ciphertext (2021) (0)
- On Classifying Conference Key Distribution Protocols (2001) (0)
- Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts (2022) (0)
- Dirichlet product for boolean functions (2017) (0)
- LLL for ideal lattices: re-evaluation of the security of Gentry–Halevi’s FHE scheme (2014) (0)
- Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing (2022) (0)
- How to Construct Fail-Stop Confirmer Signature Schemes (2001) (0)
- The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption (2023) (0)
- Generalized closest substring encryption (2016) (0)
- Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme (2016) (0)
- Electrochemical preparation system for unique mesoporous hemisphere gold nanoparticles using block copolymer micelles (2020) (0)
- Blockchain Based Multi-Authority Fine-Grained Access Control System With Flexible Revocation (2022) (0)
- Message from the Guest Editors (2016) (0)
- On Fail-Stop Verifiable Secret Sharing Schemes (2003) (0)
- Fair Multi-signature (2014) (0)
- A note on the strong authenticated key exchange with auxiliary inputs (2017) (0)
- Multimodal Private Signatures (2022) (0)
- Full Black-Box Retrievable And Accountable Identity-Based Encryption (2023) (0)
- Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings (2007) (0)
- Fail-stop signature for long messages: (Extended abstract) (2000) (0)
- Design and implementation of a content filtering (2017) (0)
- Puncturable identity-based and attribute-based encryption from lattices (2022) (0)
- A new efficient optimistic fair exchange protocol without random oracles (2011) (0)
- Guide to This Book (2018) (0)
- Ideals of Largest Weight in Constructions Based on Directed Graphs (2016) (0)
- ABG: A Multi-Party Mixed Protocol Framework for Privacy-Preserving Cooperative Learning (2022) (0)
- Identity-Based Encryption with Random Oracles (2018) (0)
- Secure access privilege delegation using attribute-based encryption (2023) (0)
- Research Online Research Online Attribute-based signature with message recovery Attribute-based signature with message recovery (2020) (0)
- Privacy-Preserving Certificateless Cloud Auditing with Multiple Users (2019) (0)
- Privacy for Private Key in Signatures (2009) (0)
- Securing Shared Systems (2016) (0)
- Exploiting QR Code Error Correction for Digital Image Watermarking (2021) (0)
- DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay (2022) (0)
- On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties (2012) (0)
- On the Short Principal Ideal Problem over some real Kummer fields (2021) (0)
- An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS (2023) (0)
- Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator (2019) (0)
- Mediated Encryption: Analysis and Design (2015) (0)
- A New Attack on Some RSA Variants (2023) (0)
- Message from the Guest Editors (2016) (0)
- Concise ID-based mercurial functional commitments and applications to zero-knowledge sets (2019) (0)
- Threshold privacy-preserving cloud auditing with multiple uploaders (2018) (0)
- Research Online Research Online Identity based identification from algebraic coding theory Identity based identification from algebraic coding theory (2020) (0)
- Mergeable and Revocable Identity-Based Encryption (2017) (0)
- Visual Analysis of Adversarial Examples in Machine Learning (2021) (0)
- CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences (2022) (0)
- Public-Key Watermarking Schemes for Pseudorandom Functions (2022) (0)
- WELCOME NOTE FROM INCITE 2017 ORGANIZING COMMITTEE CHAIRMAN (2017) (0)
- Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security (2022) (0)
- Balancing Privacy and Flexibility of Cloud-based Personal Health Records Sharing System (2022) (0)
- Collusion-resistant convertible ring signature schemes (2014) (0)
- Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles (2012) (0)
- On the Ambiguity of Concurrent Signatures (2004) (0)
- Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem (2019) (0)
- A systematic literature review on security and privacy of electronic health record systems: technical perspectives. (2015) (0)
- Efficient Threshold Attribute-Based Encryption with Constant-size Ciphertexts without Dummy Attributes (2017) (0)
- Institutional Knowledge at Singapore Management University Institutional Knowledge at Singapore Management University Online/offline provable data possession Online/offline provable data possession (2020) (0)
- Concurrent signatures without a conventional keystone (2008) (0)
- Generalized closest substring encryption (2015) (0)
- Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems (2023) (0)
- CSCI: A LEAP into the future (2008) (0)
- Research Online Research Online Practical Compact E-Cash Practical Compact E-Cash (2020) (0)
- Securing electronic health records: an overview (2009) (0)
- The code for securing web applications (2019) (0)
- Proceedings of the 17th Australasian conference on Information Security and Privacy (2012) (0)
- Secure key extraction in computer networks (2005) (0)
- Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts (2017) (0)
- Trojan Attacks and Defense for Speech Recognition (2021) (0)
- QR Code Watermarking for Digital Images (2019) (0)
- Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search (2023) (0)
- Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards (2014) (0)
- Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games (2012) (0)
- Text-based CAPTCHAs over the years (2017) (0)
- Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure (2017) (0)
- Certific ateless Designated Verifie r Signature Schemes (2006) (0)
- Blockchain-based Accountable Auditing with Multi-Ownership Transfer (2022) (0)
- Cryptanalysis on two certificates signature schemes (2010) (0)
- Analysis of Scholarly Communication Activities in Buddhism (2015) (0)
- Privately Retrieve Data from Large Databases (2006) (0)
- Public-Key Encryption with Random Oracles (2018) (0)
- An almost optimal fail-stop signature scheme (2000) (0)
- Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model (2019) (0)
- Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings (2018) (0)
- Puncturable Signature: A Generic Construction and Instantiations (2022) (0)
- Notions, Definitions, and Models (2018) (0)
- Security Analysis of “SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks” (2022) (0)
- Forward-Secure Group Encryptions from Lattices (2021) (0)
- Information Security: 23rd International Conference, ISC 2020, Bali, Indonesia, December 16–18, 2020, Proceedings (2020) (0)
- Deniability and forward secrecy of one-round authenticated key exchange (2013) (0)
- Proceedings of the 7th International Conference on Provable Security - Volume 8209 (2013) (0)
- Personal for Pocket PC 2003: Design Implementation (2005) (0)
- Table of Content for Appendix Towards Effective and Robust Neural Trojan Defenses via Input Filtering A Related Work about Trojan Attacks (2022) (0)
- A study and testbed for the Australian Standard AS7799 Compliance and Management (2006) (0)
- Efficient Broadcast from Trapdoor Functions (2005) (0)
- Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof (2019) (0)
- On Random-Oracle-Free Top-Level Secure Certificateless Signature Schemes (2021) (0)
- Separable threshold decryption for ad-hoc wireless networks (2008) (0)
- DABKE: Secure deniable attribute-based key exchange framework (2019) (0)
- A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme (2020) (0)
- A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks (2013) (0)
- Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions (2019) (0)
- Broadcast encryption with dealership (2015) (0)
- Towards secure asynchronous messaging with forward secrecy and mutual authentication (2023) (0)
- Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices (2022) (0)
- Digital Signatures with Random Oracles (2018) (0)
- Privacy-Preserving Mutual Authentication in RFID with Designated Readers (2017) (0)
- Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing (2022) (0)
- Swa-Periksa Pengelolaan Budaya Perusahaan Menggunakan Sistem Audit Manajemen Sumber Daya Manusia Model General System Audit Self Assessment of Corporate Culture Management, Using General System Audit Model of Audit System for Human Resource Management (2012) (0)
- Proceedings of the 13th Australasian conference on Information Security and Privacy (2008) (0)
- A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform (2023) (0)
- PCSF: Privacy-Preserving Content-based Spam Filter (2023) (0)
- SQL structure rebuilder: preventing SQL injection attacks (2005) (0)
- Message from the DependSys 2021 General Chairs (2021) (0)
- Lattice-based group encryptions with only one trapdoor (2022) (0)
- Geometric Searchable Encryption for Privacy-Preserving Location-Based Services (2023) (0)
- A Generalized Attack on the Multi-prime Power RSA (2022) (0)
- Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys (2023) (0)
- Concise ID-based mercurial functional commitments and applications to zero-knowledge sets (2019) (0)
- A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups (2019) (0)
- Efficient Authentication Schemes for AODV and DSR (2007) (0)
- Efficient Unique Ring Signatures From Lattices (2022) (0)
- Message from the IEEE TrustCom 2019 Program Chairs (2017) (0)
- Strong authenticated key exchange with auxiliary inputs (2016) (0)
- Information Security and Privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings (2012) (0)
This paper list is powered by the following services:
Other Resources About Willy Susilo
What Schools Are Affiliated With Willy Susilo?
Willy Susilo is affiliated with the following schools: