Willy Susilo
Willy Susilo
Professor of Computer Science and IEEE Fellow, University of Wollongong
在 uow.edu.au 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
An efficient signature scheme from bilinear pairings and its applications
F Zhang, R Safavi-Naini, W Susilo
International Workshop on Public Key Cryptography, 277-290, 2004
6152004
Public key encryption with keyword search revisited
J Baek, R Safavi-Naini, W Susilo
International conference on Computational Science and Its Applications, 1249 …, 2008
5452008
On the security of certificateless signature schemes from Asiacrypt 2003
X Huang, W Susilo, Y Mu, F Zhang
International Conference on Cryptology and Network Security, 13-25, 2005
4002005
Certificateless signature revisited
X Huang, Y Mu, W Susilo, DS Wong, W Wu
Australasian Conference on Information Security and Privacy, 308-322, 2007
3552007
Attribute-based signature and its applications
J Li, MH Au, W Susilo, D Xie, K Ren
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
3072010
Certificateless public key encryption without pairing
J Baek, R Safavi-Naini, W Susilo
International Conference on Information Security, 134-148, 2005
2782005
A Ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
K Liang, L Fang, W Susilo, DS Wong
2013 5th International Conference on Intelligent Networking and …, 2013
2692013
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model
JK Liu, MH Au, W Susilo
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2622007
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Y Yu, MH Au, G Ateniese, X Huang, W Susilo, Y Dai, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 767-778, 2016
2422016
Trapdoor security in a searchable public-key encryption scheme with a designated tester
HS Rhee, JH Park, W Susilo, DH Lee
Journal of Systems and Software 83 (5), 763-771, 2010
2412010
Constant-Size Dynamic k-TAA
MH Au, W Susilo, Y Mu
International conference on security and cryptography for networks, 111-125, 2006
2322006
An efficient public auditing protocol with novel dynamic structure for cloud data
J Shen, J Shen, X Chen, X Huang, W Susilo
IEEE Transactions on Information Forensics and Security 12 (10), 2402-2415, 2017
2222017
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
J Baek, R Safavi-Naini, W Susilo
International Workshop on Public Key Cryptography, 380-397, 2005
2112005
Asymmetric group key agreement
Q Wu, Y Mu, W Susilo, B Qin, J Domingo-Ferrer
Annual International Conference on the Theory and Applications of …, 2009
2062009
Public key encryption with keyword search secure against keyword guessing attacks without random oracle
L Fang, W Susilo, C Ge, J Wang
Information Sciences 238, 221-241, 2013
1902013
Privacy-preserving decentralized key-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Yan
IEEE Transactions on Parallel and Distributed Systems 23 (11), 2150-2162, 2012
1882012
Efficient verifiably encrypted signature and partially blind signature from bilinear pairings
F Zhang, R Safavi-Naini, W Susilo
International Conference on Cryptology in India, 191-204, 2003
1852003
Identity-based strong designated verifier signature schemes
W Susilo, F Zhang, Y Mu
Australasian Conference on Information Security and Privacy, 313-324, 2004
1822004
Anonymous and traceable group data sharing in cloud computing
J Shen, T Zhou, X Chen, J Li, W Susilo
IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017
1632017
CP-ABE with constant-size keys for lightweight devices
F Guo, Y Mu, W Susilo, DS Wong, V Varadharajan
IEEE transactions on information forensics and security 9 (5), 763-771, 2014
1462014
系统目前无法执行此操作,请稍后再试。
文章 1–20