What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Willy Susilo
Google Scholar
ORCID:
0000-0002-1562-5105
291
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
Vulnerability defence using hybrid moving target defence in Internet of Things systems.
Mohammed Tanvir Masud
Marwa Keshk
Nour Moustafa
Benjamin P. Turnbull
Willy Susilo
2025
journals/tifs
Bitcoin-Compatible Privacy-Preserving Multi-Party Payment Channels Supporting Variable Amounts.
Ruonan Chen
Yang Zhang
Dawei Li
Yizhong Liu
Jianwei Liu
Qianhong Wu
Jianying Zhou
Willy Susilo
2025
journals/tifs
How to Terminate Service Requests in Outsourcing: A Seamless Solution From Withdrawable Signatures.
Xin Liu
Willy Susilo
Joonsang Baek
2025
journals/tifs
Lightweight 0-RTT Session Resumption Protocol for Constrained Devices.
Jianghong Wei
Guohua Tian
Xiaofeng Chen
Willy Susilo
2025
journals/tifs
RandFlash: Breaking the Quadratic Barrier in Large-Scale Distributed Randomness Beacons.
Yang Yang
Bingyu Li
Qianhong Wu
Bo Qin
Qin Wang
Shihong Xiong
Willy Susilo
2025
conf/dsn
What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software.
Jialiang Dong
Xinzhang Chen
Willy Susilo
Nan Sun
Arash Shaghaghi
Siqi Ma
2025
journals/tifs
An Efficient Graph Encryption Scheme Supporting Shortest Path Fuzzy Queries.
Hua Shen
Caigang Yu
Willy Susilo
Yitao Chen
Mingwu Zhang
2025
journals/tifs
Dissecting Blockchain Network Partitioning Attacks and Novel Defense for Bitcoin and Ethereum.
Ruonan Chen
Dawei Li
Yang Zhang
Yizhong Liu
Jianwei Liu
Zhenyu Guan
Min Xie
Qianhong Wu
Jianying Zhou
Willy Susilo
2025
conf/crypto
Fully Homomorphic Encryption with Chosen-Ciphertext Security from LWE.
Rupeng Yang
Zuoxia Yu
Willy Susilo
2025
conf/esorics
Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing.
Joonsang Baek
Seongbong Choi
Willy Susilo
Partha Sarathi Roy
Hyung Tae Lee
2025
conf/icics
Certificate-Based Quasi-linearly Homomorphic Signatures: Definition, Construction, and Application to Data Integrity Auditing.
Jintao Cai
Futai Zhang
Wenjie Yang
Shao-Jun Yang
Yichi Huang
Rongmao Chen
Willy Susilo
2025
conf/icics
Public Verifiable Server-Aided Revocable Attribute-Based Encryption.
Luqi Huang
Fuchun Guo
Willy Susilo
Yumei Li
2025
conf/provsec
Many-Time Linkable Ring Signatures.
Nam Tran
Khoa Nguyen
Dongxi Liu
Josef Pieprzyk
Willy Susilo
2025
conf/uss
AudioMarkNet: Audio Watermarking for Deepfake Speech Detection.
Wei Zong
Yang-Wai Chow
Willy Susilo
Joonsang Baek
Seyit Camtepe
2025
journals/tifs
Conjunctive Keyword Search With Dynamic Group-User.
Nan Gao
Kai Fan
Zhen Zhao
Willy Susilo
Zhoutong Xiong
Hui Li
2024
journals/tifs
Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds.
Fucai Luo
Haiyan Wang
Willy Susilo
Xingfu Yan
Xiaofan Zheng
2024
journals/tifs
Accountable Secret Committee Election and Anonymous Sharding Blockchain Consensus.
Mingzhe Zhai
Yizhong Liu
Qianhong Wu
Bo Qin
Haibin Zheng
Xiaopeng Dai
Zhenyang Ding
Willy Susilo
2024
journals/tifs
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains.
Andi Liu
Yizhong Liu
Qianhong Wu
Boyu Zhao
Dongyu Li
Yuan Lu
Rongxing Lu
Willy Susilo
2024
journals/tifs
Secret Multiple Leaders & Committee Election With Application to Sharding Blockchain.
Mingzhe Zhai
Qianhong Wu
Yizhong Liu
Bo Qin
Xiaopeng Dai
Qiyuan Gao
Willy Susilo
2024
journals/tifs
CareFL: Contribution Guided Byzantine-Robust Federated Learning.
Qihao Dong
Shengyuan Yang
Zhiyang Dai
Yansong Gao
Shang Wang
Yuan Cao
Anmin Fu
Willy Susilo
2024
journals/tifs
Quantum-Safe Puncturable Signatures With Their Application in Blockchain.
Mei Jiang
Yannan Li
Willy Susilo
Dung Hoang Duong
2024
journals/tifs
Domain-Specific Fine-Grained Access Control for Cloud-Edge Collaborative IoT.
Meiyan Xiao
Qiong Huang
Wenya Chen
Chuan Lyu
Willy Susilo
2024
journals/tifs
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training.
Jiale Zhang
Chengcheng Zhu
Xiaobing Sun
Chunpeng Ge
Bing Chen
Willy Susilo
Shui Yu
2024
journals/tifs
OLBS: Oblivious Location-Based Services.
Jinguang Han
Willy Susilo
Nan Li
Xinyi Huang
2024
journals/tifs
SDSS: Sequential Data Sharing System in IoT.
Jianchang Lai
Willy Susilo
Robert H. Deng
Fuchun Guo
2024
conf/uss
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus.
Jianghong Wei
Guohua Tian
Ding Wang
Fuchun Guo
Willy Susilo
Xiaofeng Chen
2024
conf/acisp
Pairing-Free ID-Based Signatures as Secure as Discrete Logarithm in AGM.
Jia-Chng Loh
Fuchun Guo
Willy Susilo
2024
conf/acisp
Key Cooperative Attribute-Based Encryption.
Luqi Huang
Willy Susilo
Guomin Yang
Fuchun Guo
2024
conf/acisp
Threshold Ring Signatures with Accountability.
Thanh Xuan Khuc
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2024
conf/acisp
Improved Multimodal Private Signatures from Lattices.
Nam Tran
Khoa Nguyen
Dongxi Liu
Josef Pieprzyk
Willy Susilo
2024
conf/acisp
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems.
Tuong Ngoc Nguyen
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2024
conf/icisc
Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations.
Jiaming Wen
Willy Susilo
Yanhua Zhang
Fuchun Guo
Huanguo Zhang
2024
conf/provsec
Blocklistable Anonymous Credential for Circuits with Post-quantum Security.
Zuoxia Yu
Rupeng Yang
Willy Susilo
Man Ho Au
2024
conf/provsec
Tightly Secure Identity-Based Signature from Cryptographic Group Actions.
Thanh Xuan Khuc
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Hyungrok Jo
Tsuyoshi Takagi
2024
conf/provsec
Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions.
Thanh Xuan Khuc
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2024
conf/provsec
Generic Construction of Withdrawable Signature from Hash-Then-One-Way Signature.
Xin Liu
Willy Susilo
Joonsang Baek
2024
conf/icics
Identity-Based Signature from Lattices Without Trapdoors.
Pingbin Luo
Xinjian Chen
Willy Susilo
Qiong Huang
2023
journals/tifs
PrivacyEAFL: Privacy-Enhanced Aggregation for Federated Learning in Mobile Crowdsensing.
Mingwu Zhang
Shijin Chen
Jian Shen
Willy Susilo
2023
journals/tifs
A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform.
Hua Shen
Ge Wu
Zhe Xia
Willy Susilo
Mingwu Zhang
2023
journals/tifs
PCSF: Privacy-Preserving Content-Based Spam Filter.
Intae Kim
Willy Susilo
Joonsang Baek
Jongkil Kim
Yang-Wai Chow
2023
journals/tifs
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search.
Hongbo Li
Qiong Huang
Jianye Huang
Willy Susilo
2023
journals/tifs
Verifiable and Redactable Blockchains With Fully Editing Operations.
Jun Shen
Xiaofeng Chen
Zheli Liu
Willy Susilo
2023
journals/tifs
Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits.
Xueqiao Liu
Guomin Yang
Willy Susilo
Kai He
Robert H. Deng
Jian Weng
2023
conf/acisp
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM.
Jia-Chng Loh
Fuchun Guo
Willy Susilo
Guomin Yang
2023
conf/sp
TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems.
Wei Zong
Yang-Wai Chow
Willy Susilo
Kien Do
Svetha Venkatesh
2023
conf/provsec
Threshold Ring Signature Scheme from Cryptographic Group Action.
Minh Thuy Truc Pham
Dung Hoang Duong
Yannan Li
Willy Susilo
2023
conf/asiaccs
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup.
Mengdie Huang
Yi Xie
Xiaofeng Chen
Jin Li
Changyu Dong
Zheli Liu
Willy Susilo
2023
conf/asiaccs
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses.
Shang Wang
Yansong Gao
Anmin Fu
Zhi Zhang
Yuqing Zhang
Willy Susilo
Dongxi Liu
2023
conf/ndss
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
Tianyang Chen
Peng Xu
Stjepan Picek
Bo Luo
Willy Susilo
Hai Jin
Kaitai Liang
2023
conf/asiacrypt
Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions.
Yamin Li
Jianghong Wei
Fuchun Guo
Willy Susilo
Xiaofeng Chen
2023
conf/asiacrypt
Bicameral and Auditably Private Signatures.
Khoa Nguyen
Partha Sarathi Roy
Willy Susilo
Yanhong Xu
2022
journals/compsec
FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices.
Anmin Fu
Weijia Ding
Boyu Kuang
Qianmu Li
Willy Susilo
Yuqing Zhang
2022
journals/compsec
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects.
Boyu Kuang
Anmin Fu
Willy Susilo
Shui Yu
Yansong Gao
2022
journals/tifs
Security Analysis of "SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks".
Junjie Jiang
Willy Susilo
Joonsang Baek
2022
journals/tifs
ROSE: Robust Searchable Encryption With Forward and Backward Security.
Peng Xu
Willy Susilo
Wei Wang
Tianyang Chen
Qianhong Wu
Kaitai Liang
Hai Jin
2022
journals/tifs
Blockchain Assisted Multi-Copy Provable Data Possession With Faults Localization in Multi-Cloud Storage.
Ying Miao
Qiong Huang
Meiyan Xiao
Willy Susilo
2022
journals/tifs
Attribute-Based Hierarchical Access Control With Extendable Policy.
Meiyan Xiao
Hongbo Li
Qiong Huang
Shui Yu
Willy Susilo
2022
conf/crypto
Public-Key Watermarking Schemes for Pseudorandom Functions.
Rupeng Yang
Zuoxia Yu
Man Ho Au
Willy Susilo
2022
conf/crypto
Multimodal Private Signatures.
Khoa Nguyen
Fuchun Guo
Willy Susilo
Guomin Yang
2022
conf/provsec
Reinforcement-Mining: Protecting Reward in Selfish Mining.
Zhaojie Wang
Willy Susilo
Jianan Guo
Yilei Wang
Minghao Zhao
2022
conf/provsec
Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices.
Priyanka Dutta
Dung Hoang Duong
Willy Susilo
Kazuhide Fukushima
Shinsaku Kiyomoto
2022
conf/esorics
Puncturable Signature: A Generic Construction and Instantiations.
Mei Jiang
Dung Hoang Duong
Willy Susilo
2022
conf/esorics
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More.
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Josef Pieprzyk
2022
conf/esorics
GAME: Generative-Based Adaptive Model Extraction Attack.
Yi Xie
Mengdie Huang
Xiaoyu Zhang
Changyu Dong
Willy Susilo
Xiaofeng Chen
2022
conf/esorics
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay.
Yubo Zheng
Peng Xu
Wei Wang
Tianyang Chen
Willy Susilo
Kaitai Liang
Hai Jin
2022
conf/esorics
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost.
Willy Susilo
Yannan Li
Fuchun Guo
Jianchang Lai
Ge Wu
2022
conf/esorics
Efficient Unique Ring Signatures from Lattices.
Tuong Ngoc Nguyen
Anh The Ta
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2022
conf/asiaccs
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security.
Priyanka Dutta
Mei Jiang
Dung Hoang Duong
Willy Susilo
Kazuhide Fukushima
Shinsaku Kiyomoto
2022
conf/wisa
TLS Goes Low Cost: When TLS Meets Edge.
Intae Kim
Willy Susilo
Joonsang Baek
Jongkil Kim
Yang-Wai Chow
2022
conf/eurocrypt
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.
Gang Tang
Dung Hoang Duong
Antoine Joux
Thomas Plantard
Youming Qiao
Willy Susilo
2022
conf/eurocrypt
Optimal Tightness for Chain-Based Unique Signatures.
Fuchun Guo
Willy Susilo
2022
conf/africacrypt
A Generalized Attack on the Multi-prime Power RSA.
Abderrahmane Nitaj
Willy Susilo
Joseph Tonien
2021
journals/tifs
Private Set Intersection With Authorization Over Outsourced Encrypted Datasets.
Yuanhao Wang
Qiong Huang
Hongbo Li
Meiyan Xiao
Sha Ma
Willy Susilo
2021
conf/acisp
Towards Visualizing and Detecting Audio Adversarial Examples for Automatic Speech Recognition.
Wei Zong
Yang-Wai Chow
Willy Susilo
2021
conf/acisp
Broadcast Authenticated Encryption with Keyword Search.
Xueqiao Liu
Kai He
Guomin Yang
Willy Susilo
Joseph Tonien
Qiong Huang
2021
conf/acisp
Puncturable Identity-Based Encryption from Lattices.
Priyanka Dutta
Willy Susilo
Dung Hoang Duong
Partha Sarathi Roy
2021
conf/acisp
Forward-Secure Group Encryptions from Lattices.
Jing Pan
Xiaofeng Chen
Fangguo Zhang
Willy Susilo
2021
conf/acisp
Concise Mercurial Subvector Commitments: Definitions and Constructions.
Yannan Li
Willy Susilo
Guomin Yang
Tran Viet Xuan Phuong
Yong Yu
Dongxi Liu
2021
conf/acisp
Efficient Unique Ring Signature for Blockchain Privacy Protection.
Anh The Ta
Thanh Xuan Khuc
Tuong Ngoc Nguyen
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Kazuhide Fukushima
Shinsaku Kiyomoto
2021
conf/acns
Password Protected Secret Sharing from Lattices.
Partha Sarathi Roy
Sabyasachi Dutta
Willy Susilo
Reihaneh Safavi-Naini
2021
conf/esorics
Optimal Verifiable Data Streaming Protocol with Data Auditing.
Jianghong Wei
Guohua Tian
Jun Shen
Xiaofeng Chen
Willy Susilo
2021
conf/esorics
Bestie: Very Practical Searchable Encryption with Forward and Backward Security.
Tianyang Chen
Peng Xu
Wei Wang
Yubo Zheng
Willy Susilo
Hai Jin
2021
conf/esorics
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments.
Tran Viet Xuan Phuong
Willy Susilo
Guomin Yang
Jongkil Kim
Yang-Wai Chow
Dongxi Liu
2021
conf/esorics
Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model.
Willy Susilo
Priyanka Dutta
Dung Hoang Duong
Partha Sarathi Roy
2021
conf/asiaccs
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection.
Jongkil Kim
Seyit Camtepe
Joonsang Baek
Willy Susilo
Josef Pieprzyk
Surya Nepal
2021
conf/asiaccs
Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual.
Yannan Li
Willy Susilo
Guomin Yang
Yong Yu
Tran Viet Xuan Phuong
Dongxi Liu
2021
conf/wisa
Pattern Matching over Encrypted Data with a Short Ciphertext.
Jongkil Kim
Willy Susilo
Yang-Wai Chow
Joonsang Baek
Intae Kim
2021
conf/wisa
Secure Computation of Shared Secrets and Its Applications.
Xin Liu
Willy Susilo
Joonsang Baek
2021
conf/pkc
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation.
Khoa Nguyen
Reihaneh Safavi-Naini
Willy Susilo
Huaxiong Wang
Yanhong Xu
Neng Zeng
2021
conf/icics
Black-Box Audio Adversarial Example Generation Using Variational Autoencoder.
Wei Zong
Yang-Wai Chow
Willy Susilo
2021
conf/asiacrypt
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy.
Jing Pan
Xiaofeng Chen
Fangguo Zhang
Willy Susilo
2020
journals/compsec
DO-RA: Data-oriented runtime attestation for IoT devices.
Boyu Kuang
Anmin Fu
Lu Zhou
Willy Susilo
Yuqing Zhang
2020
journals/istr
A generalised bound for the Wiener attack on RSA.
Willy Susilo
Joseph Tonien
Guomin Yang
2020
conf/ccs
Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception.
Joonsang Baek
Jongkil Kim
Willy Susilo
2020
conf/acisp
Lattice Blind Signatures with Forward Security.
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Ha Thanh Nguyen Tran
Viet Cuong Trinh
Josef Pieprzyk
Thomas Plantard
2020
conf/acisp
A New Improved AES S-box with Enhanced Properties.
Abderrahmane Nitaj
Willy Susilo
Joseph Tonien
2020
conf/acns
Efficient Anonymous Multi-group Broadcast Encryption.
Intae Kim
Seong Oun Hwang
Willy Susilo
Joonsang Baek
Jongkil Kim
2020
conf/acns
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model.
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Josef Pieprzyk
2020
conf/esorics
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption.
Willy Susilo
Dung Hoang Duong
Huy Quoc Le
Josef Pieprzyk
2020
conf/esorics
Secure Cloud Auditing with Efficient Ownership Transfer.
Jun Shen
Fuchun Guo
Xiaofeng Chen
Willy Susilo
2020
conf/wisa
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction.
Priyanka Dutta
Willy Susilo
Dung Hoang Duong
Joonsang Baek
Partha Sarathi Roy
2020
conf/asiacrypt
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting.
Rupeng Yang
Junzuo Lai
Zhengan Huang
Man Ho Au
Qiuliang Xu
Willy Susilo
2019
conf/ccs
Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing.
Jongkil Kim
Seyit Camtepe
Willy Susilo
Surya Nepal
Joonsang Baek
2019
conf/acisp
A Lattice-Based Public Key Encryption with Equality Test in Standard Model.
Dung Hoang Duong
Kazuhide Fukushima
Shinsaku Kiyomoto
Partha Sarathi Roy
Willy Susilo
2019
conf/acisp
Improving the Security of the DRS Scheme with Uniformly Chosen Random Noise.
Arnaud Sipasseuth
Thomas Plantard
Willy Susilo
2019
conf/acisp
Dimensionality Reduction and Visualization of Network Intrusion Detection Data.
Wei Zong
Yang-Wai Chow
Willy Susilo
2019
conf/acisp
Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach.
Jongkil Kim
Willy Susilo
Joonsang Baek
Surya Nepal
Dongxi Liu
2019
conf/acisp
The Wiener Attack on RSA Revisited: A Quest for the Exact Bound.
Willy Susilo
Joseph Tonien
Guomin Yang
2019
conf/acisp
Location Based Encryption.
Tran Viet Xuan Phuong
Willy Susilo
Guomin Yang
Jun Yan
Dongxi Liu
2019
conf/acns
A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups.
Jongkil Kim
Willy Susilo
Fuchun Guo
Joonsang Baek
Nan Li
2019
conf/provsec
Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search.
Xueqiao Liu
Hongbo Li
Guomin Yang
Willy Susilo
Joseph Tonien
Qiong Huang
2019
conf/provsec
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem.
Abderrahmane Nitaj
Willy Susilo
Joseph Tonien
2019
conf/provsec
Lattice-Based IBE with Equality Test in Standard Model.
Dung Hoang Duong
Huy Quoc Le
Partha Sarathi Roy
Willy Susilo
2019
conf/esorics
Puncturable Proxy Re-Encryption Supporting to Group Messaging Service.
Tran Viet Xuan Phuong
Willy Susilo
Jongkil Kim
Guomin Yang
Dongxi Liu
2019
conf/wisa
QR Code Watermarking for Digital Images.
Yang-Wai Chow
Willy Susilo
Joonsang Baek
Jongkil Kim
2019
conf/wisa
Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof.
Jongkil Kim
Joonsang Baek
Willy Susilo
Yang-Wai Chow
2019
conf/wisa
A Blind Ring Signature Based on the Short Integer Solution Problem.
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
2019
conf/icics
Provably Secure Group Authentication in the Asynchronous Communication Model.
Zhe Xia
Lein Harn
Bo Yang
Mingwu Zhang
Yi Mu
Willy Susilo
Weizhi Meng
2018
journals/compsec
Editorial: Security and privacy protection vs sustainable development.
Elisa Bertino
Valentina Casola
Aniello Castiglione
Willy Susilo
2018
journals/istr
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves.
Martin W. Bunder
Abderrahmane Nitaj
Willy Susilo
Joseph Tonien
2018
journals/istr
Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks.
Shams Qazi
Raad Raad
Yi Mu
Willy Susilo
2018
journals/tifs
Anonymous and Traceable Group Data Sharing in Cloud Computing.
Jian Shen
Tianqi Zhou
Xiaofeng Chen
Jin Li
Willy Susilo
2017
journals/istr
Sequence aware functional encryption and its application in searchable encryption.
Tran Viet Xuan Phuong
Guomin Yang
Willy Susilo
Fuchun Guo
Qiong Huang
2017
journals/tifs
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage.
Yong Yu
Man Ho Au
Giuseppe Ateniese
Xinyi Huang
Willy Susilo
Yuanshun Dai
Geyong Min
2017
journals/tifs
Online/Offline Provable Data Possession.
Yujue Wang
Qianhong Wu
Bo Qin
Shaohua Tang
Willy Susilo
2017
journals/tifs
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
Willy Susilo
Peng Jiang
Fuchun Guo
Guomin Yang
Yong Yu
Yi Mu
2017
journals/tifs
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data.
Jian Shen
Jun Shen
Xiaofeng Chen
Xinyi Huang
Willy Susilo
2017
journals/tifs
Secure and Efficient Cloud Data Deduplication With Randomized Tag.
Tao Jiang
Xiaofeng Chen
Qianhong Wu
Jianfeng Ma
Willy Susilo
Wenjing Lou
2017
conf/ccs
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.
Jongkil Kim
Willy Susilo
Fuchun Guo
Man Ho Au
Surya Nepal
2017
conf/acisp
Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage.
Peng Xu
Shuai Liang
Wei Wang
Willy Susilo
Qianhong Wu
Hai Jin
2017
conf/acisp
Mergeable and Revocable Identity-Based Encryption.
Shengmin Xu
Guomin Yang
Yi Mu
Willy Susilo
2017
conf/acisp
A QR Code Watermarking Approach Based on the DWT-DCT Technique.
Yang-Wai Chow
Willy Susilo
Joseph Tonien
Wei Zong
2017
conf/crypto
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample.
Fuchun Guo
Rongmao Chen
Willy Susilo
Jianchang Lai
Guomin Yang
Yi Mu
2017
conf/provsec
An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups.
Ru Meng
Yanwei Zhou
Jianting Ning
Kaitai Liang
Jinguang Han
Willy Susilo
2017
conf/provsec
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Yunling Wang
Jianfeng Wang
Shifeng Sun
Joseph K. Liu
Willy Susilo
Xiaofeng Chen
2016
journals/tifs
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions.
Tran Viet Xuan Phuong
Guomin Yang
Willy Susilo
2016
journals/tifs
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
Yong Yu
Yannan Li
Jianbing Ni
Guomin Yang
Yi Mu
Willy Susilo
2016
journals/tifs
Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption.
Fuchun Guo
Willy Susilo
Yi Mu
2016
conf/ccs
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds.
Peng Xu
Jun Xu
Wei Wang
Hai Jin
Willy Susilo
Deqing Zou
2016
conf/ccs
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Willy Susilo
Rongmao Chen
Fuchun Guo
Guomin Yang
Yi Mu
Yang-Wai Chow
2016
conf/acisp
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance.
Yinhao Jiang
Willy Susilo
Yi Mu
Fuchun Guo
2016
conf/acisp
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing.
Jianchang Lai
Yi Mu
Fuchun Guo
Willy Susilo
Rongmao Chen
2016
conf/acisp
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
Yong Yu
Yannan Li
Man Ho Au
Willy Susilo
Kim-Kwang Raymond Choo
Xinpeng Zhang
2016
conf/acisp
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing.
Yang-Wai Chow
Willy Susilo
Guomin Yang
James G. Phillips
Ilung Pranata
Ari Moesriami Barmawi
2016
conf/acisp
A New Attack on Three Variants of the RSA Cryptosystem.
Martin W. Bunder
Abderrahmane Nitaj
Willy Susilo
Joseph Tonien
2016
conf/acisp
Towards Efficient Fully Randomized Message-Locked Encryption.
Tao Jiang
Xiaofeng Chen
Qianhong Wu
Jianfeng Ma
Willy Susilo
Wenjing Lou
2016
conf/acisp
One-Round Strong Oblivious Signature-Based Envelope.
Rongmao Chen
Yi Mu
Willy Susilo
Guomin Yang
Fuchun Guo
Mingwu Zhang
2016
conf/acisp
Edit Distance Based Encryption and Its Application.
Tran Viet Xuan Phuong
Guomin Yang
Willy Susilo
Kaitai Liang
2016
conf/provsec
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update.
Yinhao Jiang
Willy Susilo
Yi Mu
Fuchun Guo
2016
conf/ctrsa
Strongly Leakage-Resilient Authenticated Key Exchange.
Rongmao Chen
Yi Mu
Guomin Yang
Willy Susilo
Fuchun Guo
2016
conf/asiacrypt
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
Rongmao Chen
Yi Mu
Guomin Yang
Willy Susilo
Fuchun Guo
Mingwu Zhang
2016
conf/asiacrypt
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
Fuchun Guo
Willy Susilo
Yi Mu
Rongmao Chen
Jianchang Lai
Guomin Yang
2015
journals/tifs
Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage.
Kaitai Liang
Willy Susilo
Joseph K. Liu
2015
journals/tifs
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption.
Jinguang Han
Willy Susilo
Yi Mu
Jianying Zhou
Man Ho Allen Au
2015
journals/tifs
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.
Peng Xu
Qianhong Wu
Wei Wang
Willy Susilo
Josep Domingo-Ferrer
Hai Jin
2015
journals/tifs
A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion.
Cai Li
Jiankun Hu
Josef Pieprzyk
Willy Susilo
2015
journals/tifs
Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage.
Kaitai Liang
Willy Susilo
2015
journals/tifs
AAC-OT: Accountable Oblivious Transfer With Access Control.
Jinguang Han
Willy Susilo
Yi Mu
Man Ho Au
Jie Cao
2015
journals/tifs
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext.
Jongkil Kim
Willy Susilo
Man Ho Au
Jennifer Seberry
2015
conf/ccs
Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data.
Hua Deng
Qianhong Wu
Bo Qin
Willy Susilo
Joseph K. Liu
Wenchang Shi
2015
conf/ccs
Anonymous Yoking-Group Proofs.
Nan Li
Yi Mu
Willy Susilo
Vijay Varadharajan
2015
conf/acisp
Improved Identity-Based Online/Offline Encryption.
Jianchang Lai
Yi Mu
Fuchun Guo
Willy Susilo
2015
conf/acisp
Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy.
Clémentine Gritti
Willy Susilo
Thomas Plantard
2015
conf/provsec
Provably Secure Identity Based Provable Data Possession.
Yong Yu
Yafang Zhang
Yi Mu
Willy Susilo
Hongyu Liu
2015
conf/esorics
Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key.
Tran Viet Xuan Phuong
Guomin Yang
Willy Susilo
Xiaofeng Chen
2014
journals/compsec
On the security of text-based 3D CAPTCHAs.
Vu Duc Nguyen
Yang-Wai Chow
Willy Susilo
2014
journals/tifs
Collusion-Resistance in Optimistic Fair Exchange.
Yang Wang
Willy Susilo
Man Ho Au
Guilin Wang
2014
journals/tifs
CP-ABE With Constant-Size Keys for Lightweight Devices.
Fuchun Guo
Yi Mu
Willy Susilo
Duncan S. Wong
Vijay Varadharajan
2014
journals/tifs
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
Kaitai Liang
Man Ho Au
Joseph K. Liu
Willy Susilo
Duncan S. Wong
Guomin Yang
Tran Viet Xuan Phuong
Qi Xie
2014
journals/tifs
Revisiting Optimistic Fair Exchange Based on Ring Signatures.
Yang Wang
Man Ho Allen Au
Willy Susilo
2014
journals/tifs
Subset Membership Encryption and Its Applications to Oblivious Transfer.
Fuchun Guo
Yi Mu
Willy Susilo
2014
conf/ccs
POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption.
Tran Viet Xuan Phuong
Guomin Yang
Willy Susilo
2014
conf/ccs
POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption.
Fuchun Guo
Willy Susilo
Yi Mu
2014
conf/esorics
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption.
Jinguang Han
Willy Susilo
Yi Mu
Jianying Zhou
Man Ho Au
2014
conf/esorics
Efficient Hidden Vector Encryption with Constant-Size Ciphertext.
Tran Viet Xuan Phuong
Guomin Yang
Willy Susilo
2014
conf/esorics
An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing.
Kaitai Liang
Joseph K. Liu
Duncan S. Wong
Willy Susilo
2014
conf/esorics
New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era.
Joseph K. Liu
Man Ho Au
Xinyi Huang
Willy Susilo
Jianying Zhou
Yong Yu
2014
conf/wisa
An Efficient Variant of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing.
Ibrahim F. Elashry
Yi Mu
Willy Susilo
2014
conf/wisa
Fair Multi-signature.
Pairat Thorncharoensri
Willy Susilo
Yi Mu
2014
conf/icics
A Visual One-Time Password Authentication Scheme Using Mobile Devices.
Yang-Wai Chow
Willy Susilo
Man Ho Au
Ari Moesriami Barmawi
2014
conf/ctrsa
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures.
Qiong Huang
Duncan S. Wong
Willy Susilo
2013
journals/istr
Server-aided signatures verification secure against collusion attack.
Sherman S. M. Chow
Man Ho Au
Willy Susilo
2013
journals/tifs
Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE.
Man Ho Au
Joseph K. Liu
Willy Susilo
Jianying Zhou
2013
journals/tifs
Fully Homomorphic Encryption Using Hidden Ideal Lattice.
Thomas Plantard
Willy Susilo
Zhenfei Zhang
2013
conf/acisp
Membership Encryption and Its Applications.
Fuchun Guo
Yi Mu
Willy Susilo
Vijay Varadharajan
2013
conf/acisp
Fairness in Concurrent Signatures Revisited.
Willy Susilo
Man Ho Au
Yang Wang
Duncan S. Wong
2013
conf/acisp
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt".
Yang Wang
Mark Manulis
Man Ho Au
Willy Susilo
2013
conf/acisp
Adaptive Precision Floating Point LLL.
Thomas Plantard
Willy Susilo
Zhenfei Zhang
2012
journals/tifs
Efficient Fair Conditional Payments for Outsourcing Computations.
Xiaofeng Chen
Jin Li
Willy Susilo
2012
conf/acns
Breaking an Animated CAPTCHA Scheme.
Vu Duc Nguyen
Yang-Wai Chow
Willy Susilo
2012
conf/provsec
On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties.
Reza Reyhanitabar
Willy Susilo
2012
conf/provsec
Efficient Escrow-Free Identity-Based Signature.
Yunmei Zhang
Joseph K. Liu
Xinyi Huang
Man Ho Au
Willy Susilo
2012
conf/esorics
Enhancing Location Privacy for Electric Vehicles (at the Right time).
Joseph K. Liu
Man Ho Au
Willy Susilo
Jianying Zhou
2012
conf/esorics
Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext.
Fuchun Guo
Yi Mu
Willy Susilo
2012
conf/wisa
Multi-Level Controlled Signature.
Pairat Thorncharoensri
Willy Susilo
Yi Mu
2012
conf/ndss
BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation.
Man Ho Au
Apu Kapadia
Willy Susilo
2012
conf/pkc
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles.
Qiong Huang
Duncan S. Wong
Willy Susilo
2012
conf/icics
Forward Secure Attribute-Based Signatures.
Tsz Hon Yuen
Joseph K. Liu
Xinyi Huang
Man Ho Au
Willy Susilo
Jianying Zhou
2012
conf/icics
Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme.
Yang-Wai Chow
Willy Susilo
Duncan S. Wong
2012
conf/icics
Perfect Ambiguous Optimistic Fair Exchange.
Yang Wang
Man Ho Au
Willy Susilo
2012
conf/sacrypt
Lattice Reduction for Modular Knapsack.
Thomas Plantard
Willy Susilo
Zhenfei Zhang
2012
conf/cans
Attacking Animated CAPTCHAs via Character Extraction.
Vu Duc Nguyen
Yang-Wai Chow
Willy Susilo
2011
journals/tifs
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
Xinyi Huang
Yi Mu
Willy Susilo
Wei Wu
Jianying Zhou
Robert H. Deng
2011
journals/tifs
Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic Fair Exchange.
Qiong Huang
Duncan S. Wong
Willy Susilo
2011
conf/ccs
Self-certified ring signatures.
Nan Li
Yi Mu
Willy Susilo
Fuchun Guo
2011
conf/ccs
Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations.
Shekh Faisal Abdul-Latip
Reza Reyhanitabar
Willy Susilo
Jennifer Seberry
2011
conf/ccs
Server-aided signatures verification secure against collusion attack.
Sherman S. M. Chow
Man Ho Au
Willy Susilo
2011
conf/ccs
On the security of the identity-based encryption based on DHIES from ASIACCS 2010.
Willy Susilo
Joonsang Baek
2011
conf/ccs
Threshold ring signature without random oracles.
Tsz Hon Yuen
Joseph K. Liu
Man Ho Au
Willy Susilo
Jianying Zhou
2011
conf/acisp
Electronic Cash with Anonymous User Suspension.
Man Ho Au
Willy Susilo
Yi Mu
2011
conf/icisc
Breaking a 3D-Based CAPTCHA Scheme.
Vu Duc Nguyen
Yang-Wai Chow
Willy Susilo
2011
conf/icisc
Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes.
Zhenfei Zhang
Thomas Plantard
Willy Susilo
2011
conf/provsec
Concurrent Signatures with Fully Negotiable Binding Control.
Tsz Hon Yuen
Duncan S. Wong
Willy Susilo
Qiong Huang
2011
conf/cans
AniCAP: An Animated 3D CAPTCHA Scheme Based on Motion Parallax.
Yang-Wai Chow
Willy Susilo
2010
conf/fse
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.
Mohammad Reza Reyhanitabar
Willy Susilo
Yi Mu
2010
conf/ccs
Attribute-based signature and its applications.
Jin Li
Man Ho Au
Willy Susilo
Dongqing Xie
Kui Ren
2010
conf/acisp
Proof-of-Knowledge of Representation of Committed Value and Its Applications.
Man Ho Au
Willy Susilo
Yi Mu
2010
conf/acisp
Identity-Based Chameleon Hash Scheme without Key Exposure.
Xiaofeng Chen
Fangguo Zhang
Willy Susilo
Haibo Tian
Jin Li
Kwangjo Kim
2010
conf/provsec
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).
Patrick P. Tsang
Man Ho Au
Joseph K. Liu
Willy Susilo
Duncan S. Wong
2010
conf/esorics
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.
Joseph K. Liu
Man Ho Au
Willy Susilo
Jianying Zhou
2010
conf/pkc
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Xinyi Huang
Yi Mu
Willy Susilo
Wei Wu
Yang Xiang
2010
conf/cans
Towards a Cryptographic Treatment of Publish/Subscribe Systems.
Tsz Hon Yuen
Willy Susilo
Yi Mu
2010
conf/cans
STE3D-CAP: Stereoscopic 3D CAPTCHA.
Willy Susilo
Yang-Wai Chow
Hua-Yu Zhou
2009
conf/fse
Enhanced Target Collision Resistant Hash Functions Revisited.
Mohammad Reza Reyhanitabar
Willy Susilo
Yi Mu
2009
conf/ccs
Improved searchable public key encryption with designated tester.
Hyun Sook Rhee
Jong Hwan Park
Willy Susilo
Dong Hoon Lee
2009
conf/acisp
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders.
Mohammad Reza Reyhanitabar
Willy Susilo
Yi Mu
2009
conf/acns
Broadcast Attacks against Lattice-Based Cryptosystems.
Thomas Plantard
Willy Susilo
2009
conf/acns
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.
Joonsang Baek
Willy Susilo
Joseph K. Liu
Jianying Zhou
2009
conf/provsec
How to Prove Security of a Signature with a Tighter Security Reduction.
Fuchun Guo
Yi Mu
Willy Susilo
2009
conf/provsec
Anonymous Conditional Proxy Re-encryption without Random Oracle.
Liming Fang
Willy Susilo
Jiandong Wang
2009
conf/provsec
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?
Man Ho Au
Willy Susilo
Yi Mu
2009
conf/esorics
New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing.
Ching Yu Ng
Willy Susilo
Yi Mu
Reihaneh Safavi-Naini
2009
conf/wisa
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles.
Pairat Thorncharoensri
Willy Susilo
Yi Mu
2009
conf/icics
Online/Offline Ring Signature Scheme.
Joseph K. Liu
Man Ho Au
Willy Susilo
Jianying Zhou
2009
conf/icics
Policy-Controlled Signatures.
Pairat Thorncharoensri
Willy Susilo
Yi Mu
2009
conf/ctrsa
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.
Man Ho Au
Patrick P. Tsang
Willy Susilo
Yi Mu
2009
conf/iwsec
Universal Designated Verifier Signatures with Threshold-Signers.
Pairat Thorncharoensri
Willy Susilo
Yi Mu
2009
conf/eurocrypt
Asymmetric Group Key Agreement.
Qianhong Wu
Yi Mu
Willy Susilo
Bo Qin
Josep Domingo-Ferrer
2009
conf/cans
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle.
Liming Fang
Willy Susilo
Chunpeng Ge
Jiandong Wang
2008
conf/fc
Practical Anonymous Divisible E-Cash from Bounded Accumulators.
Man Ho Au
Willy Susilo
Yi Mu
2008
conf/acns
Traceable and Retrievable Identity-Based Encryption.
Man Ho Au
Qiong Huang
Joseph K. Liu
Willy Susilo
Duncan S. Wong
Guomin Yang
2008
conf/icisc
How to Balance Privacy with Authenticity.
Pairat Thorncharoensri
Willy Susilo
Yi Mu
2008
conf/provsec
Server-Aided Verification Signatures: Definitions and New Constructions.
Wei Wu
Yi Mu
Willy Susilo
Xinyi Huang
2008
conf/esorics
RFID Privacy Models Revisited.
Ching Yu Ng
Willy Susilo
Yi Mu
Reihaneh Safavi-Naini
2008
conf/wisa
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.
Wei Wu
Yi Mu
Willy Susilo
Xinyi Huang
2008
conf/pkc
A Digital Signature Scheme Based on CVP<sub>infinity</sub>.
Thomas Plantard
Willy Susilo
Khin Than Win
2008
conf/ctrsa
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.
Qiong Huang
Guomin Yang
Duncan S. Wong
Willy Susilo
2008
conf/asiacrypt
Ambiguous Optimistic Fair Exchange.
Qiong Huang
Guomin Yang
Duncan S. Wong
Willy Susilo
2008
conf/cans
Sanitizable Signatures Revisited.
Tsz Hon Yuen
Willy Susilo
Joseph K. Liu
Yi Mu
2007
conf/ccs
New constructions of fuzzy identity-based encryption.
Joonsang Baek
Willy Susilo
Jianying Zhou
2007
conf/acisp
Certificateless Signature Revisited.
Xinyi Huang
Yi Mu
Willy Susilo
Duncan S. Wong
Wei Wu
2007
conf/acisp
Practical Compact E-Cash.
Man Ho Au
Willy Susilo
Yi Mu
2007
conf/acns
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.
Xiaofeng Chen
Fangguo Zhang
Willy Susilo
Yi Mu
2007
conf/acns
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.
Liang Lu
Reihaneh Safavi-Naini
Jeffrey Horton
Willy Susilo
2007
conf/wisa
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.
Wei Wu
Yi Mu
Willy Susilo
Xinyi Huang
2007
conf/pkc
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures.
Huafei Zhu
Willy Susilo
Yi Mu
2007
conf/icics
New Construction of Group Secret Handshakes Based on Pairings.
Lan Zhou
Willy Susilo
Yi Mu
2007
conf/icics
Formal Definition and Construction of Nominative Signature.
Dennis Y. W. Liu
Duncan S. Wong
Xinyi Huang
Guilin Wang
Qiong Huang
Yi Mu
Willy Susilo
2007
conf/icics
(Convertible) Undeniable Signatures Without Random Oracles.
Tsz Hon Yuen
Man Ho Au
Joseph K. Liu
Willy Susilo
2007
conf/ctrsa
Compact E-Cash from Bounded Accumulator.
Man Ho Au
Qianhong Wu
Willy Susilo
Yi Mu
2007
conf/cans
Achieving Mobility and Anonymity in IP-Based Networks.
Rungrat Wiangsripanawan
Willy Susilo
Reihaneh Safavi-Naini
2007
conf/cans
A Generic Construction for Universally-Convertible Undeniable Signatures.
Xinyi Huang
Yi Mu
Willy Susilo
Wei Wu
2006
conf/ccs
Self-organised group key management for ad hoc networks.
Ling Luo
Reihaneh Safavi-Naini
Joonsang Baek
Willy Susilo
2006
conf/ccs
Designated group credentials.
Ching Yu Ng
Willy Susilo
Yi Mu
2006
conf/acisp
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.
Shidi Xu
Yi Mu
Willy Susilo
2006
conf/acisp
-Times Revocable-iff-Linked Group Signatures.
Man Ho Au
Willy Susilo
Siu-Ming Yiu
2006
conf/fc
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.
Xiaofeng Chen
Fangguo Zhang
Yi Mu
Willy Susilo
2006
conf/icics
Universal Designated Verifier Signature Without Delegatability.
Xinyi Huang
Willy Susilo
Yi Mu
Wei Wu
2006
conf/iwsec
Ad Hoc Group Signatures.
Qianhong Wu
Willy Susilo
Yi Mu
Fangguo Zhang
2006
conf/iwsec
Ring Signature with Designated Linkability.
Joseph K. Liu
Willy Susilo
Duncan S. Wong
2006
conf/cans
X<sup>2BT</sup> Trusted Reputation System: A Robust Mechanism for P2P Networks.
Lan Yu
Willy Susilo
Reihaneh Safavi-Naini
2005
conf/sec
Tripartite Concurrent Signatures.
Willy Susilo
Yi Mu
2005
conf/acisp
On the Security of Nominative Signatures.
Willy Susilo
Yi Mu
2005
conf/fc
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures).
Fangguo Zhang
Willy Susilo
Yi Mu
2005
conf/icisc
An Efficient Static Blind Ring Signature Scheme.
Qianhong Wu
Fangguo Zhang
Willy Susilo
Yi Mu
2005
conf/pkc
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption.
Joonsang Baek
Reihaneh Safavi-Naini
Willy Susilo
2005
conf/icics
Generic Construction of (Identity-Based) Perfect Concurrent Signatures.
Sherman S. M. Chow
Willy Susilo
2005
conf/asiacrypt
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature).
Joonsang Baek
Reihaneh Safavi-Naini
Willy Susilo
2005
conf/cans
On Securing RTP-Based Streaming Content with Firewalls.
Liang Lu
Reihaneh Safavi-Naini
Jeffrey Horton
Willy Susilo
2005
conf/cans
On the Security of Certificateless Signature Schemes from Asiacrypt 2003.
Xinyi Huang
Willy Susilo
Yi Mu
Futai Zhang
2004
conf/acisp
Identity-Based Strong Designated Verifier Signature Schemes.
Willy Susilo
Fangguo Zhang
Yi Mu
2004
conf/acns
Deniable Ring Authentication Revisited.
Willy Susilo
Yi Mu
2004
conf/acns
X<sup>2</sup>Rep: Enhanced Trust Semantics for the XRep Protocol.
Nathan Curtis
Reihaneh Safavi-Naini
Willy Susilo
2004
conf/pkc
An Efficient Signature Scheme from Bilinear Pairings and Its Applications.
Fangguo Zhang
Reihaneh Safavi-Naini
Willy Susilo
2004
conf/icics
Perfect Concurrent Signature Schemes.
Willy Susilo
Yi Mu
Fangguo Zhang
2003
conf/icisc
Non-interactive Deniable Ring Authentication.
Willy Susilo
Yi Mu
2002
conf/icisc
An Efficient Fail-Stop Signature Scheme Based on Factorization.
Willy Susilo
Reihaneh Safavi-Naini
2001
conf/acisp
How to Construct Fail-Stop Confirmer Signature Schemes.
Reihaneh Safavi-Naini
Willy Susilo
Huaxiong Wang
2001
conf/acisp
On Classifying Conference Key Distribution Protocols.
Shahrokh Saeednia
Reihaneh Safavi-Naini
Willy Susilo
2000
conf/acisp
Key Management for Secure Multicast with Dynamic Controller.
Hartono Kurnio
Reihaneh Safavi-Naini
Willy Susilo
Huaxiong Wang
1999
conf/acisp
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves.
Willy Susilo
Reihaneh Safavi-Naini
Josef Pieprzyk
Coauthors
Abderrahmane Nitaj
(5)
Andi Liu
(1)
Anh The Ta
(2)
Aniello Castiglione
(1)
Anmin Fu
(5)
Antoine Joux
(1)
Apu Kapadia
(1)
Arash Shaghaghi
(1)
Ari Moesriami Barmawi
(2)
Arnaud Sipasseuth
(1)
Benjamin P. Turnbull
(1)
Bing Chen
(1)
Bingyu Li
(1)
Bo Luo
(1)
Bo Qin
(6)
Bo Yang
(1)
Boyu Kuang
(3)
Boyu Zhao
(1)
Cai Li
(1)
Caigang Yu
(1)
Changyu Dong
(2)
Chengcheng Zhu
(1)
Ching Yu Ng
(3)
Chuan Lyu
(1)
Chunpeng Ge
(2)
Clémentine Gritti
(1)
Dawei Li
(2)
Dennis Y. W. Liu
(1)
Deqing Zou
(1)
Ding Wang
(1)
Dong Hoon Lee
(1)
Dongqing Xie
(1)
Dongxi Liu
(9)
Dongyu Li
(1)
Duncan S. Wong
(16)
Dung Hoang Duong
(22)
Elisa Bertino
(1)
Fangguo Zhang
(11)
Fucai Luo
(1)
Fuchun Guo
(39)
Futai Zhang
(2)
Gang Tang
(1)
Ge Wu
(2)
Geyong Min
(1)
Giuseppe Ateniese
(1)
Guilin Wang
(2)
Guohua Tian
(3)
Guomin Yang
(33)
Ha Thanh Nguyen Tran
(1)
Hai Jin
(7)
Haibin Zheng
(1)
Haibo Tian
(1)
Haiyan Wang
(1)
Hartono Kurnio
(1)
Hongbo Li
(4)
Hongyu Liu
(1)
Hua Deng
(1)
Hua Shen
(2)
Hua-Yu Zhou
(1)
Huafei Zhu
(1)
Huanguo Zhang
(1)
Huaxiong Wang
(3)
Hui Li
(1)
Huy Quoc Le
(8)
Hyun Sook Rhee
(1)
Hyung Tae Lee
(1)
Hyungrok Jo
(1)
Ibrahim F. Elashry
(1)
Ilung Pranata
(1)
Intae Kim
(4)
James G. Phillips
(1)
Jeffrey Horton
(2)
Jennifer Seberry
(2)
Jia-Chng Loh
(2)
Jiale Zhang
(1)
Jialiang Dong
(1)
Jiaming Wen
(1)
Jian Shen
(3)
Jian Weng
(1)
Jianan Guo
(1)
Jianbing Ni
(1)
Jianchang Lai
(6)
Jiandong Wang
(2)
Jianfeng Ma
(2)
Jianfeng Wang
(1)
Jianghong Wei
(4)
Jiankun Hu
(1)
Jianting Ning
(1)
Jianwei Liu
(2)
Jianye Huang
(1)
Jianying Zhou
(14)
Jie Cao
(1)
Jin Li
(5)
Jing Pan
(2)
Jinguang Han
(5)
Jintao Cai
(1)
Jong Hwan Park
(1)
Jongkil Kim
(15)
Joonsang Baek
(24)
Josef Pieprzyk
(9)
Josep Domingo-Ferrer
(2)
Joseph K. Liu
(19)
Joseph Tonien
(10)
Jun Shen
(4)
Jun Xu
(1)
Jun Yan
(1)
Junjie Jiang
(1)
Junzuo Lai
(1)
Kai Fan
(1)
Kai He
(2)
Kaitai Liang
(9)
Kazuhide Fukushima
(8)
Khin Than Win
(1)
Khoa Nguyen
(5)
Kien Do
(1)
Kim-Kwang Raymond Choo
(1)
Kui Ren
(1)
Kwangjo Kim
(1)
Lan Yu
(1)
Lan Zhou
(1)
Lein Harn
(1)
Liang Lu
(2)
Liming Fang
(2)
Ling Luo
(1)
Lu Zhou
(1)
Luqi Huang
(2)
Man Ho Allen Au
(2)
Man Ho Au
(38)
Mark Manulis
(1)
Martin W. Bunder
(2)
Marwa Keshk
(1)
Mei Jiang
(3)
Meiyan Xiao
(4)
Mengdie Huang
(2)
Min Xie
(1)
Minghao Zhao
(1)
Mingwu Zhang
(6)
Mingzhe Zhai
(2)
Minh Thuy Truc Pham
(1)
Mohammad Reza Reyhanitabar
(3)
Mohammed Tanvir Masud
(1)
Nam Tran
(2)
Nan Gao
(1)
Nan Li
(4)
Nan Sun
(1)
Nathan Curtis
(1)
Neng Zeng
(1)
Nour Moustafa
(1)
Pairat Thorncharoensri
(6)
Partha Sarathi Roy
(8)
Patrick P. Tsang
(2)
Peng Jiang
(1)
Peng Xu
(7)
Pingbin Luo
(1)
Priyanka Dutta
(5)
Qi Xie
(1)
Qianhong Wu
(17)
Qianmu Li
(1)
Qihao Dong
(1)
Qin Wang
(1)
Qiong Huang
(17)
Qiuliang Xu
(1)
Qiyuan Gao
(1)
Raad Raad
(1)
Reihaneh Safavi-Naini
(18)
Reza Reyhanitabar
(2)
Robert H. Deng
(3)
Rongmao Chen
(8)
Rongxing Lu
(1)
Ru Meng
(1)
Rungrat Wiangsripanawan
(1)
Ruonan Chen
(2)
Rupeng Yang
(4)
Sabyasachi Dutta
(1)
Seong Oun Hwang
(1)
Seongbong Choi
(1)
Seyit Camtepe
(3)
Sha Ma
(1)
Shahrokh Saeednia
(1)
Shams Qazi
(1)
Shang Wang
(2)
Shao-Jun Yang
(1)
Shaohua Tang
(1)
Shekh Faisal Abdul-Latip
(1)
Shengmin Xu
(1)
Shengyuan Yang
(1)
Sherman S. M. Chow
(3)
Shidi Xu
(1)
Shifeng Sun
(1)
Shihong Xiong
(1)
Shijin Chen
(1)
Shinsaku Kiyomoto
(8)
Shuai Liang
(1)
Shui Yu
(3)
Siqi Ma
(1)
Siu-Ming Yiu
(1)
Stjepan Picek
(1)
Surya Nepal
(4)
Svetha Venkatesh
(1)
Tao Jiang
(2)
Thanh Xuan Khuc
(4)
Thomas Plantard
(10)
Tianqi Zhou
(1)
Tianyang Chen
(4)
Tran Viet Xuan Phuong
(12)
Tsuyoshi Takagi
(1)
Tsz Hon Yuen
(6)
Tuong Ngoc Nguyen
(3)
Valentina Casola
(1)
Viet Cuong Trinh
(1)
Vijay Varadharajan
(3)
Vu Duc Nguyen
(4)
Wei Wang
(6)
Wei Wu
(8)
Wei Zong
(6)
Weijia Ding
(1)
Weizhi Meng
(1)
Wenchang Shi
(1)
Wenjie Yang
(1)
Wenjing Lou
(2)
Wenya Chen
(1)
Willy Susilo
(291)
Xiaobing Sun
(1)
Xiaofan Zheng
(1)
Xiaofeng Chen
(20)
Xiaopeng Dai
(2)
Xiaoyu Zhang
(1)
Xin Liu
(3)
Xingfu Yan
(1)
Xinjian Chen
(1)
Xinpeng Zhang
(1)
Xinyi Huang
(16)
Xinzhang Chen
(1)
Xueqiao Liu
(3)
Yafang Zhang
(1)
Yamin Li
(1)
Yang Wang
(5)
Yang Xiang
(1)
Yang Yang
(1)
Yang Zhang
(2)
Yang-Wai Chow
(22)
Yanhong Xu
(2)
Yanhua Zhang
(1)
Yannan Li
(7)
Yansong Gao
(3)
Yanwei Zhou
(1)
Yi Mu
(75)
Yi Xie
(2)
Yichi Huang
(1)
Yilei Wang
(1)
Ying Miao
(1)
Yinhao Jiang
(2)
Yitao Chen
(1)
Yizhong Liu
(5)
Yong Yu
(8)
Youming Qiao
(1)
Yuan Cao
(1)
Yuan Lu
(1)
Yuanhao Wang
(1)
Yuanshun Dai
(1)
Yubo Zheng
(2)
Yujue Wang
(1)
Yumei Li
(1)
Yunling Wang
(1)
Yunmei Zhang
(1)
Yuqing Zhang
(3)
Zhaojie Wang
(1)
Zhe Xia
(2)
Zheli Liu
(2)
Zhen Zhao
(1)
Zhenfei Zhang
(4)
Zhengan Huang
(1)
Zhenyang Ding
(1)
Zhenyu Guan
(1)
Zhi Zhang
(1)
Zhiyang Dai
(1)
Zhoutong Xiong
(1)
Zuoxia Yu
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to