![]() | 2009 | |
---|---|---|
162 | ![]() ![]() ![]() ![]() ![]() ![]() | Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009 ACM 2009 |
161 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu: Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. ACISP 2009: 153-170 |
160 | ![]() ![]() ![]() ![]() ![]() ![]() | Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou: A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. ACNS 2009: 143-155 |
159 | ![]() ![]() ![]() ![]() ![]() ![]() | Thomas Plantard, Willy Susilo: Broadcast Attacks against Lattice-Based Cryptosystems. ACNS 2009: 456-472 |
158 | ![]() ![]() ![]() ![]() ![]() ![]() | Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee: Improved searchable public key encryption with designated tester. ASIACCS 2009: 376-379 |
157 | ![]() ![]() ![]() ![]() ![]() ![]() | Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang: A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. CANS 2009: 248-258 |
156 | ![]() ![]() ![]() ![]() ![]() ![]() | Tsz Hon Yuen, Qiong Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Guomin Yang: Efficient Non-interactive Range Proof. COCOON 2009: 138-147 |
155 | ![]() ![]() ![]() ![]() ![]() ![]() | Man Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu: Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. CT-RSA 2009: 295-308 |
154 | ![]() ![]() ![]() ![]() ![]() ![]() | Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. ESORICS 2009: 321-336 |
153 | ![]() ![]() ![]() ![]() ![]() ![]() | Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer: Asymmetric Group Key Agreement. EUROCRYPT 2009: 153-170 |
152 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu: Enhanced Target Collision Resistant Hash Functions Revisited. FSE 2009: 327-344 |
151 | ![]() ![]() ![]() ![]() ![]() ![]() | Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou: Online/Offline Ring Signature Scheme. ICICS 2009: 80-90 |
150 | ![]() ![]() ![]() ![]() ![]() ![]() | Pairat Thorncharoensri, Willy Susilo, Yi Mu: Policy-Controlled Signatures. ICICS 2009: 91-106 |
149 | ![]() ![]() ![]() ![]() ![]() ![]() | Liang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi: Ranking Attack Graphs with Graph Neural Networks. ISPEC 2009: 345-359 |
148 | ![]() ![]() ![]() ![]() ![]() ![]() | Pairat Thorncharoensri, Willy Susilo, Yi Mu: Universal Designated Verifier Signatures with Threshold-Signers. IWSEC 2009: 89-109 |
147 | ![]() ![]() ![]() ![]() ![]() ![]() | Man Ho Au, Willy Susilo, Yi Mu: Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? ProvSec 2009: 129-139 |
146 | ![]() ![]() ![]() ![]() ![]() ![]() | Liming Fang, Willy Susilo, Jiandong Wang: Anonymous Conditional Proxy Re-encryption without Random Oracle. ProvSec 2009: 47-60 |
145 | ![]() ![]() ![]() ![]() ![]() ![]() | Fuchun Guo, Yi Mu, Willy Susilo: How to Prove Security of a Signature with a Tighter Security Reduction. ProvSec 2009: 90-103 |
144 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhi Quan Zhou, Arnaldo Sinaga, Lei Zhao, Willy Susilo, Kai-Yuan Cai: Improving Software Testing Cost-Effectiveness through Dynamic Partitioning. QSIC 2009: 249-258 |
143 | ![]() ![]() ![]() ![]() ![]() ![]() | Pairat Thorncharoensri, Willy Susilo, Yi Mu: Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles. WISA 2009: 94-108 |
142 | ![]() ![]() ![]() ![]() ![]() ![]() | Jianyong Huang, Jennifer Seberry, Willy Susilo: A five-round algebraic property of AES and its application to the ALPHA-MAC. IJACT 1(4): 264-289 (2009) |
141 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Certificate-based Signatures Revisited. J. UCS 15(8): 1659-1684 (2009) |
140 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo: Short fail-stop signature scheme based on factorization and discrete logarithm assumptions. Theor. Comput. Sci. 410(8-10): 736-744 (2009) |
2008 | ||
139 | ![]() ![]() ![]() ![]() ![]() ![]() | Liqun Chen, Yi Mu, Willy Susilo: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings Springer 2008 |
138 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi Mu, Willy Susilo, Jennifer Seberry: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings Springer 2008 |
137 | ![]() ![]() ![]() ![]() ![]() ![]() | Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang: Traceable and Retrievable Identity-Based Encryption. ACNS 2008: 94-110 |
136 | ![]() ![]() ![]() ![]() ![]() ![]() | Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: Ambiguous Optimistic Fair Exchange. ASIACRYPT 2008: 74-89 |
135 | ![]() ![]() ![]() ![]() ![]() ![]() | Tsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu: Sanitizable Signatures Revisited. CANS 2008: 80-97 |
134 | ![]() ![]() ![]() ![]() ![]() ![]() | Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. CT-RSA 2008: 106-120 |
133 | ![]() ![]() ![]() ![]() ![]() ![]() | Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: RFID Privacy Models Revisited. ESORICS 2008: 251-266 |
132 | ![]() ![]() ![]() ![]() ![]() ![]() | Man Ho Au, Willy Susilo, Yi Mu: Practical Anonymous Divisible E-Cash from Bounded Accumulators. Financial Cryptography 2008: 287-301 |
131 | ![]() ![]() ![]() ![]() ![]() ![]() | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Public Key Encryption with Keyword Search Revisited. ICCSA (1) 2008: 1249-1259 |
130 | ![]() ![]() ![]() ![]() ![]() ![]() | Pairat Thorncharoensri, Willy Susilo, Yi Mu: How to Balance Privacy with Authenticity. ICISC 2008: 184-201 |
129 | ![]() ![]() ![]() ![]() ![]() ![]() | Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou: Certificate-Based Signature Schemes without Pairings or Random Oracles. ISC 2008: 285-297 |
128 | ![]() ![]() ![]() ![]() ![]() ![]() | Jianyong Huang, Jennifer Seberry, Willy Susilo: A Five-Round Algebraic Property of the Advanced Encryption Standard. ISC 2008: 316-330 |
127 | ![]() ![]() ![]() ![]() ![]() ![]() | Dongdong Sun, Yi Mu, Willy Susilo: A Generic Construction of Identity-Based Online/Offline Signcryption. ISPA 2008: 707-712 |
126 | ![]() ![]() ![]() ![]() ![]() ![]() | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu: Publicly Verifiable Privacy-Preserving Group Decryption. Inscrypt 2008: 72-83 |
125 | ![]() ![]() ![]() ![]() ![]() ![]() | Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo: Privacy for Private Key in Signatures. Inscrypt 2008: 84-95 |
124 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Server-Aided Verification Signatures: Definitions and New Constructions. ProvSec 2008: 141-155 |
123 | ![]() ![]() ![]() ![]() ![]() ![]() | Thomas Plantard, Willy Susilo, Khin Than Win: A Digital Signature Scheme Based on CVPinfinity. Public Key Cryptography 2008: 288-307 |
122 | ![]() ![]() ![]() ![]() ![]() ![]() | Joonsang Baek, David Galindo, Willy Susilo, Jianying Zhou: Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). SCN 2008: 358-374 |
121 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. WISA 2008: 99-114 |
120 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Short Designated Verifier Signature Scheme and Its Identity-based Variant. I. J. Network Security 6(1): 82-93 (2008) |
119 | ![]() ![]() ![]() ![]() ![]() ![]() | Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo: A New and Efficient Signature on Commitment Values. I. J. Network Security 7(1): 100-105 (2008) |
118 | ![]() ![]() ![]() ![]() ![]() ![]() | Thomas Plantard, Willy Susilo, Khin Than Win, Qiong Huang: Efficient lattice-based signature scheme. IJACT 1(2): 120-132 (2008) |
117 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim: Efficient generic on-line/off-line (threshold) signatures without key exposure. Inf. Sci. 178(21): 4192-4203 (2008) |
116 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Secure universal designated verifier signature without random oracles. Int. J. Inf. Sec. 7(3): 171-183 (2008) |
115 | ![]() ![]() ![]() ![]() ![]() ![]() | Haibo Tian, Willy Susilo, Yang Ming, Yumin Wang: A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles. J. Comput. Sci. Technol. 23(5): 832-842 (2008) |
114 | ![]() ![]() ![]() ![]() ![]() ![]() | Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008) |
2007 | ||
113 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Joseph K. Liu, Yi Mu: Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings Springer 2007 |
112 | ![]() ![]() ![]() ![]() ![]() ![]() | Qiong Ren, Yi Mu, Willy Susilo: SEFAP: An Email System for Anti-Phishing. ACIS-ICIS 2007: 782-787 |
111 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu: Certificateless Signature Revisited. ACISP 2007: 308-322 |
110 | ![]() ![]() ![]() ![]() ![]() ![]() | Man Ho Au, Willy Susilo, Yi Mu: Practical Compact E-Cash. ACISP 2007: 431-445 |
109 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu: Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. ACNS 2007: 18-30 |
108 | ![]() ![]() ![]() ![]() ![]() ![]() | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. ACNS 2007: 65-86 |
107 | ![]() ![]() ![]() ![]() ![]() ![]() | Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks. ACSW Frontiers 2007: 183-191 |
106 | ![]() ![]() ![]() ![]() ![]() ![]() | Joonsang Baek, Willy Susilo, Jianying Zhou: New constructions of fuzzy identity-based encryption. ASIACCS 2007: 368-370 |
105 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang: Identity-Based Proxy Signature from Pairings. ATC 2007: 22-31 |
104 | ![]() ![]() ![]() ![]() ![]() ![]() | Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin: Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. ATC 2007: 32-41 |
103 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu: A Generic Construction for Universally-Convertible Undeniable Signatures. CANS 2007: 15-33 |
102 | ![]() ![]() ![]() ![]() ![]() ![]() | Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Achieving Mobility and Anonymity in IP-Based Networks. CANS 2007: 60-79 |
101 | ![]() ![]() ![]() ![]() ![]() ![]() | Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu: Compact E-Cash from Bounded Accumulator. CT-RSA 2007: 178-195 |
100 | ![]() ![]() ![]() ![]() ![]() ![]() | Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu: Certificate-Based Signature: Security Model and Efficient Construction. EuroPKI 2007: 110-125 |
99 | ![]() ![]() ![]() ![]() ![]() ![]() | Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2007: 1096-1105 |
98 | ![]() ![]() ![]() ![]() ![]() ![]() | Lan Zhou, Willy Susilo, Yi Mu: New Construction of Group Secret Handshakes Based on Pairings. ICICS 2007: 16-30 |
97 | ![]() ![]() ![]() ![]() ![]() ![]() | Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo: Formal Definition and Construction of Nominative Signature. ICICS 2007: 57-68 |
96 | ![]() ![]() ![]() ![]() ![]() ![]() | Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo: (Convertible) Undeniable Signatures Without Random Oracles. ICICS 2007: 83-97 |
95 | ![]() ![]() ![]() ![]() ![]() ![]() | Liang Lu, Jeffrey Horton, Reihaneh Safavi-Naini, Willy Susilo: Transport Layer Identification of Skype Traffic. ICOIN 2007: 465-481 |
94 | ![]() ![]() ![]() ![]() ![]() ![]() | Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen: Certificate Based (Linkable) Ring Signature. ISPEC 2007: 79-92 |
93 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. Inscrypt 2007: 25-39 |
92 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu: Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. Pairing 2007: 367-391 |
91 | ![]() ![]() ![]() ![]() ![]() ![]() | Huafei Zhu, Willy Susilo, Yi Mu: Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. Public Key Cryptography 2007: 134-149 |
90 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi Mu, Willy Susilo, Huafei Zhu: Compact sequential aggregate signatures. SAC 2007: 249-253 |
89 | ![]() ![]() ![]() ![]() ![]() ![]() | Yong Li, Willy Susilo, Yi Mu, Dingyi Pei: Designated Verifier Signature: Definition, Framework and New Constructions. UIC 2007: 1191-1200 |
88 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. WISA 2007: 16-29 |
87 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Hiroaki Kikuchi: Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner. I. J. Network Security 4(3): 288-291 (2007) |
86 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Khin Than Win: Securing personal health information access in mobile healthcare environment through short signature schemes. IJMC 5(2): 215-224 (2007) |
85 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. J. Comput. Sci. Technol. 22(1): 71-74 (2007) |
84 | ![]() ![]() ![]() ![]() ![]() ![]() | Dennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, Duncan S. Wong: Revocable Ring Signature. J. Comput. Sci. Technol. 22(6): 785-794 (2007) |
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang, Zhengtao Jiang: Short Group Signatures Without Random Oracles. J. Comput. Sci. Technol. 22(6): 805-821 (2007) |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Khin Than Win: Security and Access of Health Research Data. J. Medical Systems 31(2): 103-107 (2007) |
2006 | ||
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Rajkumar Buyya, Tianchi Ma, Reihaneh Safavi-Naini, Chris Steketee, Willy Susilo: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006 Australian Computer Society 2006 |
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Man Ho Au, Willy Susilo, Siu-Ming Yiu: Event-Oriented k-Times Revocable-iff-Linked Group Signatures. ACISP 2006: 223-234 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Shidi Xu, Yi Mu, Willy Susilo: Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. ACISP 2006: 99-110 |
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Certificateless Designated Verifier Signature Schemes. AINA (2) 2006: 15-19 |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo: Self-organised group key management for ad hoc networks. ASIACCS 2006: 138-147 |
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Ching Yu Ng, Willy Susilo, Yi Mu: Designated group credentials. ASIACCS 2006: 59-65 |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang: Efficient Signcryption Without Random Oracles. ATC 2006: 449-458 |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang: Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). ATC 2006: 531-540 |
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Lan Yu, Willy Susilo, Reihaneh Safavi-Naini: X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. CANS 2006: 364-380 |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang: Short Linkable Ring Signatures Revisited. EuroPKI 2006: 101-115 |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Yi Mu: Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. EuroPKI 2006: 68-80 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo: Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. Financial Cryptography 2006: 251-265 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2006: 345-354 |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Universal Designated Verifier Signature Without Delegatability. ICICS 2006: 479-498 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen: Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. INDOCRYPT 2006: 364-378 |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini: Multi-party Concurrent Signatures. ISC 2006: 131-145 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. ISC 2006: 217-232 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Short (Identity-Based) Strong Designated Verifier Signature Schemes. ISPEC 2006: 214-225 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Lan Zhou, Willy Susilo, Yi Mu: Three-Round Secret Handshakes Based on ElGamal and DSA. ISPEC 2006: 332-342 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang: Privately Retrieve Data from Large Databases. ISPEC 2006: 367-378 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Yiqun Chen, Willy Susilo, Yi Mu: Identity-based anonymous designated ring signatures. IWCMC 2006: 189-194 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Joseph K. Liu, Willy Susilo, Duncan S. Wong: Ring Signature with Designated Linkability. IWSEC 2006: 104-119 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Ad Hoc Group Signatures. IWSEC 2006: 120-135 |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Proxy Signature Without Random Oracles. MSN 2006: 473-484 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Lan Zhou, Willy Susilo, Yi Mu: Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings. MSN 2006: 521-532 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Man Ho Au, Willy Susilo, Yi Mu: Constant-Size Dynamic k-TAA. SCN 2006: 111-125 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Restricted Universal Designated Verifier Signature. UIC 2006: 874-882 |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Sherman S. M. Chow, Willy Susilo, Tsz Hon Yuen: Escrowed Linkability of Ring Signatures and Its Applications. VIETCRYPT 2006: 175-192 |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Jianyong Huang, Jennifer Seberry, Willy Susilo: On the Internal Structure of Alpha-MAC. VIETCRYPT 2006: 271-285 |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu: A New Signature Scheme Without Random Oracles from Bilinear Pairings. VIETCRYPT 2006: 67-80 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Khin Than Win: Securing electronic health records with broadcast encryption schemes. IJEH 2(2): 175-184 (2006) |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Yiqun Chen, Willy Susilo, Yi Mu: Convertible identity-based anonymous designated ring signatures. IJSN 1(3/4): 218-225 (2006) |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Khin Than Win, Willy Susilo, Yi Mu: Personal Health Record Systems and Their Security Protection. J. Medical Systems 30(4): 309-315 (2006) |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Shidi Xu, Yi Mu, Willy Susilo: Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes. JNW 1(1): 47-53 (2006) |
2005 | ||
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Yi Mu: On the Security of Nominative Signatures. ACISP 2005: 329-335 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Fangguo Zhang, Yi Mu, Willy Susilo: Reducing Security Overhead for Mobile Networks. AINA 2005: 398-403 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Fangguo Zhang, Yi Mu: Privacy-Enhanced Internet Storage. AINA 2005: 603-608 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. AINA 2005: 649-654 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Russell James Ang, Cameron Allen George McDonald, Jianyong Huang: Personal Firewall for Pocket PC 2003: Design & Implementation. AINA 2005: 661-666 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). ASIACRYPT 2005: 644-661 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: On the Security of Certificateless Signature Schemes from Asiacrypt 2003. CANS 2005: 13-25 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: On Securing RTP-Based Streaming Content with Firewalls. CANS 2005: 304-319 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder: Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. EUC Workshops 2005: 423-432 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen: A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. EUC Workshops 2005: 480-489 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen: Identity-Based Universal Designated Verifier Signatures. EUC Workshops 2005: 825-834 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang: Short Designated Verifier Proxy Signature from Pairings. EUC Workshops 2005: 835-844 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Shidi Xu, Yi Mu, Willy Susilo: Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. EUC Workshops 2005: 854-863 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Fangguo Zhang, Willy Susilo, Yi Mu: Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). Financial Cryptography 2005: 45-56 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Sherman S. M. Chow, Willy Susilo: Generic Construction of (Identity-Based) Perfect Concurrent Signatures. ICICS 2005: 194-206 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu: An Efficient Static Blind Ring Signature Scheme. ICISC 2005: 410-423 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Ching Yu Ng, Willy Susilo, Yi Mu: Universal Designated Multi Verifier Signature Schemes. ICPADS (2) 2005: 305-309 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Man Ho Au, Sherman S. M. Chow, Willy Susilo: Short E-Cash. INDOCRYPT 2005: 332-346 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Certificateless Public Key Encryption Without Pairing. ISC 2005: 134-148 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Token-Controlled Public Key Encryption. ISPEC 2005: 386-397 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Shidi Xu, Yi Mu, Willy Susilo: Secure AODV Routing Protocol Using One-Time Signature. MSN 2005: 288-297 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Public Key Cryptography 2005: 380-397 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Yi Mu: Tripartite Concurrent Signatures. SEC 2005: 425-442 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03. Applied Mathematics and Computation 170(2): 1166-1169 (2005) |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Yi Mu: Provably secure fail-stop signature schemes based on RSA. IJWMC 1(1): 53-60 (2005) |
2004 | ||
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Fangguo Zhang, Yi Mu: Identity-Based Strong Designated Verifier Signature Schemes. ACISP 2004: 313-324 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Yi Mu: Deniable Ring Authentication Revisited. ACNS 2004: 149-163 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo: X2Rep: Enhanced Trust Semantics for the XRep Protocol. ACNS 2004: 205-219 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi Mu, Willy Susilo, Yan-Xia Lin, Chun Ruan: Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. ASIAN 2004: 169-181 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi Mu, Fangguo Zhang, Willy Susilo: Deniable Partial Proxy Signatures. ASIAN 2004: 182-194 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Yi Mu, Fangguo Zhang: Perfect Concurrent Signature Schemes. ICICS 2004: 14-26 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. Public Key Cryptography 2004: 277-290 |
2003 | ||
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Yi Mu: Non-interactive Deniable Ring Authentication. ICISC 2003: 386-401 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi Mu, Willy Susilo, Yan-Xia Lin: Identity-Based Broadcasting. INDOCRYPT 2003: 177-190 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. INDOCRYPT 2003: 191-204 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Yi Mu: On Fail-Stop Verifiable Secret Sharing Schemes. Security and Management 2003: 663-667 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Jianyong Huang, Jennifer Seberry: On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). Security and Management 2003: 668-674 |
2002 | ||
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Reihaneh Safavi-Naini: An Efficient Fail-Stop Signature Scheme Based on Factorization. ICISC 2002: 62-74 |
2001 | ||
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: How to Construct Fail-Stop Confirmer Signature Schemes. ACISP 2001: 435-444 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo: On Classifying Conference Key Distribution Protocols. ACISP 2001: 51-59 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: An Efficient Construction for Fail-Stop Signature for Long Messages. J. Inf. Sci. Eng. 17(6): 879-898 (2001) |
2000 | ||
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Key Management for Secure Multicast with Dynamic Controller. ACISP 2000: 178-190 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Fail-Stop Signature for Long Messages. INDOCRYPT 2000: 165-177 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Willy Susilo: Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. ISW 2000: 292-307 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry: A New and Efficient Fail-stop Signature Scheme. Comput. J. 43(5): 430-437 (2000) |
1999 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. ACISP 1999: 103-116 |
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: RSA-Based Fail-Stop Signature Schemes. ICPP Workshops 1999: 161-166 |