2009 | ||
---|---|---|
162 | Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009 ACM 2009 | |
161 | Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu: Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. ACISP 2009: 153-170 | |
160 | Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou: A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. ACNS 2009: 143-155 | |
159 | Thomas Plantard, Willy Susilo: Broadcast Attacks against Lattice-Based Cryptosystems. ACNS 2009: 456-472 | |
158 | Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee: Improved searchable public key encryption with designated tester. ASIACCS 2009: 376-379 | |
157 | Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang: A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. CANS 2009: 248-258 | |
156 | Tsz Hon Yuen, Qiong Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Guomin Yang: Efficient Non-interactive Range Proof. COCOON 2009: 138-147 | |
155 | Man Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu: Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. CT-RSA 2009: 295-308 | |
154 | Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. ESORICS 2009: 321-336 | |
153 | Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer: Asymmetric Group Key Agreement. EUROCRYPT 2009: 153-170 | |
152 | Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu: Enhanced Target Collision Resistant Hash Functions Revisited. FSE 2009: 327-344 | |
151 | Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou: Online/Offline Ring Signature Scheme. ICICS 2009: 80-90 | |
150 | Pairat Thorncharoensri, Willy Susilo, Yi Mu: Policy-Controlled Signatures. ICICS 2009: 91-106 | |
149 | Liang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi: Ranking Attack Graphs with Graph Neural Networks. ISPEC 2009: 345-359 | |
148 | Pairat Thorncharoensri, Willy Susilo, Yi Mu: Universal Designated Verifier Signatures with Threshold-Signers. IWSEC 2009: 89-109 | |
147 | Man Ho Au, Willy Susilo, Yi Mu: Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? ProvSec 2009: 129-139 | |
146 | Liming Fang, Willy Susilo, Jiandong Wang: Anonymous Conditional Proxy Re-encryption without Random Oracle. ProvSec 2009: 47-60 | |
145 | Fuchun Guo, Yi Mu, Willy Susilo: How to Prove Security of a Signature with a Tighter Security Reduction. ProvSec 2009: 90-103 | |
144 | Zhi Quan Zhou, Arnaldo Sinaga, Lei Zhao, Willy Susilo, Kai-Yuan Cai: Improving Software Testing Cost-Effectiveness through Dynamic Partitioning. QSIC 2009: 249-258 | |
143 | Pairat Thorncharoensri, Willy Susilo, Yi Mu: Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles. WISA 2009: 94-108 | |
142 | Jianyong Huang, Jennifer Seberry, Willy Susilo: A five-round algebraic property of AES and its application to the ALPHA-MAC. IJACT 1(4): 264-289 (2009) | |
141 | Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Certificate-based Signatures Revisited. J. UCS 15(8): 1659-1684 (2009) | |
140 | Willy Susilo: Short fail-stop signature scheme based on factorization and discrete logarithm assumptions. Theor. Comput. Sci. 410(8-10): 736-744 (2009) | |
2008 | ||
139 | Liqun Chen, Yi Mu, Willy Susilo: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings Springer 2008 | |
138 | Yi Mu, Willy Susilo, Jennifer Seberry: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings Springer 2008 | |
137 | Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang: Traceable and Retrievable Identity-Based Encryption. ACNS 2008: 94-110 | |
136 | Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: Ambiguous Optimistic Fair Exchange. ASIACRYPT 2008: 74-89 | |
135 | Tsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu: Sanitizable Signatures Revisited. CANS 2008: 80-97 | |
134 | Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. CT-RSA 2008: 106-120 | |
133 | Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: RFID Privacy Models Revisited. ESORICS 2008: 251-266 | |
132 | Man Ho Au, Willy Susilo, Yi Mu: Practical Anonymous Divisible E-Cash from Bounded Accumulators. Financial Cryptography 2008: 287-301 | |
131 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Public Key Encryption with Keyword Search Revisited. ICCSA (1) 2008: 1249-1259 | |
130 | Pairat Thorncharoensri, Willy Susilo, Yi Mu: How to Balance Privacy with Authenticity. ICISC 2008: 184-201 | |
129 | Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou: Certificate-Based Signature Schemes without Pairings or Random Oracles. ISC 2008: 285-297 | |
128 | Jianyong Huang, Jennifer Seberry, Willy Susilo: A Five-Round Algebraic Property of the Advanced Encryption Standard. ISC 2008: 316-330 | |
127 | Dongdong Sun, Yi Mu, Willy Susilo: A Generic Construction of Identity-Based Online/Offline Signcryption. ISPA 2008: 707-712 | |
126 | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu: Publicly Verifiable Privacy-Preserving Group Decryption. Inscrypt 2008: 72-83 | |
125 | Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo: Privacy for Private Key in Signatures. Inscrypt 2008: 84-95 | |
124 | Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Server-Aided Verification Signatures: Definitions and New Constructions. ProvSec 2008: 141-155 | |
123 | Thomas Plantard, Willy Susilo, Khin Than Win: A Digital Signature Scheme Based on CVPinfinity. Public Key Cryptography 2008: 288-307 | |
122 | Joonsang Baek, David Galindo, Willy Susilo, Jianying Zhou: Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). SCN 2008: 358-374 | |
121 | Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. WISA 2008: 99-114 | |
120 | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Short Designated Verifier Signature Scheme and Its Identity-based Variant. I. J. Network Security 6(1): 82-93 (2008) | |
119 | Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo: A New and Efficient Signature on Commitment Values. I. J. Network Security 7(1): 100-105 (2008) | |
118 | Thomas Plantard, Willy Susilo, Khin Than Win, Qiong Huang: Efficient lattice-based signature scheme. IJACT 1(2): 120-132 (2008) | |
117 | Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim: Efficient generic on-line/off-line (threshold) signatures without key exposure. Inf. Sci. 178(21): 4192-4203 (2008) | |
116 | Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Secure universal designated verifier signature without random oracles. Int. J. Inf. Sec. 7(3): 171-183 (2008) | |
115 | Haibo Tian, Willy Susilo, Yang Ming, Yumin Wang: A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles. J. Comput. Sci. Technol. 23(5): 832-842 (2008) | |
114 | Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008) | |
2007 | ||
113 | Willy Susilo, Joseph K. Liu, Yi Mu: Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings Springer 2007 | |
112 | Qiong Ren, Yi Mu, Willy Susilo: SEFAP: An Email System for Anti-Phishing. ACIS-ICIS 2007: 782-787 | |
111 | Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu: Certificateless Signature Revisited. ACISP 2007: 308-322 | |
110 | Man Ho Au, Willy Susilo, Yi Mu: Practical Compact E-Cash. ACISP 2007: 431-445 | |
109 | Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu: Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. ACNS 2007: 18-30 | |
108 | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. ACNS 2007: 65-86 | |
107 | Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks. ACSW Frontiers 2007: 183-191 | |
106 | Joonsang Baek, Willy Susilo, Jianying Zhou: New constructions of fuzzy identity-based encryption. ASIACCS 2007: 368-370 | |
105 | Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang: Identity-Based Proxy Signature from Pairings. ATC 2007: 22-31 | |
104 | Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin: Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. ATC 2007: 32-41 | |
103 | Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu: A Generic Construction for Universally-Convertible Undeniable Signatures. CANS 2007: 15-33 | |
102 | Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Achieving Mobility and Anonymity in IP-Based Networks. CANS 2007: 60-79 | |
101 | Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu: Compact E-Cash from Bounded Accumulator. CT-RSA 2007: 178-195 | |
100 | Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu: Certificate-Based Signature: Security Model and Efficient Construction. EuroPKI 2007: 110-125 | |
99 | Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2007: 1096-1105 | |
98 | Lan Zhou, Willy Susilo, Yi Mu: New Construction of Group Secret Handshakes Based on Pairings. ICICS 2007: 16-30 | |
97 | Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo: Formal Definition and Construction of Nominative Signature. ICICS 2007: 57-68 | |
96 | Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo: (Convertible) Undeniable Signatures Without Random Oracles. ICICS 2007: 83-97 | |
95 | Liang Lu, Jeffrey Horton, Reihaneh Safavi-Naini, Willy Susilo: Transport Layer Identification of Skype Traffic. ICOIN 2007: 465-481 | |
94 | Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen: Certificate Based (Linkable) Ring Signature. ISPEC 2007: 79-92 | |
93 | Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. Inscrypt 2007: 25-39 | |
92 | Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu: Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. Pairing 2007: 367-391 | |
91 | Huafei Zhu, Willy Susilo, Yi Mu: Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. Public Key Cryptography 2007: 134-149 | |
90 | Yi Mu, Willy Susilo, Huafei Zhu: Compact sequential aggregate signatures. SAC 2007: 249-253 | |
89 | Yong Li, Willy Susilo, Yi Mu, Dingyi Pei: Designated Verifier Signature: Definition, Framework and New Constructions. UIC 2007: 1191-1200 | |
88 | Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. WISA 2007: 16-29 | |
87 | Willy Susilo, Hiroaki Kikuchi: Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner. I. J. Network Security 4(3): 288-291 (2007) | |
86 | Willy Susilo, Khin Than Win: Securing personal health information access in mobile healthcare environment through short signature schemes. IJMC 5(2): 215-224 (2007) | |
85 | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. J. Comput. Sci. Technol. 22(1): 71-74 (2007) | |
84 | Dennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, Duncan S. Wong: Revocable Ring Signature. J. Comput. Sci. Technol. 22(6): 785-794 (2007) | |
83 | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang, Zhengtao Jiang: Short Group Signatures Without Random Oracles. J. Comput. Sci. Technol. 22(6): 805-821 (2007) | |
82 | Willy Susilo, Khin Than Win: Security and Access of Health Research Data. J. Medical Systems 31(2): 103-107 (2007) | |
2006 | ||
81 | Rajkumar Buyya, Tianchi Ma, Reihaneh Safavi-Naini, Chris Steketee, Willy Susilo: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006 Australian Computer Society 2006 | |
80 | Man Ho Au, Willy Susilo, Siu-Ming Yiu: Event-Oriented k-Times Revocable-iff-Linked Group Signatures. ACISP 2006: 223-234 | |
79 | Shidi Xu, Yi Mu, Willy Susilo: Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. ACISP 2006: 99-110 | |
78 | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Certificateless Designated Verifier Signature Schemes. AINA (2) 2006: 15-19 | |
77 | Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo: Self-organised group key management for ad hoc networks. ASIACCS 2006: 138-147 | |
76 | Ching Yu Ng, Willy Susilo, Yi Mu: Designated group credentials. ASIACCS 2006: 59-65 | |
75 | Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang: Efficient Signcryption Without Random Oracles. ATC 2006: 449-458 | |
74 | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang: Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). ATC 2006: 531-540 | |
73 | Lan Yu, Willy Susilo, Reihaneh Safavi-Naini: X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. CANS 2006: 364-380 | |
72 | Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang: Short Linkable Ring Signatures Revisited. EuroPKI 2006: 101-115 | |
71 | Willy Susilo, Yi Mu: Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. EuroPKI 2006: 68-80 | |
70 | Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo: Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. Financial Cryptography 2006: 251-265 | |
69 | Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2006: 345-354 | |
68 | Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Universal Designated Verifier Signature Without Delegatability. ICICS 2006: 479-498 | |
67 | Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen: Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. INDOCRYPT 2006: 364-378 | |
66 | Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini: Multi-party Concurrent Signatures. ISC 2006: 131-145 | |
65 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. ISC 2006: 217-232 | |
64 | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Short (Identity-Based) Strong Designated Verifier Signature Schemes. ISPEC 2006: 214-225 | |
63 | Lan Zhou, Willy Susilo, Yi Mu: Three-Round Secret Handshakes Based on ElGamal and DSA. ISPEC 2006: 332-342 | |
62 | Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang: Privately Retrieve Data from Large Databases. ISPEC 2006: 367-378 | |
61 | Yiqun Chen, Willy Susilo, Yi Mu: Identity-based anonymous designated ring signatures. IWCMC 2006: 189-194 | |
60 | Joseph K. Liu, Willy Susilo, Duncan S. Wong: Ring Signature with Designated Linkability. IWSEC 2006: 104-119 | |
59 | Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Ad Hoc Group Signatures. IWSEC 2006: 120-135 | |
58 | Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Proxy Signature Without Random Oracles. MSN 2006: 473-484 | |
57 | Lan Zhou, Willy Susilo, Yi Mu: Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings. MSN 2006: 521-532 | |
56 | Man Ho Au, Willy Susilo, Yi Mu: Constant-Size Dynamic k-TAA. SCN 2006: 111-125 | |
55 | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Restricted Universal Designated Verifier Signature. UIC 2006: 874-882 | |
54 | Sherman S. M. Chow, Willy Susilo, Tsz Hon Yuen: Escrowed Linkability of Ring Signatures and Its Applications. VIETCRYPT 2006: 175-192 | |
53 | Jianyong Huang, Jennifer Seberry, Willy Susilo: On the Internal Structure of Alpha-MAC. VIETCRYPT 2006: 271-285 | |
52 | Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu: A New Signature Scheme Without Random Oracles from Bilinear Pairings. VIETCRYPT 2006: 67-80 | |
51 | Willy Susilo, Khin Than Win: Securing electronic health records with broadcast encryption schemes. IJEH 2(2): 175-184 (2006) | |
50 | Yiqun Chen, Willy Susilo, Yi Mu: Convertible identity-based anonymous designated ring signatures. IJSN 1(3/4): 218-225 (2006) | |
49 | Khin Than Win, Willy Susilo, Yi Mu: Personal Health Record Systems and Their Security Protection. J. Medical Systems 30(4): 309-315 (2006) | |
48 | Shidi Xu, Yi Mu, Willy Susilo: Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes. JNW 1(1): 47-53 (2006) | |
2005 | ||
47 | Willy Susilo, Yi Mu: On the Security of Nominative Signatures. ACISP 2005: 329-335 | |
46 | Fangguo Zhang, Yi Mu, Willy Susilo: Reducing Security Overhead for Mobile Networks. AINA 2005: 398-403 | |
45 | Willy Susilo, Fangguo Zhang, Yi Mu: Privacy-Enhanced Internet Storage. AINA 2005: 603-608 | |
44 | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. AINA 2005: 649-654 | |
43 | Willy Susilo, Russell James Ang, Cameron Allen George McDonald, Jianyong Huang: Personal Firewall for Pocket PC 2003: Design & Implementation. AINA 2005: 661-666 | |
42 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). ASIACRYPT 2005: 644-661 | |
41 | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: On the Security of Certificateless Signature Schemes from Asiacrypt 2003. CANS 2005: 13-25 | |
40 | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: On Securing RTP-Based Streaming Content with Firewalls. CANS 2005: 304-319 | |
39 | Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder: Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. EUC Workshops 2005: 423-432 | |
38 | Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen: A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. EUC Workshops 2005: 480-489 | |
37 | Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen: Identity-Based Universal Designated Verifier Signatures. EUC Workshops 2005: 825-834 | |
36 | Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang: Short Designated Verifier Proxy Signature from Pairings. EUC Workshops 2005: 835-844 | |
35 | Shidi Xu, Yi Mu, Willy Susilo: Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. EUC Workshops 2005: 854-863 | |
34 | Fangguo Zhang, Willy Susilo, Yi Mu: Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). Financial Cryptography 2005: 45-56 | |
33 | Sherman S. M. Chow, Willy Susilo: Generic Construction of (Identity-Based) Perfect Concurrent Signatures. ICICS 2005: 194-206 | |
32 | Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu: An Efficient Static Blind Ring Signature Scheme. ICISC 2005: 410-423 | |
31 | Ching Yu Ng, Willy Susilo, Yi Mu: Universal Designated Multi Verifier Signature Schemes. ICPADS (2) 2005: 305-309 | |
30 | Man Ho Au, Sherman S. M. Chow, Willy Susilo: Short E-Cash. INDOCRYPT 2005: 332-346 | |
29 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Certificateless Public Key Encryption Without Pairing. ISC 2005: 134-148 | |
28 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Token-Controlled Public Key Encryption. ISPEC 2005: 386-397 | |
27 | Shidi Xu, Yi Mu, Willy Susilo: Secure AODV Routing Protocol Using One-Time Signature. MSN 2005: 288-297 | |
26 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Public Key Cryptography 2005: 380-397 | |
25 | Willy Susilo, Yi Mu: Tripartite Concurrent Signatures. SEC 2005: 425-442 | |
24 | Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03. Applied Mathematics and Computation 170(2): 1166-1169 (2005) | |
23 | Willy Susilo, Yi Mu: Provably secure fail-stop signature schemes based on RSA. IJWMC 1(1): 53-60 (2005) | |
2004 | ||
22 | Willy Susilo, Fangguo Zhang, Yi Mu: Identity-Based Strong Designated Verifier Signature Schemes. ACISP 2004: 313-324 | |
21 | Willy Susilo, Yi Mu: Deniable Ring Authentication Revisited. ACNS 2004: 149-163 | |
20 | Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo: X2Rep: Enhanced Trust Semantics for the XRep Protocol. ACNS 2004: 205-219 | |
19 | Yi Mu, Willy Susilo, Yan-Xia Lin, Chun Ruan: Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. ASIAN 2004: 169-181 | |
18 | Yi Mu, Fangguo Zhang, Willy Susilo: Deniable Partial Proxy Signatures. ASIAN 2004: 182-194 | |
17 | Willy Susilo, Yi Mu, Fangguo Zhang: Perfect Concurrent Signature Schemes. ICICS 2004: 14-26 | |
16 | Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. Public Key Cryptography 2004: 277-290 | |
2003 | ||
15 | Willy Susilo, Yi Mu: Non-interactive Deniable Ring Authentication. ICISC 2003: 386-401 | |
14 | Yi Mu, Willy Susilo, Yan-Xia Lin: Identity-Based Broadcasting. INDOCRYPT 2003: 177-190 | |
13 | Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. INDOCRYPT 2003: 191-204 | |
12 | Willy Susilo, Yi Mu: On Fail-Stop Verifiable Secret Sharing Schemes. Security and Management 2003: 663-667 | |
11 | Willy Susilo, Jianyong Huang, Jennifer Seberry: On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). Security and Management 2003: 668-674 | |
2002 | ||
10 | Willy Susilo, Reihaneh Safavi-Naini: An Efficient Fail-Stop Signature Scheme Based on Factorization. ICISC 2002: 62-74 | |
2001 | ||
9 | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: How to Construct Fail-Stop Confirmer Signature Schemes. ACISP 2001: 435-444 | |
8 | Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo: On Classifying Conference Key Distribution Protocols. ACISP 2001: 51-59 | |
7 | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: An Efficient Construction for Fail-Stop Signature for Long Messages. J. Inf. Sci. Eng. 17(6): 879-898 (2001) | |
2000 | ||
6 | Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Key Management for Secure Multicast with Dynamic Controller. ACISP 2000: 178-190 | |
5 | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Fail-Stop Signature for Long Messages. INDOCRYPT 2000: 165-177 | |
4 | Reihaneh Safavi-Naini, Willy Susilo: Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. ISW 2000: 292-307 | |
3 | Willy Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry: A New and Efficient Fail-stop Signature Scheme. Comput. J. 43(5): 430-437 (2000) | |
1999 | ||
2 | Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. ACISP 1999: 103-116 | |
1 | Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: RSA-Based Fail-Stop Signature Schemes. ICPP Workshops 1999: 161-166 |