2009 |
140 | | Wanqing Li,
Willy Susilo,
Udaya Kiran Tupakula,
Reihaneh Safavi-Naini,
Vijay Varadharajan:
Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009
ACM 2009 |
139 | EE | Hyun Sook Rhee,
Jong Hwan Park,
Willy Susilo,
Dong Hoon Lee:
Improved searchable public key encryption with designated tester.
ASIACCS 2009: 376-379 |
138 | EE | Man Ho Au,
Patrick P. Tsang,
Willy Susilo,
Yi Mu:
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.
CT-RSA 2009: 295-308 |
137 | EE | Qianhong Wu,
Yi Mu,
Willy Susilo,
Bo Qin,
Josep Domingo-Ferrer:
Asymmetric Group Key Agreement.
EUROCRYPT 2009: 153-170 |
136 | EE | Liang Lu,
Reihaneh Safavi-Naini,
Markus Hagenbuchner,
Willy Susilo,
Jeffrey Horton,
Sweah Liang Yong,
Ah Chung Tsoi:
Ranking Attack Graphs with Graph Neural Networks.
ISPEC 2009: 345-359 |
135 | EE | Willy Susilo:
Short fail-stop signature scheme based on factorization and discrete logarithm assumptions.
Theor. Comput. Sci. 410(8-10): 736-744 (2009) |
2008 |
134 | | Liqun Chen,
Yi Mu,
Willy Susilo:
Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings
Springer 2008 |
133 | | Yi Mu,
Willy Susilo,
Jennifer Seberry:
Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings
Springer 2008 |
132 | EE | Man Ho Au,
Qiong Huang,
Joseph K. Liu,
Willy Susilo,
Duncan S. Wong,
Guomin Yang:
Traceable and Retrievable Identity-Based Encryption.
ACNS 2008: 94-110 |
131 | EE | Qiong Huang,
Guomin Yang,
Duncan S. Wong,
Willy Susilo:
Ambiguous Optimistic Fair Exchange.
ASIACRYPT 2008: 74-89 |
130 | EE | Tsz Hon Yuen,
Willy Susilo,
Joseph K. Liu,
Yi Mu:
Sanitizable Signatures Revisited.
CANS 2008: 80-97 |
129 | EE | Qiong Huang,
Guomin Yang,
Duncan S. Wong,
Willy Susilo:
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.
CT-RSA 2008: 106-120 |
128 | EE | Ching Yu Ng,
Willy Susilo,
Yi Mu,
Reihaneh Safavi-Naini:
RFID Privacy Models Revisited.
ESORICS 2008: 251-266 |
127 | EE | Man Ho Au,
Willy Susilo,
Yi Mu:
Practical Anonymous Divisible E-Cash from Bounded Accumulators.
Financial Cryptography 2008: 287-301 |
126 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Public Key Encryption with Keyword Search Revisited.
ICCSA (1) 2008: 1249-1259 |
125 | EE | Pairat Thorncharoensri,
Willy Susilo,
Yi Mu:
How to Balance Privacy with Authenticity.
ICISC 2008: 184-201 |
124 | EE | Joseph K. Liu,
Joonsang Baek,
Willy Susilo,
Jianying Zhou:
Certificate-Based Signature Schemes without Pairings or Random Oracles.
ISC 2008: 285-297 |
123 | EE | Jianyong Huang,
Jennifer Seberry,
Willy Susilo:
A Five-Round Algebraic Property of the Advanced Encryption Standard.
ISC 2008: 316-330 |
122 | EE | Dongdong Sun,
Yi Mu,
Willy Susilo:
A Generic Construction of Identity-Based Online/Offline Signcryption.
ISPA 2008: 707-712 |
121 | EE | Bo Qin,
Qianhong Wu,
Willy Susilo,
Yi Mu:
Publicly Verifiable Privacy-Preserving Group Decryption.
Inscrypt 2008: 72-83 |
120 | EE | Qianhong Wu,
Bo Qin,
Yi Mu,
Willy Susilo:
Privacy for Private Key in Signatures.
Inscrypt 2008: 84-95 |
119 | EE | Wei Wu,
Yi Mu,
Willy Susilo,
Xinyi Huang:
Server-Aided Verification Signatures: Definitions and New Constructions.
ProvSec 2008: 141-155 |
118 | EE | Thomas Plantard,
Willy Susilo,
Khin Than Win:
A Digital Signature Scheme Based on CVPinfinity.
Public Key Cryptography 2008: 288-307 |
117 | EE | Joonsang Baek,
David Galindo,
Willy Susilo,
Jianying Zhou:
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework).
SCN 2008: 358-374 |
116 | EE | Wei Wu,
Yi Mu,
Willy Susilo,
Xinyi Huang:
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.
WISA 2008: 99-114 |
115 | EE | Thomas Plantard,
Willy Susilo,
Khin Than Win,
Qiong Huang:
Efficient lattice-based signature scheme.
IJACT 1(2): 120-132 (2008) |
114 | EE | Xiaofeng Chen,
Fangguo Zhang,
Haibo Tian,
Baodian Wei,
Willy Susilo,
Yi Mu,
Hyunrok Lee,
Kwangjo Kim:
Efficient generic on-line/off-line (threshold) signatures without key exposure.
Inf. Sci. 178(21): 4192-4203 (2008) |
113 | EE | Xinyi Huang,
Willy Susilo,
Yi Mu,
Wei Wu:
Secure universal designated verifier signature without random oracles.
Int. J. Inf. Sec. 7(3): 171-183 (2008) |
112 | EE | Haibo Tian,
Willy Susilo,
Yang Ming,
Yu-Min Wang:
A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles.
J. Comput. Sci. Technol. 23(5): 832-842 (2008) |
111 | | Liqun Chen,
Willy Susilo,
Huaxiong Wang,
Duncan S. Wong,
Ed Dawson,
Xuejia Lai,
Masahiro Mambo,
Atsuko Miyaji,
Yi Mu,
David Pointcheval,
Bart Preneel,
Nigel P. Smart:
Cryptography in Computer System Security.
J. UCS 14(3): 314-317 (2008) |
2007 |
110 | | Willy Susilo,
Joseph K. Liu,
Yi Mu:
Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings
Springer 2007 |
109 | EE | Qiong Ren,
Yi Mu,
Willy Susilo:
SEFAP: An Email System for Anti-Phishing.
ACIS-ICIS 2007: 782-787 |
108 | EE | Xinyi Huang,
Yi Mu,
Willy Susilo,
Duncan S. Wong,
Wei Wu:
Certificateless Signature Revisited.
ACISP 2007: 308-322 |
107 | EE | Man Ho Au,
Willy Susilo,
Yi Mu:
Practical Compact E-Cash.
ACISP 2007: 431-445 |
106 | EE | Xiaofeng Chen,
Fangguo Zhang,
Willy Susilo,
Yi Mu:
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.
ACNS 2007: 18-30 |
105 | EE | Liang Lu,
Reihaneh Safavi-Naini,
Jeffrey Horton,
Willy Susilo:
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.
ACNS 2007: 65-86 |
104 | EE | Rungrat Wiangsripanawan,
Willy Susilo,
Reihaneh Safavi-Naini:
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks.
ACSW Frontiers 2007: 183-191 |
103 | EE | Joonsang Baek,
Willy Susilo,
Jianying Zhou:
New constructions of fuzzy identity-based encryption.
ASIACCS 2007: 368-370 |
102 | EE | Wei Wu,
Yi Mu,
Willy Susilo,
Jennifer Seberry,
Xinyi Huang:
Identity-Based Proxy Signature from Pairings.
ATC 2007: 22-31 |
101 | EE | Qianhong Wu,
Willy Susilo,
Yi Mu,
Bo Qin:
Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection.
ATC 2007: 32-41 |
100 | EE | Xinyi Huang,
Yi Mu,
Willy Susilo,
Wei Wu:
A Generic Construction for Universally-Convertible Undeniable Signatures.
CANS 2007: 15-33 |
99 | EE | Rungrat Wiangsripanawan,
Willy Susilo,
Reihaneh Safavi-Naini:
Achieving Mobility and Anonymity in IP-Based Networks.
CANS 2007: 60-79 |
98 | EE | Man Ho Au,
Qianhong Wu,
Willy Susilo,
Yi Mu:
Compact E-Cash from Bounded Accumulator.
CT-RSA 2007: 178-195 |
97 | EE | Jiguo Li,
Xinyi Huang,
Yi Mu,
Willy Susilo,
Qianhong Wu:
Certificate-Based Signature: Security Model and Efficient Construction.
EuroPKI 2007: 110-125 |
96 | EE | Qianhong Wu,
Willy Susilo,
Yi Mu,
Fangguo Zhang:
Efficient Partially Blind Signatures with Provable Security.
ICCSA (3) 2007: 1096-1105 |
95 | EE | Lan Zhou,
Willy Susilo,
Yi Mu:
New Construction of Group Secret Handshakes Based on Pairings.
ICICS 2007: 16-30 |
94 | EE | Dennis Y. W. Liu,
Duncan S. Wong,
Xinyi Huang,
Guilin Wang,
Qiong Huang,
Yi Mu,
Willy Susilo:
Formal Definition and Construction of Nominative Signature.
ICICS 2007: 57-68 |
93 | EE | Tsz Hon Yuen,
Man Ho Au,
Joseph K. Liu,
Willy Susilo:
(Convertible) Undeniable Signatures Without Random Oracles.
ICICS 2007: 83-97 |
92 | EE | Liang Lu,
Jeffrey Horton,
Reihaneh Safavi-Naini,
Willy Susilo:
Transport Layer Identification of Skype Traffic.
ICOIN 2007: 465-481 |
91 | EE | Man Ho Au,
Joseph K. Liu,
Willy Susilo,
Tsz Hon Yuen:
Certificate Based (Linkable) Ring Signature.
ISPEC 2007: 79-92 |
90 | EE | Wei Wu,
Yi Mu,
Willy Susilo,
Xinyi Huang:
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.
Inscrypt 2007: 25-39 |
89 | EE | Xinyi Huang,
Yi Mu,
Willy Susilo,
Wei Wu:
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length.
Pairing 2007: 367-391 |
88 | EE | Huafei Zhu,
Willy Susilo,
Yi Mu:
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures.
Public Key Cryptography 2007: 134-149 |
87 | EE | Yi Mu,
Willy Susilo,
Huafei Zhu:
Compact sequential aggregate signatures.
SAC 2007: 249-253 |
86 | EE | Yong Li,
Willy Susilo,
Yi Mu,
Dingyi Pei:
Designated Verifier Signature: Definition, Framework and New Constructions.
UIC 2007: 1191-1200 |
85 | EE | Wei Wu,
Yi Mu,
Willy Susilo,
Xinyi Huang:
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.
WISA 2007: 16-29 |
84 | EE | Willy Susilo,
Khin Than Win:
Securing personal health information access in mobile healthcare environment through short signature schemes.
IJMC 5(2): 215-224 (2007) |
83 | EE | Xinyi Huang,
Willy Susilo,
Yi Mu,
Futai Zhang:
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004.
J. Comput. Sci. Technol. 22(1): 71-74 (2007) |
82 | EE | Dennis Y. W. Liu,
Joseph K. Liu,
Yi Mu,
Willy Susilo,
Duncan S. Wong:
Revocable Ring Signature.
J. Comput. Sci. Technol. 22(6): 785-794 (2007) |
81 | EE | Bo Qin,
Qianhong Wu,
Willy Susilo,
Yi Mu,
Yu-Min Wang,
Zheng-Tao Jiang:
Short Group Signatures Without Random Oracles.
J. Comput. Sci. Technol. 22(6): 805-821 (2007) |
2006 |
80 | | Rajkumar Buyya,
Tianchi Ma,
Reihaneh Safavi-Naini,
Chris Steketee,
Willy Susilo:
The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006
Australian Computer Society 2006 |
79 | EE | Man Ho Au,
Willy Susilo,
Siu-Ming Yiu:
Event-Oriented k-Times Revocable-iff-Linked Group Signatures.
ACISP 2006: 223-234 |
78 | EE | Shidi Xu,
Yi Mu,
Willy Susilo:
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.
ACISP 2006: 99-110 |
77 | EE | Xinyi Huang,
Willy Susilo,
Yi Mu,
Futai Zhang:
Certificateless Designated Verifier Signature Schemes.
AINA (2) 2006: 15-19 |
76 | EE | Ling Luo,
Reihaneh Safavi-Naini,
Joonsang Baek,
Willy Susilo:
Self-organised group key management for ad hoc networks.
ASIACCS 2006: 138-147 |
75 | EE | Ching Yu Ng,
Willy Susilo,
Yi Mu:
Designated group credentials.
ASIACCS 2006: 59-65 |
74 | EE | Qianhong Wu,
Yi Mu,
Willy Susilo,
Fangguo Zhang:
Efficient Signcryption Without Random Oracles.
ATC 2006: 449-458 |
73 | EE | Bo Qin,
Qianhong Wu,
Willy Susilo,
Yi Mu,
Yumin Wang:
Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).
ATC 2006: 531-540 |
72 | EE | Lan Yu,
Willy Susilo,
Reihaneh Safavi-Naini:
X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks.
CANS 2006: 364-380 |
71 | EE | Man Ho Au,
Sherman S. M. Chow,
Willy Susilo,
Patrick P. Tsang:
Short Linkable Ring Signatures Revisited.
EuroPKI 2006: 101-115 |
70 | EE | Willy Susilo,
Yi Mu:
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing.
EuroPKI 2006: 68-80 |
69 | EE | Xiaofeng Chen,
Fangguo Zhang,
Yi Mu,
Willy Susilo:
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.
Financial Cryptography 2006: 251-265 |
68 | EE | Qianhong Wu,
Willy Susilo,
Yi Mu,
Fangguo Zhang:
Efficient Partially Blind Signatures with Provable Security.
ICCSA (3) 2006: 345-354 |
67 | EE | Xinyi Huang,
Willy Susilo,
Yi Mu,
Wei Wu:
Universal Designated Verifier Signature Without Delegatability.
ICICS 2006: 479-498 |
66 | EE | Man Ho Au,
Joseph K. Liu,
Willy Susilo,
Tsz Hon Yuen:
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature.
INDOCRYPT 2006: 364-378 |
65 | EE | Dongvu Tonien,
Willy Susilo,
Reihaneh Safavi-Naini:
Multi-party Concurrent Signatures.
ISC 2006: 131-145 |
64 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search.
ISC 2006: 217-232 |
63 | EE | Xinyi Huang,
Willy Susilo,
Yi Mu,
Futai Zhang:
Short (Identity-Based) Strong Designated Verifier Signature Schemes.
ISPEC 2006: 214-225 |
62 | EE | Lan Zhou,
Willy Susilo,
Yi Mu:
Three-Round Secret Handshakes Based on ElGamal and DSA.
ISPEC 2006: 332-342 |
61 | EE | Qianhong Wu,
Yi Mu,
Willy Susilo,
Fangguo Zhang:
Privately Retrieve Data from Large Databases.
ISPEC 2006: 367-378 |
60 | EE | Yiqun Chen,
Willy Susilo,
Yi Mu:
Identity-based anonymous designated ring signatures.
IWCMC 2006: 189-194 |
59 | EE | Joseph K. Liu,
Willy Susilo,
Duncan S. Wong:
Ring Signature with Designated Linkability.
IWSEC 2006: 104-119 |
58 | EE | Qianhong Wu,
Willy Susilo,
Yi Mu,
Fangguo Zhang:
Ad Hoc Group Signatures.
IWSEC 2006: 120-135 |
57 | EE | Xinyi Huang,
Willy Susilo,
Yi Mu,
Wei Wu:
Proxy Signature Without Random Oracles.
MSN 2006: 473-484 |
56 | EE | Lan Zhou,
Willy Susilo,
Yi Mu:
Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings.
MSN 2006: 521-532 |
55 | EE | Man Ho Au,
Willy Susilo,
Yi Mu:
Constant-Size Dynamic k-TAA.
SCN 2006: 111-125 |
54 | EE | Xinyi Huang,
Willy Susilo,
Yi Mu,
Futai Zhang:
Restricted Universal Designated Verifier Signature.
UIC 2006: 874-882 |
53 | EE | Sherman S. M. Chow,
Willy Susilo,
Tsz Hon Yuen:
Escrowed Linkability of Ring Signatures and Its Applications.
VIETCRYPT 2006: 175-192 |
52 | EE | Jianyong Huang,
Jennifer Seberry,
Willy Susilo:
On the Internal Structure of Alpha-MAC.
VIETCRYPT 2006: 271-285 |
51 | EE | Fangguo Zhang,
Xiaofeng Chen,
Willy Susilo,
Yi Mu:
A New Signature Scheme Without Random Oracles from Bilinear Pairings.
VIETCRYPT 2006: 67-80 |
50 | EE | Willy Susilo,
Khin Than Win:
Securing electronic health records with broadcast encryption schemes.
IJEH 2(2): 175-184 (2006) |
49 | EE | Yiqun Chen,
Willy Susilo,
Yi Mu:
Convertible identity-based anonymous designated ring signatures.
IJSN 1(3/4): 218-225 (2006) |
48 | EE | Shidi Xu,
Yi Mu,
Willy Susilo:
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes.
JNW 1(1): 47-53 (2006) |
2005 |
47 | EE | Willy Susilo,
Yi Mu:
On the Security of Nominative Signatures.
ACISP 2005: 329-335 |
46 | EE | Fangguo Zhang,
Yi Mu,
Willy Susilo:
Reducing Security Overhead for Mobile Networks.
AINA 2005: 398-403 |
45 | EE | Willy Susilo,
Fangguo Zhang,
Yi Mu:
Privacy-Enhanced Internet Storage.
AINA 2005: 603-608 |
44 | EE | Xinyi Huang,
Willy Susilo,
Yi Mu,
Futai Zhang:
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World.
AINA 2005: 649-654 |
43 | EE | Willy Susilo,
Russell James Ang,
Cameron Allen George McDonald,
Jianyong Huang:
Personal Firewall for Pocket PC 2003: Design & Implementation.
AINA 2005: 661-666 |
42 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature).
ASIACRYPT 2005: 644-661 |
41 | EE | Xinyi Huang,
Willy Susilo,
Yi Mu,
Futai Zhang:
On the Security of Certificateless Signature Schemes from Asiacrypt 2003.
CANS 2005: 13-25 |
40 | EE | Liang Lu,
Reihaneh Safavi-Naini,
Jeffrey Horton,
Willy Susilo:
On Securing RTP-Based Streaming Content with Firewalls.
CANS 2005: 304-319 |
39 | EE | Jianyong Huang,
Jennifer Seberry,
Willy Susilo,
Martin W. Bunder:
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code.
EUC Workshops 2005: 423-432 |
38 | EE | Xinyi Huang,
Yi Mu,
Willy Susilo,
Fangguo Zhang,
Xiaofeng Chen:
A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World.
EUC Workshops 2005: 480-489 |
37 | EE | Fangguo Zhang,
Willy Susilo,
Yi Mu,
Xiaofeng Chen:
Identity-Based Universal Designated Verifier Signatures.
EUC Workshops 2005: 825-834 |
36 | EE | Xinyi Huang,
Yi Mu,
Willy Susilo,
Futai Zhang:
Short Designated Verifier Proxy Signature from Pairings.
EUC Workshops 2005: 835-844 |
35 | EE | Shidi Xu,
Yi Mu,
Willy Susilo:
Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks.
EUC Workshops 2005: 854-863 |
34 | EE | Fangguo Zhang,
Willy Susilo,
Yi Mu:
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures).
Financial Cryptography 2005: 45-56 |
33 | EE | Sherman S. M. Chow,
Willy Susilo:
Generic Construction of (Identity-Based) Perfect Concurrent Signatures.
ICICS 2005: 194-206 |
32 | EE | Qianhong Wu,
Fangguo Zhang,
Willy Susilo,
Yi Mu:
An Efficient Static Blind Ring Signature Scheme.
ICISC 2005: 410-423 |
31 | EE | Ching Yu Ng,
Willy Susilo,
Yi Mu:
Universal Designated Multi Verifier Signature Schemes.
ICPADS (2) 2005: 305-309 |
30 | EE | Man Ho Au,
Sherman S. M. Chow,
Willy Susilo:
Short E-Cash.
INDOCRYPT 2005: 332-346 |
29 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Certificateless Public Key Encryption Without Pairing.
ISC 2005: 134-148 |
28 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Token-Controlled Public Key Encryption.
ISPEC 2005: 386-397 |
27 | EE | Shidi Xu,
Yi Mu,
Willy Susilo:
Secure AODV Routing Protocol Using One-Time Signature.
MSN 2005: 288-297 |
26 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption.
Public Key Cryptography 2005: 380-397 |
25 | | Willy Susilo,
Yi Mu:
Tripartite Concurrent Signatures.
SEC 2005: 425-442 |
24 | EE | Fangguo Zhang,
Reihaneh Safavi-Naini,
Willy Susilo:
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03.
Applied Mathematics and Computation 170(2): 1166-1169 (2005) |
23 | EE | Willy Susilo,
Yi Mu:
Provably secure fail-stop signature schemes based on RSA.
IJWMC 1(1): 53-60 (2005) |
2004 |
22 | EE | Willy Susilo,
Fangguo Zhang,
Yi Mu:
Identity-Based Strong Designated Verifier Signature Schemes.
ACISP 2004: 313-324 |
21 | EE | Willy Susilo,
Yi Mu:
Deniable Ring Authentication Revisited.
ACNS 2004: 149-163 |
20 | EE | Nathan Curtis,
Reihaneh Safavi-Naini,
Willy Susilo:
X2Rep: Enhanced Trust Semantics for the XRep Protocol.
ACNS 2004: 205-219 |
19 | EE | Yi Mu,
Willy Susilo,
Yan-Xia Lin,
Chun Ruan:
Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption.
ASIAN 2004: 169-181 |
18 | EE | Yi Mu,
Fangguo Zhang,
Willy Susilo:
Deniable Partial Proxy Signatures.
ASIAN 2004: 182-194 |
17 | EE | Willy Susilo,
Yi Mu,
Fangguo Zhang:
Perfect Concurrent Signature Schemes.
ICICS 2004: 14-26 |
16 | EE | Fangguo Zhang,
Reihaneh Safavi-Naini,
Willy Susilo:
An Efficient Signature Scheme from Bilinear Pairings and Its Applications.
Public Key Cryptography 2004: 277-290 |
2003 |
15 | EE | Willy Susilo,
Yi Mu:
Non-interactive Deniable Ring Authentication.
ICISC 2003: 386-401 |
14 | EE | Yi Mu,
Willy Susilo,
Yan-Xia Lin:
Identity-Based Broadcasting.
INDOCRYPT 2003: 177-190 |
13 | EE | Fangguo Zhang,
Reihaneh Safavi-Naini,
Willy Susilo:
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings.
INDOCRYPT 2003: 191-204 |
12 | | Willy Susilo,
Yi Mu:
On Fail-Stop Verifiable Secret Sharing Schemes.
Security and Management 2003: 663-667 |
11 | | Willy Susilo,
Jianyong Huang,
Jennifer Seberry:
On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?).
Security and Management 2003: 668-674 |
2002 |
10 | EE | Willy Susilo,
Reihaneh Safavi-Naini:
An Efficient Fail-Stop Signature Scheme Based on Factorization.
ICISC 2002: 62-74 |
2001 |
9 | EE | Reihaneh Safavi-Naini,
Willy Susilo,
Huaxiong Wang:
How to Construct Fail-Stop Confirmer Signature Schemes.
ACISP 2001: 435-444 |
8 | EE | Shahrokh Saeednia,
Reihaneh Safavi-Naini,
Willy Susilo:
On Classifying Conference Key Distribution Protocols.
ACISP 2001: 51-59 |
7 | EE | Reihaneh Safavi-Naini,
Willy Susilo,
Huaxiong Wang:
An Efficient Construction for Fail-Stop Signature for Long Messages.
J. Inf. Sci. Eng. 17(6): 879-898 (2001) |
2000 |
6 | | Hartono Kurnio,
Reihaneh Safavi-Naini,
Willy Susilo,
Huaxiong Wang:
Key Management for Secure Multicast with Dynamic Controller.
ACISP 2000: 178-190 |
5 | EE | Reihaneh Safavi-Naini,
Willy Susilo,
Huaxiong Wang:
Fail-Stop Signature for Long Messages.
INDOCRYPT 2000: 165-177 |
4 | EE | Reihaneh Safavi-Naini,
Willy Susilo:
Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization.
ISW 2000: 292-307 |
3 | EE | Willy Susilo,
Reihaneh Safavi-Naini,
Marc Gysin,
Jennifer Seberry:
A New and Efficient Fail-stop Signature Scheme.
Comput. J. 43(5): 430-437 (2000) |
1999 |
2 | EE | Willy Susilo,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves.
ACISP 1999: 103-116 |
1 | EE | Willy Susilo,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
RSA-Based Fail-Stop Signature Schemes.
ICPP Workshops 1999: 161-166 |