dblp.uni-trier.dewww.uni-trier.de

Willy Susilo

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
140 Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009 ACM 2009
139EEHyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee: Improved searchable public key encryption with designated tester. ASIACCS 2009: 376-379
138EEMan Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu: Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. CT-RSA 2009: 295-308
137EEQianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer: Asymmetric Group Key Agreement. EUROCRYPT 2009: 153-170
136EELiang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi: Ranking Attack Graphs with Graph Neural Networks. ISPEC 2009: 345-359
135EEWilly Susilo: Short fail-stop signature scheme based on factorization and discrete logarithm assumptions. Theor. Comput. Sci. 410(8-10): 736-744 (2009)
2008
134 Liqun Chen, Yi Mu, Willy Susilo: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings Springer 2008
133 Yi Mu, Willy Susilo, Jennifer Seberry: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings Springer 2008
132EEMan Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang: Traceable and Retrievable Identity-Based Encryption. ACNS 2008: 94-110
131EEQiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: Ambiguous Optimistic Fair Exchange. ASIACRYPT 2008: 74-89
130EETsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu: Sanitizable Signatures Revisited. CANS 2008: 80-97
129EEQiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. CT-RSA 2008: 106-120
128EEChing Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: RFID Privacy Models Revisited. ESORICS 2008: 251-266
127EEMan Ho Au, Willy Susilo, Yi Mu: Practical Anonymous Divisible E-Cash from Bounded Accumulators. Financial Cryptography 2008: 287-301
126EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Public Key Encryption with Keyword Search Revisited. ICCSA (1) 2008: 1249-1259
125EEPairat Thorncharoensri, Willy Susilo, Yi Mu: How to Balance Privacy with Authenticity. ICISC 2008: 184-201
124EEJoseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou: Certificate-Based Signature Schemes without Pairings or Random Oracles. ISC 2008: 285-297
123EEJianyong Huang, Jennifer Seberry, Willy Susilo: A Five-Round Algebraic Property of the Advanced Encryption Standard. ISC 2008: 316-330
122EEDongdong Sun, Yi Mu, Willy Susilo: A Generic Construction of Identity-Based Online/Offline Signcryption. ISPA 2008: 707-712
121EEBo Qin, Qianhong Wu, Willy Susilo, Yi Mu: Publicly Verifiable Privacy-Preserving Group Decryption. Inscrypt 2008: 72-83
120EEQianhong Wu, Bo Qin, Yi Mu, Willy Susilo: Privacy for Private Key in Signatures. Inscrypt 2008: 84-95
119EEWei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Server-Aided Verification Signatures: Definitions and New Constructions. ProvSec 2008: 141-155
118EEThomas Plantard, Willy Susilo, Khin Than Win: A Digital Signature Scheme Based on CVPinfinity. Public Key Cryptography 2008: 288-307
117EEJoonsang Baek, David Galindo, Willy Susilo, Jianying Zhou: Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). SCN 2008: 358-374
116EEWei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. WISA 2008: 99-114
115EEThomas Plantard, Willy Susilo, Khin Than Win, Qiong Huang: Efficient lattice-based signature scheme. IJACT 1(2): 120-132 (2008)
114EEXiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim: Efficient generic on-line/off-line (threshold) signatures without key exposure. Inf. Sci. 178(21): 4192-4203 (2008)
113EEXinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Secure universal designated verifier signature without random oracles. Int. J. Inf. Sec. 7(3): 171-183 (2008)
112EEHaibo Tian, Willy Susilo, Yang Ming, Yu-Min Wang: A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles. J. Comput. Sci. Technol. 23(5): 832-842 (2008)
111 Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008)
2007
110 Willy Susilo, Joseph K. Liu, Yi Mu: Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings Springer 2007
109EEQiong Ren, Yi Mu, Willy Susilo: SEFAP: An Email System for Anti-Phishing. ACIS-ICIS 2007: 782-787
108EEXinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu: Certificateless Signature Revisited. ACISP 2007: 308-322
107EEMan Ho Au, Willy Susilo, Yi Mu: Practical Compact E-Cash. ACISP 2007: 431-445
106EEXiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu: Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. ACNS 2007: 18-30
105EELiang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. ACNS 2007: 65-86
104EERungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks. ACSW Frontiers 2007: 183-191
103EEJoonsang Baek, Willy Susilo, Jianying Zhou: New constructions of fuzzy identity-based encryption. ASIACCS 2007: 368-370
102EEWei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang: Identity-Based Proxy Signature from Pairings. ATC 2007: 22-31
101EEQianhong Wu, Willy Susilo, Yi Mu, Bo Qin: Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. ATC 2007: 32-41
100EEXinyi Huang, Yi Mu, Willy Susilo, Wei Wu: A Generic Construction for Universally-Convertible Undeniable Signatures. CANS 2007: 15-33
99EERungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Achieving Mobility and Anonymity in IP-Based Networks. CANS 2007: 60-79
98EEMan Ho Au, Qianhong Wu, Willy Susilo, Yi Mu: Compact E-Cash from Bounded Accumulator. CT-RSA 2007: 178-195
97EEJiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu: Certificate-Based Signature: Security Model and Efficient Construction. EuroPKI 2007: 110-125
96EEQianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2007: 1096-1105
95EELan Zhou, Willy Susilo, Yi Mu: New Construction of Group Secret Handshakes Based on Pairings. ICICS 2007: 16-30
94EEDennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo: Formal Definition and Construction of Nominative Signature. ICICS 2007: 57-68
93EETsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo: (Convertible) Undeniable Signatures Without Random Oracles. ICICS 2007: 83-97
92EELiang Lu, Jeffrey Horton, Reihaneh Safavi-Naini, Willy Susilo: Transport Layer Identification of Skype Traffic. ICOIN 2007: 465-481
91EEMan Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen: Certificate Based (Linkable) Ring Signature. ISPEC 2007: 79-92
90EEWei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. Inscrypt 2007: 25-39
89EEXinyi Huang, Yi Mu, Willy Susilo, Wei Wu: Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. Pairing 2007: 367-391
88EEHuafei Zhu, Willy Susilo, Yi Mu: Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. Public Key Cryptography 2007: 134-149
87EEYi Mu, Willy Susilo, Huafei Zhu: Compact sequential aggregate signatures. SAC 2007: 249-253
86EEYong Li, Willy Susilo, Yi Mu, Dingyi Pei: Designated Verifier Signature: Definition, Framework and New Constructions. UIC 2007: 1191-1200
85EEWei Wu, Yi Mu, Willy Susilo, Xinyi Huang: Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. WISA 2007: 16-29
84EEWilly Susilo, Khin Than Win: Securing personal health information access in mobile healthcare environment through short signature schemes. IJMC 5(2): 215-224 (2007)
83EEXinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. J. Comput. Sci. Technol. 22(1): 71-74 (2007)
82EEDennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, Duncan S. Wong: Revocable Ring Signature. J. Comput. Sci. Technol. 22(6): 785-794 (2007)
81EEBo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yu-Min Wang, Zheng-Tao Jiang: Short Group Signatures Without Random Oracles. J. Comput. Sci. Technol. 22(6): 805-821 (2007)
2006
80 Rajkumar Buyya, Tianchi Ma, Reihaneh Safavi-Naini, Chris Steketee, Willy Susilo: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006 Australian Computer Society 2006
79EEMan Ho Au, Willy Susilo, Siu-Ming Yiu: Event-Oriented k-Times Revocable-iff-Linked Group Signatures. ACISP 2006: 223-234
78EEShidi Xu, Yi Mu, Willy Susilo: Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. ACISP 2006: 99-110
77EEXinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Certificateless Designated Verifier Signature Schemes. AINA (2) 2006: 15-19
76EELing Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo: Self-organised group key management for ad hoc networks. ASIACCS 2006: 138-147
75EEChing Yu Ng, Willy Susilo, Yi Mu: Designated group credentials. ASIACCS 2006: 59-65
74EEQianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang: Efficient Signcryption Without Random Oracles. ATC 2006: 449-458
73EEBo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang: Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). ATC 2006: 531-540
72EELan Yu, Willy Susilo, Reihaneh Safavi-Naini: X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. CANS 2006: 364-380
71EEMan Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang: Short Linkable Ring Signatures Revisited. EuroPKI 2006: 101-115
70EEWilly Susilo, Yi Mu: Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. EuroPKI 2006: 68-80
69EEXiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo: Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. Financial Cryptography 2006: 251-265
68EEQianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2006: 345-354
67EEXinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Universal Designated Verifier Signature Without Delegatability. ICICS 2006: 479-498
66EEMan Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen: Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. INDOCRYPT 2006: 364-378
65EEDongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini: Multi-party Concurrent Signatures. ISC 2006: 131-145
64EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. ISC 2006: 217-232
63EEXinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Short (Identity-Based) Strong Designated Verifier Signature Schemes. ISPEC 2006: 214-225
62EELan Zhou, Willy Susilo, Yi Mu: Three-Round Secret Handshakes Based on ElGamal and DSA. ISPEC 2006: 332-342
61EEQianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang: Privately Retrieve Data from Large Databases. ISPEC 2006: 367-378
60EEYiqun Chen, Willy Susilo, Yi Mu: Identity-based anonymous designated ring signatures. IWCMC 2006: 189-194
59EEJoseph K. Liu, Willy Susilo, Duncan S. Wong: Ring Signature with Designated Linkability. IWSEC 2006: 104-119
58EEQianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang: Ad Hoc Group Signatures. IWSEC 2006: 120-135
57EEXinyi Huang, Willy Susilo, Yi Mu, Wei Wu: Proxy Signature Without Random Oracles. MSN 2006: 473-484
56EELan Zhou, Willy Susilo, Yi Mu: Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings. MSN 2006: 521-532
55EEMan Ho Au, Willy Susilo, Yi Mu: Constant-Size Dynamic k-TAA. SCN 2006: 111-125
54EEXinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Restricted Universal Designated Verifier Signature. UIC 2006: 874-882
53EESherman S. M. Chow, Willy Susilo, Tsz Hon Yuen: Escrowed Linkability of Ring Signatures and Its Applications. VIETCRYPT 2006: 175-192
52EEJianyong Huang, Jennifer Seberry, Willy Susilo: On the Internal Structure of Alpha-MAC. VIETCRYPT 2006: 271-285
51EEFangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu: A New Signature Scheme Without Random Oracles from Bilinear Pairings. VIETCRYPT 2006: 67-80
50EEWilly Susilo, Khin Than Win: Securing electronic health records with broadcast encryption schemes. IJEH 2(2): 175-184 (2006)
49EEYiqun Chen, Willy Susilo, Yi Mu: Convertible identity-based anonymous designated ring signatures. IJSN 1(3/4): 218-225 (2006)
48EEShidi Xu, Yi Mu, Willy Susilo: Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes. JNW 1(1): 47-53 (2006)
2005
47EEWilly Susilo, Yi Mu: On the Security of Nominative Signatures. ACISP 2005: 329-335
46EEFangguo Zhang, Yi Mu, Willy Susilo: Reducing Security Overhead for Mobile Networks. AINA 2005: 398-403
45EEWilly Susilo, Fangguo Zhang, Yi Mu: Privacy-Enhanced Internet Storage. AINA 2005: 603-608
44EEXinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. AINA 2005: 649-654
43EEWilly Susilo, Russell James Ang, Cameron Allen George McDonald, Jianyong Huang: Personal Firewall for Pocket PC 2003: Design & Implementation. AINA 2005: 661-666
42EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). ASIACRYPT 2005: 644-661
41EEXinyi Huang, Willy Susilo, Yi Mu, Futai Zhang: On the Security of Certificateless Signature Schemes from Asiacrypt 2003. CANS 2005: 13-25
40EELiang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: On Securing RTP-Based Streaming Content with Firewalls. CANS 2005: 304-319
39EEJianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder: Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. EUC Workshops 2005: 423-432
38EEXinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen: A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. EUC Workshops 2005: 480-489
37EEFangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen: Identity-Based Universal Designated Verifier Signatures. EUC Workshops 2005: 825-834
36EEXinyi Huang, Yi Mu, Willy Susilo, Futai Zhang: Short Designated Verifier Proxy Signature from Pairings. EUC Workshops 2005: 835-844
35EEShidi Xu, Yi Mu, Willy Susilo: Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. EUC Workshops 2005: 854-863
34EEFangguo Zhang, Willy Susilo, Yi Mu: Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). Financial Cryptography 2005: 45-56
33EESherman S. M. Chow, Willy Susilo: Generic Construction of (Identity-Based) Perfect Concurrent Signatures. ICICS 2005: 194-206
32EEQianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu: An Efficient Static Blind Ring Signature Scheme. ICISC 2005: 410-423
31EEChing Yu Ng, Willy Susilo, Yi Mu: Universal Designated Multi Verifier Signature Schemes. ICPADS (2) 2005: 305-309
30EEMan Ho Au, Sherman S. M. Chow, Willy Susilo: Short E-Cash. INDOCRYPT 2005: 332-346
29EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Certificateless Public Key Encryption Without Pairing. ISC 2005: 134-148
28EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Token-Controlled Public Key Encryption. ISPEC 2005: 386-397
27EEShidi Xu, Yi Mu, Willy Susilo: Secure AODV Routing Protocol Using One-Time Signature. MSN 2005: 288-297
26EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Public Key Cryptography 2005: 380-397
25 Willy Susilo, Yi Mu: Tripartite Concurrent Signatures. SEC 2005: 425-442
24EEFangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03. Applied Mathematics and Computation 170(2): 1166-1169 (2005)
23EEWilly Susilo, Yi Mu: Provably secure fail-stop signature schemes based on RSA. IJWMC 1(1): 53-60 (2005)
2004
22EEWilly Susilo, Fangguo Zhang, Yi Mu: Identity-Based Strong Designated Verifier Signature Schemes. ACISP 2004: 313-324
21EEWilly Susilo, Yi Mu: Deniable Ring Authentication Revisited. ACNS 2004: 149-163
20EENathan Curtis, Reihaneh Safavi-Naini, Willy Susilo: X2Rep: Enhanced Trust Semantics for the XRep Protocol. ACNS 2004: 205-219
19EEYi Mu, Willy Susilo, Yan-Xia Lin, Chun Ruan: Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. ASIAN 2004: 169-181
18EEYi Mu, Fangguo Zhang, Willy Susilo: Deniable Partial Proxy Signatures. ASIAN 2004: 182-194
17EEWilly Susilo, Yi Mu, Fangguo Zhang: Perfect Concurrent Signature Schemes. ICICS 2004: 14-26
16EEFangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. Public Key Cryptography 2004: 277-290
2003
15EEWilly Susilo, Yi Mu: Non-interactive Deniable Ring Authentication. ICISC 2003: 386-401
14EEYi Mu, Willy Susilo, Yan-Xia Lin: Identity-Based Broadcasting. INDOCRYPT 2003: 177-190
13EEFangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. INDOCRYPT 2003: 191-204
12 Willy Susilo, Yi Mu: On Fail-Stop Verifiable Secret Sharing Schemes. Security and Management 2003: 663-667
11 Willy Susilo, Jianyong Huang, Jennifer Seberry: On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). Security and Management 2003: 668-674
2002
10EEWilly Susilo, Reihaneh Safavi-Naini: An Efficient Fail-Stop Signature Scheme Based on Factorization. ICISC 2002: 62-74
2001
9EEReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: How to Construct Fail-Stop Confirmer Signature Schemes. ACISP 2001: 435-444
8EEShahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo: On Classifying Conference Key Distribution Protocols. ACISP 2001: 51-59
7EEReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: An Efficient Construction for Fail-Stop Signature for Long Messages. J. Inf. Sci. Eng. 17(6): 879-898 (2001)
2000
6 Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Key Management for Secure Multicast with Dynamic Controller. ACISP 2000: 178-190
5EEReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Fail-Stop Signature for Long Messages. INDOCRYPT 2000: 165-177
4EEReihaneh Safavi-Naini, Willy Susilo: Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. ISW 2000: 292-307
3EEWilly Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry: A New and Efficient Fail-stop Signature Scheme. Comput. J. 43(5): 430-437 (2000)
1999
2EEWilly Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. ACISP 1999: 103-116
1EEWilly Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: RSA-Based Fail-Stop Signature Schemes. ICPP Workshops 1999: 161-166

Coauthor Index

1Russell James Ang [43]
2Man Ho Au [30] [55] [66] [71] [79] [91] [93] [98] [107] [127] [132] [138]
3Joonsang Baek [26] [28] [29] [42] [64] [76] [103] [117] [124] [126]
4Martin W. Bunder [39]
5Rajkumar Buyya [80]
6Liqun Chen [111] [134]
7Xiaofeng Chen [37] [38] [51] [69] [106] [114]
8Yiqun Chen [49] [60]
9Sherman S. M. Chow [30] [33] [53] [71]
10Nathan Curtis [20]
11Ed Dawson [111]
12Josep Domingo-Ferrer [137]
13David Galindo [117]
14Marc Gysin [3]
15Markus Hagenbuchner [136]
16Jeffrey Horton [40] [92] [105] [136]
17Jianyong Huang [11] [39] [43] [52] [123]
18Qiong Huang [94] [115] [129] [131] [132]
19Xinyi Huang [36] [38] [41] [44] [54] [57] [63] [67] [77] [83] [85] [89] [90] [94] [97] [100] [102] [108] [113] [116] [119]
20Zheng-Tao Jiang [81]
21Kwangjo Kim [114]
22Hartono Kurnio [6]
23Xuejia Lai [111]
24Dong Hoon Lee [139]
25Hyunrok Lee [114]
26Jiguo Li [97]
27Wanqing Li [140]
28Yong Li [86]
29Yan-Xia Lin [14] [19]
30Dennis Y. W. Liu [82] [94]
31Joseph K. Liu [59] [66] [82] [91] [93] [110] [124] [130] [132]
32Liang Lu [40] [92] [105] [136]
33Ling Luo [76]
34Tianchi Ma [80]
35Masahiro Mambo [111]
36Cameron Allen George McDonald [43]
37Yang Ming [112]
38Atsuko Miyaji [111]
39Yi Mu [12] [14] [15] [17] [18] [19] [21] [22] [23] [25] [27] [31] [32] [34] [35] [36] [37] [38] [41] [44] [45] [46] [47] [48] [49] [51] [54] [55] [56] [57] [58] [60] [61] [62] [63] [67] [68] [69] [70] [73] [74] [75] [77] [78] [81] [82] [83] [85] [86] [87] [88] [89] [90] [94] [95] [96] [97] [98] [100] [101] [102] [106] [107] [108] [109] [110] [111] [113] [114] [116] [119] [120] [121] [122] [125] [127] [128] [130] [133] [134] [137] [138]
40Ching Yu Ng [31] [75] [128]
41Jong Hwan Park [139]
42Dingyi Pei [86]
43Josef Pieprzyk [1] [2]
44Thomas Plantard [115] [118]
45David Pointcheval [111]
46Bart Preneel [111]
47Bo Qin [73] [81] [101] [120] [121] [137]
48Qiong Ren [109]
49Hyun Sook Rhee [139]
50Chun Ruan [19]
51Shahrokh Saeednia [8]
52Reihaneh Safavi-Naini [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [13] [16] [20] [24] [26] [28] [29] [40] [42] [64] [65] [72] [76] [80] [92] [99] [104] [105] [126] [128] [136] [140]
53Jennifer Seberry (Jennifer Seberry Wallis) [3] [11] [39] [52] [102] [123] [133]
54Nigel P. Smart [111]
55Chris Steketee [80]
56Dongdong Sun [122]
57Pairat Thorncharoensri [125]
58Haibo Tian [112] [114]
59Dongvu Tonien [65]
60Patrick P. Tsang [71] [138]
61Ah Chung Tsoi [136]
62Udaya Kiran Tupakula [140]
63Vijay Varadharajan [140]
64Guilin Wang [94]
65Huaxiong Wang [5] [6] [7] [9] [111]
66Yu-Min Wang [81] [112]
67Yumin Wang [73]
68Baodian Wei [114]
69Rungrat Wiangsripanawan [99] [104]
70Khin Than Win [50] [84] [115] [118]
71Duncan S. Wong [59] [82] [94] [108] [111] [129] [131] [132]
72Qianhong Wu [32] [58] [61] [68] [73] [74] [81] [96] [97] [98] [101] [120] [121] [137]
73Wei Wu [57] [67] [85] [89] [90] [100] [102] [108] [113] [116] [119]
74Shidi Xu [27] [35] [48] [78]
75Guomin Yang [129] [131] [132]
76Siu-Ming Yiu [79]
77Sweah Liang Yong [136]
78Lan Yu [72]
79Tsz Hon Yuen [53] [66] [91] [93] [130]
80Fangguo Zhang [13] [16] [17] [18] [22] [24] [32] [34] [37] [38] [45] [46] [51] [58] [61] [68] [69] [74] [96] [106] [114]
81Futai Zhang [36] [41] [44] [54] [63] [77] [83]
82Jianying Zhou [103] [117] [124]
83Lan Zhou [56] [62] [95]
84Huafei Zhu [87] [88]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)