Browsing by Author Susilo, Willy

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 52 to 71 of 83 < previous   next >
TitleAuthor(s)Issue DateViews
Perfect ambiguous optimistic fair exchange
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
13
PEVTS: Privacy-preserving electric vehicles test-bedding scheme
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2016
13
PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014
10
 
PPFilter: Provider Privacy-aware Encrypted Filtering System
Journal:IEEE Transactions on Services Computing
2018
Practical anonymous divisible E-cash from bounded accumulators
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008
Practical compact E-cash
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
Privacy-enhanced keyword search in clouds
Proceeding/Conference:Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013
2013
Privacy-preserved access control for cloud computing
Proceeding/Conference:Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011
2011
5
Proof-of-knowledge of representation of committed value and its applications
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
9
Public cloud data auditing with practical key update and zero knowledge privacy
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016
 
2013
Relations among privacy notions for signcryption and key invisible "sign-then-encrypt"
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
 
Revisiting optimistic fair exchange based on ring signatures
Journal:IEEE Transactions on Information Forensics and Security
2014
13
 
2014
Sanitizable signatures revisited
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008
8
 
2015
 
2015
18
 
2014
9
Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model
Proceeding/Conference:eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
2007
9
Server-aided signatures verification secure against collusion attack
Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
2011
9