Browsing by Author Susilo, Willy

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 27 to 46 of 83 < previous   next >
TitleAuthor(s)Issue DateViews
 
Efficient and Adaptive Procurement Protocol with Purchasing Privacy
Journal:IEEE Transactions on Services Computing
2018
18
Efficient escrow-free identity-based signature
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
15
Efficient non-interactive range proof
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
18
 
2016
43
Efficient semi-static secure broadcast encryption scheme
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014
18
Electronic cash with anonymous user suspension
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
7
 
2015
8
Enhancing location privacy for electric vehicles (at the right time)
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
27
 
Escrowed deniable identification schemes
Journal:International Journal of Security and its Applications
2010
25
Escrowed deniable identification schemes
Proceeding/Conference:Communications in Computer and Information Science
2009
10
Escrowed linkability of ring signatures and its applications
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
14
Fairness in concurrent signatures revisited
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
12
 
2018
13
How to construct identity-based signatures without the key escrow problem
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
7
 
How to construct identity-based signatures without the key escrow problem
Journal:International Journal of Information Security
2010
14
 
2017
20
 
2019
13
 
2014
31
 
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
Journal:IEEE Transactions on Information Forensics and Security
2015
21
Is the notion of divisible on-line/off-line signatures stronger than on-line/off-line signatures?
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
7