Browsing by Author Susilo, Willy

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 67 to 83 of 83 < previous 
TitleAuthor(s)Issue DateViews
 
2015
21
 
2015
18
 
2014
9
Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model
Proceeding/Conference:eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
2007
9
Server-aided signatures verification secure against collusion attack
Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
2011
9
Server-aided signatures verification secure against collusion attack
Proceeding/Conference:Information Security Technical Report
2013
13
Short e-cash
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2005
7
Short generic transformation to strongly unforgeable signature in the standard model
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
9
Short linkable ring signatures revisited
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
13
(Strong) multi-designated verifiers signatures secure against rogue key attack
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
7
 
(Strong) multidesignated verifiers signatures secure against rogue key attack
Journal:Concurrency Computation: Practice and Experience
2014
15
Threshold ring signature without random oracles
Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
2011
17
Towards a cryptographic treatment of publish/subscribe systems
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
7
 
2014
15
Traceable and retrievable identity-based encryption
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008
11
Two-party (blind) ring signatures and their applications
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014
8
Visual authentication based on visual cryptography using mobile devices
Book:Protecting Mobile Networks and Devices: Challenges and Solutions
2016
48