Browsing by Author Susilo, Willy

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 83  next >
TitleAuthor(s)Issue DateViews
 
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
Journal:IEEE Transactions on Information Forensics and Security
2014
23
 
2017
59
 
A new payment system for enhancing location privacy of electric vehicles
Journal:IEEE Transactions on Vehicular Technology
2014
26
 
2015
31
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract)
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
19
A tag based encoding: An efficient encoding for predicate encryption in prime order groups
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016
11
A visual one-time password authentication scheme using mobile devices
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015
14
 
AAC-OT: Accountable Oblivious Transfer with Access Control
Journal:IEEE Transactions on Information Forensics and Security
2015
14
 
2016
32
 
Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext
Journal:IEEE Transactions on Information Forensics and Security
2015
17
An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014
17
An efficient KP-ABE with short ciphertexts in prime order groups under standard assumption
Proceeding/Conference:ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security
2017
17
 
2014
15
Attribute-based signature and its applications
Proceeding/Conference:Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
2010
23
Authentication and transaction verification using QR codes with a mobile device
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016
12
Certificate based (linkable) ring signature
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
31
 
2017
16
 
2016
13
 
Collusion-resistance in optimistic fair exchange
Journal:IEEE Transactions on Information Forensics and Security
2014
12
Compact e-cash from bounded accumulator
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
15