Browsing by Author Susilo, Willy

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 17 of 17
TitleAuthor(s)Issue DateViews
 
2017
22
 
2016
18
Certificate based (linkable) ring signature
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
13
Concurrent signatures with fully negotiable binding control
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
8
Constant-size id-based linkable and revocable-iff-linked ring signature
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
20
(Convertible) undeniable signatures without random oracles
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
7
Efficient non-interactive range proof
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
10
 
2016
16
Escrowed linkability of ring signatures and its applications
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
9
 
How to construct identity-based signatures without the key escrow problem
Journal:International Journal of Information Security
2010
8
How to construct identity-based signatures without the key escrow problem
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
3
 
2014
12
 
2015
26
Sanitizable signatures revisited
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008
3
Threshold ring signature without random oracles
Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
2011
7
 
2014
9
Towards a cryptographic treatment of publish/subscribe systems
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
3