Browsing by Author Susilo, Willy

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 21 to 40 of 83 < previous   next >
TitleAuthor(s)Issue Date
Concurrent signatures with fully negotiable binding control
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
Constant-size dynamic k-TAA
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
 
2013
Constant-size id-based linkable and revocable-iff-linked ring signature
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
(Convertible) undeniable signatures without random oracles
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
 
Efficient and Adaptive Procurement Protocol with Purchasing Privacy
Journal:IEEE Transactions on Services Computing
2018
Efficient escrow-free identity-based signature
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
Efficient non-interactive range proof
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
 
2016
Efficient semi-static secure broadcast encryption scheme
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014
Electronic cash with anonymous user suspension
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
 
2015
Enhancing location privacy for electric vehicles (at the right time)
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
 
Escrowed deniable identification schemes
Journal:International Journal of Security and its Applications
2010
Escrowed deniable identification schemes
Proceeding/Conference:Communications in Computer and Information Science
2009
Escrowed linkability of ring signatures and its applications
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
Fairness in concurrent signatures revisited
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
 
2018
 
How to construct identity-based signatures without the key escrow problem
Journal:International Journal of Information Security
2010