Browsing by Author Susilo, Willy

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 27 to 46 of 83 < previous   next >
TitleAuthor(s)Issue Date
 
Efficient and Adaptive Procurement Protocol with Purchasing Privacy
Journal:IEEE Transactions on Services Computing
2018
Efficient escrow-free identity-based signature
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
Efficient non-interactive range proof
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
 
2016
Efficient semi-static secure broadcast encryption scheme
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014
Electronic cash with anonymous user suspension
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
 
2015
Enhancing location privacy for electric vehicles (at the right time)
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
 
Escrowed deniable identification schemes
Journal:International Journal of Security and its Applications
2010
Escrowed deniable identification schemes
Proceeding/Conference:Communications in Computer and Information Science
2009
Escrowed linkability of ring signatures and its applications
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
Fairness in concurrent signatures revisited
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
 
2018
 
How to construct identity-based signatures without the key escrow problem
Journal:International Journal of Information Security
2010
How to construct identity-based signatures without the key escrow problem
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
 
2017
 
2019
 
2014
 
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
Journal:IEEE Transactions on Information Forensics and Security
2015
Is the notion of divisible on-line/off-line signatures stronger than on-line/off-line signatures?
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009