Browsing by Author Susilo, Willy

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 40 to 59 of 83 < previous   next >
TitleAuthor(s)Issue Date
 
How to construct identity-based signatures without the key escrow problem
Journal:International Journal of Information Security
2010
How to construct identity-based signatures without the key escrow problem
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
 
2017
 
2019
 
2014
 
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
Journal:IEEE Transactions on Information Forensics and Security
2015
Is the notion of divisible on-line/off-line signatures stronger than on-line/off-line signatures?
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
 
2015
 
Linkable ring signature with unconditional anonymity
Journal:IEEE Transactions on Knowledge and Data Engineering
2014
New insight to preserve online survey accuracy and privacy in big data era
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014
Online/offline ring signature scheme
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
 
2015
Perfect ambiguous optimistic fair exchange
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
PEVTS: Privacy-preserving electric vehicles test-bedding scheme
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2016
PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014
 
PPFilter: Provider Privacy-aware Encrypted Filtering System
Journal:IEEE Transactions on Services Computing
2018
Practical anonymous divisible E-cash from bounded accumulators
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008
Practical compact E-cash
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
Privacy-enhanced keyword search in clouds
Proceeding/Conference:Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013
2013
Privacy-preserved access control for cloud computing
Proceeding/Conference:Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011
2011