Browsing by Author Susilo, Willy

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 62 to 81 of 83 < previous   next >
TitleAuthor(s)Issue Date
 
2013
Relations among privacy notions for signcryption and key invisible "sign-then-encrypt"
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
 
Revisiting optimistic fair exchange based on ring signatures
Journal:IEEE Transactions on Information Forensics and Security
2014
 
2014
Sanitizable signatures revisited
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008
 
2015
 
2015
 
2014
Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model
Proceeding/Conference:eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
2007
Server-aided signatures verification secure against collusion attack
Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
2011
Server-aided signatures verification secure against collusion attack
Proceeding/Conference:Information Security Technical Report
2013
Short e-cash
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2005
Short generic transformation to strongly unforgeable signature in the standard model
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
Short linkable ring signatures revisited
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
(Strong) multi-designated verifiers signatures secure against rogue key attack
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
 
(Strong) multidesignated verifiers signatures secure against rogue key attack
Journal:Concurrency Computation: Practice and Experience
2014
Threshold ring signature without random oracles
Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
2011
 
2014
Towards a cryptographic treatment of publish/subscribe systems
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
Traceable and retrievable identity-based encryption
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008