Browsing by Author Susilo, Willy

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 66 to 83 of 83 < previous 
TitleAuthor(s)Issue Date
Sanitizable signatures revisited
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008
 
2015
 
2015
 
2014
Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model
Proceeding/Conference:eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
2007
Server-aided signatures verification secure against collusion attack
Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
2011
Server-aided signatures verification secure against collusion attack
Proceeding/Conference:Information Security Technical Report
2013
Short e-cash
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2005
Short generic transformation to strongly unforgeable signature in the standard model
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
Short linkable ring signatures revisited
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
(Strong) multi-designated verifiers signatures secure against rogue key attack
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
 
(Strong) multidesignated verifiers signatures secure against rogue key attack
Journal:Concurrency Computation: Practice and Experience
2014
Threshold ring signature without random oracles
Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
2011
 
2014
Towards a cryptographic treatment of publish/subscribe systems
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
Traceable and retrievable identity-based encryption
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008
Two-party (blind) ring signatures and their applications
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014
Visual authentication based on visual cryptography using mobile devices
Book:Protecting Mobile Networks and Devices: Challenges and Solutions
2016