Browsing by Author Susilo, Willy

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 83  next >
TitleAuthor(s)Issue DateViews
 
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
Journal:IEEE Transactions on Information Forensics and Security
2014
20
 
2017
19
 
A new payment system for enhancing location privacy of electric vehicles
Journal:IEEE Transactions on Vehicular Technology
2014
21
 
2015
22
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract)
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
A tag based encoding: An efficient encoding for predicate encryption in prime order groups
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016
9
A visual one-time password authentication scheme using mobile devices
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015
12
 
AAC-OT: Accountable Oblivious Transfer with Access Control
Journal:IEEE Transactions on Information Forensics and Security
2015
12
 
2016
3
 
Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext
Journal:IEEE Transactions on Information Forensics and Security
2015
15
An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014
An efficient KP-ABE with short ciphertexts in prime order groups under standard assumption
Proceeding/Conference:ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security
2017
15
 
2014
15
Attribute-based signature and its applications
Proceeding/Conference:Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
2010
Authentication and transaction verification using QR codes with a mobile device
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016
6
Certificate based (linkable) ring signature
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
10
 
2017
14
 
2016
11
 
Collusion-resistance in optimistic fair exchange
Journal:IEEE Transactions on Information Forensics and Security
2014
10
Compact e-cash from bounded accumulator
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007