|
Search the dblp DataBase
Willy Susilo:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Man Ho Au, Willy Susilo, Siu-Ming Yiu
Event-Oriented k-Times Revocable-iff-Linked Group Signatures. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:223-234 [Conf]
- Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
Key Management for Secure Multicast with Dynamic Controller. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:178-190 [Conf]
- Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
How to Construct Fail-Stop Confirmer Signature Schemes. [Citation Graph (0, 0)][DBLP] ACISP, 2001, pp:435-444 [Conf]
- Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo
On Classifying Conference Key Distribution Protocols. [Citation Graph (0, 0)][DBLP] ACISP, 2001, pp:51-59 [Conf]
- Willy Susilo, Yi Mu
On the Security of Nominative Signatures. [Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:329-335 [Conf]
- Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. [Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:103-116 [Conf]
- Willy Susilo, Fangguo Zhang, Yi Mu
Identity-Based Strong Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP] ACISP, 2004, pp:313-324 [Conf]
- Shidi Xu, Yi Mu, Willy Susilo
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:99-110 [Conf]
- Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo
X2Rep: Enhanced Trust Semantics for the XRep Protocol. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:205-219 [Conf]
- Willy Susilo, Yi Mu
Deniable Ring Authentication Revisited. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:149-163 [Conf]
- Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. [Citation Graph (0, 0)][DBLP] AINA, 2005, pp:649-654 [Conf]
- Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
Certificateless Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP] AINA (2), 2006, pp:15-19 [Conf]
- Willy Susilo, Fangguo Zhang, Yi Mu
Privacy-Enhanced Internet Storage. [Citation Graph (0, 0)][DBLP] AINA, 2005, pp:603-608 [Conf]
- Willy Susilo, Russell James Ang, Cameron Allen George McDonald, Jianyong Huang
Personal Firewall for Pocket PC 2003: Design & Implementation. [Citation Graph (0, 0)][DBLP] AINA, 2005, pp:661-666 [Conf]
- Fangguo Zhang, Yi Mu, Willy Susilo
Reducing Security Overhead for Mobile Networks. [Citation Graph (0, 0)][DBLP] AINA, 2005, pp:398-403 [Conf]
- Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:644-661 [Conf]
- Yi Mu, Willy Susilo, Yan-Xia Lin, Chun Ruan
Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. [Citation Graph (0, 0)][DBLP] ASIAN, 2004, pp:169-181 [Conf]
- Yi Mu, Fangguo Zhang, Willy Susilo
Deniable Partial Proxy Signatures. [Citation Graph (0, 0)][DBLP] ASIAN, 2004, pp:182-194 [Conf]
- Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang
Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). [Citation Graph (0, 0)][DBLP] ATC, 2006, pp:531-540 [Conf]
- Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
Efficient Signcryption Without Random Oracles. [Citation Graph (0, 0)][DBLP] ATC, 2006, pp:449-458 [Conf]
- Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
On the Security of Certificateless Signature Schemes from Asiacrypt 2003. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:13-25 [Conf]
- Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo
On Securing RTP-Based Streaming Content with Firewalls. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:304-319 [Conf]
- Lan Yu, Willy Susilo, Reihaneh Safavi-Naini
X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. [Citation Graph (0, 0)][DBLP] CANS, 2006, pp:364-380 [Conf]
- Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo
Self-organised group key management for ad hoc networks. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:138-147 [Conf]
- Ching Yu Ng, Willy Susilo, Yi Mu
Designated group credentials. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:59-65 [Conf]
- Joonsang Baek, Willy Susilo, Jianying Zhou
New constructions of fuzzy identity-based encryption. [Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:368-370 [Conf]
- Willy Susilo, Jianyong Huang, Jennifer Seberry
On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). [Citation Graph (0, 0)][DBLP] Security and Management, 2003, pp:668-674 [Conf]
- Willy Susilo, Yi Mu
On Fail-Stop Verifiable Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Security and Management, 2003, pp:663-667 [Conf]
- Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
Compact E-Cash from Bounded Accumulator. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:178-195 [Conf]
- Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang
Short Designated Verifier Proxy Signature from Pairings. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:835-844 [Conf]
- Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen
A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:480-489 [Conf]
- Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:423-432 [Conf]
- Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen
Identity-Based Universal Designated Verifier Signatures. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:825-834 [Conf]
- Shidi Xu, Yi Mu, Willy Susilo
Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:854-863 [Conf]
- Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang
Short Linkable Ring Signatures Revisited. [Citation Graph (0, 0)][DBLP] EuroPKI, 2006, pp:101-115 [Conf]
- Willy Susilo, Yi Mu
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. [Citation Graph (0, 0)][DBLP] EuroPKI, 2006, pp:68-80 [Conf]
- Fangguo Zhang, Willy Susilo, Yi Mu
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:45-56 [Conf]
- Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2006, pp:251-265 [Conf]
- Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
Efficient Partially Blind Signatures with Provable Security. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:345-354 [Conf]
- Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu
Universal Designated Verifier Signature Without Delegatability. [Citation Graph (0, 0)][DBLP] ICICS, 2006, pp:479-498 [Conf]
- Sherman S. M. Chow, Willy Susilo
Generic Construction of (Identity-Based) Perfect Concurrent Signatures. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:194-206 [Conf]
- Willy Susilo, Yi Mu, Fangguo Zhang
Perfect Concurrent Signature Schemes. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:14-26 [Conf]
- Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu
An Efficient Static Blind Ring Signature Scheme. [Citation Graph (0, 0)][DBLP] ICISC, 2005, pp:410-423 [Conf]
- Willy Susilo, Yi Mu
Non-interactive Deniable Ring Authentication. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:386-401 [Conf]
- Willy Susilo, Reihaneh Safavi-Naini
An Efficient Fail-Stop Signature Scheme Based on Factorization. [Citation Graph (0, 0)][DBLP] ICISC, 2002, pp:62-74 [Conf]
- Ching Yu Ng, Willy Susilo, Yi Mu
Universal Designated Multi Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP] ICPADS (2), 2005, pp:305-309 [Conf]
- Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk
RSA-Based Fail-Stop Signature Schemes. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 1999, pp:161-166 [Conf]
- Yi Mu, Willy Susilo, Yan-Xia Lin
Identity-Based Broadcasting. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:177-190 [Conf]
- Man Ho Au, Sherman S. M. Chow, Willy Susilo
Short E-Cash. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2005, pp:332-346 [Conf]
- Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2006, pp:364-378 [Conf]
- Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
Fail-Stop Signature for Long Messages. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2000, pp:165-177 [Conf]
- Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:191-204 [Conf]
- Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
Token-Controlled Public Key Encryption. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:386-397 [Conf]
- Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen
Certificate Based (Linkable) Ring Signature. [Citation Graph (0, 0)][DBLP] ISPEC, 2007, pp:79-92 [Conf]
- Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
Short (Identity-Based) Strong Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:214-225 [Conf]
- Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
Privately Retrieve Data from Large Databases. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:367-378 [Conf]
- Lan Zhou, Willy Susilo, Yi Mu
Three-Round Secret Handshakes Based on ElGamal and DSA. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:332-342 [Conf]
- Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
Certificateless Public Key Encryption Without Pairing. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:134-148 [Conf]
- Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:217-232 [Conf]
- Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini
Multi-party Concurrent Signatures. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:131-145 [Conf]
- Reihaneh Safavi-Naini, Willy Susilo
Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:292-307 [Conf]
- Joseph K. Liu, Willy Susilo, Duncan S. Wong
Ring Signature with Designated Linkability. [Citation Graph (0, 0)][DBLP] IWSEC, 2006, pp:104-119 [Conf]
- Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
Ad Hoc Group Signatures. [Citation Graph (0, 0)][DBLP] IWSEC, 2006, pp:120-135 [Conf]
- Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu
Proxy Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP] MSN, 2006, pp:473-484 [Conf]
- Shidi Xu, Yi Mu, Willy Susilo
Secure AODV Routing Protocol Using One-Time Signature. [Citation Graph (0, 0)][DBLP] MSN, 2005, pp:288-297 [Conf]
- Lan Zhou, Willy Susilo, Yi Mu
Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings. [Citation Graph (0, 0)][DBLP] MSN, 2006, pp:521-532 [Conf]
- Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2005, pp:380-397 [Conf]
- Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
An Efficient Signature Scheme from Bilinear Pairings and Its Applications. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2004, pp:277-290 [Conf]
- Yi Mu, Willy Susilo, Huafei Zhu
Compact sequential aggregate signatures. [Citation Graph (0, 0)][DBLP] SAC, 2007, pp:249-253 [Conf]
- Man Ho Au, Willy Susilo, Yi Mu
Constant-Size Dynamic k-TAA. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:111-125 [Conf]
- Willy Susilo, Yi Mu
Tripartite Concurrent Signatures. [Citation Graph (0, 0)][DBLP] SEC, 2005, pp:425-442 [Conf]
- Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
Restricted Universal Designated Verifier Signature. [Citation Graph (0, 0)][DBLP] UIC, 2006, pp:874-882 [Conf]
- Sherman S. M. Chow, Willy Susilo, Tsz Hon Yuen
Escrowed Linkability of Ring Signatures and Its Applications. [Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:175-192 [Conf]
- Jianyong Huang, Jennifer Seberry, Willy Susilo
On the Internal Structure of Alpha-MAC. [Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:271-285 [Conf]
- Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu
A New Signature Scheme Without Random Oracles from Bilinear Pairings. [Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:67-80 [Conf]
- Willy Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry
A New and Efficient Fail-stop Signature Scheme. [Citation Graph (0, 0)][DBLP] Comput. J., 2000, v:43, n:5, pp:430-437 [Journal]
- Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
An Efficient Construction for Fail-Stop Signature for Long Messages. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2001, v:17, n:6, pp:879-898 [Journal]
- Qiong Ren, Yi Mu, Willy Susilo
SEFAP: An Email System for Anti-Phishing. [Citation Graph (0, 0)][DBLP] ACIS-ICIS, 2007, pp:782-787 [Conf]
- Man Ho Au, Willy Susilo, Yi Mu
Practical Compact E-Cash. [Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:431-445 [Conf]
- Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu
Certificateless Signature Revisited. [Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:308-322 [Conf]
- Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. [Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:18-30 [Conf]
- Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. [Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:65-86 [Conf]
- Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang
Identity-Based Proxy Signature from Pairings. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:22-31 [Conf]
- Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin
Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:32-41 [Conf]
- Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini
Achieving Mobility and Anonymity in IP-Based Networks. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:60-79 [Conf]
- Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu
A Generic Construction for Universally-Convertible Undeniable Signatures. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:15-33 [Conf]
- Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu
Certificate-Based Signature: Security Model and Efficient Construction. [Citation Graph (0, 0)][DBLP] EuroPKI, 2007, pp:110-125 [Conf]
- Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
Efficient Partially Blind Signatures with Provable Security. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2007, pp:1096-1105 [Conf]
- Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo
Formal Definition and Construction of Nominative Signature. [Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:57-68 [Conf]
- Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo
(Convertible) Undeniable Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:83-97 [Conf]
- Lan Zhou, Willy Susilo, Yi Mu
New Construction of Group Secret Handshakes Based on Pairings. [Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:16-30 [Conf]
- Huafei Zhu, Willy Susilo, Yi Mu
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:134-149 [Conf]
- Yong Li 0002, Willy Susilo, Yi Mu, Dingyi Pei
Designated Verifier Signature: Definition, Framework and New Constructions. [Citation Graph (0, 0)][DBLP] UIC, 2007, pp:1191-1200 [Conf]
- Yiqun Chen, Willy Susilo, Yi Mu
Identity-based anonymous designated ring signatures. [Citation Graph (0, 0)][DBLP] IWCMC, 2006, pp:189-194 [Conf]
- Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. [Citation Graph (0, 0)][DBLP] Pairing, 2007, pp:367-391 [Conf]
- Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:1, pp:71-74 [Journal]
Constructing an Authentication Token to Access External Services in Service Aggregation. [Citation Graph (, )][DBLP]
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. [Citation Graph (, )][DBLP]
Traceable and Retrievable Identity-Based Encryption. [Citation Graph (, )][DBLP]
Broadcast Attacks against Lattice-Based Cryptosystems. [Citation Graph (, )][DBLP]
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. [Citation Graph (, )][DBLP]
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks. [Citation Graph (, )][DBLP]
Ambiguous Optimistic Fair Exchange. [Citation Graph (, )][DBLP]
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. [Citation Graph (, )][DBLP]
Sanitizable Signatures Revisited. [Citation Graph (, )][DBLP]
Improved searchable public key encryption with designated tester. [Citation Graph (, )][DBLP]
Attribute-based signature and its applications. [Citation Graph (, )][DBLP]
Privacy for Private Key in Signatures. [Citation Graph (, )][DBLP]
Publicly Verifiable Privacy-Preserving Group Decryption. [Citation Graph (, )][DBLP]
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. [Citation Graph (, )][DBLP]
Efficient Non-interactive Range Proof. [Citation Graph (, )][DBLP]
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. [Citation Graph (, )][DBLP]
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. [Citation Graph (, )][DBLP]
RFID Privacy Models Revisited. [Citation Graph (, )][DBLP]
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. [Citation Graph (, )][DBLP]
New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. [Citation Graph (, )][DBLP]
Asymmetric Group Key Agreement. [Citation Graph (, )][DBLP]
Practical Anonymous Divisible E-Cash from Bounded Accumulators. [Citation Graph (, )][DBLP]
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships. [Citation Graph (, )][DBLP]
Enhanced Target Collision Resistant Hash Functions Revisited. [Citation Graph (, )][DBLP]
Public Key Encryption with Keyword Search Revisited. [Citation Graph (, )][DBLP]
Policy-Controlled Signatures. [Citation Graph (, )][DBLP]
Online/Offline Ring Signature Scheme. [Citation Graph (, )][DBLP]
How to Balance Privacy with Authenticity. [Citation Graph (, )][DBLP]
Transport Layer Identification of Skype Traffic. [Citation Graph (, )][DBLP]
A Generic Construction of Identity-Based Online/Offline Signcryption. [Citation Graph (, )][DBLP]
Ranking Attack Graphs with Graph Neural Networks. [Citation Graph (, )][DBLP]
On the Security of NOEKEON against Side Channel Cube Attacks. [Citation Graph (, )][DBLP]
Certificate-Based Signature Schemes without Pairings or Random Oracles. [Citation Graph (, )][DBLP]
A Five-Round Algebraic Property of the Advanced Encryption Standard. [Citation Graph (, )][DBLP]
Universal Designated Verifier Signatures with Threshold-Signers. [Citation Graph (, )][DBLP]
Identity-Based On-Line/Off-Line Signcryption. [Citation Graph (, )][DBLP]
A Digital Signature Scheme Based on CVPinfinity. [Citation Graph (, )][DBLP]
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. [Citation Graph (, )][DBLP]
Improving Software Testing Cost-Effectiveness through Dynamic Partitioning. [Citation Graph (, )][DBLP]
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). [Citation Graph (, )][DBLP]
Recursive Lattice Reduction. [Citation Graph (, )][DBLP]
Differential Fault Analysis of LEX. [Citation Graph (, )][DBLP]
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. [Citation Graph (, )][DBLP]
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. [Citation Graph (, )][DBLP]
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles. [Citation Graph (, )][DBLP]
Server-Aided Verification Signatures: Definitions and New Constructions. [Citation Graph (, )][DBLP]
How to Prove Security of a Signature with a Tighter Security Reduction. [Citation Graph (, )][DBLP]
Anonymous Conditional Proxy Re-encryption without Random Oracle. [Citation Graph (, )][DBLP]
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? [Citation Graph (, )][DBLP]
Improvement of Lattice-Based Cryptography Using CRT. [Citation Graph (, )][DBLP]
Search in 0.022secs, Finished in 0.027secs
|