The SCEAS System
| |||||||

## Search the dblp DataBase
Willy Susilo:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Man Ho Au, Willy Susilo, Siu-Ming Yiu
**Event-Oriented**[Citation Graph (0, 0)][DBLP]*k*-Times Revocable-iff-Linked Group Signatures. ACISP, 2006, pp:223-234 [Conf] - Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
**Key Management for Secure Multicast with Dynamic Controller.**[Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:178-190 [Conf] - Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
**How to Construct Fail-Stop Confirmer Signature Schemes.**[Citation Graph (0, 0)][DBLP] ACISP, 2001, pp:435-444 [Conf] - Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo
**On Classifying Conference Key Distribution Protocols.**[Citation Graph (0, 0)][DBLP] ACISP, 2001, pp:51-59 [Conf] - Willy Susilo, Yi Mu
**On the Security of Nominative Signatures.**[Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:329-335 [Conf] - Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk
**Fail-Stop Threshold Signature Schemes Based on Elliptic Curves.**[Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:103-116 [Conf] - Willy Susilo, Fangguo Zhang, Yi Mu
**Identity-Based Strong Designated Verifier Signature Schemes.**[Citation Graph (0, 0)][DBLP] ACISP, 2004, pp:313-324 [Conf] - Shidi Xu, Yi Mu, Willy Susilo
**Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.**[Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:99-110 [Conf] - Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo
**X**[Citation Graph (0, 0)][DBLP]^{2}Rep: Enhanced Trust Semantics for the XRep Protocol. ACNS, 2004, pp:205-219 [Conf] - Willy Susilo, Yi Mu
**Deniable Ring Authentication Revisited.**[Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:149-163 [Conf] - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
**Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World.**[Citation Graph (0, 0)][DBLP] AINA, 2005, pp:649-654 [Conf] - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
**Certificateless Designated Verifier Signature Schemes.**[Citation Graph (0, 0)][DBLP] AINA (2), 2006, pp:15-19 [Conf] - Willy Susilo, Fangguo Zhang, Yi Mu
**Privacy-Enhanced Internet Storage.**[Citation Graph (0, 0)][DBLP] AINA, 2005, pp:603-608 [Conf] - Willy Susilo, Russell James Ang, Cameron Allen George McDonald, Jianyong Huang
**Personal Firewall for Pocket PC 2003: Design & Implementation.**[Citation Graph (0, 0)][DBLP] AINA, 2005, pp:661-666 [Conf] - Fangguo Zhang, Yi Mu, Willy Susilo
**Reducing Security Overhead for Mobile Networks.**[Citation Graph (0, 0)][DBLP] AINA, 2005, pp:398-403 [Conf] - Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
**Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature).**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:644-661 [Conf] - Yi Mu, Willy Susilo, Yan-Xia Lin, Chun Ruan
**Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption.**[Citation Graph (0, 0)][DBLP] ASIAN, 2004, pp:169-181 [Conf] - Yi Mu, Fangguo Zhang, Willy Susilo
**Deniable Partial Proxy Signatures.**[Citation Graph (0, 0)][DBLP] ASIAN, 2004, pp:182-194 [Conf] - Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang
**Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).**[Citation Graph (0, 0)][DBLP] ATC, 2006, pp:531-540 [Conf] - Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
**Efficient Signcryption Without Random Oracles.**[Citation Graph (0, 0)][DBLP] ATC, 2006, pp:449-458 [Conf] - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
**On the Security of Certificateless Signature Schemes from Asiacrypt 2003.**[Citation Graph (0, 0)][DBLP] CANS, 2005, pp:13-25 [Conf] - Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo
**On Securing RTP-Based Streaming Content with Firewalls.**[Citation Graph (0, 0)][DBLP] CANS, 2005, pp:304-319 [Conf] - Lan Yu, Willy Susilo, Reihaneh Safavi-Naini
**X**[Citation Graph (0, 0)][DBLP]^{2BT}Trusted Reputation System: A Robust Mechanism for P2P Networks. CANS, 2006, pp:364-380 [Conf] - Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo
**Self-organised group key management for ad hoc networks.**[Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:138-147 [Conf] - Ching Yu Ng, Willy Susilo, Yi Mu
**Designated group credentials.**[Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:59-65 [Conf] - Joonsang Baek, Willy Susilo, Jianying Zhou
**New constructions of fuzzy identity-based encryption.**[Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:368-370 [Conf] - Willy Susilo, Jianyong Huang, Jennifer Seberry
**On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?).**[Citation Graph (0, 0)][DBLP] Security and Management, 2003, pp:668-674 [Conf] - Willy Susilo, Yi Mu
**On Fail-Stop Verifiable Secret Sharing Schemes.**[Citation Graph (0, 0)][DBLP] Security and Management, 2003, pp:663-667 [Conf] - Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
**Compact E-Cash from Bounded Accumulator.**[Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:178-195 [Conf] - Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang
**Short Designated Verifier Proxy Signature from Pairings.**[Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:835-844 [Conf] - Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen
**A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World.**[Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:480-489 [Conf] - Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder
**Security Analysis of Michael: The IEEE 802.11i Message Integrity Code.**[Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:423-432 [Conf] - Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen
**Identity-Based Universal Designated Verifier Signatures.**[Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:825-834 [Conf] - Shidi Xu, Yi Mu, Willy Susilo
**Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks.**[Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:854-863 [Conf] - Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang
**Short Linkable Ring Signatures Revisited.**[Citation Graph (0, 0)][DBLP] EuroPKI, 2006, pp:101-115 [Conf] - Willy Susilo, Yi Mu
**Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing.**[Citation Graph (0, 0)][DBLP] EuroPKI, 2006, pp:68-80 [Conf] - Fangguo Zhang, Willy Susilo, Yi Mu
**Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures).**[Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:45-56 [Conf] - Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo
**Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.**[Citation Graph (0, 0)][DBLP] Financial Cryptography, 2006, pp:251-265 [Conf] - Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
**Efficient Partially Blind Signatures with Provable Security.**[Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:345-354 [Conf] - Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu
**Universal Designated Verifier Signature Without Delegatability.**[Citation Graph (0, 0)][DBLP] ICICS, 2006, pp:479-498 [Conf] - Sherman S. M. Chow, Willy Susilo
**Generic Construction of (Identity-Based) Perfect Concurrent Signatures.**[Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:194-206 [Conf] - Willy Susilo, Yi Mu, Fangguo Zhang
**Perfect Concurrent Signature Schemes.**[Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:14-26 [Conf] - Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu
**An Efficient Static Blind Ring Signature Scheme.**[Citation Graph (0, 0)][DBLP] ICISC, 2005, pp:410-423 [Conf] - Willy Susilo, Yi Mu
**Non-interactive Deniable Ring Authentication.**[Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:386-401 [Conf] - Willy Susilo, Reihaneh Safavi-Naini
**An Efficient Fail-Stop Signature Scheme Based on Factorization.**[Citation Graph (0, 0)][DBLP] ICISC, 2002, pp:62-74 [Conf] - Ching Yu Ng, Willy Susilo, Yi Mu
**Universal Designated Multi Verifier Signature Schemes.**[Citation Graph (0, 0)][DBLP] ICPADS (2), 2005, pp:305-309 [Conf] - Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk
**RSA-Based Fail-Stop Signature Schemes.**[Citation Graph (0, 0)][DBLP] ICPP Workshops, 1999, pp:161-166 [Conf] - Yi Mu, Willy Susilo, Yan-Xia Lin
**Identity-Based Broadcasting.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:177-190 [Conf] - Man Ho Au, Sherman S. M. Chow, Willy Susilo
**Short E-Cash.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2005, pp:332-346 [Conf] - Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen
**Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2006, pp:364-378 [Conf] - Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
**Fail-Stop Signature for Long Messages.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2000, pp:165-177 [Conf] - Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
**Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:191-204 [Conf] - Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
**Token-Controlled Public Key Encryption.**[Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:386-397 [Conf] - Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen
**Certificate Based (Linkable) Ring Signature.**[Citation Graph (0, 0)][DBLP] ISPEC, 2007, pp:79-92 [Conf] - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
**Short (Identity-Based) Strong Designated Verifier Signature Schemes.**[Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:214-225 [Conf] - Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
**Privately Retrieve Data from Large Databases.**[Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:367-378 [Conf] - Lan Zhou, Willy Susilo, Yi Mu
**Three-Round Secret Handshakes Based on ElGamal and DSA.**[Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:332-342 [Conf] - Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
**Certificateless Public Key Encryption Without Pairing.**[Citation Graph (0, 0)][DBLP] ISC, 2005, pp:134-148 [Conf] - Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
**On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search.**[Citation Graph (0, 0)][DBLP] ISC, 2006, pp:217-232 [Conf] - Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini
**Multi-party Concurrent Signatures.**[Citation Graph (0, 0)][DBLP] ISC, 2006, pp:131-145 [Conf] - Reihaneh Safavi-Naini, Willy Susilo
**Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization.**[Citation Graph (0, 0)][DBLP] ISW, 2000, pp:292-307 [Conf] - Joseph K. Liu, Willy Susilo, Duncan S. Wong
**Ring Signature with Designated Linkability.**[Citation Graph (0, 0)][DBLP] IWSEC, 2006, pp:104-119 [Conf] - Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
**Ad Hoc Group Signatures.**[Citation Graph (0, 0)][DBLP] IWSEC, 2006, pp:120-135 [Conf] - Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu
**Proxy Signature Without Random Oracles.**[Citation Graph (0, 0)][DBLP] MSN, 2006, pp:473-484 [Conf] - Shidi Xu, Yi Mu, Willy Susilo
**Secure AODV Routing Protocol Using One-Time Signature.**[Citation Graph (0, 0)][DBLP] MSN, 2005, pp:288-297 [Conf] - Lan Zhou, Willy Susilo, Yi Mu
**Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings.**[Citation Graph (0, 0)][DBLP] MSN, 2006, pp:521-532 [Conf] - Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
**Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2005, pp:380-397 [Conf] - Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
**An Efficient Signature Scheme from Bilinear Pairings and Its Applications.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2004, pp:277-290 [Conf] - Yi Mu, Willy Susilo, Huafei Zhu
**Compact sequential aggregate signatures.**[Citation Graph (0, 0)][DBLP] SAC, 2007, pp:249-253 [Conf] - Man Ho Au, Willy Susilo, Yi Mu
**Constant-Size Dynamic**[Citation Graph (0, 0)][DBLP]*k*-TAA. SCN, 2006, pp:111-125 [Conf] - Willy Susilo, Yi Mu
**Tripartite Concurrent Signatures.**[Citation Graph (0, 0)][DBLP] SEC, 2005, pp:425-442 [Conf] - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
**Restricted Universal Designated Verifier Signature.**[Citation Graph (0, 0)][DBLP] UIC, 2006, pp:874-882 [Conf] - Sherman S. M. Chow, Willy Susilo, Tsz Hon Yuen
**Escrowed Linkability of Ring Signatures and Its Applications.**[Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:175-192 [Conf] - Jianyong Huang, Jennifer Seberry, Willy Susilo
**On the Internal Structure of Alpha-MAC.**[Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:271-285 [Conf] - Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu
**A New Signature Scheme Without Random Oracles from Bilinear Pairings.**[Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:67-80 [Conf] - Willy Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry
**A New and Efficient Fail-stop Signature Scheme.**[Citation Graph (0, 0)][DBLP] Comput. J., 2000, v:43, n:5, pp:430-437 [Journal] - Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
**An Efficient Construction for Fail-Stop Signature for Long Messages.**[Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2001, v:17, n:6, pp:879-898 [Journal] - Qiong Ren, Yi Mu, Willy Susilo
**SEFAP: An Email System for Anti-Phishing.**[Citation Graph (0, 0)][DBLP] ACIS-ICIS, 2007, pp:782-787 [Conf] - Man Ho Au, Willy Susilo, Yi Mu
**Practical Compact E-Cash.**[Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:431-445 [Conf] - Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu
**Certificateless Signature Revisited.**[Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:308-322 [Conf] - Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu
**Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.**[Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:18-30 [Conf] - Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo
**An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.**[Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:65-86 [Conf] - Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang
**Identity-Based Proxy Signature from Pairings.**[Citation Graph (0, 0)][DBLP] ATC, 2007, pp:22-31 [Conf] - Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin
**Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection.**[Citation Graph (0, 0)][DBLP] ATC, 2007, pp:32-41 [Conf] - Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini
**Achieving Mobility and Anonymity in IP-Based Networks.**[Citation Graph (0, 0)][DBLP] CANS, 2007, pp:60-79 [Conf] - Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu
**A Generic Construction for Universally-Convertible Undeniable Signatures.**[Citation Graph (0, 0)][DBLP] CANS, 2007, pp:15-33 [Conf] - Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu
**Certificate-Based Signature: Security Model and Efficient Construction.**[Citation Graph (0, 0)][DBLP] EuroPKI, 2007, pp:110-125 [Conf] - Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
**Efficient Partially Blind Signatures with Provable Security.**[Citation Graph (0, 0)][DBLP] ICCSA (3), 2007, pp:1096-1105 [Conf] - Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo
**Formal Definition and Construction of Nominative Signature.**[Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:57-68 [Conf] - Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo
**(Convertible) Undeniable Signatures Without Random Oracles.**[Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:83-97 [Conf] - Lan Zhou, Willy Susilo, Yi Mu
**New Construction of Group Secret Handshakes Based on Pairings.**[Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:16-30 [Conf] - Huafei Zhu, Willy Susilo, Yi Mu
**Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:134-149 [Conf] - Yong Li 0002, Willy Susilo, Yi Mu, Dingyi Pei
**Designated Verifier Signature: Definition, Framework and New Constructions.**[Citation Graph (0, 0)][DBLP] UIC, 2007, pp:1191-1200 [Conf] - Yiqun Chen, Willy Susilo, Yi Mu
**Identity-based anonymous designated ring signatures.**[Citation Graph (0, 0)][DBLP] IWCMC, 2006, pp:189-194 [Conf] - Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu
**Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length.**[Citation Graph (0, 0)][DBLP] Pairing, 2007, pp:367-391 [Conf] - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
**Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004.**[Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:1, pp:71-74 [Journal] **Constructing an Authentication Token to Access External Services in Service Aggregation.**[Citation Graph (, )][DBLP]**Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders.**[Citation Graph (, )][DBLP]**Traceable and Retrievable Identity-Based Encryption.**[Citation Graph (, )][DBLP]**Broadcast Attacks against Lattice-Based Cryptosystems.**[Citation Graph (, )][DBLP]**A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.**[Citation Graph (, )][DBLP]**Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks.**[Citation Graph (, )][DBLP]**Ambiguous Optimistic Fair Exchange.**[Citation Graph (, )][DBLP]**A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle.**[Citation Graph (, )][DBLP]**Sanitizable Signatures Revisited.**[Citation Graph (, )][DBLP]**Improved searchable public key encryption with designated tester.**[Citation Graph (, )][DBLP]**Attribute-based signature and its applications.**[Citation Graph (, )][DBLP]**Privacy for Private Key in Signatures.**[Citation Graph (, )][DBLP]**Publicly Verifiable Privacy-Preserving Group Decryption.**[Citation Graph (, )][DBLP]**Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.**[Citation Graph (, )][DBLP]**Efficient Non-interactive Range Proof.**[Citation Graph (, )][DBLP]**Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.**[Citation Graph (, )][DBLP]**Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.**[Citation Graph (, )][DBLP]**RFID Privacy Models Revisited.**[Citation Graph (, )][DBLP]**Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.**[Citation Graph (, )][DBLP]**New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing.**[Citation Graph (, )][DBLP]**Asymmetric Group Key Agreement.**[Citation Graph (, )][DBLP]**Practical Anonymous Divisible E-Cash from Bounded Accumulators.**[Citation Graph (, )][DBLP]**Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.**[Citation Graph (, )][DBLP]**Enhanced Target Collision Resistant Hash Functions Revisited.**[Citation Graph (, )][DBLP]**Public Key Encryption with Keyword Search Revisited.**[Citation Graph (, )][DBLP]**Policy-Controlled Signatures.**[Citation Graph (, )][DBLP]**Online/Offline Ring Signature Scheme.**[Citation Graph (, )][DBLP]**How to Balance Privacy with Authenticity.**[Citation Graph (, )][DBLP]**Transport Layer Identification of Skype Traffic.**[Citation Graph (, )][DBLP]**A Generic Construction of Identity-Based Online/Offline Signcryption.**[Citation Graph (, )][DBLP]**Ranking Attack Graphs with Graph Neural Networks.**[Citation Graph (, )][DBLP]**On the Security of NOEKEON against Side Channel Cube Attacks.**[Citation Graph (, )][DBLP]**Certificate-Based Signature Schemes without Pairings or Random Oracles.**[Citation Graph (, )][DBLP]**A Five-Round Algebraic Property of the Advanced Encryption Standard.**[Citation Graph (, )][DBLP]**Universal Designated Verifier Signatures with Threshold-Signers.**[Citation Graph (, )][DBLP]**Identity-Based On-Line/Off-Line Signcryption.**[Citation Graph (, )][DBLP]**A Digital Signature Scheme Based on CVP**[Citation Graph (, )][DBLP]_{infinity}.**Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.**[Citation Graph (, )][DBLP]**Improving Software Testing Cost-Effectiveness through Dynamic Partitioning.**[Citation Graph (, )][DBLP]**Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework).**[Citation Graph (, )][DBLP]**Recursive Lattice Reduction.**[Citation Graph (, )][DBLP]**Differential Fault Analysis of LEX.**[Citation Graph (, )][DBLP]**Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.**[Citation Graph (, )][DBLP]**Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.**[Citation Graph (, )][DBLP]**Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles.**[Citation Graph (, )][DBLP]**Server-Aided Verification Signatures: Definitions and New Constructions.**[Citation Graph (, )][DBLP]**How to Prove Security of a Signature with a Tighter Security Reduction.**[Citation Graph (, )][DBLP]**Anonymous Conditional Proxy Re-encryption without Random Oracle.**[Citation Graph (, )][DBLP]**Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?**[Citation Graph (, )][DBLP]**Improvement of Lattice-Based Cryptography Using CRT.**[Citation Graph (, )][DBLP]
Search in 0.309secs, Finished in 0.317secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |