The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Willy Susilo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Man Ho Au, Willy Susilo, Siu-Ming Yiu
    Event-Oriented k-Times Revocable-iff-Linked Group Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:223-234 [Conf]
  2. Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
    Key Management for Secure Multicast with Dynamic Controller. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:178-190 [Conf]
  3. Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
    How to Construct Fail-Stop Confirmer Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:435-444 [Conf]
  4. Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo
    On Classifying Conference Key Distribution Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:51-59 [Conf]
  5. Willy Susilo, Yi Mu
    On the Security of Nominative Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:329-335 [Conf]
  6. Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk
    Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:103-116 [Conf]
  7. Willy Susilo, Fangguo Zhang, Yi Mu
    Identity-Based Strong Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:313-324 [Conf]
  8. Shidi Xu, Yi Mu, Willy Susilo
    Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:99-110 [Conf]
  9. Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo
    X2Rep: Enhanced Trust Semantics for the XRep Protocol. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:205-219 [Conf]
  10. Willy Susilo, Yi Mu
    Deniable Ring Authentication Revisited. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:149-163 [Conf]
  11. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:649-654 [Conf]
  12. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Certificateless Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:15-19 [Conf]
  13. Willy Susilo, Fangguo Zhang, Yi Mu
    Privacy-Enhanced Internet Storage. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:603-608 [Conf]
  14. Willy Susilo, Russell James Ang, Cameron Allen George McDonald, Jianyong Huang
    Personal Firewall for Pocket PC 2003: Design & Implementation. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:661-666 [Conf]
  15. Fangguo Zhang, Yi Mu, Willy Susilo
    Reducing Security Overhead for Mobile Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:398-403 [Conf]
  16. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:644-661 [Conf]
  17. Yi Mu, Willy Susilo, Yan-Xia Lin, Chun Ruan
    Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2004, pp:169-181 [Conf]
  18. Yi Mu, Fangguo Zhang, Willy Susilo
    Deniable Partial Proxy Signatures. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2004, pp:182-194 [Conf]
  19. Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang
    Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:531-540 [Conf]
  20. Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
    Efficient Signcryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:449-458 [Conf]
  21. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    On the Security of Certificateless Signature Schemes from Asiacrypt 2003. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:13-25 [Conf]
  22. Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo
    On Securing RTP-Based Streaming Content with Firewalls. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:304-319 [Conf]
  23. Lan Yu, Willy Susilo, Reihaneh Safavi-Naini
    X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:364-380 [Conf]
  24. Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo
    Self-organised group key management for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:138-147 [Conf]
  25. Ching Yu Ng, Willy Susilo, Yi Mu
    Designated group credentials. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:59-65 [Conf]
  26. Joonsang Baek, Willy Susilo, Jianying Zhou
    New constructions of fuzzy identity-based encryption. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:368-370 [Conf]
  27. Willy Susilo, Jianyong Huang, Jennifer Seberry
    On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:668-674 [Conf]
  28. Willy Susilo, Yi Mu
    On Fail-Stop Verifiable Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:663-667 [Conf]
  29. Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
    Compact E-Cash from Bounded Accumulator. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:178-195 [Conf]
  30. Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang
    Short Designated Verifier Proxy Signature from Pairings. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:835-844 [Conf]
  31. Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen
    A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:480-489 [Conf]
  32. Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder
    Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:423-432 [Conf]
  33. Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen
    Identity-Based Universal Designated Verifier Signatures. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:825-834 [Conf]
  34. Shidi Xu, Yi Mu, Willy Susilo
    Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:854-863 [Conf]
  35. Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang
    Short Linkable Ring Signatures Revisited. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:101-115 [Conf]
  36. Willy Susilo, Yi Mu
    Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:68-80 [Conf]
  37. Fangguo Zhang, Willy Susilo, Yi Mu
    Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:45-56 [Conf]
  38. Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo
    Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:251-265 [Conf]
  39. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
    Efficient Partially Blind Signatures with Provable Security. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:345-354 [Conf]
  40. Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu
    Universal Designated Verifier Signature Without Delegatability. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:479-498 [Conf]
  41. Sherman S. M. Chow, Willy Susilo
    Generic Construction of (Identity-Based) Perfect Concurrent Signatures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:194-206 [Conf]
  42. Willy Susilo, Yi Mu, Fangguo Zhang
    Perfect Concurrent Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:14-26 [Conf]
  43. Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu
    An Efficient Static Blind Ring Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:410-423 [Conf]
  44. Willy Susilo, Yi Mu
    Non-interactive Deniable Ring Authentication. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:386-401 [Conf]
  45. Willy Susilo, Reihaneh Safavi-Naini
    An Efficient Fail-Stop Signature Scheme Based on Factorization. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:62-74 [Conf]
  46. Ching Yu Ng, Willy Susilo, Yi Mu
    Universal Designated Multi Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:305-309 [Conf]
  47. Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk
    RSA-Based Fail-Stop Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:161-166 [Conf]
  48. Yi Mu, Willy Susilo, Yan-Xia Lin
    Identity-Based Broadcasting. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:177-190 [Conf]
  49. Man Ho Au, Sherman S. M. Chow, Willy Susilo
    Short E-Cash. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:332-346 [Conf]
  50. Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen
    Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:364-378 [Conf]
  51. Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
    Fail-Stop Signature for Long Messages. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:165-177 [Conf]
  52. Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
    Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:191-204 [Conf]
  53. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    Token-Controlled Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:386-397 [Conf]
  54. Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen
    Certificate Based (Linkable) Ring Signature. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:79-92 [Conf]
  55. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Short (Identity-Based) Strong Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:214-225 [Conf]
  56. Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
    Privately Retrieve Data from Large Databases. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:367-378 [Conf]
  57. Lan Zhou, Willy Susilo, Yi Mu
    Three-Round Secret Handshakes Based on ElGamal and DSA. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:332-342 [Conf]
  58. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    Certificateless Public Key Encryption Without Pairing. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:134-148 [Conf]
  59. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:217-232 [Conf]
  60. Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini
    Multi-party Concurrent Signatures. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:131-145 [Conf]
  61. Reihaneh Safavi-Naini, Willy Susilo
    Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:292-307 [Conf]
  62. Joseph K. Liu, Willy Susilo, Duncan S. Wong
    Ring Signature with Designated Linkability. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:104-119 [Conf]
  63. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
    Ad Hoc Group Signatures. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:120-135 [Conf]
  64. Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu
    Proxy Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:473-484 [Conf]
  65. Shidi Xu, Yi Mu, Willy Susilo
    Secure AODV Routing Protocol Using One-Time Signature. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:288-297 [Conf]
  66. Lan Zhou, Willy Susilo, Yi Mu
    Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:521-532 [Conf]
  67. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:380-397 [Conf]
  68. Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
    An Efficient Signature Scheme from Bilinear Pairings and Its Applications. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:277-290 [Conf]
  69. Yi Mu, Willy Susilo, Huafei Zhu
    Compact sequential aggregate signatures. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:249-253 [Conf]
  70. Man Ho Au, Willy Susilo, Yi Mu
    Constant-Size Dynamic k-TAA. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:111-125 [Conf]
  71. Willy Susilo, Yi Mu
    Tripartite Concurrent Signatures. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:425-442 [Conf]
  72. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Restricted Universal Designated Verifier Signature. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:874-882 [Conf]
  73. Sherman S. M. Chow, Willy Susilo, Tsz Hon Yuen
    Escrowed Linkability of Ring Signatures and Its Applications. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:175-192 [Conf]
  74. Jianyong Huang, Jennifer Seberry, Willy Susilo
    On the Internal Structure of Alpha-MAC. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:271-285 [Conf]
  75. Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu
    A New Signature Scheme Without Random Oracles from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:67-80 [Conf]
  76. Willy Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry
    A New and Efficient Fail-stop Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2000, v:43, n:5, pp:430-437 [Journal]
  77. Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
    An Efficient Construction for Fail-Stop Signature for Long Messages. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:6, pp:879-898 [Journal]
  78. Qiong Ren, Yi Mu, Willy Susilo
    SEFAP: An Email System for Anti-Phishing. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:782-787 [Conf]
  79. Man Ho Au, Willy Susilo, Yi Mu
    Practical Compact E-Cash. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:431-445 [Conf]
  80. Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu
    Certificateless Signature Revisited. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:308-322 [Conf]
  81. Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu
    Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:18-30 [Conf]
  82. Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo
    An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:65-86 [Conf]
  83. Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang
    Identity-Based Proxy Signature from Pairings. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:22-31 [Conf]
  84. Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin
    Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:32-41 [Conf]
  85. Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini
    Achieving Mobility and Anonymity in IP-Based Networks. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:60-79 [Conf]
  86. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu
    A Generic Construction for Universally-Convertible Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:15-33 [Conf]
  87. Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu
    Certificate-Based Signature: Security Model and Efficient Construction. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:110-125 [Conf]
  88. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
    Efficient Partially Blind Signatures with Provable Security. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1096-1105 [Conf]
  89. Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo
    Formal Definition and Construction of Nominative Signature. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:57-68 [Conf]
  90. Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo
    (Convertible) Undeniable Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:83-97 [Conf]
  91. Lan Zhou, Willy Susilo, Yi Mu
    New Construction of Group Secret Handshakes Based on Pairings. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:16-30 [Conf]
  92. Huafei Zhu, Willy Susilo, Yi Mu
    Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:134-149 [Conf]
  93. Yong Li 0002, Willy Susilo, Yi Mu, Dingyi Pei
    Designated Verifier Signature: Definition, Framework and New Constructions. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:1191-1200 [Conf]
  94. Yiqun Chen, Willy Susilo, Yi Mu
    Identity-based anonymous designated ring signatures. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:189-194 [Conf]
  95. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu
    Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. [Citation Graph (0, 0)][DBLP]
    Pairing, 2007, pp:367-391 [Conf]
  96. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:71-74 [Journal]

  97. Constructing an Authentication Token to Access External Services in Service Aggregation. [Citation Graph (, )][DBLP]


  98. Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. [Citation Graph (, )][DBLP]


  99. Traceable and Retrievable Identity-Based Encryption. [Citation Graph (, )][DBLP]


  100. Broadcast Attacks against Lattice-Based Cryptosystems. [Citation Graph (, )][DBLP]


  101. A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. [Citation Graph (, )][DBLP]


  102. Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks. [Citation Graph (, )][DBLP]


  103. Ambiguous Optimistic Fair Exchange. [Citation Graph (, )][DBLP]


  104. A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. [Citation Graph (, )][DBLP]


  105. Sanitizable Signatures Revisited. [Citation Graph (, )][DBLP]


  106. Improved searchable public key encryption with designated tester. [Citation Graph (, )][DBLP]


  107. Attribute-based signature and its applications. [Citation Graph (, )][DBLP]


  108. Privacy for Private Key in Signatures. [Citation Graph (, )][DBLP]


  109. Publicly Verifiable Privacy-Preserving Group Decryption. [Citation Graph (, )][DBLP]


  110. Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. [Citation Graph (, )][DBLP]


  111. Efficient Non-interactive Range Proof. [Citation Graph (, )][DBLP]


  112. Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. [Citation Graph (, )][DBLP]


  113. Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. [Citation Graph (, )][DBLP]


  114. RFID Privacy Models Revisited. [Citation Graph (, )][DBLP]


  115. Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. [Citation Graph (, )][DBLP]


  116. New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. [Citation Graph (, )][DBLP]


  117. Asymmetric Group Key Agreement. [Citation Graph (, )][DBLP]


  118. Practical Anonymous Divisible E-Cash from Bounded Accumulators. [Citation Graph (, )][DBLP]


  119. Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships. [Citation Graph (, )][DBLP]


  120. Enhanced Target Collision Resistant Hash Functions Revisited. [Citation Graph (, )][DBLP]


  121. Public Key Encryption with Keyword Search Revisited. [Citation Graph (, )][DBLP]


  122. Policy-Controlled Signatures. [Citation Graph (, )][DBLP]


  123. Online/Offline Ring Signature Scheme. [Citation Graph (, )][DBLP]


  124. How to Balance Privacy with Authenticity. [Citation Graph (, )][DBLP]


  125. Transport Layer Identification of Skype Traffic. [Citation Graph (, )][DBLP]


  126. A Generic Construction of Identity-Based Online/Offline Signcryption. [Citation Graph (, )][DBLP]


  127. Ranking Attack Graphs with Graph Neural Networks. [Citation Graph (, )][DBLP]


  128. On the Security of NOEKEON against Side Channel Cube Attacks. [Citation Graph (, )][DBLP]


  129. Certificate-Based Signature Schemes without Pairings or Random Oracles. [Citation Graph (, )][DBLP]


  130. A Five-Round Algebraic Property of the Advanced Encryption Standard. [Citation Graph (, )][DBLP]


  131. Universal Designated Verifier Signatures with Threshold-Signers. [Citation Graph (, )][DBLP]


  132. Identity-Based On-Line/Off-Line Signcryption. [Citation Graph (, )][DBLP]


  133. A Digital Signature Scheme Based on CVPinfinity. [Citation Graph (, )][DBLP]


  134. Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. [Citation Graph (, )][DBLP]


  135. Improving Software Testing Cost-Effectiveness through Dynamic Partitioning. [Citation Graph (, )][DBLP]


  136. Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). [Citation Graph (, )][DBLP]


  137. Recursive Lattice Reduction. [Citation Graph (, )][DBLP]


  138. Differential Fault Analysis of LEX. [Citation Graph (, )][DBLP]


  139. Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. [Citation Graph (, )][DBLP]


  140. Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. [Citation Graph (, )][DBLP]


  141. Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles. [Citation Graph (, )][DBLP]


  142. Server-Aided Verification Signatures: Definitions and New Constructions. [Citation Graph (, )][DBLP]


  143. How to Prove Security of a Signature with a Tighter Security Reduction. [Citation Graph (, )][DBLP]


  144. Anonymous Conditional Proxy Re-encryption without Random Oracle. [Citation Graph (, )][DBLP]


  145. Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? [Citation Graph (, )][DBLP]


  146. Improvement of Lattice-Based Cryptography Using CRT. [Citation Graph (, )][DBLP]


Search in 0.027secs, Finished in 0.037secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002