Willy Susilo

According to our database1, Willy Susilo
  • authored at least 501 papers between 1999 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Anonymous and Traceable Group Data Sharing in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2018

A cost-effective software testing strategy employing online feedback information.
Inf. Sci., 2018

Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes.
Inf. Sci., 2018

A Generic Scheme of plaintext-checkable database encryption.
Inf. Sci., 2018

Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing.
Future Generation Comp. Syst., 2018

Functional encryption for computational hiding in prime order groups via pair encodings.
Des. Codes Cryptography, 2018

2017
Privacy-Preserving Mutual Authentication in RFID with Designated Readers.
Wireless Personal Communications, 2017

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage.
IEEE Trans. Information Forensics and Security, 2017

Online/Offline Provable Data Possession.
IEEE Trans. Information Forensics and Security, 2017

EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
IEEE Trans. Information Forensics and Security, 2017

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data.
IEEE Trans. Information Forensics and Security, 2017

Secure and Efficient Cloud Data Deduplication With Randomized Tag.
IEEE Trans. Information Forensics and Security, 2017

Securely Reinforcing Synchronization for Embedded Online Contests.
ACM Trans. Embedded Comput. Syst., 2017

Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices.
IEEE Trans. Dependable Sec. Comput., 2017

A generalized attack on RSA type cryptosystems.
Theor. Comput. Sci., 2017

RFID Ownership Transfer with Positive Secrecy Capacity Channels.
Sensors, 2017

Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city.
Personal and Ubiquitous Computing, 2017

Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview.
JoWUA, 2017

Publicly verifiable databases with efficient insertion/deletion operations.
J. Comput. Syst. Sci., 2017

A general framework for secure sharing of personal health records in cloud system.
J. Comput. Syst. Sci., 2017

Sequence aware functional encryption and its application in searchable encryption.
J. Inf. Sec. Appl., 2017

Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security.
IACR Cryptology ePrint Archive, 2017

Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
IACR Cryptology ePrint Archive, 2017

Strong Authenticated Key Exchange with Auxiliary Inputs.
IACR Cryptology ePrint Archive, 2017

A note on the strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptography, 2017

Strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptography, 2017

Cloud computing security and privacy: Standards and regulations.
Computer Standards & Interfaces, 2017

Policy-controlled signatures and their applications.
Computer Standards & Interfaces, 2017

Identity-based conditional proxy re-encryption with fine grain policy.
Computer Standards & Interfaces, 2017

Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy.
CoRR, 2017

Anonymous Announcement System (AAS) for Electric Vehicle in VANETs.
Comput. J., 2017

Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server.
IEEE Access, 2017

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Proceedings of the Provable Security, 2017

An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups.
Proceedings of the Provable Security, 2017

Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy.
Proceedings of the Information Security Practice and Experience, 2017

Covert QR Codes: How to Hide in the Crowd.
Proceedings of the Information Security Practice and Experience, 2017

Fuzzy Extractors for Biometric Identification.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2017

An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems.
Proceedings of the Applications and Techniques in Information Security, 2017

An efficient and provably secure RFID grouping proof protocol.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

Mergeable and Revocable Identity-Based Encryption.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

A QR Code Watermarking Approach Based on the DWT-DCT Technique.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
IEEE Trans. Information Forensics and Security, 2016

Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions.
IEEE Trans. Information Forensics and Security, 2016

Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption.
IEEE Trans. Information Forensics and Security, 2016

Efficient dynamic threshold identity-based encryption with constant-size ciphertext.
Theor. Comput. Sci., 2016

Two-Factor Data Security Protection Mechanism for Cloud Storage System.
IEEE Trans. Computers, 2016

ABKS-CSC: attribute-based keyword search with constant-size ciphertexts.
Security and Communication Networks, 2016

SAKE: scalable authenticated key exchange for mobile e-health networks.
Security and Communication Networks, 2016

Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record.
J. Internet Serv. Inf. Secur., 2016

Solutions to the anti-piracy problem in oblivious transfer.
J. Comput. Syst. Sci., 2016

Multi-authority security framework for scalable EHR systems.
IJMEI, 2016

Message from the Guest Editors.
Int. J. Inf. Sec., 2016

Broadcast encryption with dealership.
Int. J. Inf. Sec., 2016

A short ID-based proxy signature scheme.
Int. J. Communication Systems, 2016

Logarithmic size ring signatures without random oracles.
IET Information Security, 2016

Dirichlet Product for Boolean Functions.
IACR Cryptology ePrint Archive, 2016

Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings.
IACR Cryptology ePrint Archive, 2016

A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups.
IACR Cryptology ePrint Archive, 2016

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
IACR Cryptology ePrint Archive, 2016

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
IACR Cryptology ePrint Archive, 2016

Strongly Leakage-Resilient Authenticated Key Exchange.
IACR Cryptology ePrint Archive, 2016

Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme.
IACR Cryptology ePrint Archive, 2016

Cloud data integrity checking with an identity-based auditing mechanism from RSA.
Future Generation Comp. Syst., 2016

Are the most popular users always trustworthy? The case of Yelp.
Electronic Commerce Research and Applications, 2016

Generalized closest substring encryption.
Des. Codes Cryptography, 2016

Metamorphic Testing for Cybersecurity.
IEEE Computer, 2016

Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol.
Comput. J., 2016

Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016

A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.
Comput. J., 2016

Authentication and Transaction Verification Using QR Codes with a Mobile Device.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update.
Proceedings of the Provable Security, 2016

Privacy-Preserving Cloud Auditing with Multiple Uploaders.
Proceedings of the Information Security Practice and Experience, 2016

Strongly Leakage-Resilient Authenticated Key Exchange.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Identifying malicious web domains using machine learning techniques with online credibility and performance data.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

Securing Shared Systems.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2016

Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Edit Distance Based Encryption and Its Application.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Towards Efficient Fully Randomized Message-Locked Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

One-Round Strong Oblivious Signature-Based Envelope.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

A New Attack on Three Variants of the RSA Cryptosystem.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards.
Wireless Personal Communications, 2015

Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.
IEEE Trans. Information Forensics and Security, 2015

Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage.
IEEE Trans. Information Forensics and Security, 2015

Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage.
IEEE Trans. Information Forensics and Security, 2015

A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion.
IEEE Trans. Information Forensics and Security, 2015

Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext.
IEEE Trans. Information Forensics and Security, 2015

Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption.
IEEE Trans. Information Forensics and Security, 2015

AAC-OT: Accountable Oblivious Transfer With Access Control.
IEEE Trans. Information Forensics and Security, 2015

Optimistic fair exchange in the enhanced chosen-key model.
Theor. Comput. Sci., 2015

Ambiguous optimistic fair exchange: Definition and constructions.
Theor. Comput. Sci., 2015

Privacy-preserving encryption scheme using DNA parentage test.
Theor. Comput. Sci., 2015

Efficient algorithms for secure outsourcing of bilinear pairings.
Theor. Comput. Sci., 2015

k-Times Attribute-Based Anonymous Access Control for Cloud Computing.
IEEE Trans. Computers, 2015

Mediated Encryption: Analysis and Design.
ICST Trans. Security Safety, 2015

Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information.
Security and Communication Networks, 2015

Vulnerabilities of an ECC-based RFID authentication scheme.
Security and Communication Networks, 2015

A resilient identity-based authenticated key exchange protocol.
Security and Communication Networks, 2015

A provably secure identity-based proxy ring signature based on RSA.
Security and Communication Networks, 2015

Secure sharing and searching for real-time video data in mobile cloud.
IEEE Network, 2015

Identity-based quotable ring signature.
Inf. Sci., 2015

How to protect privacy in Optimistic Fair Exchange of digital signatures.
Inf. Sci., 2015

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage.
Int. J. Inf. Sec., 2015

File sharing in cloud computing using win stay lose shift strategy.
IJHPCN, 2015

Protecting peer-to-peer-based massively multiplayer online games.
IJCSE, 2015

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Generation Comp. Syst., 2015

LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme.
Des. Codes Cryptography, 2015

Shared RFID ownership transfer protocols.
Computer Standards & Interfaces, 2015

A short identity-based proxy ring signature scheme from RSA.
Computer Standards & Interfaces, 2015

Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search.
CoRR, 2015

A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds.
Concurrency and Computation: Practice and Experience, 2015

Secure Delegation of Signing Power from Factorization.
Comput. J., 2015

Revisiting Security Against the Arbitrator in Optimistic Fair Exchange.
Comput. J., 2015

Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption.
Comput. J., 2015

An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants.
Comput. J., 2015

Collusion-resistant convertible ring signature schemes.
SCIENCE CHINA Information Sciences, 2015

Provably Secure Identity Based Provable Data Possession.
Proceedings of the Provable Security, 2015

Efficient File Sharing in Electronic Health Records.
Proceedings of the Information Security Practice and Experience, 2015

PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key.
Proceedings of the Computer Security - ESORICS 2015, 2015

Anonymous Yoking-Group Proofs.
Proceedings of the 10th ACM Symposium on Information, 2015

Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data.
Proceedings of the 10th ACM Symposium on Information, 2015

Improved Identity-Based Online/Offline Encryption.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
A New Payment System for Enhancing Location Privacy of Electric Vehicles.
IEEE Trans. Vehicular Technology, 2014

Linkable Ring Signature with Unconditional Anonymity.
IEEE Trans. Knowl. Data Eng., 2014

Deniability and forward secrecy of one-round authenticated key exchange.
The Journal of Supercomputing, 2014

Collusion-Resistance in Optimistic Fair Exchange.
IEEE Trans. Information Forensics and Security, 2014

Revisiting Optimistic Fair Exchange Based on Ring Signatures.
IEEE Trans. Information Forensics and Security, 2014

A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Information Forensics and Security, 2014

CP-ABE With Constant-Size Keys for Lightweight Devices.
IEEE Trans. Information Forensics and Security, 2014

Subset Membership Encryption and Its Applications to Oblivious Transfer.
IEEE Trans. Information Forensics and Security, 2014

Identity based identification from algebraic coding theory.
Theor. Comput. Sci., 2014

Attribute-based optimistic fair exchange: How to restrict brokers with policies.
Theor. Comput. Sci., 2014

Identity-Based Secure DistributedData Storage Schemes.
IEEE Trans. Computers, 2014

Efficient public key encryption with revocable keyword search.
Security and Communication Networks, 2014

A robust smart card-based anonymous user authentication protocol for wireless communications.
Security and Communication Networks, 2014

Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently.
JoWUA, 2014

Towards a cryptographic treatment of publish/subscribe systems.
Journal of Computer Security, 2014

Identity-based chameleon hashing and signatures without key exposure.
Inf. Sci., 2014

Security pitfalls of an efficient threshold proxy signature scheme for mobile agents.
Inf. Process. Lett., 2014

Efficient Hidden Vector Encryption with Constant-Size Ciphertext.
IACR Cryptology ePrint Archive, 2014

PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption.
IACR Cryptology ePrint Archive, 2014

Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme.
IACR Cryptology ePrint Archive, 2014

On the security of auditing mechanisms for secure cloud storage.
Future Generation Comp. Syst., 2014

Improvements on an authentication scheme for vehicular sensor networks.
Expert Syst. Appl., 2014

(Strong) multidesignated verifiers signatures secure against rogue key attack.
Concurrency and Computation: Practice and Experience, 2014

On the security of text-based 3D CAPTCHAs.
Computers & Security, 2014

Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing.
Comput. J., 2014

Server-Aided Signature Verification for Lightweight Devices.
Comput. J., 2014

Fair Multi-signature.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

An Efficient Variant of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Privacy-Preserving Authorized RFID Authentication Protocols.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

Jhanwar-Barua's Identity-Based Encryption Revisited.
Proceedings of the Network and System Security - 8th International Conference, 2014

Attribute-Based Signature with Message Recovery.
Proceedings of the Information Security Practice and Experience, 2014

A CAPTCHA Scheme Based on the Identification of Character Locations.
Proceedings of the Information Security Practice and Experience, 2014

An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing.
Proceedings of the Information Security Practice and Experience, 2014

Two-Party (Blind) Ring Signatures and Their Applications.
Proceedings of the Information Security Practice and Experience, 2014

A Visual One-Time Password Authentication Scheme Using Mobile Devices.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Efficient Hidden Vector Encryption with Constant-Size Ciphertext.
Proceedings of the Computer Security - ESORICS 2014, 2014

New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era.
Proceedings of the Computer Security - ESORICS 2014, 2014

An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing.
Proceedings of the Computer Security - ESORICS 2014, 2014

PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2014, 2014

P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2013

Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme.
Wireless Personal Communications, 2013

Fully Homomorphic Encryption Using Hidden Ideal Lattice.
IEEE Trans. Information Forensics and Security, 2013

Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE.
IEEE Trans. Information Forensics and Security, 2013

Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction.
Theor. Comput. Sci., 2013

Constant-Size Dynamic $k$ -Times Anonymous Authentication.
IEEE Systems Journal, 2013

Securing DSR against wormhole attacks in multirate ad hoc networks.
J. Network and Computer Applications, 2013

Server-aided signatures verification secure against collusion attack.
Inf. Sec. Techn. Report, 2013

Fully secure hidden vector encryption under standard assumptions.
Inf. Sci., 2013

The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles.
Inf. Sci., 2013

Public key encryption with keyword search secure against keyword guessing attacks without random oracle.
Inf. Sci., 2013

Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt".
IACR Cryptology ePrint Archive, 2013

Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model.
IACR Cryptology ePrint Archive, 2013

A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security.
IACR Cryptology ePrint Archive, 2013

Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes.
IACR Cryptology ePrint Archive, 2013

Identity-based data storage in cloud computing.
Future Generation Comp. Syst., 2013

Efficient Linkable and/or Threshold Ring Signature Without Random Oracles.
Comput. J., 2013

Privacy-Enhanced Keyword Search in Clouds.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Secure Single Sign-On Schemes Constructed from Nominative Signatures.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Identity-Based Mediated RSA Revisited.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Generic Mediated Encryption.
Proceedings of the Security and Privacy in Communication Networks, 2013

On RFID Authentication Protocols with Wide-Strong Privacy.
Proceedings of the Radio Frequency Identification System Security, 2013

A Secure Elliptic Curve based RFID Ownership Transfer Scheme with Controlled Delegation.
Proceedings of the Radio Frequency Identification System Security, 2013

Efficient Semi-static Secure Broadcast Encryption Scheme.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Threshold-Oriented Optimistic Fair Exchange.
Proceedings of the Network and System Security - 7th International Conference, 2013

Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model.
Proceedings of the Information Security Practice and Experience, 2013

Identity-Based Multisignature with Message Recovery.
Proceedings of the Information Security Practice and Experience, 2013

Secure RFID Ownership Transfer Protocols.
Proceedings of the Information Security Practice and Experience, 2013

Anonymous Single Sign-On Schemes Transformed from Group Signatures.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt".
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

Fairness in Concurrent Signatures Revisited.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

Adaptive Precision Floating Point LLL.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

Membership Encryption and Its Applications.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
IEEE Trans. Parallel Distrib. Syst., 2012

Efficient Fair Conditional Payments for Outsourcing Computations.
IEEE Trans. Information Forensics and Security, 2012

Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search.
Theor. Comput. Sci., 2012

Privacy preserving protocol for service aggregation in cloud computing.
Softw., Pract. Exper., 2012

Provably secure proxy signature scheme from factorization.
Mathematical and Computer Modelling, 2012

Strongly secure certificateless short signatures.
Journal of Systems and Software, 2012

Privacy enhanced data outsourcing in the cloud.
J. Network and Computer Applications, 2012

A new efficient optimistic fair exchange protocol without random oracles.
Int. J. Inf. Sec., 2012

New constructions of OSBE schemes and their applications in oblivious access control.
Int. J. Inf. Sec., 2012

Perfect Ambiguous Optimistic Fair Exchange.
IACR Cryptology ePrint Archive, 2012

Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles.
IACR Cryptology ePrint Archive, 2012

Enhancing Location Privacy for Electric Vehicles (at the right time).
IACR Cryptology ePrint Archive, 2012

Secure Outsourced Attribute-Based Signatures.
IACR Cryptology ePrint Archive, 2012

Fault Analysis of the KATAN Family of Block Ciphers.
IACR Cryptology ePrint Archive, 2012

Hierarchical conditional proxy re-encryption.
Computer Standards & Interfaces, 2012

Efficient oblivious transfers with access control.
Computers & Mathematics with Applications, 2012

A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Comput. J., 2012

Certificateless Signatures: New Schemes and Security Models.
Comput. J., 2012

Attribute-Based Oblivious Access Control.
Comput. J., 2012

Efficient and secure stored-value cards with leakage resilience.
Computers & Electrical Engineering, 2012

Multi-Level Controlled Signature.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Lattice Reduction for Modular Knapsack.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Efficient Escrow-Free Identity-Based Signature.
Proceedings of the Provable Security - 6th International Conference, 2012

On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties.
Proceedings of the Provable Security - 6th International Conference, 2012

The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

(Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack.
Proceedings of the Network and System Security - 6th International Conference, 2012

Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games.
Proceedings of the Network and System Security - 6th International Conference, 2012

BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers.
Proceedings of the Information Security Practice and Experience, 2012

A Pre-computable Signature Scheme with Efficient Verification for RFID.
Proceedings of the Information Security Practice and Experience, 2012

Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family.
Proceedings of the Information Security Practice and Experience, 2012

Fault Analysis of the KATAN Family of Block Ciphers.
Proceedings of the Information Security Practice and Experience, 2012

Forward Secure Attribute-Based Signatures.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Perfect Ambiguous Optimistic Fair Exchange.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

On the Fault-Detection Capabilities of Adaptive Random Test Case Prioritization: Case Studies with Large Test Suites.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Enhancing Location Privacy for Electric Vehicles (at the Right time).
Proceedings of the Computer Security - ESORICS 2012, 2012

Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext.
Proceedings of the Computer Security - ESORICS 2012, 2012

Attacking Animated CAPTCHAs via Character Extraction.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

Breaking an Animated CAPTCHA Scheme.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic Fair Exchange.
IEEE Trans. Information Forensics and Security, 2011

Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Information Forensics and Security, 2011

Identity-based trapdoor mercurial commitments and applications.
Theor. Comput. Sci., 2011

Identity-based strong designated verifier signature revisited.
Journal of Systems and Software, 2011

Improving security of q-SDH based digital signatures.
Journal of Systems and Software, 2011

Interactive conditional proxy re-encryption with fine grain policy.
Journal of Systems and Software, 2011

Optimistic Fair Exchange with Strong Resolution-Ambiguity.
IEEE Journal on Selected Areas in Communications, 2011

Practical RFID ownership transfer scheme.
Journal of Computer Security, 2011

Group-oriented fair exchange of signatures.
Inf. Sci., 2011

Efficient strong designated verifier signature schemes without random oracle or with non-delegatability.
Int. J. Inf. Sec., 2011

Special issue of computer communications on information and future communication security.
Computer Communications, 2011

Provably secure server-aided verification signatures.
Computers & Mathematics with Applications, 2011

Short Signatures with a Tighter Security Reduction Without Random Oracles.
Comput. J., 2011

Privacy-Preserved Access Control for Cloud Computing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Repeated Differential Properties of the AES-128 and AES-256 Key Schedules.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Concurrent Signatures with Fully Negotiable Binding Control.
Proceedings of the Provable Security - 5th International Conference, 2011

An Efficient Construction of Time-Selective Convertible Undeniable Signatures.
Proceedings of the Information Security, 14th International Conference, 2011

Improving BDD Cryptosystems in General Lattices.
Proceedings of the Information Security Practice and Experience, 2011

Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Breaking a 3D-Based CAPTCHA Scheme.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Efficient Self-certified Signatures with Batch Verification.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Threshold ring signature without random oracles.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

On the security of the identity-based encryption based on DHIES from ASIACCS 2010.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Self-certified ring signatures.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Server-aided signatures verification secure against collusion attack.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

AniCAP: An Animated 3D CAPTCHA Scheme Based on Motion Parallax.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

Electronic Cash with Anonymous User Suspension.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Trapdoor security in a searchable public-key encryption scheme with a designated tester.
Journal of Systems and Software, 2010

Biometrics for Electronic Health Records.
J. Medical Systems, 2010

Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes.
JDCTA, 2010

Constructions of certificate-based signature secure against key replacement attacks.
Journal of Computer Security, 2010

Certificateless threshold signature scheme from bilinear maps.
Inf. Sci., 2010

How to construct identity-based signatures without the key escrow problem.
Int. J. Inf. Sec., 2010

Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.
IACR Cryptology ePrint Archive, 2010

A Generic Construction of Dynamic Single Sign-on with Strong Security.
Proceedings of the Security and Privacy in Communication Networks, 2010

Recursive Lattice Reduction.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Differential Fault Analysis of LEX.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).
Proceedings of the Provable Security - 4th International Conference, 2010

Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Proceedings of the Public Key Cryptography, 2010

A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange - (Extended Abstract).
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

On the Security of NOEKEON against Side Channel Cube Attacks.
Proceedings of the Information Security, 2010

Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.
Proceedings of the Computer Security, 2010

CAPTCHA Challenges for Massively Multiplayer Online Games: Mini-game CAPTCHAs.
Proceedings of the 2010 International Conference on CyberWorlds, 2010

A framework for privacy policy management in service aggregation.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Attribute-based signature and its applications.
Proceedings of the 5th ACM Symposium on Information, 2010

Towards a Cryptographic Treatment of Publish/Subscribe Systems.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

STE3D-CAP: Stereoscopic 3D CAPTCHA.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

Identity-Based Chameleon Hash Scheme without Key Exposure.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

Proof-of-Knowledge of Representation of Committed Value and Its Applications.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

Constructing an Authentication Token to Access External Services in Service Aggregation.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010

2009
Short fail-stop signature scheme based on factorization and discrete logarithm assumptions.
Theor. Comput. Sci., 2009

Certificate-based Signatures Revisited.
J. UCS, 2009

A five-round algebraic property of AES and its application to the ALPHA-MAC.
IJACT, 2009

Security Vulnerability of ID-Based Key Sharing Schemes.
IEICE Transactions, 2009

Secure searchable public key encryption scheme against keyword guessing attacks.
IEICE Electronic Express, 2009

How to Construct Identity-Based Signatures without the Key Escrow Problem.
IACR Cryptology ePrint Archive, 2009

An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions.
IACR Cryptology ePrint Archive, 2009

Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders.
IACR Cryptology ePrint Archive, 2009

Enhanced Target Collision Resistant Hash Functions Revisited.
IACR Cryptology ePrint Archive, 2009

Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability.
IACR Cryptology ePrint Archive, 2009

Group-Oriented Fair Exchange of Signatures.
IACR Cryptology ePrint Archive, 2009

Non-delegatable Identity-based Designated Verifier Signature.
IACR Cryptology ePrint Archive, 2009

Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Improvement of Lattice-Based Cryptography Using CRT.
Proceedings of the Quantum Communication and Quantum Networking, 2009

Improving Software Testing Cost-Effectiveness through Dynamic Partitioning.
Proceedings of the Ninth International Conference on Quality Software, 2009

How to Prove Security of a Signature with a Tighter Security Reduction.
Proceedings of the Provable Security, Third International Conference, 2009

Anonymous Conditional Proxy Re-encryption without Random Oracle.
Proceedings of the Provable Security, Third International Conference, 2009

Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?
Proceedings of the Provable Security, Third International Conference, 2009

Universal Designated Verifier Signatures with Threshold-Signers.
Proceedings of the Advances in Information and Computer Security, 2009

Ranking Attack Graphs with Graph Neural Networks.
Proceedings of the Information Security Practice and Experience, 2009

Policy-Controlled Signatures.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Online/Offline Ring Signature Scheme.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Enhanced Target Collision Resistant Hash Functions Revisited.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Escrowed Deniable Identification Schemes.
Proceedings of the Security Technology, 2009

How to Construct Identity-Based Signatures without the Key Escrow Problem.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

Asymmetric Group Key Agreement.
Proceedings of the Advances in Cryptology, 2009

New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing.
Proceedings of the Computer Security, 2009

Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.
Proceedings of the Topics in Cryptology, 2009

Efficient Non-interactive Range Proof.
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009

Improved searchable public key encryption with designated tester.
Proceedings of the 2009 ACM Symposium on Information, 2009

A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

Broadcast Attacks against Lattice-Based Cryptosystems.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Cryptography in Computer System Security.
J. UCS, 2008

A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles.
J. Comput. Sci. Technol., 2008

Efficient generic on-line/off-line (threshold) signatures without key exposure.
Inf. Sci., 2008

A New and Efficient Signature on Commitment Values.
I. J. Network Security, 2008

Short Designated Verifier Signature Scheme and Its Identity-based Variant.
I. J. Network Security, 2008

Secure universal designated verifier signature without random oracles.
Int. J. Inf. Sec., 2008

Efficient lattice-based signature scheme.
IJACT, 2008

Certificate-Based Signature Schemes without Pairings or Random Oracles.
IACR Cryptology ePrint Archive, 2008

A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.
IACR Cryptology ePrint Archive, 2008

Constant-Size Dynamic k-TAA.
IACR Cryptology ePrint Archive, 2008

Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework).
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Server-Aided Verification Signatures: Definitions and New Constructions.
Proceedings of the Provable Security, Second International Conference, 2008

A Digital Signature Scheme Based on CVPinfinity.
Proceedings of the Public Key Cryptography, 2008

Identity-Based On-Line/Off-Line Signcryption.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Certificate-Based Signature Schemes without Pairings or Random Oracles.
Proceedings of the Information Security, 11th International Conference, 2008

A Five-Round Algebraic Property of the Advanced Encryption Standard.
Proceedings of the Information Security, 11th International Conference, 2008

A Generic Construction of Identity-Based Online/Offline Signcryption.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

How to Balance Privacy with Authenticity.
Proceedings of the Information Security and Cryptology, 2008

Public Key Encryption with Keyword Search Revisited.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

Practical Anonymous Divisible E-Cash from Bounded Accumulators.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

RFID Privacy Models Revisited.
Proceedings of the Computer Security, 2008

Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.
Proceedings of the Topics in Cryptology, 2008

Privacy for Private Key in Signatures.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Publicly Verifiable Privacy-Preserving Group Decryption.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Sanitizable Signatures Revisited.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Mitigating Phishing with ID-based Online/Offline Authentication.
Proceedings of the Sixth Australasian Information Security Conference, 2008

Ambiguous Optimistic Fair Exchange.
Proceedings of the Advances in Cryptology, 2008

Traceable and Retrievable Identity-Based Encryption.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Security and Access of Health Research Data.
J. Medical Systems, 2007

Short Group Signatures Without Random Oracles.
J. Comput. Sci. Technol., 2007

Revocable Ring Signature.
J. Comput. Sci. Technol., 2007

Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004.
J. Comput. Sci. Technol., 2007

Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner.
I. J. Network Security, 2007

Securing personal health information access in mobile healthcare environment through short signature schemes.
IJMC, 2007

Comparing and debugging firewall rule tables.
IET Information Security, 2007

(Convertible) Undeniable Signatures without Random Oracles.
IACR Cryptology ePrint Archive, 2007

Group Decryption.
IACR Cryptology ePrint Archive, 2007

Nominative Signature: Application, Security Model and Construction.
IACR Cryptology ePrint Archive, 2007

New Constructions of Fuzzy Identity-Based Encryption.
IACR Cryptology ePrint Archive, 2007

Practical Anonymous Divisible E-Cash From Bounded Accumulators.
IACR Cryptology ePrint Archive, 2007

Practical Compact E-Cash.
IACR Cryptology ePrint Archive, 2007

Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Designated Verifier Signature: Definition, Framework and New Constructions.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Compact sequential aggregate signatures.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures.
Proceedings of the Public Key Cryptography, 2007

Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length.
Proceedings of the Pairing-Based Cryptography, 2007

Certificate Based (Linkable) Ring Signature.
Proceedings of the Information Security Practice and Experience, 2007

Transport Layer Identification of Skype Traffic.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

New Construction of Group Secret Handshakes Based on Pairings.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

(Convertible) Undeniable Signatures Without Random Oracles.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Formal Definition and Construction of Nominative Signature.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Efficient Partially Blind Signatures with Provable Security.
Proceedings of the Computational Science and Its Applications, 2007

Certificate-Based Signature: Security Model and Efficient Construction.
Proceedings of the Public Key Infrastructure, 2007

Compact E-Cash from Bounded Accumulator.
Proceedings of the Topics in Cryptology, 2007

Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

New constructions of fuzzy identity-based encryption.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Achieving Mobility and Anonymity in IP-Based Networks.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

A Generic Construction for Universally-Convertible Undeniable Signatures.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Identity-Based Proxy Signature from Pairings.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks.
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007

An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

Certificateless Signature Revisited.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

Practical Compact E-Cash.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

SEFAP: An Email System for Anti-Phishing.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes.
JNW, 2006

Personal Health Record Systems and Their Security Protection.
J. Medical Systems, 2006

Convertible identity-based anonymous designated ring signatures.
IJSN, 2006

Securing electronic health records with broadcast encryption schemes.
IJEH, 2006

Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.
IACR Cryptology ePrint Archive, 2006

Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model.
IACR Cryptology ePrint Archive, 2006

Generic Construction of (Identity-based) Perfect Concurrent Signatures.
IACR Cryptology ePrint Archive, 2006

A New Signature Scheme Without Random Oracles from Bilinear Pairings.
Proceedings of the Progressin Cryptology, 2006

On the Internal Structure of Alpha-MAC.
Proceedings of the Progressin Cryptology, 2006

Escrowed Linkability of Ring Signatures and Its Applications.
Proceedings of the Progressin Cryptology, 2006

Restricted Universal Designated Verifier Signature.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Constant-Size Dynamic k-TAA.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Proxy Signature Without Random Oracles.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Ad Hoc Group Signatures.
Proceedings of the Advances in Information and Computer Security, 2006

Ring Signature with Designated Linkability.
Proceedings of the Advances in Information and Computer Security, 2006

Identity-based anonymous designated ring signatures.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Multi-party Concurrent Signatures.
Proceedings of the Information Security, 9th International Conference, 2006

On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search.
Proceedings of the Information Security, 9th International Conference, 2006

Three-Round Secret Handshakes Based on ElGamal and DSA.
Proceedings of the Information Security Practice and Experience, 2006

Privately Retrieve Data from Large Databases.
Proceedings of the Information Security Practice and Experience, 2006

Short (Identity-Based) Strong Designated Verifier Signature Schemes.
Proceedings of the Information Security Practice and Experience, 2006

Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature.
Proceedings of the Progress in Cryptology, 2006

Universal Designated Verifier Signature Without Delegatability.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Efficient Partially Blind Signatures with Provable Security.
Proceedings of the Computational Science and Its Applications, 2006

Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.
Proceedings of the Financial Cryptography and Data Security, 2006

Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing.
Proceedings of the Public Key Infrastructure, 2006

Short Linkable Ring Signatures Revisited.
Proceedings of the Public Key Infrastructure, 2006

Designated group credentials.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Self-organised group key management for ad hoc networks.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

Efficient Signcryption Without Random Oracles.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Certificateless Designated Verifier Signature Schemes.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

Event-Oriented k-Times Revocable-iff-Linked Group Signatures.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Provably secure fail-stop signature schemes based on RSA.
IJWMC, 2005

A New Short Signature Scheme Without Random Oracles from Bilinear Pairings.
IACR Cryptology ePrint Archive, 2005

A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity.
IACR Cryptology ePrint Archive, 2005

Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004.
IACR Cryptology ePrint Archive, 2005

Public Key Encryption with Keyword Search Revisited.
IACR Cryptology ePrint Archive, 2005

Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03.
Applied Mathematics and Computation, 2005

Tripartite Concurrent Signatures.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption.
Proceedings of the Public Key Cryptography, 2005

Secure AODV Routing Protocol Using One-Time Signature.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Efficient Broadcast from Trapdoor Functions.
Proceedings of the Applied Public Key Infrastructure, 2005

Certificateless Public Key Encryption Without Pairing.
Proceedings of the Information Security, 8th International Conference, 2005

Token-Controlled Public Key Encryption.
Proceedings of the Information Security Practice and Experience, 2005

Short E-Cash.
Proceedings of the Progress in Cryptology, 2005

Universal Designated Multi Verifier Signature Schemes.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

An Efficient Static Blind Ring Signature Scheme.
Proceedings of the Information Security and Cryptology, 2005

Generic Construction of (Identity-Based) Perfect Concurrent Signatures.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures).
Proceedings of the Financial Cryptography and Data Security, 2005

Identity-Based Universal Designated Verifier Signatures.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Security Analysis of Michael: The IEEE 802.11i Message Integrity Code.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Short Designated Verifier Proxy Signature from Pairings.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

On Securing RTP-Based Streaming Content with Firewalls.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

On the Security of Certificateless Signature Schemes from Asiacrypt 2003.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature).
Proceedings of the Advances in Cryptology, 2005

Reducing Security Overhead for Mobile Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Personal Firewall for Pocket PC 2003: Design & Implementation.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Privacy-Enhanced Internet Storage.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

On the Security of Nominative Signatures.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
An Efficient Signature Scheme from Bilinear Pairings and Its Applications.
Proceedings of the Public Key Cryptography, 2004

Perfect Concurrent Signature Schemes.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Deniable Partial Proxy Signatures.
Proceedings of the Advances in Computer Science, 2004

Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption.
Proceedings of the Advances in Computer Science, 2004

Deniable Ring Authentication Revisited.
Proceedings of the Applied Cryptography and Network Security, 2004

X2Rep: Enhanced Trust Semantics for the XRep Protocol.
Proceedings of the Applied Cryptography and Network Security, 2004

Identity-Based Strong Designated Verifier Signature Schemes.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
ID-Based Chameleon Hashes from Bilinear Pairings.
IACR Cryptology ePrint Archive, 2003

Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03.
IACR Cryptology ePrint Archive, 2003

Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings.
Proceedings of the Progress in Cryptology, 2003

Identity-Based Broadcasting.
Proceedings of the Progress in Cryptology, 2003

Securing mobile IP enabled laptop.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Web filtering using text classification.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Non-interactive Deniable Ring Authentication.
Proceedings of the Information Security and Cryptology, 2003

On Fail-Stop Verifiable Secret Sharing Schemes.
Proceedings of the International Conference on Security and Management, 2003

On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?).
Proceedings of the International Conference on Security and Management, 2003

2002
Securing handheld devices.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002

Secure authorization, access control and data integrity in Bluetooth.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002

An Efficient Fail-Stop Signature Scheme Based on Factorization.
Proceedings of the Information Security and Cryptology, 2002

2001
An Efficient Construction for Fail-Stop Signature for Long Messages.
J. Inf. Sci. Eng., 2001

Towards securing 3G mobile phones.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

How to Construct Fail-Stop Confirmer Signature Schemes.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

On Classifying Conference Key Distribution Protocols.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
A New and Efficient Fail-stop Signature Scheme.
Comput. J., 2000

Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization.
Proceedings of the Information Security, Third International Workshop, 2000

Fail-Stop Signature for Long Messages.
Proceedings of the Progress in Cryptology, 2000

Key Management for Secure Multicast with Dynamic Controller.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
RSA-Based Fail-Stop Signature Schemes.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

Fail-Stop Threshold Signature Schemes Based on Elliptic Curves.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999


  Loading...