


default search action
Willy Susilo
Person information
- affiliation: University of Wollongong, Centre for Computer and Information Security Research, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j419]Sunil Prajapat, Garima Thakur, Pankaj Kumar, Ashok Kumar Das
, Sajjad Shaukat Jamal, Willy Susilo
:
Designing lattice-enabled group authentication scheme based on post-quantum computing in healthcare applications. Comput. Electr. Eng. 123: 110028 (2025) - [j418]Mohammed Tanvir Masud
, Marwa Keshk, Nour Moustafa
, Benjamin P. Turnbull
, Willy Susilo
:
Vulnerability defence using hybrid moving target defence in Internet of Things systems. Comput. Secur. 153: 104380 (2025) - [j417]Meixia Miao
, Siqi Zhao, Jiawei Li
, Jianghong Wei, Willy Susilo
:
Practically secure linear-map vector commitment and its applications. Comput. Stand. Interfaces 91: 103885 (2025) - [j416]Jia-Chng Loh
, Fuchun Guo, Willy Susilo
:
Improving efficiency and security of Camenisch-Lysyanskaya signatures for anonymous credential systems. Comput. Stand. Interfaces 91: 103886 (2025) - [j415]Yusong Yao
, Yiwen Shi, Guohua Tian
, Meixia Miao, Willy Susilo
:
PSCBO: A provably secure consensus-based blockchain Oracle. Comput. Stand. Interfaces 91: 103892 (2025) - [j414]Jiaming Wen
, Willy Susilo
, Rupeng Yang, Zuoxia Yu, Huanguo Zhang:
Revocable ring signatures with CCA-anonymity from standard lattices. Comput. Stand. Interfaces 91: 103893 (2025) - [j413]Yanhua Zhang
, Willy Susilo
, Fuchun Guo
:
Lattice-based strong designated verifier signature with non-delegatability. Comput. Stand. Interfaces 92: 103904 (2025) - [j412]Fengmei Tang, Yumei Li, Yudi Zhang, Willy Susilo
, Bingbing Li:
Real-time privacy-preserved auditing for shared outsourced data. Comput. Stand. Interfaces 92: 103927 (2025) - [j411]Huy Quoc Le, Phi Thuong Le
, Sy Tuan Trinh, Willy Susilo
, Viet Cuong Trinh
:
Levelled attribute-based encryption for hierarchical access control. Comput. Stand. Interfaces 93: 103957 (2025) - [j410]Sunil Prajapat, Aryan Rana, Pankaj Kumar
, Ashok Kumar Das
, Willy Susilo
:
Privacy-preserving authentication protocol for user personal device security in Brain-Computer Interface. Comput. Stand. Interfaces 94: 104009 (2025) - [j409]Bo Zhang
, Yansong Gao
, Boyu Kuang
, Changlong Yu
, Anmin Fu
, Willy Susilo
:
A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and Countermeasures. ACM Comput. Surv. 57(3): 62:1-62:36 (2025) - [j408]Zihao Yao
, Fanding Huang, Yannan Li
, Wei Duan
, Peng Qian
, Nan Yang
, Willy Susilo
:
Mecon: A GNN-based graph classification framework for MEV activity detection. Expert Syst. Appl. 269: 126486 (2025) - [j407]Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, Sahil Garg
, Willy Susilo, Mohammad Mehedi Hassan:
Cloud storage-based secure big data analytics mechanism for drone-assisted healthcare 5.0 data fusion system. Inf. Fusion 121: 103085 (2025) - [j406]Wenbo Yang, Hao Wang
, Zhi Li
, Ziyu Niu, Lei Wu
, Xiaochao Wei
, Ye Su
, Willy Susilo
:
Privacy-Preserving Machine Learning in Cloud-Edge-End Collaborative Environments. IEEE Internet Things J. 12(1): 419-434 (2025) - [j405]Zhongda Feng
, Qianhong Wu
, Yizhong Liu
, Bo Qin
, Mingzhe Zhai
, Willy Susilo
:
Secure and Fair Data Trading Based on Blockchain With Enhanced Access Control. IEEE Internet Things J. 12(6): 7277-7292 (2025) - [j404]Chong Yao, Xuejun Zhang
, Yizhong Liu
, Boyu Zhao
, Qianhong Wu
, Willy Susilo
:
Blockchain-Based Secure and Efficient ADS-B Authentication via Certificateless Signature With Packet Loss Tolerance. IEEE Internet Things J. 12(8): 10574-10588 (2025) - [j403]Yizhong Liu
, Zixiao Jia, Zixu Jiang, Jianwei Liu
, Dawei Li
, Zhenyu Guan
, Qianhong Wu
, Willy Susilo
:
Secure 6G Distributed Group Authentication and Key Agreement via Sharding Blockchain. IEEE Netw. 39(2): 100-107 (2025) - [j402]Jianghong Wei
, Guohua Tian
, Xiaofeng Chen
, Willy Susilo
:
Lightweight 0-RTT Session Resumption Protocol for Constrained Devices. IEEE Trans. Inf. Forensics Secur. 20: 221-233 (2025) - [j401]Ruonan Chen
, Yang Zhang, Dawei Li
, Yizhong Liu
, Jianwei Liu
, Qianhong Wu
, Jianying Zhou
, Willy Susilo
:
Bitcoin-Compatible Privacy-Preserving Multi-Party Payment Channels Supporting Variable Amounts. IEEE Trans. Inf. Forensics Secur. 20: 2984-2998 (2025) - [j400]Xin Liu
, Willy Susilo
, Joonsang Baek
:
How to Terminate Service Requests in Outsourcing: A Seamless Solution From Withdrawable Signatures. IEEE Trans. Inf. Forensics Secur. 20: 4087-4099 (2025) - [i96]Dung Hoang Duong, Thanh Xuan Khuc, Youming Qiao, Willy Susilo, Chuanqi Zhang:
Blind Signatures from Cryptographic Group Actions. IACR Cryptol. ePrint Arch. 2025: 397 (2025) - 2024
- [j399]Gelare Oudi Ghadim
, Mohammad Dakhilalian, Parvin Rastegari, Faramarz Hendessi, Willy Susilo
:
On Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles: Cryptanalysis and Improvements. IEEE Access 12: 167944-167969 (2024) - [j398]Jinguang Han
, Willy Susilo
, Liquan Chen, Jianchang Lai, Ge Wu
:
Privacy-Preserving Confidential Reporting System With Designated Reporters. Comput. J. 67(5): 1951-1962 (2024) - [j397]Deepika Gautam, Sunil Prajapat, Pankaj Kumar
, Ashok Kumar Das, Korhan Cengiz
, Willy Susilo
:
Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage. Clust. Comput. 27(6): 8159-8172 (2024) - [j396]Yanmei Cao, Jianghong Wei, Yang Xiang, Willy Susilo
, Xiaofeng Chen:
Abuse-resistant deniable encryption. Comput. Stand. Interfaces 87: 103761 (2024) - [j395]Abderrahmane Nitaj
, Willy Susilo
, Joseph Tonien
:
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property. Comput. Stand. Interfaces 87: 103769 (2024) - [j394]Shuaining Gao
, Xinjian Chen, Hongbo Li
, Willy Susilo
, Qiong Huang
:
Post-quantum secure group signature with verifier local revocation and backward unlinkability. Comput. Stand. Interfaces 88: 103782 (2024) - [j393]Tao Li
, Peiyao Niu, Yilei Wang, Shengke Zeng, Xiaoying Wang, Willy Susilo
:
HT2REP: A fair cross-chain atomic exchange protocol under UC framework based on HTLCs and TRE. Comput. Stand. Interfaces 89: 103834 (2024) - [j392]Wei Liang
, Yaqin Liu
, Ce Yang
, Songyou Xie
, Kuanching Li
, Willy Susilo
:
On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive Survey. ACM Comput. Surv. 56(12): 298:1-298:35 (2024) - [j391]Madhav Mukherjee
, Ngoc-Thuy Le, Yang-Wai Chow
, Willy Susilo
:
Strategic Approaches to Cybersecurity Learning: A Study of Educational Models and Outcomes. Inf. 15(2): 117 (2024) - [j390]Yuan Gao
, Liquan Chen
, Jinguang Han
, Ge Wu
, Willy Susilo
:
IoT Privacy-Preserving Data Mining With Dynamic Incentive Mechanism. IEEE Internet Things J. 11(1): 777-790 (2024) - [j389]Peiheng Zhang
, Min Tang
, Willy Susilo
, Mingwu Zhang
:
Efficient Noninteractive Polynomial Commitment Scheme in the Discrete Logarithm Setting. IEEE Internet Things J. 11(5): 8078-8089 (2024) - [j388]Yizhong Liu
, Boyu Zhao
, Zedan Zhao, Jianwei Liu
, Xun Lin, Qianhong Wu
, Willy Susilo
:
SS-DID: A Secure and Scalable Web3 Decentralized Identity Utilizing Multilayer Sharding Blockchain. IEEE Internet Things J. 11(15): 25694-25705 (2024) - [j387]Kaifeng Xiao
, Xinjian Chen
, Hongbo Li
, Jianye Huang, Willy Susilo
, Qiong Huang
:
A fully secure lattice-based signcryption with designated equality test in standard model. Inf. Sci. 658: 120015 (2024) - [j386]Yizhong Liu
, Zixiao Jia, Zixu Jiang, Xun Lin, Jianwei Liu, Qianhong Wu, Willy Susilo
:
BFL-SA: Blockchain-based federated learning via enhanced secure aggregation. J. Syst. Archit. 152: 103163 (2024) - [j385]Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo
, Huaxiong Wang, Yanhong Xu, Neng Zeng:
Group encryption: Full dynamicity, message filtering and code-based instantiation. Theor. Comput. Sci. 1007: 114678 (2024) - [j384]Chunpeng Ge
, Zhe Liu
, Willy Susilo
, Liming Fang
, Hao Wang
:
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract. IEEE Trans. Dependable Secur. Comput. 21(2): 937-948 (2024) - [j383]Chunpeng Ge
, Willy Susilo
, Zhe Liu
, Joonsang Baek
, Xiapu Luo
, Liming Fang
:
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 21(2): 949-960 (2024) - [j382]Yizhong Liu
, Xinxin Xing
, Ziheng Tong
, Xun Lin
, Jing Chen
, Zhenyu Guan
, Qianhong Wu
, Willy Susilo
:
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain. IEEE Trans. Dependable Secur. Comput. 21(4): 2603-2618 (2024) - [j381]Guohua Tian
, Jianghong Wei
, Meixia Miao
, Fuchun Guo
, Willy Susilo
, Xiaofeng Chen
:
Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing. IEEE Trans. Dependable Secur. Comput. 21(4): 3917-3930 (2024) - [j380]Wenchao Li
, Willy Susilo
, Chunhe Xia
, Luqi Huang
, Fuchun Guo
, Tianbo Wang
:
Secure Data Integrity Check Based on Verified Public Key Encryption With Equality Test for Multi-Cloud Storage. IEEE Trans. Dependable Secur. Comput. 21(6): 5359-5373 (2024) - [j379]Jinguang Han
, Patrick Schaumont
, Willy Susilo
:
Guest Editorial IEEE Transactions on Emerging Topics in Computing Special Section on Advances in Emerging Privacy-Preserving Computing. IEEE Trans. Emerg. Top. Comput. 12(1): 266-268 (2024) - [j378]Jinguang Han
, Willy Susilo
, Nan Li
, Xinyi Huang
:
OLBS: Oblivious Location-Based Services. IEEE Trans. Inf. Forensics Secur. 19: 2231-2243 (2024) - [j377]Jianchang Lai
, Willy Susilo
, Robert H. Deng
, Fuchun Guo
:
SDSS: Sequential Data Sharing System in IoT. IEEE Trans. Inf. Forensics Secur. 19: 2288-2299 (2024) - [j376]Mei Jiang
, Yannan Li
, Willy Susilo
, Dung Hoang Duong
:
Quantum-Safe Puncturable Signatures With Their Application in Blockchain. IEEE Trans. Inf. Forensics Secur. 19: 2761-2770 (2024) - [j375]Fucai Luo
, Haiyan Wang
, Willy Susilo
, Xingfu Yan
, Xiaofan Zheng
:
Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds. IEEE Trans. Inf. Forensics Secur. 19: 2919-2934 (2024) - [j374]Andi Liu
, Yizhong Liu
, Qianhong Wu
, Boyu Zhao
, Dongyu Li
, Yuan Lu
, Rongxing Lu
, Willy Susilo
:
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains. IEEE Trans. Inf. Forensics Secur. 19: 3178-3193 (2024) - [j373]Jiale Zhang
, Chengcheng Zhu, Xiaobing Sun
, Chunpeng Ge
, Bing Chen
, Willy Susilo
, Shui Yu
:
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training. IEEE Trans. Inf. Forensics Secur. 19: 4752-4766 (2024) - [j372]Mingzhe Zhai
, Qianhong Wu
, Yizhong Liu
, Bo Qin
, Xiaopeng Dai
, Qiyuan Gao
, Willy Susilo
:
Secret Multiple Leaders & Committee Election With Application to Sharding Blockchain. IEEE Trans. Inf. Forensics Secur. 19: 5060-5074 (2024) - [j371]Meiyan Xiao
, Qiong Huang
, Wenya Chen
, Chuan Lyu, Willy Susilo
:
Domain-Specific Fine-Grained Access Control for Cloud-Edge Collaborative IoT. IEEE Trans. Inf. Forensics Secur. 19: 6499-6513 (2024) - [j370]Mingzhe Zhai
, Yizhong Liu
, Qianhong Wu
, Bo Qin
, Haibin Zheng
, Xiaopeng Dai
, Zhenyang Ding
, Willy Susilo
:
Accountable Secret Committee Election and Anonymous Sharding Blockchain Consensus. IEEE Trans. Inf. Forensics Secur. 19: 9158-9172 (2024) - [j369]Qihao Dong
, Shengyuan Yang, Zhiyang Dai, Yansong Gao
, Shang Wang, Yuan Cao
, Anmin Fu
, Willy Susilo
:
CareFL: Contribution Guided Byzantine-Robust Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 9714-9729 (2024) - [j368]Jianghong Wei
, Meixia Miao
, Guohua Tian
, Jun Shen
, Xiaofeng Chen
, Willy Susilo
:
Optimal Verifiable Data Streaming Under Concurrent Queries. IEEE Trans. Mob. Comput. 23(5): 5543-5557 (2024) - [j367]Zhenhua Chen
, Luqi Huang
, Guomin Yang
, Willy Susilo
, Xingbing Fu
, Xingxing Jia
:
Attribute-Hiding Fuzzy Encryption for Privacy-Preserving Data Evaluation. IEEE Trans. Serv. Comput. 17(3): 789-803 (2024) - [j366]Y. Sreenivasa Rao
, Suryakant Prasad
, Sourav Bera
, Ashok Kumar Das
, Willy Susilo
:
Boolean Searchable Attribute-Based Signcryption With Search Results Self-Verifiability Mechanism for Data Storage and Retrieval in Clouds. IEEE Trans. Serv. Comput. 17(4): 1382-1399 (2024) - [j365]Jiale Zhang
, Hao Sui, Xiaobing Sun
, Chunpeng Ge
, Lu Zhou
, Willy Susilo
:
GrabPhisher: Phishing Scams Detection in Ethereum via Temporally Evolving GNNs. IEEE Trans. Serv. Comput. 17(6): 3727-3741 (2024) - [c384]Wei Zong, Yang-Wai Chow
, Willy Susilo
, Joonsang Baek
, Jongkil Kim, Seyit Camtepe
:
IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking. AAAI 2024: 7837-7845 - [c383]Nam Tran, Khoa Nguyen, Dongxi Liu, Josef Pieprzyk, Willy Susilo
:
Improved Multimodal Private Signatures from Lattices. ACISP (2) 2024: 3-23 - [c382]Luqi Huang, Willy Susilo
, Guomin Yang, Fuchun Guo:
Key Cooperative Attribute-Based Encryption. ACISP (1) 2024: 241-260 - [c381]Tuong Ngoc Nguyen
, Willy Susilo
, Dung Hoang Duong
, Fuchun Guo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems. ACISP (2) 2024: 269-289 - [c380]Jia-Chng Loh, Fuchun Guo, Willy Susilo
:
Pairing-Free ID-Based Signatures as Secure as Discrete Logarithm in AGM. ACISP (1) 2024: 347-367 - [c379]Thanh Xuan Khuc
, Willy Susilo
, Dung Hoang Duong
, Fuchun Guo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Threshold Ring Signatures with Accountability. ACISP (1) 2024: 368-388 - [c378]Xin Liu, Willy Susilo
, Joonsang Baek
:
Extended Withdrawable Signature. DSPP (1) 2024: 119-140 - [c377]Yumei Li, Willy Susilo
, Fuchun Guo:
Public Auditing with Aggregated Tags for Multiple Users. DSPP (2) 2024: 122-139 - [c376]Pingbin Luo, Xinjian Chen, Willy Susilo
, Qiong Huang:
Identity-Based Signature from Lattices Without Trapdoors. ICICS (2) 2024: 211-230 - [c375]Yanhua Zhang, Willy Susilo
, Yan Chen, Fuchun Guo, Jiaming Wen:
Lattice-Based Universal Designated Multi-verifiers Signature Scheme. ISPEC 2024: 33-54 - [c374]Tuong Ngoc Nguyen
, Willy Susilo
, Dung Hoang Duong
, Fuchun Guo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Shrinkable Ring Signatures: It Wasn't Them! ISPEC 2024: 75-93 - [c373]Yudi Zhang
, Yumei Li
, Mingwu Zhang
, Willy Susilo
:
OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT. ISPEC 2024: 383-402 - [c372]Shen Lin
, Xiaoyu Zhang
, Willy Susilo
, Xiaofeng Chen
, Jun Liu
:
GDR-GMA: Machine Unlearning via Direction-Rectified and Magnitude-Adjusted Gradients. ACM Multimedia 2024: 9087-9095 - [c371]Markus Bläser, Zhili Chen
, Dung Hoang Duong, Antoine Joux, Tuong Ngoc Nguyen, Thomas Plantard, Youming Qiao, Willy Susilo
, Gang Tang:
On Digital Signatures Based on Group Actions: QROM Security and Ring Signatures. PQCrypto (1) 2024: 227-261 - [c370]Zuoxia Yu
, Rupeng Yang
, Willy Susilo
, Man Ho Au
:
Blocklistable Anonymous Credential for Circuits with Post-quantum Security. ProvSec (2) 2024: 83-105 - [c369]Thanh Xuan Khuc, Willy Susilo
, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions. ProvSec (1) 2024: 189-208 - [c368]Thanh Xuan Khuc, Willy Susilo
, Dung Hoang Duong, Fuchun Guo, Hyungrok Jo, Tsuyoshi Takagi:
Tightly Secure Identity-Based Signature from Cryptographic Group Actions. ProvSec (1) 2024: 209-228 - [c367]Xin Liu
, Willy Susilo
, Joonsang Baek
:
Generic Construction of Withdrawable Signature from Hash-Then-One-Way Signature. ProvSec (1) 2024: 229-249 - [c366]Jianghong Wei, Guohua Tian, Ding Wang, Fuchun Guo, Willy Susilo, Xiaofeng Chen:
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus. USENIX Security Symposium 2024 - [i95]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo
, Willy Susilo
, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. CoRR abs/2403.15052 (2024) - [i94]Yongqi Jiang, Yansong Gao, Chunyi Zhou, Hongsheng Hu, Anmin Fu, Willy Susilo:
Intellectual Property Protection for Deep Learning Model and Dataset Intelligence. CoRR abs/2411.05051 (2024) - [i93]Sabyasachi Dutta, Partha Sarathi Roy, Reihaneh Safavi-Naini, Willy Susilo:
Password Protected Universal Thresholdizer. IACR Cryptol. ePrint Arch. 2024: 7 (2024) - 2023
- [j364]Zhenhua Chen, Jingjing Nie, Zhanli Li, Chunpeng Ge, Willy Susilo
:
Geometric Searchable Encryption Without False Positive And Its Applications. Comput. J. 66(9): 2155-2168 (2023) - [j363]Shijin Chen, Willy Susilo
, Yudi Zhang, Bo Yang, Mingwu Zhang
:
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing. Comput. Stand. Interfaces 85: 103707 (2023) - [j362]Zhen Zhao
, Willy Susilo
, Fuchun Guo
, Jianchang Lai, Baocang Wang:
Full black-box retrievable and accountable identity-based encryption. Comput. Stand. Interfaces 86: 103741 (2023) - [j361]Hoonyong Park, TaeGuen Kim, Daniel Gerbi Duguma, Jiyoon Kim
, Ilsun You, Willy Susilo
:
An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS. Comput. Syst. Sci. Eng. 45(2): 1145-1165 (2023) - [j360]Duy Tung Khanh Nguyen, Dung Hoang Duong, Willy Susilo
, Yang-Wai Chow
, Anh The Ta:
HeFUN: Homomorphic Encryption for Unconstrained Secure Neural Network Inference. Future Internet 15(12): 407 (2023) - [j359]Suryakanta Panda
, Samrat Mondal, Ashok Kumar Das, Willy Susilo
:
Secure access privilege delegation using attribute-based encryption. Int. J. Inf. Sec. 22(5): 1261-1276 (2023) - [j358]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang
, Willy Susilo
, Ilsun You:
Towards secure asynchronous messaging with forward secrecy and mutual authentication. Inf. Sci. 626: 114-132 (2023) - [j357]Gang Shen
, Zhiqiang Fu, Yumin Gui, Willy Susilo
, Mingwu Zhang:
Efficient and privacy-preserving online diagnosis scheme based on federated learning in e-healthcare system. Inf. Sci. 647: 119261 (2023) - [j356]Jinguang Han
, Liqun Chen, Willy Susilo
, Liquan Chen, Ge Wu
:
DFE-IP: Delegatable functional encryption for inner product. Inf. Sci. 647: 119425 (2023) - [j355]Yang-Wai Chow
, Willy Susilo
, Yannan Li
, Nan Li, Chau Nguyen:
Visualization and Cybersecurity in the Metaverse: A Survey. J. Imaging 9(1): 11 (2023) - [j354]Guohua Tian
, Jianghong Wei
, Miroslaw Kutylowski
, Willy Susilo
, Xinyi Huang, Xiaofeng Chen
:
VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing. IEEE Trans. Computers 72(7): 1928-1942 (2023) - [j353]Yudi Zhang
, Fuchun Guo
, Willy Susilo
, Guomin Yang
:
Balancing Privacy and Flexibility of Cloud-Based Personal Health Records Sharing System. IEEE Trans. Cloud Comput. 11(3): 2420-2430 (2023) - [j352]Jun Shen
, Xiaofeng Chen
, Jianghong Wei
, Fuchun Guo
, Willy Susilo
:
Blockchain-Based Accountable Auditing With Multi-Ownership Transfer. IEEE Trans. Cloud Comput. 11(3): 2711-2724 (2023) - [j351]Zhen Zhao
, Willy Susilo
, Baocang Wang
, Kai Zeng:
Public-Key Encryption With Tester Verifiable Equality Test for Cloud Computing. IEEE Trans. Cloud Comput. 11(4): 3396-3406 (2023) - [j350]Abderrahmane Nitaj, Willy Susilo
, Joseph Tonien:
A new attack on some RSA variants. Theor. Comput. Sci. 960: 113898 (2023) - [j349]Mingwu Zhang
, Yu Chen
, Willy Susilo
:
Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systems. IEEE Trans. Dependable Secur. Comput. 20(5): 3988-4001 (2023) - [j348]Hongbo Li
, Qiong Huang
, Jianye Huang
, Willy Susilo
:
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search. IEEE Trans. Inf. Forensics Secur. 18: 396-410 (2023) - [j347]Hua Shen
, Ge Wu
, Zhe Xia
, Willy Susilo
, Mingwu Zhang
:
A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform. IEEE Trans. Inf. Forensics Secur. 18: 2637-2652 (2023) - [j346]Intae Kim
, Willy Susilo
, Joonsang Baek
, Jongkil Kim
, Yang-Wai Chow
:
PCSF: Privacy-Preserving Content-Based Spam Filter. IEEE Trans. Inf. Forensics Secur. 18: 2856-2869 (2023) - [j345]Jun Shen
, Xiaofeng Chen
, Zheli Liu
, Willy Susilo
:
Verifiable and Redactable Blockchains With Fully Editing Operations. IEEE Trans. Inf. Forensics Secur. 18: 3787-3802 (2023) - [j344]Xueqiao Liu
, Guomin Yang
, Willy Susilo
, Kai He
, Robert H. Deng
, Jian Weng
:
Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits. IEEE Trans. Inf. Forensics Secur. 18: 4929-4943 (2023) - [j343]Mingwu Zhang
, Shijin Chen, Jian Shen
, Willy Susilo
:
PrivacyEAFL: Privacy-Enhanced Aggregation for Federated Learning in Mobile Crowdsensing. IEEE Trans. Inf. Forensics Secur. 18: 5804-5816 (2023) - [j342]Jianghong Wei
, Xiaofeng Chen
, Jianfeng Wang
, Xinyi Huang
, Willy Susilo
:
Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems. IEEE Trans. Parallel Distributed Syst. 34(2): 552-566 (2023) - [j341]Zhenhua Chen
, Jingjing Nie
, Li Zhan-Li, Willy Susilo
, Chunpeng Ge
:
Geometric Searchable Encryption for Privacy-Preserving Location-Based Services. IEEE Trans. Serv. Comput. 16(4): 2672-2684 (2023) - [j340]Peng Jiang
, Fuchun Guo
, Willy Susilo
, Chao Lin
, Jiaxi Hu, Zhen Zhao
, Liehuang Zhu
, Debiao He
:
EthereumX: Improving Signature Security With Randomness Preprocessing Module. IEEE Trans. Serv. Comput. 16(5): 3318-3331 (2023) - [j339]Willy Susilo
, Fuchun Guo
, Zhen Zhao
, Yinhao Jiang
, Chunpeng Ge
:
Secure Replication-Based Outsourced Computation Using Smart Contracts. IEEE Trans. Serv. Comput. 16(5): 3711-3722 (2023) - [j338]Yudi Zhang
, Willy Susilo
, Fuchun Guo
, Guomin Yang
:
PPDF: A Privacy-Preserving Cloud-Based Data Distribution System With Filtering. IEEE Trans. Serv. Comput. 16(6): 3920-3930 (2023) - [j337]Hua Shen
, Ge Wu
, Willy Susilo
, Mingwu Zhang
:
Data-Matching-Based Privacy-Preserving Statistics and Its Applications in Digital Publishing Industry. IEEE Trans. Serv. Comput. 16(6): 4554-4566 (2023) - [c365]Jia-Chng Loh
, Fuchun Guo
, Willy Susilo
, Guomin Yang:
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM. ACISP 2023: 199-219 - [c364]Chunpeng Ge
, Willy Susilo
, Zhe Liu
, Joonsang Baek
, Xiapu Luo
, Liming Fang
:
Attribute-based Proxy Re-encryption with Direct Revocation Mechanism for Data Sharing in Clouds. ACM TUR-C 2023: 164-165 - [c363]Mengdie Huang
, Yi Xie
, Xiaofeng Chen
, Jin Li
, Changyu Dong
, Zheli Liu
, Willy Susilo
:
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup. AsiaCCS 2023: 716-730 - [c362]Shang Wang
, Yansong Gao
, Anmin Fu
, Zhi Zhang
, Yuqing Zhang
, Willy Susilo
, Dongxi Liu
:
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. AsiaCCS 2023: 938-950 - [c361]Yamin Li
, Jianghong Wei
, Fuchun Guo
, Willy Susilo
, Xiaofeng Chen
:
Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions. ASIACRYPT (5) 2023: 134-165 - [c360]Khoa Nguyen
, Partha Sarathi Roy
, Willy Susilo
, Yanhong Xu
:
Bicameral and Auditably Private Signatures. ASIACRYPT (2) 2023: 313-347 - [c359]Thanh Xuan Khuc
, Willy Susilo
, Dung Hoang Duong
, Fuchun Guo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Compact Accountable Ring Signatures in the Plain Model. Inscrypt (1) 2023: 23-43 - [c358]Tuong Ngoc Nguyen
, Willy Susilo
, Dung Hoang Duong
, Fuchun Guo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Compact Ring Signatures with Post-Quantum Security in Standard Model. Inscrypt (1) 2023: 65-84 - [c357]Shen Lin
, Xiaoyu Zhang, Chenyang Chen, Xiaofeng Chen, Willy Susilo
:
ERM-KTP: Knowledge-Level Machine Unlearning via Knowledge Transfer. CVPR 2023: 20147-20155 - [c356]Jacob Neil Taylor
, Ngoc-Thuy Le
, Joonsang Baek
, Willy Susilo
:
Hyron: A New Approach for Automating the Network ACL Delivery Pipeline. ICCCN 2023: 1-10 - [c355]Xin Liu
, Joonsang Baek
, Willy Susilo
:
Withdrawable Signature: How to Call Off a Signature. ISC 2023: 557-577 - [c354]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. NDSS 2023 - [c353]Minh Thuy Truc Pham, Dung Hoang Duong, Yannan Li, Willy Susilo
:
Threshold Ring Signature Scheme from Cryptographic Group Action. ProvSec 2023: 207-227 - [c352]Duy Tung Khanh Nguyen, Dung Hoang Duong, Willy Susilo
, Yang-Wai Chow
:
HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference. SecureComm (1) 2023: 413-438 - [c351]Wei Zong, Yang-Wai Chow
, Willy Susilo
, Kien Do
, Svetha Venkatesh:
TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems. SP 2023: 1667-1683 - [c350]Thanh Xuan Khuc
, Anh The Ta
, Willy Susilo
, Dung Hoang Duong
, Fuchun Guo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems. SPACE 2023: 214-241 - [i92]Jinpeng Hou, Yansong Gao, Mang Su, Willy Susilo, Jie Chen, Anmin Fu:
Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys. IACR Cryptol. ePrint Arch. 2023: 180 (2023) - [i91]Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, Zhen Zhao:
Research Philosophy of Modern Cryptography. IACR Cryptol. ePrint Arch. 2023: 715 (2023) - [i90]Khoa Nguyen, Partha Sarathi Roy, Willy Susilo, Yanhong Xu:
Bicameral and Auditably Private Signatures. IACR Cryptol. ePrint Arch. 2023: 1351 (2023) - [i89]Xin Liu, Joonsang Baek, Willy Susilo:
Withdrawable Signature: How to Call off a Signature. IACR Cryptol. ePrint Arch. 2023: 1621 (2023) - 2022
- [j336]Jing Pan, Jiang Zhang, Fangguo Zhang
, Xiaofeng Chen, Willy Susilo
:
Lattice-based group encryptions with only one trapdoor. Sci. China Inf. Sci. 65(5): 1-18 (2022) - [j335]Parvin Rastegari, Willy Susilo
:
On Random-Oracle-Free Top-Level Secure Certificateless Signature Schemes. Comput. J. 65(12): 3049-3061 (2022) - [j334]Boyu Kuang, Anmin Fu
, Willy Susilo
, Shui Yu
, Yansong Gao:
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects. Comput. Secur. 112: 102498 (2022) - [j333]Anmin Fu
, Weijia Ding, Boyu Kuang, Qianmu Li, Willy Susilo
, Yuqing Zhang:
FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices. Comput. Secur. 116: 102666 (2022) - [j332]Jongkil Kim, Yang-Wai Chow
, Willy Susilo
, Joonsang Baek
, Intae Kim
:
Functional Encryption for Pattern Matching with a Hidden String. Cryptogr. 6(1): 1 (2022) - [j331]Yulin Wu
, Xuan Wang
, Willy Susilo
, Guomin Yang
, Zoe Lin Jiang, Siu-Ming Yiu, Hao Wang:
Generic server-aided secure multi-party computation in cloud computing. Comput. Stand. Interfaces 79: 103552 (2022) - [j330]Yulin Wu, Xuan Wang
, Willy Susilo
, Guomin Yang
, Zoe Lin Jiang, Junyi Li
, Xueqiao Liu
:
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security. Comput. Stand. Interfaces 80: 103570 (2022) - [j329]Yulin Wu, Xuan Wang
, Willy Susilo
, Guomin Yang
, Zoe Lin Jiang, Hao Wang, Tong Wu
:
Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks. Comput. Stand. Interfaces 80: 103571 (2022) - [j328]Hanchao Ku, Willy Susilo
, Yudi Zhang, Wenfen Liu, Mingwu Zhang:
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption. Comput. Stand. Interfaces 80: 103583 (2022) - [j327]Haiyan Wang
, Yuan Li, Willy Susilo
, Dung Hoang Duong, Fucai Luo:
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing. Comput. Stand. Interfaces 82: 103635 (2022) - [j326]Meixia Miao
, Jianghong Wei
, Jiaojiao Wu
, Kuan-Ching Li
, Willy Susilo
:
Verifiable data streaming with efficient update for intelligent automation systems. Int. J. Intell. Syst. 37(2): 1322-1338 (2022) - [j325]Mahdi Fahmideh
, John Grundy, Ghassan Beydoun
, Didar Zowghi
, Willy Susilo
, Davoud Mougouei:
A model-driven approach to reengineering processes in cloud computing. Inf. Softw. Technol. 144: 106795 (2022) - [j324]Zhen Zhao
, Fuchun Guo
, Ge Wu
, Willy Susilo
, Baocang Wang
:
Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms. IEEE Internet Things J. 9(22): 22595-22607 (2022) - [j323]Jianchang Lai, Fuchun Guo
, Willy Susilo
, Peng Jiang, Guomin Yang
, Xinyi Huang:
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts. Inf. Sci. 613: 966-981 (2022) - [j322]Wei Zong
, Yang-Wai Chow
, Willy Susilo
, Jongkil Kim
, Ngoc-Thuy Le
:
Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns. J. Imaging 8(12): 324 (2022) - [j321]Willy Susilo
, Fuchun Guo
, Zhen Zhao
, Ge Wu
:
PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing. IEEE Trans. Cloud Comput. 10(2): 1476-1488 (2022) - [j320]Fucai Luo
, Saif M. Al-Kuwari
, Willy Susilo
, Dung Hoang Duong
:
Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption. IEEE Trans. Cloud Comput. 10(4): 2398-2408 (2022) - [j319]Minh Thuy Truc Pham, Ngoc Ai Van Nguyen, Mei Jiang
, Dung Hoang Duong, Willy Susilo
:
Wildcarded identity-based encryption from lattices. Theor. Comput. Sci. 902: 41-53 (2022) - [j318]Dung Hoang Duong, Partha Sarathi Roy
, Willy Susilo
, Kazuhide Fukushima
, Shinsaku Kiyomoto, Arnaud Sipasseuth
:
Chosen-ciphertext lattice-based public key encryption with equality test in standard model. Theor. Comput. Sci. 905: 31-53 (2022) - [j317]Pairat Thorncharoensri
, Willy Susilo
, Yang-Wai Chow
:
Privacy-preserving file sharing on cloud storage with certificateless signcryption. Theor. Comput. Sci. 916: 1-21 (2022) - [j316]Priyanka Dutta
, Willy Susilo
, Dung Hoang Duong, Partha Sarathi Roy
:
Puncturable identity-based and attribute-based encryption from lattices. Theor. Comput. Sci. 929: 18-38 (2022) - [j315]Partha Sarathi Roy
, Dung Hoang Duong
, Willy Susilo
, Arnaud Sipasseuth
, Kazuhide Fukushima, Shinsaku Kiyomoto:
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model. Theor. Comput. Sci. 929: 124-139 (2022) - [j314]Xinjian Chen, Qiong Huang, Hongbo Li, Zhijian Liao, Willy Susilo
:
A novel identity-based multi-signature scheme over NTRU lattices. Theor. Comput. Sci. 933: 163-176 (2022) - [j313]Yannan Li
, Willy Susilo
, Guomin Yang
, Yong Yu
, Dongxi Liu, Xiaojiang Du
, Mohsen Guizani
:
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT. IEEE Trans. Dependable Secur. Comput. 19(1): 119-130 (2022) - [j312]Jianting Ning
, Xinyi Huang
, Willy Susilo
, Kaitai Liang
, Ximeng Liu
, Yinghui Zhang
:
Dual Access Control for Cloud-Based Data Storage and Sharing. IEEE Trans. Dependable Secur. Comput. 19(2): 1036-1048 (2022) - [j311]Jianye Huang
, Willy Susilo
, Fuchun Guo
, Ge Wu
, Zhen Zhao
, Qiong Huang
:
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*. IEEE Trans. Dependable Secur. Comput. 19(2): 1280-1291 (2022) - [j310]Hongbo Li
, Qiong Huang
, Willy Susilo
:
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search. IEEE Trans. Dependable Secur. Comput. 19(3): 1532-1543 (2022) - [j309]Intae Kim
, Willy Susilo
, Joonsang Baek
, Jongkil Kim:
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption. IEEE Trans. Dependable Secur. Comput. 19(3): 1856-1870 (2022) - [j308]Willy Susilo
, Peng Jiang
, Jianchang Lai
, Fuchun Guo
, Guomin Yang
, Robert H. Deng
:
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers. IEEE Trans. Dependable Secur. Comput. 19(3): 2138-2148 (2022) - [j307]Chunpeng Ge
, Willy Susilo
, Joonsang Baek
, Zhe Liu, Jinyue Xia, Liming Fang
:
Revocable Attribute-Based Encryption With Data Integrity in Clouds. IEEE Trans. Dependable Secur. Comput. 19(5): 2864-2872 (2022) - [j306]Chunpeng Ge
, Willy Susilo
, Joonsang Baek
, Zhe Liu, Jinyue Xia
, Liming Fang
:
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 19(5): 2907-2919 (2022) - [j305]Liming Fang
, Minghui Li
, Zhe Liu
, Changting Lin
, Shouling Ji
, Anni Zhou
, Willy Susilo
, Chunpeng Ge
:
A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy. IEEE Trans. Dependable Secur. Comput. 19(5): 3564-3578 (2022) - [j304]Guohua Tian
, Yunhan Hu, Jianghong Wei
, Zheli Liu
, Xinyi Huang
, Xiaofeng Chen
, Willy Susilo
:
Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage. IEEE Trans. Dependable Secur. Comput. 19(6): 3941-3954 (2022) - [j303]Thomas Plantard
, Arnaud Sipasseuth
, Willy Susilo
, Vincent Zucca
:
Tight Bound on NewHope Failure Probability. IEEE Trans. Emerg. Top. Comput. 10(4): 1955-1965 (2022) - [j302]Peng Xu
, Willy Susilo
, Wei Wang
, Tianyang Chen, Qianhong Wu
, Kaitai Liang
, Hai Jin
:
ROSE: Robust Searchable Encryption With Forward and Backward Security. IEEE Trans. Inf. Forensics Secur. 17: 1115-1130 (2022) - [j301]Meiyan Xiao
, Hongbo Li, Qiong Huang
, Shui Yu
, Willy Susilo
:
Attribute-Based Hierarchical Access Control With Extendable Policy. IEEE Trans. Inf. Forensics Secur. 17: 1868-1883 (2022) - [j300]Junjie Jiang
, Willy Susilo
, Joonsang Baek
:
Security Analysis of "SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks". IEEE Trans. Inf. Forensics Secur. 17: 3006-3007 (2022) - [j299]Ying Miao
, Qiong Huang
, Meiyan Xiao
, Willy Susilo
:
Blockchain Assisted Multi-Copy Provable Data Possession With Faults Localization in Multi-Cloud Storage. IEEE Trans. Inf. Forensics Secur. 17: 3663-3676 (2022) - [j298]Anmin Fu
, Zhenzhu Chen
, Yi Mu
, Willy Susilo
, Yinxia Sun
, Jie Wu
:
Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization. IEEE Trans. Serv. Comput. 15(1): 266-278 (2022) - [j297]Xueqiao Liu
, Guomin Yang
, Willy Susilo
, Joseph Tonien
, Rongmao Chen
, Xixiang Lv
:
Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage. IEEE Trans. Serv. Comput. 15(3): 1664-1677 (2022) - [j296]Jianchang Lai
, Fuchun Guo
, Willy Susilo
, Xinyi Huang
, Peng Jiang
, Futai Zhang
:
Data Access Control in Cloud Computing: Flexible and Receiver Extendable. IEEE Trans. Serv. Comput. 15(5): 2658-2670 (2022) - [j295]Meiyan Xiao
, Qiong Huang
, Ying Miao, Shunpeng Li, Willy Susilo
:
Blockchain Based Multi-Authority Fine-Grained Access Control System With Flexible Revocation. IEEE Trans. Serv. Comput. 15(6): 3143-3155 (2022) - [j294]Mahdi Fahmideh
, Aakash Ahmad
, Ali Behnaz, John Grundy
, Willy Susilo
:
Software Engineering for Internet of Things: The Practitioners' Perspective. IEEE Trans. Software Eng. 48(8): 2857-2878 (2022) - [j293]Parvin Rastegari, Willy Susilo
:
On delegatability of MDVS schemes. J. Comput. Virol. Hacking Tech. 18(2): 71-80 (2022) - [c349]Abderrahmane Nitaj, Willy Susilo
, Joseph Tonien:
A Generalized Attack on the Multi-prime Power RSA. AFRICACRYPT 2022: 537-549 - [c348]Priyanka Dutta, Mei Jiang
, Dung Hoang Duong, Willy Susilo
, Kazuhide Fukushima
, Shinsaku Kiyomoto:
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security. AsiaCCS 2022: 408-422 - [c347]Rupeng Yang, Zuoxia Yu, Man Ho Au, Willy Susilo
:
Public-Key Watermarking Schemes for Pseudorandom Functions. CRYPTO (2) 2022: 637-667 - [c346]Khoa Nguyen
, Fuchun Guo
, Willy Susilo
, Guomin Yang
:
Multimodal Private Signatures. CRYPTO (2) 2022: 792-822 - [c345]Wei Zong, Yang-Wai Chow
, Willy Susilo
:
High Quality Audio Adversarial Examples Without Using Psychoacoustics. CSS 2022: 163-177 - [c344]Kien Do
, Haripriya Harikumar, Hung Le, Dung Nguyen, Truyen Tran, Santu Rana
, Dang Nguyen, Willy Susilo
, Svetha Venkatesh:
Towards Effective and Robust Neural Trojan Defenses via Input Filtering. ECCV (5) 2022: 283-300 - [c343]Willy Susilo
, Yannan Li
, Fuchun Guo
, Jianchang Lai
, Ge Wu
:
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost. ESORICS (2) 2022: 65-85 - [c342]Yubo Zheng, Peng Xu
, Wei Wang, Tianyang Chen, Willy Susilo
, Kaitai Liang, Hai Jin:
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay. ESORICS (2) 2022: 86-104 - [c341]Huy Quoc Le
, Dung Hoang Duong
, Willy Susilo
, Josef Pieprzyk
:
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More. ESORICS (1) 2022: 283-302 - [c340]Tuong Ngoc Nguyen
, Anh The Ta
, Huy Quoc Le
, Dung Hoang Duong
, Willy Susilo
, Fuchun Guo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Efficient Unique Ring Signatures from Lattices. ESORICS (2) 2022: 447-466 - [c339]Mei Jiang
, Dung Hoang Duong
, Willy Susilo
:
Puncturable Signature: A Generic Construction and Instantiations. ESORICS (2) 2022: 507-527 - [c338]Yi Xie
, Mengdie Huang
, Xiaoyu Zhang, Changyu Dong, Willy Susilo
, Xiaofeng Chen:
GAME: Generative-Based Adaptive Model Extraction Attack. ESORICS (1) 2022: 570-588 - [c337]Fuchun Guo
, Willy Susilo
:
Optimal Tightness for Chain-Based Unique Signatures. EUROCRYPT (2) 2022: 553-583 - [c336]Gang Tang
, Dung Hoang Duong
, Antoine Joux
, Thomas Plantard
, Youming Qiao
, Willy Susilo
:
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms. EUROCRYPT (3) 2022: 582-612 - [c335]Willy Susilo:
Keynote Speech. ISPA/BDCloud/SocialCom/SustainCom 2022: xxv - [c334]Priyanka Dutta
, Dung Hoang Duong
, Willy Susilo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices. ProvSec 2022: 121-136 - [c333]Zhaojie Wang
, Willy Susilo
, Jianan Guo
, Yilei Wang
, Minghao Zhao
:
Reinforcement-Mining: Protecting Reward in Selfish Mining. ProvSec 2022: 199-209 - [c332]Meiyan Xiao, Qiong Huang, Ying Miao, Shunpeng Li, Willy Susilo
:
Blockchain Based Multi-Authority Fine-Grained Access Control System With Flexible Revocation. SERVICES 2022: 31 - [c331]Intae Kim
, Willy Susilo
, Joonsang Baek
, Jongkil Kim
, Yang-Wai Chow
:
TLS Goes Low Cost: When TLS Meets Edge. WISA 2022: 102-113 - [e20]Khoa Nguyen
, Guomin Yang
, Fuchun Guo
, Willy Susilo
:
Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings. Lecture Notes in Computer Science 13494, Springer 2022, ISBN 978-3-031-22300-6 [contents] - [e19]Xiaofeng Chen, Jian Shen
, Willy Susilo
:
Cyberspace Safety and Security - 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings. Lecture Notes in Computer Science 13547, Springer 2022, ISBN 978-3-031-18066-8 [contents] - [e18]Willy Susilo
, Xiaofeng Chen
, Fuchun Guo
, Yudi Zhang
, Rolly Intan:
Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings. Lecture Notes in Computer Science 13640, Springer 2022, ISBN 978-3-031-22389-1 [contents] - [i88]Kien Do, Haripriya Harikumar, Hung Le, Dung Nguyen, Truyen Tran, Santu Rana, Dang Nguyen, Willy Susilo
, Svetha Venkatesh:
Towards Effective and Robust Neural Trojan Defenses via Input Filtering. CoRR abs/2202.12154 (2022) - [i87]Shang Wang, Yansong Gao, Anmin Fu
, Zhi Zhang, Yuqing Zhang, Willy Susilo
:
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences. CoRR abs/2206.00145 (2022) - [i86]Haripriya Harikumar, Santu Rana, Kien Do, Sunil Gupta, Wei Zong, Willy Susilo
, Svetha Venkatesh:
Defense Against Multi-target Trojan Attacks. CoRR abs/2207.03895 (2022) - [i85]Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk:
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More. IACR Cryptol. ePrint Arch. 2022: 95 (2022) - [i84]Giang Linh Duc Nguyen, Dung Hoang Duong, Huy Quoc Le, Willy Susilo:
Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing. IACR Cryptol. ePrint Arch. 2022: 199 (2022) - [i83]Gang Tang, Dung Hoang Duong, Antoine Joux, Thomas Plantard, Youming Qiao, Willy Susilo:
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms. IACR Cryptol. ePrint Arch. 2022: 267 (2022) - [i82]Fuchun Guo, Willy Susilo:
Optimal Tightness for Chain-Based Unique Signatures. IACR Cryptol. ePrint Arch. 2022: 526 (2022) - [i81]Rupeng Yang, Zuoxia Yu, Man Ho Au, Willy Susilo:
Public-Key Watermarking Schemes for Pseudorandom Functions. IACR Cryptol. ePrint Arch. 2022: 768 (2022) - [i80]Khoa Nguyen, Fuchun Guo, Willy Susilo, Guomin Yang:
Multimodal Private Signatures. IACR Cryptol. ePrint Arch. 2022: 1008 (2022) - [i79]Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signatures From Lattices. IACR Cryptol. ePrint Arch. 2022: 1070 (2022) - [i78]Zhili Chen, Dung Hoang Duong, Tuong Ngoc Nguyen, Youming Qiao, Willy Susilo, Gang Tang:
On digital signatures based on isomorphism problems: QROM security and ring signatures. IACR Cryptol. ePrint Arch. 2022: 1184 (2022) - 2021
- [j292]Hua Shen
, Mingwu Zhang
, Hao Wang
, Fuchun Guo
, Willy Susilo
:
Efficient and Privacy-Preserving Massive Data Processing for Smart Grids. IEEE Access 9: 70616-70627 (2021) - [j291]Huy Quoc Le
, Bay Vo
, Dung Hoang Duong
, Willy Susilo
, Ngoc-Thuy Le, Kazuhide Fukushima
, Shinsaku Kiyomoto:
Identity-Based Linkable Ring Signatures From Lattices. IEEE Access 9: 84739-84755 (2021) - [j290]Zengpeng Li, Vishal Sharma
, Chunguang Ma, Chunpeng Ge, Willy Susilo
:
Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs. Sci. China Inf. Sci. 64(6) (2021) - [j289]Qingwen Guo
, Qiong Huang, Sha Ma, Meiyan Xiao, Guomin Yang
, Willy Susilo
:
Functional signatures: new definition and constructions. Sci. China Inf. Sci. 64(12) (2021) - [j288]Hao Lin, Zhen Zhao, Fei Gao, Willy Susilo
, Qiaoyan Wen, Fuchun Guo
, Yijie Shi:
Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage. Comput. J. 64(8): 1226-1238 (2021) - [j287]Willy Susilo
, Joseph Tonien
, Guomin Yang
:
Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA. Comput. Stand. Interfaces 74: 103470 (2021) - [j286]Dung Hoang Duong
, Ha Thanh Nguyen Tran
, Willy Susilo
, Le Van Luyen:
An efficient multivariate threshold ring signature scheme. Comput. Stand. Interfaces 74: 103489 (2021) - [j285]Fucai Luo
, Saif M. Al-Kuwari
, Willy Susilo
, Dung Hoang Duong:
Attribute-based proxy re-signature from standard lattices and its applications. Comput. Stand. Interfaces 75: 103499 (2021) - [j284]Huy Quoc Le
, Dung Hoang Duong
, Partha Sarathi Roy
, Willy Susilo
, Kazuhide Fukushima
, Shinsaku Kiyomoto:
Lattice-based signcryption with equality test in standard model. Comput. Stand. Interfaces 76: 103515 (2021) - [j283]Pingshui Wang, Willy Susilo
:
Data Security Storage Model of the Internet of Things Based on Blockchain. Comput. Syst. Sci. Eng. 36(1): 213-224 (2021) - [j282]Meixia Miao
, Guohua Tian
, Willy Susilo
:
New proofs of ownership for efficient data deduplication in the adversarial conspiracy model. Int. J. Intell. Syst. 36(6): 2753-2766 (2021) - [j281]Hua Shen
, Mingwu Zhang
, Hao Wang
, Fuchun Guo
, Willy Susilo
:
A cloud-aided privacy-preserving multi-dimensional data comparison protocol. Inf. Sci. 545: 739-752 (2021) - [j280]Yang-Wai Chow
, Willy Susilo
, Jianfeng Wang
, Richard Buckland, Joonsang Baek
, Jongkil Kim, Nan Li
:
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning. J. Netw. Comput. Appl. 173: 102834 (2021) - [j279]Yang-Wai Chow
, Willy Susilo
, Joonsang Baek
, Jongkil Kim, Wei Zong
:
Exploiting QR Code Error Correction for Digital Image Watermarking. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(2): 114-140 (2021) - [j278]Mingwu Zhang
, Yu Chen, Zhe Xia, Jiangyi Du, Willy Susilo
:
PPO-DFK: A Privacy-Preserving Optimization of Distributed Fractional Knapsack With Application in Secure Footballer Configurations. IEEE Syst. J. 15(1): 759-770 (2021) - [j277]Priyanka Dutta
, Willy Susilo
, Dung Hoang Duong, Partha Sarathi Roy
:
Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model. Theor. Comput. Sci. 871: 16-29 (2021) - [j276]Willy Susilo
, Joseph Tonien
:
A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations. Theor. Comput. Sci. 885: 125-130 (2021) - [j275]Jianchang Lai, Ge Wu, Peng Jiang, Zhen Zhao
, Willy Susilo
, Fuchun Guo
:
Generic construction for tightly-secure signatures from discrete log. Theor. Comput. Sci. 888: 13-21 (2021) - [j274]Yannan Li
, Guomin Yang
, Willy Susilo
, Yong Yu
, Man Ho Au
, Dongxi Liu:
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. IEEE Trans. Dependable Secur. Comput. 18(2): 679-691 (2021) - [j273]Jianghong Wei
, Xiaofeng Chen
, Xinyi Huang
, Xuexian Hu
, Willy Susilo
:
RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud. IEEE Trans. Dependable Secur. Comput. 18(5): 2301-2315 (2021) - [j272]Chunpeng Ge
, Willy Susilo
, Zhe Liu, Jinyue Xia
, Pawel Szalachowski
, Liming Fang
:
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing. IEEE Trans. Dependable Secur. Comput. 18(6): 2787-2800 (2021) - [j271]Yulin Wu
, Xuan Wang
, Willy Susilo
, Guomin Yang
, Zoe Lin Jiang
, Qian Chen
, Peng Xu
:
Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing. IEEE Trans. Dependable Secur. Comput. 18(6): 2820-2834 (2021) - [j270]Yuanhao Wang, Qiong Huang
, Hongbo Li, Meiyan Xiao
, Sha Ma
, Willy Susilo
:
Private Set Intersection With Authorization Over Outsourced Encrypted Datasets. IEEE Trans. Inf. Forensics Secur. 16: 4050-4062 (2021) - [j269]Xiaofeng Chen
, Hui Li
, Jin Li
, Qian Wang
, Xinyi Huang
, Willy Susilo
, Yang Xiang
:
Publicly Verifiable Databases With All Efficient Updating Operations. IEEE Trans. Knowl. Data Eng. 33(12): 3729-3740 (2021) - [j268]Xiaojiang Du, Willy Susilo
, Mohsen Guizani
, Zhihong Tian:
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense. IEEE Trans. Netw. Sci. Eng. 8(2): 905-907 (2021) - [j267]Xueqiao Liu
, Guomin Yang
, Willy Susilo
, Joseph Tonien
, Ximeng Liu
, Jian Shen
:
Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems. IEEE Trans. Parallel Distributed Syst. 32(3): 561-574 (2021) - [j266]Zhi Quan Zhou
, Chen Liu
, Tsong Yueh Chen
, T. H. Tse
, Willy Susilo
:
Beating Random Test Case Prioritization. IEEE Trans. Reliab. 70(2): 654-675 (2021) - [j265]Peng Jiang
, Fuchun Guo
, Willy Susilo
, Man Ho Au
, Xinyi Huang
, Joseph K. Liu
:
Efficient and Adaptive Procurement Protocol with Purchasing Privacy. IEEE Trans. Serv. Comput. 14(3): 683-694 (2021) - [j264]Peng Jiang
, Fuchun Guo
, Willy Susilo
, Man Ho Au
, Jianchang Lai
, Wenmin Li:
PPFilter: Provider Privacy-Aware Encrypted Filtering System. IEEE Trans. Serv. Comput. 14(5): 1519-1530 (2021) - [j263]Peiming Xu, Shaohua Tang, Peng Xu, Qianhong Wu, Honggang Hu, Willy Susilo:
Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server. IEEE Trans. Serv. Comput. 14(6): 1877-1889 (2021) - [j262]Raveendra Babu Ponnuru
, Ruhul Amin
, Alavalapati Goutham Reddy
, Ashok Kumar Das
, Willy Susilo
, Youngho Park
:
Robust Authentication Protocol for Dynamic Charging System of Electric Vehicles. IEEE Trans. Veh. Technol. 70(11): 11338-11351 (2021) - [j261]Yannan Li
, Yong Yu
, Willy Susilo
, Zhiyong Hong, Mohsen Guizani
:
Security and Privacy for Edge Intelligence in 5G and Beyond Networks: Challenges and Solutions. IEEE Wirel. Commun. 28(2): 63-69 (2021) - [c330]Xueqiao Liu
, Kai He
, Guomin Yang
, Willy Susilo
, Joseph Tonien
, Qiong Huang
:
Broadcast Authenticated Encryption with Keyword Search. ACISP 2021: 193-213 - [c329]Yannan Li
, Willy Susilo
, Guomin Yang
, Tran Viet Xuan Phuong
, Yong Yu
, Dongxi Liu:
Concise Mercurial Subvector Commitments: Definitions and Constructions. ACISP 2021: 353-371 - [c328]Anh The Ta, Thanh Xuan Khuc, Tuong Ngoc Nguyen, Huy Quoc Le, Dung Hoang Duong, Willy Susilo
, Kazuhide Fukushima
, Shinsaku Kiyomoto:
Efficient Unique Ring Signature for Blockchain Privacy Protection. ACISP 2021: 391-407 - [c327]Wei Zong
, Yang-Wai Chow
, Willy Susilo
:
Towards Visualizing and Detecting Audio Adversarial Examples for Automatic Speech Recognition. ACISP 2021: 531-549 - [c326]Priyanka Dutta
, Willy Susilo
, Dung Hoang Duong, Partha Sarathi Roy
:
Puncturable Identity-Based Encryption from Lattices. ACISP 2021: 571-589 - [c325]Jing Pan, Xiaofeng Chen, Fangguo Zhang
, Willy Susilo
:
Forward-Secure Group Encryptions from Lattices. ACISP 2021: 610-629 - [c324]Partha Sarathi Roy
, Sabyasachi Dutta
, Willy Susilo
, Reihaneh Safavi-Naini:
Password Protected Secret Sharing from Lattices. ACNS (1) 2021: 442-459 - [c323]Jean-Claude Bajard, Kazuhide Fukushima
, Shinsaku Kiyomoto, Thomas Plantard, Arnaud Sipasseuth
, Willy Susilo
:
Generating Residue Number System Bases. ARITH 2021: 86-93 - [c322]Jongkil Kim, Seyit Camtepe, Joonsang Baek
, Willy Susilo
, Josef Pieprzyk
, Surya Nepal:
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection. AsiaCCS 2021: 135-146 - [c321]Yannan Li
, Willy Susilo
, Guomin Yang
, Yong Yu
, Tran Viet Xuan Phuong, Dongxi Liu:
Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual. AsiaCCS 2021: 859-871 - [c320]Jing Pan, Xiaofeng Chen, Fangguo Zhang
, Willy Susilo
:
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy. ASIACRYPT (4) 2021: 156-186 - [c319]Tianyang Chen, Peng Xu
, Wei Wang, Yubo Zheng, Willy Susilo
, Hai Jin:
Bestie: Very Practical Searchable Encryption with Forward and Backward Security. ESORICS (2) 2021: 3-23 - [c318]Tran Viet Xuan Phuong, Willy Susilo
, Guomin Yang
, Jongkil Kim, Yang-Wai Chow
, Dongxi Liu:
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments. ESORICS (2) 2021: 106-126 - [c317]Willy Susilo
, Priyanka Dutta
, Dung Hoang Duong, Partha Sarathi Roy
:
Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model. ESORICS (2) 2021: 169-191 - [c316]Jianghong Wei, Guohua Tian, Jun Shen, Xiaofeng Chen, Willy Susilo
:
Optimal Verifiable Data Streaming Protocol with Data Auditing. ESORICS (2) 2021: 296-312 - [c315]Stephen S. Yau, Zheng Yan, Willy Susilo
:
Message from the DependSys 2021 General Chairs. HPCC/DSS/SmartCity/DependSys 2021: lxxviii - [c314]Wei Zong
, Yang-Wai Chow
, Willy Susilo
:
Black-Box Audio Adversarial Example Generation Using Variational Autoencoder. ICICS (2) 2021: 142-160 - [c313]Meryem Cherkaoui Semmouni, Abderrahmane Nitaj, Willy Susilo
, Joseph Tonien
:
Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits. ISC 2021: 42-53 - [c312]Wei Zong
, Yang-Wai Chow
, Willy Susilo
, Santu Rana
, Svetha Venkatesh
:
Targeted Universal Adversarial Perturbations for Automatic Speech Recognition. ISC 2021: 358-373 - [c311]Wei Zong
, Yang-Wai Chow
, Willy Susilo
, Jongkil Kim
:
Trojan Attacks and Defense for Speech Recognition. MobiSec 2021: 195-210 - [c310]Khoa Nguyen
, Reihaneh Safavi-Naini, Willy Susilo
, Huaxiong Wang, Yanhong Xu
, Neng Zeng:
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. Public Key Cryptography (2) 2021: 678-708 - [c309]Xin Liu
, Willy Susilo
, Joonsang Baek
:
Secure Computation of Shared Secrets and Its Applications. WISA 2021: 119-131 - [c308]Jongkil Kim, Willy Susilo
, Yang-Wai Chow
, Joonsang Baek
, Intae Kim
:
Pattern Matching over Encrypted Data with a Short Ciphertext. WISA 2021: 132-143 - [e17]Joseph K. Liu
, Sokratis K. Katsikas
, Weizhi Meng
, Willy Susilo
, Rolly Intan:
Information Security - 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings. Lecture Notes in Computer Science 13118, Springer 2021, ISBN 978-3-030-91355-7 [contents] - [i77]Mahdi Fahmideh
, Aakash Ahmed, Ali Behnaz, John Grundy, Willy Susilo:
Software Engineering for Internet of Things. CoRR abs/2102.10708 (2021) - [i76]Mahdi Fahmideh, John C. Grundy, Ghassan Beydoun
, Didar Zowghi, Willy Susilo
, Davoud Mougouei:
A Model-Driven Approach to Reengineering Processes in Cloud Computing. CoRR abs/2109.11896 (2021) - [i75]Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng:
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. IACR Cryptol. ePrint Arch. 2021: 226 (2021) - [i74]Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal:
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection. IACR Cryptol. ePrint Arch. 2021: 789 (2021) - [i73]Andrea Lesavourey, Thomas Plantard, Willy Susilo:
On the Short Principal Ideal Problem over some real Kummer fields. IACR Cryptol. ePrint Arch. 2021: 1623 (2021) - [i72]Meryem Cherkaoui Semmouni, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits. IACR Cryptol. ePrint Arch. 2021: 1632 (2021) - 2020
- [j260]Pairat Thorncharoensri
, Willy Susilo
, Joonsang Baek
:
Aggregatable Certificateless Designated Verifier Signature. IEEE Access 8: 95019-95031 (2020) - [j259]Zhen Zhao, Ge Wu, Fuchun Guo
, Willy Susilo
, Yi Mu, Baocang Wang, Yupu Hu:
Black-Box Accountable Authority Identity-Based Revocation System. Comput. J. 63(4): 525-535 (2020) - [j258]Dung Hoang Duong, Willy Susilo
, Ha Thanh Nguyen Tran:
A Multivariate Blind Ring Signature Scheme. Comput. J. 63(8): 1194-1202 (2020) - [j257]Zhichao Yang, Dung Hoang Duong, Willy Susilo
, Guomin Yang
, Chao Li, Rongmao Chen:
Hierarchical Identity-Based Signature in Polynomial Rings. Comput. J. 63(10): 1490-1499 (2020) - [j256]Ge Wu, Zhen Zhao, Fuchun Guo
, Willy Susilo
, Futai Zhang:
On the General Construction of Tightly Secure Identity-Based Signature Schemes. Comput. J. 63(12): 1835-1848 (2020) - [j255]Boyu Kuang
, Anmin Fu
, Lu Zhou, Willy Susilo
, Yuqing Zhang:
DO-RA: Data-oriented runtime attestation for IoT devices. Comput. Secur. 97: 101945 (2020) - [j254]Wei Zong
, Yang-Wai Chow
, Willy Susilo
:
Interactive three-dimensional visualization of network intrusion detection data for machine learning. Future Gener. Comput. Syst. 102: 292-306 (2020) - [j253]Chun-Hui Wu, Xiaofeng Chen, Willy Susilo
:
Concise ID-based mercurial functional commitments and applications to zero-knowledge sets. Int. J. Inf. Sec. 19(4): 453-464 (2020) - [j252]Arnaud Sipasseuth
, Thomas Plantard
, Willy Susilo
:
A Noise Study of the PSW Signature Family: Patching DRS with Uniform Distribution †. Inf. 11(3): 133 (2020) - [j251]Dung Hoang Duong, Willy Susilo
, Viet Cuong Trinh
:
A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme. Inf. 11(5): 260 (2020) - [j250]Hua Shen
, Mingwu Zhang
, Hao Wang
, Fuchun Guo
, Willy Susilo
:
A Lightweight Privacy-Preserving Fair Meeting Location Determination Scheme. IEEE Internet Things J. 7(4): 3083-3093 (2020) - [j249]Ruonan Chen
, Yannan Li
, Yong Yu
, Huilin Li, Xiaofeng Chen
, Willy Susilo
:
Blockchain-Based Dynamic Provable Data Possession for Smart Cities. IEEE Internet Things J. 7(5): 4143-4154 (2020) - [j248]Mingwu Zhang
, Yu Chen
, Willy Susilo
:
PPO-CPQ: A Privacy-Preserving Optimization of Clinical Pathway Query for E-Healthcare Systems. IEEE Internet Things J. 7(10): 10660-10672 (2020) - [j247]Jianye Huang, Qiong Huang
, Willy Susilo
:
Leakage-resilient group signature: Definitions and constructions. Inf. Sci. 509: 119-132 (2020) - [j246]Mojtaba Khalili, Mohammad Dakhilalian
, Willy Susilo
:
Efficient chameleon hash functions in the enhanced collision resistant model. Inf. Sci. 510: 155-164 (2020) - [j245]Ge Wu
, Futai Zhang, Limin Shen, Fuchun Guo
, Willy Susilo
:
Certificateless aggregate signature scheme secure against fully chosen-key attacks. Inf. Sci. 514: 288-301 (2020) - [j244]Hao Wang
, Hong Qin
, Minghao Zhao
, Xiaochao Wei
, Hua Shen
, Willy Susilo
:
Blockchain-based fair payment smart contract for public cloud storage auditing. Inf. Sci. 519: 348-362 (2020) - [j243]Haoran Yuan, Xiaofeng Chen, Jianfeng Wang
, Jiaming Yuan
, Hongyang Yan, Willy Susilo
:
Blockchain-based public auditing and secure deduplication with fair arbitration. Inf. Sci. 541: 409-425 (2020) - [j242]Willy Susilo
, Joseph Tonien
, Guomin Yang
:
A generalised bound for the Wiener attack on RSA. J. Inf. Secur. Appl. 53: 102531 (2020) - [j241]Priyanka Dutta
, Willy Susilo
, Dung Hoang Duong, Joonsang Baek
, Partha Sarathi Roy
:
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions. J. Internet Serv. Inf. Secur. 10(4): 1-22 (2020) - [j240]Andrea Lesavourey
, Thomas Plantard
, Willy Susilo
:
Short Principal Ideal Problem in multicubic fields. J. Math. Cryptol. 14(1): 359-392 (2020) - [j239]Zheng Yan
, Willy Susilo
, Elisa Bertino, Jun Zhang, Laurence T. Yang:
AI-driven data security and privacy. J. Netw. Comput. Appl. 172: 102842 (2020) - [j238]Dung Hoang Duong, Willy Susilo
, Viet Cuong Trinh
:
Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(2): 74-86 (2020) - [j237]Zhen Zhao
, Fuchun Guo
, Jianchang Lai, Willy Susilo
, Baocang Wang, Yupu Hu:
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts. Theor. Comput. Sci. 809: 73-87 (2020) - [j236]Yinxia Sun, Yi Mu, Willy Susilo
, Futai Zhang, Anmin Fu
:
Revocable identity-based encryption with server-aided ciphertext evolution. Theor. Comput. Sci. 815: 11-24 (2020) - [j235]Hui Cui
, Baodong Qin, Willy Susilo
, Surya Nepal
:
Robust digital signature revisited. Theor. Comput. Sci. 844: 87-96 (2020) - [j234]Mohammad Wazid
, Ashok Kumar Das
, Vanga Odelu
, Neeraj Kumar
, Willy Susilo
:
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Trans. Dependable Secur. Comput. 17(2): 391-406 (2020) - [j233]Yong Yu
, Yannan Li
, Bo Yang, Willy Susilo
, Guomin Yang
, Jian Bai
:
Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage. IEEE Trans. Emerg. Top. Comput. 8(2): 377-390 (2020) - [c307]Huy Quoc Le
, Dung Hoang Duong, Willy Susilo
, Ha Thanh Nguyen Tran, Viet Cuong Trinh
, Josef Pieprzyk
, Thomas Plantard
:
Lattice Blind Signatures with Forward Security. ACISP 2020: 3-22 - [c306]Abderrahmane Nitaj, Willy Susilo
, Joseph Tonien
:
A New Improved AES S-box with Enhanced Properties. ACISP 2020: 125-141 - [c305]Huy Quoc Le
, Dung Hoang Duong, Willy Susilo
, Josef Pieprzyk
:
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model. ACNS (1) 2020: 130-149 - [c304]Intae Kim
, Seong Oun Hwang, Willy Susilo
, Joonsang Baek
, Jongkil Kim:
Efficient Anonymous Multi-group Broadcast Encryption. ACNS (1) 2020: 251-270 - [c303]Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo
:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting. ASIACRYPT (1) 2020: 191-220 - [c302]Joonsang Baek
, Jongkil Kim, Willy Susilo
:
Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception. AsiaCCS 2020: 116-126 - [c301]Willy Susilo
, Dung Hoang Duong, Huy Quoc Le
, Josef Pieprzyk
:
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption. ESORICS (2) 2020: 107-127 - [c300]Jun Shen, Fuchun Guo
, Xiaofeng Chen, Willy Susilo
:
Secure Cloud Auditing with Efficient Ownership Transfer. ESORICS (1) 2020: 611-631 - [c299]Willy Susilo
, Dung Hoang Duong, Huy Quoc Le
:
Efficient Post-quantum Identity-based Encryption with Equality Test. ICPADS 2020: 633-640 - [c298]Giang Linh Duc Nguyen, Willy Susilo
, Dung Hoang Duong, Huy Quoc Le
, Fuchun Guo
:
Lattice-Based IBE with Equality Test Supporting Flexible Authorization in the Standard Model. INDOCRYPT 2020: 624-643 - [c297]Priyanka Dutta
, Willy Susilo
, Dung Hoang Duong, Joonsang Baek
, Partha Sarathi Roy
:
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction. WISA 2020: 245-257 - [e16]Willy Susilo
, Robert H. Deng
, Fuchun Guo
, Yannan Li
, Rolly Intan:
Information Security - 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings. Lecture Notes in Computer Science 12472, Springer 2020, ISBN 978-3-030-62973-1 [contents] - [i71]Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo
, Kazuhide Fukushima, Shinsaku Kiyomoto, Arnaud Sipasseuth:
Lattice-based public key encryption with equality test in standard model, revisited. CoRR abs/2005.03178 (2020) - [i70]Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy, Arnaud Sipasseuth, Willy Susilo
:
Lattice-based public key encryption with equality test supporting flexible authorization in standard model. CoRR abs/2005.05308 (2020) - [i69]Priyanka Dutta, Willy Susilo
, Dung Hoang Duong, Joonsang Baek, Partha Sarathi Roy:
Lattice-based Unidirectional IBPRE Secure in Standard Model. CoRR abs/2005.06741 (2020) - [i68]Willy Susilo
, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk:
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption. CoRR abs/2007.06353 (2020) - [i67]Huy Quoc Le, Dung Hoang Duong, Willy Susilo
, Josef Pieprzyk:
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model. CoRR abs/2007.06881 (2020) - [i66]Huy Quoc Le, Dung Hoang Duong, Willy Susilo
, Ha Thanh Nguyen Tran, Viet Cuong Trinh, Josef Pieprzyk, Thomas Plantard:
Lattice Blind Signatures with Forward Security. CoRR abs/2007.06884 (2020) - [i65]Giang L. D. Nguyen, Willy Susilo
, Dung Hoang Duong, Huy Quoc Le, Fuchun Guo:
Lattice-based IBE with Equality Test Supporting Flexible Authorization in the Standard Model. CoRR abs/2010.14077 (2020) - [i64]Priyanka Dutta, Willy Susilo
, Dung Hoang Duong, Partha Sarathi Roy:
Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model. CoRR abs/2011.08456 (2020) - [i63]Huy Quoc Le, Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo
, Kazuhide Fukushima, Shinsaku Kiyomoto:
Lattice-based Signcryption with Equality Test in Standard Model. CoRR abs/2012.15423 (2020) - [i62]Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk:
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2020: 882 (2020) - [i61]Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting. IACR Cryptol. ePrint Arch. 2020: 1080 (2020) - [i60]Jun Shen, Fuchun Guo, Xiaofeng Chen, Willy Susilo:
Secure Cloud Auditing with Efficient Ownership Transfer (Full Version). IACR Cryptol. ePrint Arch. 2020: 1468 (2020) - [i59]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A New Improved AES S-box With Enhanced Properties. IACR Cryptol. ePrint Arch. 2020: 1597 (2020)
2010 – 2019
- 2019
- [j232]Hongbo Li
, Qiong Huang
, Sha Ma
, Jian Shen
, Willy Susilo
:
Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage. IEEE Access 7: 25409-25421 (2019) - [j231]Zhen Zhao
, Jianchang Lai, Willy Susilo
, Baocang Wang, Yupu Hu, Fuchun Guo
:
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption. IEEE Access 7: 25936-25947 (2019) - [j230]Babak Siabi, Mehdi Berenjkoub, Willy Susilo
:
Optimally Efficient Secure Scalar Product With Applications in Cloud Computing. IEEE Access 7: 42798-42815 (2019) - [j229]Joonsang Baek
, Willy Susilo
, Jongkil Kim
, Yang-Wai Chow
:
Subversion in Practice: How to Efficiently Undermine Signatures. IEEE Access 7: 68799-68811 (2019) - [j228]Yuanhao Wang, Qiong Huang
, Hongbo Li, Jianye Huang, Guomin Yang
, Willy Susilo
:
Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups. IEEE Access 7: 135999-136011 (2019) - [j227]Parvin Rastegari, Willy Susilo
, Mohammad Dakhilalian:
Efficient Certificateless Signcryption in the Standard Model: Revisiting Luo and Wan's Scheme from Wireless Personal Communications (2018). Comput. J. 62(8): 1178-1193 (2019) - [j226]Guomin Yang
, Rongmao Chen, Yi Mu, Willy Susilo
, Fuchun Guo
, Jie Li:
Strongly leakage resilient authenticated key exchange, revisited. Des. Codes Cryptogr. 87(12): 2885-2911 (2019) - [j225]Parvin Rastegari, Mohammad Dakhilalian
, Mehdi Berenjkoub, Willy Susilo
:
Multi-designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model. IET Inf. Secur. 13(5): 459-468 (2019) - [j224]Ge Wu
, Yi Mu, Willy Susilo
, Fuchun Guo
, Futai Zhang:
Threshold privacy-preserving cloud auditing with multiple uploaders. Int. J. Inf. Sec. 18(3): 321-331 (2019) - [j223]Parvin Rastegari, Willy Susilo
, Mohammad Dakhilalian
:
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model. Int. J. Inf. Sec. 18(5): 619-635 (2019) - [j222]Peng Jiang, Jianchang Lai, Fuchun Guo
, Willy Susilo
, Man Ho Au, Guomin Yang
, Yi Mu, Rongmao Chen:
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters. Inf. Sci. 472: 35-52 (2019) - [j221]Parvin Rastegari, Mehdi Berenjkoub, Mohammad Dakhilalian
, Willy Susilo
:
Universal designated verifier signature scheme with non-delegatability in the standard model. Inf. Sci. 479: 321-334 (2019) - [j220]Hongbo Li
, Qiong Huang
, Jian Shen
, Guomin Yang
, Willy Susilo
:
Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Inf. Sci. 481: 330-343 (2019) - [j219]Jinguang Han
, Liqun Chen
, Willy Susilo
, Xinyi Huang, Aniello Castiglione
, Kaitai Liang
:
Fine-grained information flow control using attributes. Inf. Sci. 484: 167-182 (2019) - [j218]Ge Wu
, Fuchun Guo
, Willy Susilo
:
Generalized public-key cryptography with tight security. Inf. Sci. 504: 561-577 (2019) - [j217]Zhen Zhao, Ge Wu
, Willy Susilo
, Fuchun Guo
, Baocang Wang
, Yupu Hu:
Accountable identity-based encryption with distributed private key generators. Inf. Sci. 505: 352-366 (2019) - [j216]Yangguang Tian, Yingjiu Li, Guomin Yang
, Willy Susilo
, Yi Mu, Hui Cui
, Yinghui Zhang:
DABKE: Secure deniable attribute-based key exchange framework. J. Comput. Secur. 27(2): 259-275 (2019) - [j215]Ge Wu, Jianchang Lai, Fuchun Guo
, Willy Susilo
, Futai Zhang:
Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions. J. Comput. Sci. Technol. 34(6): 1366-1379 (2019) - [j214]Arnaud Sipasseuth
, Thomas Plantard
, Willy Susilo
:
Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices. J. Math. Cryptol. 13(3-4): 169-196 (2019) - [j213]Joonsang Baek
, Willy Susilo
, Jongkil Kim
:
Guest Editorial: Security and Privacy for Contemporary Network Computing Environment. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(1): 1-3 (2019) - [j212]Pairat Thorncharoensri
, Willy Susilo
, Joonsang Baek
:
Efficient Controlled Signature for a Large Network with Multi Security-level Setting. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(3): 1-20 (2019) - [j211]Yang Wang, Willy Susilo
, Joonsang Baek
, Jongkil Kim
, Intae Kim
:
Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(4): 68-87 (2019) - [j210]Yunling Wang, Jianfeng Wang, Shifeng Sun, Joseph K. Liu, Willy Susilo, Joonsang Baek, Ilsun You, Xiaofeng Chen:
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. J. Univers. Comput. Sci. 25(3): 222-244 (2019) - [j209]Yannan Li
, Willy Susilo
, Guomin Yang
, Yong Yu
, Xiaojiang Du, Dongxi Liu, Nadra Guizani:
Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies. IEEE Netw. 33(5): 111-117 (2019) - [j208]Laurence T. Yang
, Wei Wang, Gregorio Martínez Pérez
, Willy Susilo
:
Security, Privacy, and Trust for Cyberphysical-Social Systems. Secur. Commun. Networks 2019: 2964673:1-2964673:2 (2019) - [j207]Binrui Zhu, Willy Susilo
, Jing Qin, Fuchun Guo
, Zhen Zhao, Jixin Ma
:
A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks. Sensors 19(11): 2583 (2019) - [j206]Jianye Huang
, Qiong Huang
, Willy Susilo
:
Leakage-resilient ring signature schemes. Theor. Comput. Sci. 759: 1-13 (2019) - [j205]Yannan Li
, Yong Yu
, Geyong Min
, Willy Susilo
, Jianbing Ni, Kim-Kwang Raymond Choo
:
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems. IEEE Trans. Dependable Secur. Comput. 16(1): 72-83 (2019) - [j204]Ge Wu
, Yi Mu, Willy Susilo
, Fuchun Guo
, Futai Zhang:
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users. Wirel. Pers. Commun. 106(3): 1161-1182 (2019) - [c296]Jongkil Kim
, Willy Susilo
, Joonsang Baek
, Surya Nepal, Dongxi Liu:
Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach. ACISP 2019: 3-20 - [c295]Tran Viet Xuan Phuong, Willy Susilo
, Guomin Yang
, Jun Yan
, Dongxi Liu:
Location Based Encryption. ACISP 2019: 21-38 - [c294]Arnaud Sipasseuth
, Thomas Plantard
, Willy Susilo
:
Improving the Security of the DRS Scheme with Uniformly Chosen Random Noise. ACISP 2019: 119-137 - [c293]Dung Hoang Duong
, Kazuhide Fukushima
, Shinsaku Kiyomoto, Partha Sarathi Roy
, Willy Susilo
:
A Lattice-Based Public Key Encryption with Equality Test in Standard Model. ACISP 2019: 138-155 - [c292]Willy Susilo
, Joseph Tonien
, Guomin Yang
:
The Wiener Attack on RSA Revisited: A Quest for the Exact Bound. ACISP 2019: 381-398 - [c291]Wei Zong
, Yang-Wai Chow
, Willy Susilo
:
Dimensionality Reduction and Visualization of Network Intrusion Detection Data. ACISP 2019: 441-455 - [c290]Jongkil Kim
, Willy Susilo
, Fuchun Guo
, Joonsang Baek
, Nan Li
:
A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups. ACNS 2019: 406-425 - [c289]Jongkil Kim
, Seyit Camtepe
, Willy Susilo
, Surya Nepal
, Joonsang Baek
:
Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing. AsiaCCS 2019: 55-66 - [c288]Dung Hoang Duong, Willy Susilo
, Minh Kim Bui, Thanh Xuan Khuc:
A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model. Inscrypt 2019: 50-65 - [c287]Huy Quoc Le
, Willy Susilo
, Thanh Xuan Khuc, Minh Kim Bui, Dung Hoang Duong
:
A Blind Signature from Module Latices. DSC 2019: 1-8 - [c286]Tran Viet Xuan Phuong, Willy Susilo
, Jongkil Kim
, Guomin Yang
, Dongxi Liu:
Puncturable Proxy Re-Encryption Supporting to Group Messaging Service. ESORICS (1) 2019: 215-233 - [c285]Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo
, Weizhi Meng
:
Provably Secure Group Authentication in the Asynchronous Communication Model. ICICS 2019: 324-340 - [c284]Arnaud Sipasseuth
, Thomas Plantard
, Willy Susilo
:
Using Freivalds' Algorithm to Accelerate Lattice-Based Signature Verifications. ISPEC 2019: 401-412 - [c283]Yang-Wai Chow
, Willy Susilo
, Jianfeng Wang
, Richard Buckland, Joonsang Baek
, Jongkil Kim
, Nan Li
:
Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes. ML4CS 2019: 320-335 - [c282]Dung Hoang Duong
, Huy Quoc Le
, Partha Sarathi Roy
, Willy Susilo
:
Lattice-Based IBE with Equality Test in Standard Model. ProvSec 2019: 19-40 - [c281]Xueqiao Liu, Hongbo Li, Guomin Yang
, Willy Susilo
, Joseph Tonien
, Qiong Huang:
Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search. ProvSec 2019: 113-129 - [c280]Abderrahmane Nitaj, Willy Susilo
, Joseph Tonien
:
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem. ProvSec 2019: 206-221 - [c279]Yang-Wai Chow
, Willy Susilo
, Joonsang Baek
, Jongkil Kim
:
QR Code Watermarking for Digital Images. WISA 2019: 25-37 - [c278]Huy Quoc Le
, Dung Hoang Duong
, Willy Susilo
:
A Blind Ring Signature Based on the Short Integer Solution Problem. WISA 2019: 92-111 - [c277]Jongkil Kim
, Joonsang Baek
, Willy Susilo
, Yang-Wai Chow
:
Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof. WISA 2019: 206-216 - [p2]Joonsang Baek
, Willy Susilo
, Khaled Salah, Jun Su Ha, Ernesto Damiani, Ilsun You:
Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment. Advances in Cyber Security 2019: 1-22 - [p1]Yang-Wai Chow
, Willy Susilo
, Pairat Thorncharoensri
:
CAPTCHA Design and Security Issues. Advances in Cyber Security 2019: 69-92 - [e15]Kuan-Ching Li
, Xiaofeng Chen, Willy Susilo
:
Advances in Cyber Security: Principles, Techniques, and Applications. Springer 2019, ISBN 978-981-13-1482-7 [contents] - [e14]Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang:
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019. ACM 2019, ISBN 978-1-4503-6752-3 [contents] - [r1]Peng Jiang, Fuchun Guo, Willy Susilo
, Jinguang Han
:
Keyword Attacks and Privacy Preserving in Public-Key-Based Searchable Encryption. Encyclopedia of Big Data Technologies 2019 - [i58]Yannan Li, Willy Susilo
, Guomin Yang
, Yong Yu, Dongxi Liu, Mohsen Guizani:
A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT. CoRR abs/1902.03710 (2019) - [i57]Zhongyi Hu, Raymond Chiong, Ilung Pranata, Willy Susilo
, Yukun Bao:
Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data. CoRR abs/1902.08792 (2019) - [i56]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem. IACR Cryptol. ePrint Arch. 2019: 1052 (2019) - [i55]Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu:
Puncturable Proxy Re-Encryption supporting to Group Messaging Service. IACR Cryptol. ePrint Arch. 2019: 1078 (2019) - [i54]Thomas Plantard, Arnaud Sipasseuth, Willy Susilo, Vincent Zucca:
Tight bound on NewHope failure probability. IACR Cryptol. ePrint Arch. 2019: 1451 (2019) - [i53]Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li:
A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups. IACR Cryptol. ePrint Arch. 2019: 1479 (2019) - 2018
- [b1]Fuchun Guo
, Willy Susilo
, Yi Mu:
Introduction to Security Reduction. Springer 2018, ISBN 978-3-319-93048-0, pp. 1-253 - [j203]Yinxia Sun
, Willy Susilo
, Futai Zhang, Anmin Fu
:
CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud. IEEE Access 6: 56977-56983 (2018) - [j202]Tran Viet Xuan Phuong, Guomin Yang
, Willy Susilo
:
Criteria-Based Encryption. Comput. J. 61(4): 512-525 (2018) - [j201]Jianye Huang, Qiong Huang, Willy Susilo
:
Leakage-Resilient Dual-Form Signatures. Comput. J. 61(8): 1216-1227 (2018) - [j200]Elisa Bertino, Valentina Casola
, Aniello Castiglione
, Willy Susilo
:
Editorial: Security and privacy protection vs sustainable development. Comput. Secur. 76: 250-251 (2018) - [j199]Jongkil Kim
, Willy Susilo
, Fuchun Guo
, Man Ho Au
:
Functional encryption for computational hiding in prime order groups via pair encodings. Des. Codes Cryptogr. 86(1): 97-120 (2018) - [j198]Chunpeng Ge, Willy Susilo
, Liming Fang, Jiandong Wang, Yunqing Shi:
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. Des. Codes Cryptogr. 86(11): 2587-2603 (2018) - [j197]Yinhao Jiang
, Willy Susilo
, Yi Mu, Fuchun Guo
:
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener. Comput. Syst. 78: 720-729 (2018) - [j196]Yinhao Jiang
, Willy Susilo
, Yi Mu, Fuchun Guo
:
Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts. Int. J. Inf. Sec. 17(4): 463-475 (2018) - [j195]Yinhao Jiang
, Willy Susilo
, Yi Mu, Fuchun Guo
:
Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes. Int. J. Inf. Sec. 17(5): 533-548 (2018) - [j194]Elena Vlahu-Gjorgievska
, Khin Than Win
, Willy Susilo
:
A System Model for Personalized Medication Management (MyMediMan) - The Consumers' Point of View. Inf. 9(4): 69 (2018) - [j193]Zhi Quan Zhou
, Arnaldo Sinaga
, Willy Susilo
, Lei Zhao, Kai-Yuan Cai:
A cost-effective software testing strategy employing online feedback information. Inf. Sci. 422: 318-335 (2018) - [j192]Sha Ma, Yi Mu, Willy Susilo
:
A Generic Scheme of plaintext-checkable database encryption. Inf. Sci. 429: 88-101 (2018) - [j191]Willy Susilo
, Guomin Yang
, Fuchun Guo
, Qiong Huang:
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. Inf. Sci. 429: 349-360 (2018) - [j190]Chong-zhi Gao, Qiong Cheng, Pei He, Willy Susilo
, Jin Li
:
Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack. Inf. Sci. 444: 72-88 (2018) - [j189]Sha Ma
, Yi Mu, Willy Susilo
, Bo Yang:
Witness-based searchable encryption. Inf. Sci. 453: 364-378 (2018) - [j188]Jianchang Lai, Yi Mu, Fuchun Guo
, Peng Jiang, Willy Susilo
:
Privacy-enhanced attribute-based private information retrieval. Inf. Sci. 454-455: 275-291 (2018) - [j187]Shams Qazi, Raad Raad, Yi Mu, Willy Susilo
:
Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks. J. Inf. Secur. Appl. 39: 31-40 (2018) - [j186]Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo
, Joseph Tonien
:
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves. J. Inf. Secur. Appl. 40: 193-198 (2018) - [j185]Clémentine Gritti, Melek Önen
, Refik Molva, Willy Susilo
, Thomas Plantard
:
Device Identification and Personal Data Attestation in Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(4): 1-25 (2018) - [j184]Da-Zhi Sun
, Yi Mu, Willy Susilo
:
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure. Pers. Ubiquitous Comput. 22(1): 55-67 (2018) - [j183]Da-Zhi Sun
, Yi Mu, Willy Susilo
:
Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure. Pers. Ubiquitous Comput. 22(1): 69 (2018) - [j182]Yang-Wai Chow
, Willy Susilo
, Joseph Tonien
, Elena Vlahu-Gjorgievska
, Guomin Yang
:
Cooperative Secret Sharing Using QR Codes and Symmetric Keys. Symmetry 10(4): 95 (2018) - [j181]Pairat Thorncharoensri
, Willy Susilo
, Yi Mu:
Policy controlled system with anonymity. Theor. Comput. Sci. 745: 87-113 (2018) - [j180]Jian Shen
, Tianqi Zhou, Xiaofeng Chen
, Jin Li, Willy Susilo
:
Anonymous and Traceable Group Data Sharing in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 13(4): 912-925 (2018) - [j179]Peng Xu
, Shuanghong He
, Wei Wang
, Willy Susilo
, Hai Jin:
Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks. IEEE Trans. Ind. Informatics 14(8): 3712-3723 (2018) - [j178]Amit Dua
, Neeraj Kumar
, Ashok Kumar Das
, Willy Susilo
:
Secure Message Communication Protocol Among Vehicles in Smart City. IEEE Trans. Veh. Technol. 67(5): 4359-4373 (2018) - [j177]Maryam Rajabzadeh Asaar
, Mahmoud Salmasizadeh, Willy Susilo
, Akbar Majidi
:
A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks. IEEE Trans. Veh. Technol. 67(6): 5409-5423 (2018) - [c276]Mingwu Zhang, Yan Jiang
, Hua Shen, Bingbing Li, Willy Susilo
:
Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation. Inscrypt 2018: 240-259 - [c275]Wei Zong
, Yang-Wai Chow
, Willy Susilo
:
A 3D Approach for the Visualization of Network Intrusion Detection Data. CW 2018: 308-315 - [c274]Abraham Serhane
, Mohamad Raad, Raad Raad, Willy Susilo
:
PLC Code-Level Vulnerabilities. ICCA 2018: 348-352 - [c273]Wei Zong
, Yang-Wai Chow
, Willy Susilo
:
A Two-Stage Classifier Approach for Network Intrusion Detection. ISPEC 2018: 329-340 - [e13]Willy Susilo, Guomin Yang:
Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings. Lecture Notes in Computer Science 10946, Springer 2018, ISBN 978-3-319-93637-6 [contents] - [e12]Joonsang Baek, Willy Susilo, Jongkil Kim:
Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings. Lecture Notes in Computer Science 11192, Springer 2018, ISBN 978-3-030-01445-2 [contents] - [i52]Joonsang Baek, Willy Susilo, Jongkil Kim, Yang-Wai Chow:
Subversion in Practice: How to Efficiently Undermine Signatures. IACR Cryptol. ePrint Arch. 2018: 1201 (2018) - 2017
- [j176]Mingwu Zhang
, Yan Jiang, Yi Mu, Willy Susilo
:
Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server. IEEE Access 5: 26419-26434 (2017) - [j175]Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo
, Jin Li:
Anonymous Announcement System (AAS) for Electric Vehicle in VANETs. Comput. J. 60(4): 588-599 (2017) - [j174]Pairat Thorncharoensri
, Willy Susilo
, Yi Mu:
Policy-controlled signatures and their applications. Comput. Stand. Interfaces 50: 26-41 (2017) - [j173]Chunpeng Ge, Willy Susilo
, Jiandong Wang, Liming Fang:
Identity-based conditional proxy re-encryption with fine grain policy. Comput. Stand. Interfaces 52: 1-9 (2017) - [j172]Yong Yu
, Atsuko Miyaji
, Man Ho Au
, Willy Susilo
:
Cloud computing security and privacy: Standards and regulations. Comput. Stand. Interfaces 54: 1-2 (2017) - [j171]Rongmao Chen, Yi Mu, Guomin Yang
, Willy Susilo
, Fuchun Guo
:
Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1): 145-173 (2017) - [j170]Rongmao Chen, Yi Mu, Guomin Yang
, Willy Susilo
, Fuchun Guo
, Zheng Yang
:
A note on the strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1): 175-178 (2017) - [j169]Jinguang Han
, Yogachandran Rahulamathavan
, Willy Susilo
:
Preface. Int. J. Found. Comput. Sci. 28(6): 641-644 (2017) - [j168]Tran Viet Xuan Phuong, Guomin Yang
, Willy Susilo
, Fuchun Guo
, Qiong Huang:
Sequence aware functional encryption and its application in searchable encryption. J. Inf. Secur. Appl. 35: 106-118 (2017) - [j167]Meixia Miao, Jianfeng Wang
, Jianfeng Ma, Willy Susilo
:
Publicly verifiable databases with efficient insertion/deletion operations. J. Comput. Syst. Sci. 86: 49-58 (2017) - [j166]Man Ho Au
, Tsz Hon Yuen
, Joseph K. Liu, Willy Susilo
, Xinyi Huang, Yang Xiang, Zoe Lin Jiang:
A general framework for secure sharing of personal health records in cloud system. J. Comput. Syst. Sci. 90: 46-62 (2017) - [j165]Yang-Wai Chow
, Willy Susilo
, James G. Phillips, Joonsang Baek
, Elena Vlahu-Gjorgievska:
Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(3): 18-35 (2017) - [j164]Jianchang Lai, Yi Mu, Fuchun Guo
, Willy Susilo
, Rongmao Chen:
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city. Pers. Ubiquitous Comput. 21(5): 855-868 (2017) - [j163]Jorge Munilla
, Mike Burmester
, Alberto Peinado, Guomin Yang
, Willy Susilo
:
RFID Ownership Transfer with Positive Secrecy Capacity Channels. Sensors 17(1): 53 (2017) - [j162]Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo
, Joseph Tonien
:
A generalized attack on RSA type cryptosystems. Theor. Comput. Sci. 704: 74-81 (2017) - [j161]Fuchun Guo
, Yi Mu, Willy Susilo
, Homer Hsing, Duncan S. Wong, Vijay Varadharajan
:
Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. IEEE Trans. Dependable Secur. Comput. 14(2): 211-220 (2017) - [j160]Wei Wang, Peng Xu, Laurence Tianruo Yang, Willy Susilo
, Jinjun Chen:
Securely Reinforcing Synchronization for Embedded Online Contests. ACM Trans. Embed. Comput. Syst. 16(2): 58:1-58:21 (2017) - [j159]Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo
, Wenjing Lou:
Secure and Efficient Cloud Data Deduplication With Randomized Tag. IEEE Trans. Inf. Forensics Secur. 12(3): 532-543 (2017) - [j158]Yong Yu
, Man Ho Au
, Giuseppe Ateniese
, Xinyi Huang, Willy Susilo
, Yuanshun Dai, Geyong Min
:
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. IEEE Trans. Inf. Forensics Secur. 12(4): 767-778 (2017) - [j157]Yujue Wang, Qianhong Wu, Bo Qin
, Shaohua Tang, Willy Susilo
:
Online/Offline Provable Data Possession. IEEE Trans. Inf. Forensics Secur. 12(5): 1182-1194 (2017) - [j156]Jian Shen
, Jun Shen, Xiaofeng Chen, Xinyi Huang, Willy Susilo
:
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data. IEEE Trans. Inf. Forensics Secur. 12(10): 2402-2415 (2017) - [j155]Willy Susilo
, Peng Jiang, Fuchun Guo
, Guomin Yang
, Yong Yu
, Yi Mu:
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. IEEE Trans. Inf. Forensics Secur. 12(12): 3110-3122 (2017) - [j154]Fuchun Guo
, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
Privacy-Preserving Mutual Authentication in RFID with Designated Readers. Wirel. Pers. Commun. 96(3): 4819-4845 (2017) - [c272]Shengmin Xu, Guomin Yang
, Yi Mu, Willy Susilo
:
Mergeable and Revocable Identity-Based Encryption. ACISP (1) 2017: 147-167 - [c271]Peng Xu, Shuai Liang, Wei Wang, Willy Susilo
, Qianhong Wu, Hai Jin:
Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage. ACISP (1) 2017: 207-226 - [c270]Yang-Wai Chow
, Willy Susilo
, Joseph Tonien
, Wei Zong
:
A QR Code Watermarking Approach Based on the DWT-DCT Technique. ACISP (2) 2017: 314-331 - [c269]Shu Cheng
, Vijay Varadharajan
, Yi Mu, Willy Susilo
:
An efficient and provably secure RFID grouping proof protocol. ACSW 2017: 71:1-71:7 - [c268]Michal Kedziora, Yang-Wai Chow
, Willy Susilo
:
Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems. ATIS 2017: 3-13 - [c267]Jongkil Kim
, Willy Susilo
, Fuchun Guo
, Man Ho Au
, Surya Nepal
:
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption. AsiaCCS 2017: 823-834 - [c266]Yang-Wai Chow
, Willy Susilo
, Guomin Yang
:
Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts. CDVE 2017: 65-72 - [c265]Fuchun Guo
, Rongmao Chen, Willy Susilo
, Jianchang Lai, Guomin Yang
, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample. CRYPTO (2) 2017: 517-547 - [c264]Nan Li
, Fuchun Guo
, Yi Mu, Willy Susilo
, Surya Nepal
:
Fuzzy Extractors for Biometric Identification. ICDCS 2017: 667-677 - [c263]Clémentine Gritti, Rongmao Chen, Willy Susilo
, Thomas Plantard
:
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy. ISPEC 2017: 485-505 - [c262]Yang-Wai Chow
, Willy Susilo
, Joonsang Baek
:
Covert QR Codes: How to Hide in the Crowd. ISPEC 2017: 678-693 - [c261]Yunling Wang, Jianfeng Wang
, Shifeng Sun, Joseph K. Liu, Willy Susilo
, Xiaofeng Chen:
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. ProvSec 2017: 24-38 - [c260]Ru Meng, Yanwei Zhou, Jianting Ning, Kaitai Liang
, Jinguang Han
, Willy Susilo
:
An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups. ProvSec 2017: 39-56 - [i51]Clémentine Gritti, Rongmao Chen, Willy Susilo
, Thomas Plantard:
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy. CoRR abs/1709.08434 (2017) - [i50]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strong Authenticated Key Exchange with Auxiliary Inputs. IACR Cryptol. ePrint Arch. 2017: 418 (2017) - [i49]Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample. IACR Cryptol. ePrint Arch. 2017: 499 (2017) - [i48]Peng Xu, Xia Gao, Wei Wang, Willy Susilo, Qianhong Wu, Hai Jin:
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security. IACR Cryptol. ePrint Arch. 2017: 741 (2017) - [i47]Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A generalized attack on RSA type cryptosystems. IACR Cryptol. ePrint Arch. 2017: 1076 (2017) - 2016
- [j153]Joseph K. Liu, Sze Ling Yeo, Wun-She Yap
, Sherman S. M. Chow
, Duncan S. Wong, Willy Susilo
:
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol. Comput. J. 59(7): 945-954 (2016) - [j152]Chunpeng Ge, Willy Susilo
, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren:
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles. Comput. J. 59(7): 970-982 (2016) - [j151]Joseph K. Liu, Willy Susilo
, Tsz Hon Yuen
, Man Ho Au
, Jun-bin Fang, Zoe Lin Jiang, Jianying Zhou
:
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles. Comput. J. 59(7): 1040-1053 (2016) - [j150]Tsong Yueh Chen
, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo
, Dave Towey
, Jeffrey M. Voas, Zhi Quan Zhou
:
Metamorphic Testing for Cybersecurity. Computer 49(6): 48-55 (2016) - [j149]Fuchun Guo
, Willy Susilo
, Yi Mu:
Generalized closest substring encryption. Des. Codes Cryptogr. 80(1): 103-124 (2016) - [j148]Ilung Pranata
, Willy Susilo
:
Are the most popular users always trustworthy? The case of Yelp. Electron. Commer. Res. Appl. 20: 30-41 (2016) - [j147]Yong Yu
, Liang Xue, Man Ho Au
, Willy Susilo
, Jianbing Ni, Yafang Zhang, Athanasios V. Vasilakos
, Jian Shen:
Cloud data integrity checking with an identity-based auditing mechanism from RSA. Future Gener. Comput. Syst. 62: 85-91 (2016) - [j146]Clémentine Gritti, Willy Susilo
, Thomas Plantard
:
Logarithmic size ring signatures without random oracles. IET Inf. Secur. 10(1): 1-7 (2016) - [j145]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo
:
A short ID-based proxy signature scheme. Int. J. Commun. Syst. 29(5): 859-873 (2016) - [j144]Guomin Yang
, Willy Susilo
, Yi Mu:
Message from the Guest Editors. Int. J. Inf. Sec. 15(2): 223-224 (2016) - [j143]Clémentine Gritti, Willy Susilo
, Thomas Plantard
, Kaitai Liang
, Duncan S. Wong:
Broadcast encryption with dealership. Int. J. Inf. Sec. 15(3): 271-283 (2016) - [j142]Fatemeh Rezaeibagha
, Yi Mu, Willy Susilo
, Khin Than Win
:
Multi-authority security framework for scalable EHR systems. Int. J. Medical Eng. Informatics 8(4): 390-408 (2016) - [j141]Lingling Xu, Fangguo Zhang
, Willy Susilo
, Yamin Wen:
Solutions to the anti-piracy problem in oblivious transfer. J. Comput. Syst. Sci. 82(3): 466-476 (2016) - [j140]Clémentine Gritti, Willy Susilo, Thomas Plantard:
Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record. J. Internet Serv. Inf. Secur. 6(4): 1-34 (2016) - [j139]Weiran Liu, Jianwei Liu
, Qianhong Wu, Willy Susilo
, Hua Deng, Bo Qin:
SAKE: scalable authenticated key exchange for mobile e-health networks. Secur. Commun. Networks 9(15): 2754-2765 (2016) - [j138]Ye Yang, Jinguang Han
, Willy Susilo
, Tsz Hon Yuen
, Jiguo Li:
ABKS-CSC: attribute-based keyword search with constant-size ciphertexts. Secur. Commun. Networks 9(18): 5003-5015 (2016) - [j137]Joseph K. Liu, Kaitai Liang
, Willy Susilo
, Jianghua Liu, Yang Xiang:
Two-Factor Data Security Protection Mechanism for Cloud Storage System. IEEE Trans. Computers 65(6): 1992-2004 (2016) - [j136]Willy Susilo
, Fuchun Guo
, Yi Mu:
Efficient dynamic threshold identity-based encryption with constant-size ciphertext. Theor. Comput. Sci. 609: 49-59 (2016) - [j135]Tran Viet Xuan Phuong
, Guomin Yang
, Willy Susilo
:
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions. IEEE Trans. Inf. Forensics Secur. 11(1): 35-45 (2016) - [j134]Fuchun Guo
, Willy Susilo
, Yi Mu:
Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption. IEEE Trans. Inf. Forensics Secur. 11(2): 247-257 (2016) - [j133]Yong Yu
, Yannan Li
, Jianbing Ni, Guomin Yang
, Yi Mu, Willy Susilo
:
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification". IEEE Trans. Inf. Forensics Secur. 11(3): 658-659 (2016) - [c259]Rongmao Chen, Yi Mu, Willy Susilo
, Guomin Yang
, Fuchun Guo
, Mingwu Zhang:
One-Round Strong Oblivious Signature-Based Envelope. ACISP (2) 2016: 3-20 - [c258]Tran Viet Xuan Phuong, Guomin Yang
, Willy Susilo
, Kaitai Liang
:
Edit Distance Based Encryption and Its Application. ACISP (2) 2016: 103-119 - [c257]Jianchang Lai, Yi Mu, Fuchun Guo
, Willy Susilo
, Rongmao Chen:
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing. ACISP (2) 2016: 223-239 - [c256]Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo
, Joseph Tonien
:
A New Attack on Three Variants of the RSA Cryptosystem. ACISP (2) 2016: 258-268 - [c255]Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo
, Wenjing Lou:
Towards Efficient Fully Randomized Message-Locked Encryption. ACISP (1) 2016: 361-375 - [c254]Yong Yu
, Yannan Li
, Man Ho Au
, Willy Susilo
, Kim-Kwang Raymond Choo
, Xinpeng Zhang:
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy. ACISP (1) 2016: 389-405 - [c253]Yang-Wai Chow
, Willy Susilo
, Guomin Yang
, James G. Phillips, Ilung Pranata, Ari Moesriami Barmawi:
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing. ACISP (1) 2016: 409-425 - [c252]Yinhao Jiang, Willy Susilo
, Yi Mu, Fuchun Guo
:
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance. ACISP (1) 2016: 477-494 - [c251]Fuchun Guo
, Willy Susilo
, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang
:
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. ASIACRYPT (2) 2016: 745-776 - [c250]Rongmao Chen, Yi Mu, Guomin Yang
, Willy Susilo
, Fuchun Guo
, Mingwu Zhang:
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. ASIACRYPT (1) 2016: 844-876 - [c249]Willy Susilo
, Rongmao Chen, Fuchun Guo
, Guomin Yang
, Yi Mu, Yang-Wai Chow
:
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext. AsiaCCS 2016: 201-210 - [c248]Peng Xu
, Jun Xu, Wei Wang, Hai Jin, Willy Susilo
, Deqing Zou:
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds. AsiaCCS 2016: 913-918 - [c247]Mandy Li, Willy Susilo
, Joseph Tonien
:
Securing Shared Systems. CDVE 2016: 194-201 - [c246]Zhongyi Hu, Raymond Chiong
, Ilung Pranata, Willy Susilo
, Yukun Bao:
Identifying malicious web domains using machine learning techniques with online credibility and performance data. CEC 2016: 5186-5194 - [c245]Rongmao Chen, Yi Mu, Guomin Yang
, Willy Susilo
, Fuchun Guo
:
Strongly Leakage-Resilient Authenticated Key Exchange. CT-RSA 2016: 19-36 - [c244]Sim Kim Lau
, Reza Zamani, Willy Susilo
:
A semantic web vision for an intelligent community transport service brokering system. ICITE 2016: 172-175 - [c243]Ge Wu, Yi Mu, Willy Susilo
, Fuchun Guo
:
Privacy-Preserving Cloud Auditing with Multiple Uploaders. ISPEC 2016: 224-237 - [c242]Yinhao Jiang, Willy Susilo
, Yi Mu, Fuchun Guo
:
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update. ProvSec 2016: 39-60 - [c241]Jongkil Kim
, Willy Susilo
, Fuchun Guo
, Man Ho Au
:
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups. SCN 2016: 3-22 - [c240]Yang-Wai Chow
, Willy Susilo
, Guomin Yang
, Man Ho Au
, Cong Wang
:
Authentication and Transaction Verification Using QR Codes with a Mobile Device. SpaCCS 2016: 437-451 - [i46]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strongly Leakage-Resilient Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2016: 308 (2016) - [i45]Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au:
A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups. IACR Cryptol. ePrint Arch. 2016: 655 (2016) - [i44]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Dirichlet Product for Boolean Functions. IACR Cryptol. ePrint Arch. 2016: 673 (2016) - [i43]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo:
Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme. IACR Cryptol. ePrint Arch. 2016: 822 (2016) - [i42]Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang:
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. IACR Cryptol. ePrint Arch. 2016: 872 (2016) - [i41]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang:
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. IACR Cryptol. ePrint Arch. 2016: 873 (2016) - [i40]Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au:
Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings. IACR Cryptol. ePrint Arch. 2016: 949 (2016) - 2015
- [j132]Jung Yeon Hwang, Ku-Young Chang, Hyun Sook Cho, Boyeon Song, Willy Susilo
:
Collusion-resistant convertible ring signature schemes. Sci. China Inf. Sci. 58(1): 1-16 (2015) - [j131]Yong Yu
, Man Ho Au
, Yi Mu, Willy Susilo
, Huai Wu:
Secure Delegation of Signing Power from Factorization. Comput. J. 58(4): 867-877 (2015) - [j130]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo
:
An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants. Comput. J. 58(4): 1021-1039 (2015) - [j129]Yang Wang, Willy Susilo
, Man Ho Au
:
Revisiting Security Against the Arbitrator in Optimistic Fair Exchange. Comput. J. 58(10): 2665-2676 (2015) - [j128]Kaitai Liang
, Willy Susilo
, Joseph K. Liu
, Duncan S. Wong:
Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption. Comput. J. 58(10): 2778-2792 (2015) - [j127]Kaitai Liang
, Liming Fang, Duncan S. Wong, Willy Susilo
:
A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurr. Comput. Pract. Exp. 27(8): 2004-2027 (2015) - [j126]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo
:
A short identity-based proxy ring signature scheme from RSA. Comput. Stand. Interfaces 38: 144-151 (2015) - [j125]Nan Li
, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
Shared RFID ownership transfer protocols. Comput. Stand. Interfaces 42: 95-104 (2015) - [j124]Thomas Plantard
, Willy Susilo
, Zhenfei Zhang:
LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme. Des. Codes Cryptogr. 76(2): 325-344 (2015) - [j123]Kaitai Liang
, Man Ho Au
, Joseph K. Liu
, Willy Susilo
, Duncan S. Wong, Guomin Yang
, Yong Yu
, Anjia Yang
:
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Future Gener. Comput. Syst. 52: 95-108 (2015) - [j122]Willy Susilo
, Yang-Wai Chow
, Rungrat Wiangsripanawan:
Protecting peer-to-peer-based massively multiplayer online games. Int. J. Comput. Sci. Eng. 10(3): 293-305 (2015) - [j121]Yilei Wang, Willy Susilo
, Tao Li, Qiuliang Xu:
File sharing in cloud computing using win stay lose shift strategy. Int. J. High Perform. Comput. Netw. 8(2): 154-166 (2015) - [j120]Yong Yu
, Man Ho Au
, Yi Mu, Shaohua Tang, Jian Ren, Willy Susilo
, Liju Dong:
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int. J. Inf. Sec. 14(4): 307-318 (2015) - [j119]Kefeng Wang, Yi Mu, Willy Susilo
:
Identity-based quotable ring signature. Inf. Sci. 321: 71-89 (2015) - [j118]Qiong Huang, Duncan S. Wong, Willy Susilo
:
How to protect privacy in Optimistic Fair Exchange of digital signatures. Inf. Sci. 325: 300-315 (2015) - [j117]Joseph K. Liu
, Man Ho Au
, Willy Susilo
, Kaitai Liang
, Rongxing Lu, Bala Srinivasan:
Secure sharing and searching for real-time video data in mobile cloud. IEEE Netw. 29(2): 46-50 (2015) - [j116]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo
:
A provably secure identity-based proxy ring signature based on RSA. Secur. Commun. Networks 8(7): 1223-1236 (2015) - [j115]Ibrahim F. Elashry, Yi Mu, Willy Susilo
:
A resilient identity-based authenticated key exchange protocol. Secur. Commun. Networks 8(13): 2279-2290 (2015) - [j114]Nan Li
, Yi Mu, Willy Susilo
, Fuchun Guo
, Vijay Varadharajan
:
Vulnerabilities of an ECC-based RFID authentication scheme. Secur. Commun. Networks 8(17): 3262-3270 (2015) - [j113]Yilei Wang, Duncan S. Wong, Willy Susilo
, Xiaofeng Chen, Qiuliang Xu:
Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information. Secur. Commun. Networks 8(18): 3690-3700 (2015) - [j112]Ibrahim F. Elashry, Yi Mu, Willy Susilo
:
Mediated Encryption: Analysis and Design. EAI Endorsed Trans. Security Safety 2(3): e2 (2015) - [j111]Tsz Hon Yuen
, Joseph K. Liu
, Man Ho Au
, Xinyi Huang, Willy Susilo
, Jianying Zhou
:
k-Times Attribute-Based Anonymous Access Control for Cloud Computing. IEEE Trans. Computers 64(9): 2595-2608 (2015) - [j110]Yang Wang, Man Ho Au
, Willy Susilo
:
Optimistic fair exchange in the enhanced chosen-key model. Theor. Comput. Sci. 562: 57-74 (2015) - [j109]Xiaofeng Chen, Willy Susilo
, Jin Li, Duncan S. Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang
:
Efficient algorithms for secure outsourcing of bilinear pairings. Theor. Comput. Sci. 562: 112-121 (2015) - [j108]Qiong Huang, Guomin Yang
, Duncan S. Wong, Willy Susilo
:
Ambiguous optimistic fair exchange: Definition and constructions. Theor. Comput. Sci. 562: 177-193 (2015) - [j107]Clémentine Gritti
, Willy Susilo
, Thomas Plantard
, Khin Than Win
:
Privacy-preserving encryption scheme using DNA parentage test. Theor. Comput. Sci. 580: 1-13 (2015) - [j106]Jinguang Han
, Willy Susilo
, Yi Mu, Jianying Zhou
, Man Ho Allen Au
:
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption. IEEE Trans. Inf. Forensics Secur. 10(3): 665-678 (2015) - [j105]Jongkil Kim
, Willy Susilo
, Man Ho Au
, Jennifer Seberry:
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext. IEEE Trans. Inf. Forensics Secur. 10(3): 679-693 (2015) - [j104]Cai Li, Jiankun Hu
, Josef Pieprzyk
, Willy Susilo
:
A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion. IEEE Trans. Inf. Forensics Secur. 10(6): 1193-1206 (2015) - [j103]Kaitai Liang
, Willy Susilo
, Joseph K. Liu
:
Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage. IEEE Trans. Inf. Forensics Secur. 10(8): 1578-1589 (2015) - [j102]Kaitai Liang
, Willy Susilo
:
Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 10(9): 1981-1992 (2015) - [j101]Peng Xu
, Qianhong Wu, Wei Wang, Willy Susilo
, Josep Domingo-Ferrer
, Hai Jin:
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search. IEEE Trans. Inf. Forensics Secur. 10(9): 1993-2006 (2015) - [j100]Jinguang Han
, Willy Susilo
, Yi Mu, Man Ho Au
, Jie Cao
:
AAC-OT: Accountable Oblivious Transfer With Access Control. IEEE Trans. Inf. Forensics Secur. 10(12): 2502-2514 (2015) - [j99]Fengtong Wen, Willy Susilo
, Guomin Yang
:
Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards. Wirel. Pers. Commun. 80(4): 1747-1760 (2015) - [c239]Jianchang Lai, Yi Mu, Fuchun Guo
, Willy Susilo
:
Improved Identity-Based Online/Offline Encryption. ACISP 2015: 160-173 - [c238]Clémentine Gritti, Willy Susilo
, Thomas Plantard
:
Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy. ACISP 2015: 395-412 - [c237]Hua Deng, Qianhong Wu, Bo Qin, Willy Susilo
, Joseph K. Liu
, Wenchang Shi:
Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data. AsiaCCS 2015: 393-404 - [c236]Nan Li
, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
Anonymous Yoking-Group Proofs. AsiaCCS 2015: 615-620 - [c235]Tran Viet Xuan Phuong, Guomin Yang
, Willy Susilo
, Xiaofeng Chen:
Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key. ESORICS (2) 2015: 252-269 - [c234]Xu Yang, Joseph K. Liu, Wei Wu, Man Ho Au
, Willy Susilo
:
PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme. ICPADS 2015: 282-289 - [c233]Clémentine Gritti, Willy Susilo
, Thomas Plantard
:
Efficient File Sharing in Electronic Health Records. ISPEC 2015: 499-513 - [c232]Yong Yu
, Yafang Zhang, Yi Mu, Willy Susilo
, Hongyu Liu:
Provably Secure Identity Based Provable Data Possession. ProvSec 2015: 310-325 - [i39]Peng Xu, Qianhong Wu, Wei Wang, Willy Susilo
, Josep Domingo-Ferrer, Hai Jin:
Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search. CoRR abs/1512.06581 (2015) - 2014
- [j98]Fuchun Guo
, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
Server-Aided Signature Verification for Lightweight Devices. Comput. J. 57(4): 481-493 (2014) - [j97]Jinguang Han
, Willy Susilo
, Yi Mu, Jun Yan
:
Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing. Comput. J. 57(4): 579-591 (2014) - [j96]Vu Duc Nguyen, Yang-Wai Chow
, Willy Susilo
:
On the security of text-based 3D CAPTCHAs. Comput. Secur. 45: 84-99 (2014) - [j95]Man Ho Au
, Guomin Yang
, Willy Susilo
, Yunmei Zhang:
(Strong) multidesignated verifiers signatures secure against rogue key attack. Concurr. Comput. Pract. Exp. 26(8): 1574-1592 (2014) - [j94]Joseph K. Liu
, Tsz Hon Yuen
, Man Ho Au
, Willy Susilo
:
Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 41(5): 2559-2564 (2014) - [j93]Yong Yu
, Lei Niu, Guomin Yang
, Yi Mu, Willy Susilo
:
On the security of auditing mechanisms for secure cloud storage. Future Gener. Comput. Syst. 30: 127-132 (2014) - [j92]Yong Yu
, Yi Mu, Willy Susilo
, Man Ho Au
:
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents. Inf. Process. Lett. 114(1-2): 5-8 (2014) - [j91]Xiaofeng Chen, Fangguo Zhang
, Willy Susilo
, Haibo Tian, Jin Li, Kwangjo Kim:
Identity-based chameleon hashing and signatures without key exposure. Inf. Sci. 265: 198-210 (2014) - [j90]Tsz Hon Yuen
, Willy Susilo
, Yi Mu:
Towards a cryptographic treatment of publish/subscribe systems. J. Comput. Secur. 22(1): 33-67 (2014) - [j89]Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:
Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(4): 3-28 (2014) - [j88]Yong Yu
, Jianbing Ni, Haomiao Yang, Yi Mu, Willy Susilo
:
Efficient public key encryption with revocable keyword search. Secur. Commun. Networks 7(2): 466-472 (2014) - [j87]Fengtong Wen, Willy Susilo
, Guomin Yang
:
A robust smart card-based anonymous user authentication protocol for wireless communications. Secur. Commun. Networks 7(6): 987-993 (2014) - [j86]Jinguang Han
, Willy Susilo
, Yi Mu:
Identity-Based Secure DistributedData Storage Schemes. IEEE Trans. Computers 63(4): 941-953 (2014) - [j85]Guomin Yang
, Chik How Tan, Yi Mu, Willy Susilo
, Duncan S. Wong:
Identity based identification from algebraic coding theory. Theor. Comput. Sci. 520: 51-61 (2014) - [j84]Yang Wang, Man Ho Au
, Willy Susilo
:
Attribute-based optimistic fair exchange: How to restrict brokers with policies. Theor. Comput. Sci. 527: 83-96 (2014) - [j83]Fuchun Guo
, Yi Mu, Willy Susilo
, Duncan S. Wong, Vijay Varadharajan
:
CP-ABE With Constant-Size Keys for Lightweight Devices. IEEE Trans. Inf. Forensics Secur. 9(5): 763-771 (2014) - [j82]Fuchun Guo
, Yi Mu, Willy Susilo
:
Subset Membership Encryption and Its Applications to Oblivious Transfer. IEEE Trans. Inf. Forensics Secur. 9(7): 1098-1107 (2014) - [j81]Yang Wang, Willy Susilo
, Man Ho Au
, Guilin Wang:
Collusion-Resistance in Optimistic Fair Exchange. IEEE Trans. Inf. Forensics Secur. 9(8): 1227-1239 (2014) - [j80]Kaitai Liang
, Man Ho Au
, Joseph K. Liu
, Willy Susilo
, Duncan S. Wong, Guomin Yang
, Tran Viet Xuan Phuong, Qi Xie:
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. IEEE Trans. Inf. Forensics Secur. 9(10): 1667-1680 (2014) - [j79]Yang Wang, Man Ho Allen Au
, Willy Susilo
:
Revisiting Optimistic Fair Exchange Based on Ring Signatures. IEEE Trans. Inf. Forensics Secur. 9(11): 1883-1892 (2014) - [j78]