2013
194Identity-based data storage in cloud computing. Jinguang Han, Willy Susilo, Yi Mu. Future Generation Comp. Syst. (29): 673-681 (2013). Web SearchBibTeXDownload
193Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo. IACR Cryptology ePrint Archive (2013): 230 (2013). Web SearchBibTeXDownload
192Constant-Size Dynamic $k$ -Times Anonymous Authentication. Man Ho Au, Willy Susilo, Yi Mu, Sherman S. M. Chow. IEEE Systems Journal (7): 249-261 (2013). Web SearchBibTeXDownload
191Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model. Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong. ISPEC 2013, 204-217. Web SearchBibTeXDownload
190Identity-Based Multisignature with Message Recovery. Kefeng Wang, Yi Mu, Willy Susilo. ISPEC 2013, 91-104. Web SearchBibTeXDownload
189Secure RFID Ownership Transfer Protocols. Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan. ISPEC 2013, 189-203. Web SearchBibTeXDownload
188Securing DSR against wormhole attacks in multirate ad hoc networks. Shams Qazi, Raad Raad, Yi Mu, Willy Susilo. J. Network and Computer Applications (36): 582-592 (2013). Web SearchBibTeXDownload
2012
187Efficient and secure stored-value cards with leakage resilience. Fuchun Guo, Yi Mu, Willy Susilo. Computers & Electrical Engineering (38): 370-380 (2012). Web SearchBibTeXDownload
186Efficient oblivious transfers with access control. Jinguang Han, Willy Susilo, Yi Mu, Jun Yan. Computers & Mathematics with Applications (63): 827-837 (2012). Web SearchBibTeXDownload
185Certificateless Signatures: New Schemes and Security Models. Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu. Comput. J. (55): 457-474 (2012). Web SearchBibTeXDownload
184A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang, Li Xu. Comput. J. (55): 1157-1168 (2012). Web SearchBibTeXDownload
183Attribute-Based Oblivious Access Control. Jinguang Han, Willy Susilo, Yi Mu, Jun Yan. Comput. J. (55): 1202-1215 (2012). Web SearchBibTeXDownload
182Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext. Fuchun Guo, Yi Mu, Willy Susilo. ESORICS 2012, 609-626. Web SearchBibTeXDownload
181Fault Analysis of the KATAN Family of Block Ciphers. Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry. IACR Cryptology ePrint Archive (2012): 30 (2012). Web SearchBibTeXDownload
180Secure Outsourced Attribute-Based Signatures. Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo. IACR Cryptology ePrint Archive (2012): 605 (2012). Web SearchBibTeXDownload
179Perfect Ambiguous Optimistic Fair Exchange. Yang Wang, Man Ho Au, Willy Susilo. IACR Cryptology ePrint Archive (2012): 462 (2012). Web SearchBibTeXDownload
178Efficient Fair Conditional Payments for Outsourcing Computations. Xiaofeng Chen, Jin Li, Willy Susilo. IEEE Transactions on Information Forensics and Security (7): 1687-1694 (2012). Web SearchBibTeXDownload
177Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption. Jinguang Han, Willy Susilo, Yi Mu, Jun Yan. IEEE Trans. Parallel Distrib. Syst. (23): 2150-2162 (2012). Web SearchBibTeXDownload
176New constructions of OSBE schemes and their applications in oblivious access control. Jinguang Han, Willy Susilo, Yi Mu, Jun Yan. Int. J. Inf. Sec. (11): 389-401 (2012). Web SearchBibTeXDownload
175A Pre-computable Signature Scheme with Efficient Verification for RFID. Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan. ISPEC 2012, 1-16. Web SearchBibTeXDownload
174Privacy enhanced data outsourcing in the cloud. Miao Zhou, Yi Mu, Willy Susilo, Jun Yan, Liju Dong. J. Network and Computer Applications (35): 1367-1373 (2012). Web SearchBibTeXDownload
173Provably secure proxy signature scheme from factorization. Yong Yu, Yi Mu, Willy Susilo, Ying Sun, Yafu Ji. Mathematical and Computer Modelling (55): 1160-1168 (2012). Web SearchBibTeXDownload
172Privacy preserving protocol for service aggregation in cloud computing. Peishun Wang, Yi Mu, Willy Susilo, Jun Yan. Softw., Pract. Exper. (42): 467-483 (2012). Web SearchBibTeXDownload
171Multi-Level Controlled Signature. Pairat Thorncharoensri, Willy Susilo, Yi Mu. WISA 2012, 96-110. Web SearchBibTeXDownload
2011
170Electronic Cash with Anonymous User Suspension. Man Ho Au, Willy Susilo, Yi Mu. ACISP 2011, 172-188. Web SearchBibTeXDownload
169Self-certified ring signatures. Nan Li, Yi Mu, Willy Susilo, Fuchun Guo. ASIACCS 2011, 396-400. Web SearchBibTeXDownload
168Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations. Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry. ASIACCS 2011, 296-305. Web SearchBibTeXDownload
167Provably secure server-aided verification signatures. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang. Computers & Mathematics with Applications (61): 1705-1723 (2011). Web SearchBibTeXDownload
166Short Signatures with a Tighter Security Reduction Without Random Oracles. Fuchun Guo, Yi Mu, Willy Susilo. Comput. J. (54): 513-524 (2011). Web SearchBibTeXDownload
165Optimistic Fair Exchange with Strong Resolution-Ambiguity. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiang. IEEE Journal on Selected Areas in Communications (29): 1491-1502 (2011). Web SearchBibTeXDownload
164Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures. X. Huang, Y. Mu, W. Susilo, W. Wu, J. Zhou, Robert H. Deng. IEEE Transactions on Information Forensics and Security (6): 498-512 (2011). Web SearchBibTeXDownload
163Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication. Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Willy Susilo. INCoS 2011, 100-107. Web SearchBibTeXDownload
162Efficient Self-certified Signatures with Batch Verification. Nan Li, Yi Mu, Willy Susilo. Inscrypt 2011, 179-194. Web SearchBibTeXDownload
161Practical RFID ownership transfer scheme. Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini. Journal of Computer Security (19): 319-341 (2011). Web SearchBibTeXDownload
160Improving security of q-SDH based digital signatures. Fuchun Guo, Yi Mu, Willy Susilo. Journal of Systems and Software (84): 1783-1790 (2011). Web SearchBibTeXDownload
159Identity-based trapdoor mercurial commitments and applications. Xiaofeng Chen, Willy Susilo, Fangguo Zhang, Haibo Tian, Jin Li. Theor. Comput. Sci. (412): 5498-5512 (2011). Web SearchBibTeXDownload
2010
158Identity-Based Chameleon Hash Scheme without Key Exposure. Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim. ACISP 2010, 200-215. Web SearchBibTeXDownload
157Proof-of-Knowledge of Representation of Committed Value and Its Applications. Man Ho Au, Willy Susilo, Yi Mu. ACISP 2010, 352-369. Web SearchBibTeXDownload
156Attribute-based signature and its applications. Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui Ren. ASIACCS 2010, 60-69. Web SearchBibTeXDownload
155Towards a Cryptographic Treatment of Publish/Subscribe Systems. Tsz Hon Yuen, Willy Susilo, Yi Mu. CANS 2010, 201-220. Web SearchBibTeXDownload
154A framework for privacy policy management in service aggregation. Peishun Wang, Liju Dong, Yi Mu, Willy Susilo, Jun Yan. CSCWD 2010, 166-171. Web SearchBibTeXDownload
153Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships. Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu. FSE 2010, 192-211. Web SearchBibTeXDownload
152Constructing an Authentication Token to Access External Services in Service Aggregation. Peishun Wang, Yi Mu, Willy Susilo, Jun Yan. IEEE SCC 2010, 321-328. Web SearchBibTeXDownload
151Certificateless threshold signature scheme from bilinear maps. Hong Yuan, Futai Zhang, Xinyi Huang, Yi Mu, Willy Susilo, Lei Zhang. Inf. Sci. (180): 4714-4728 (2010). Web SearchBibTeXDownload
150Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase. Fuchun Guo, Yi Mu, Willy Susilo. Inscrypt 2010, 455-470. Web SearchBibTeXDownload
149How to construct identity-based signatures without the key escrow problem. Tsz Hon Yuen, Willy Susilo, Yi Mu. Int. J. Inf. Sec. (9): 297-311 (2010). Web SearchBibTeXDownload
148On the Security of NOEKEON against Side Channel Cube Attacks. Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry. ISPEC 2010, 45-55. Web SearchBibTeXDownload
147Constructions of certificate-based signature secure against key replacement attacks. Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu. Journal of Computer Security (18): 421-449 (2010). Web SearchBibTeXDownload
146Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiang. Public Key Cryptography 2010, 124-141. Web SearchBibTeXDownload
145Differential Fault Analysis of LEX. Jianyong Huang, Willy Susilo, Jennifer Seberry. SCN 2010, 55-72. Web SearchBibTeXDownload
144A Generic Construction of Dynamic Single Sign-on with Strong Security. Jinguang Han, Yi Mu, Willy Susilo, Jun Yan. SecureComm 2010, 181-198. Web SearchBibTeXDownload
2009
143Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu. ACISP 2009, 153-170. Web SearchBibTeXDownload
142Efficient Non-interactive Range Proof. Tsz Hon Yuen, Qiong Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Guomin Yang. COCOON 2009, 138-147. Web SearchBibTeXDownload
141Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. Man Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu. CT-RSA 2009, 295-308. Web SearchBibTeXDownload
140New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini. ESORICS 2009, 321-336. Web SearchBibTeXDownload
139Asymmetric Group Key Agreement. Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer. EUROCRYPT 2009, 153-170. Web SearchBibTeXDownload
138How to Construct Identity-Based Signatures without the Key Escrow Problem. Tsz Hon Yuen, Willy Susilo, Yi Mu. EuroPKI 2009, 286-301. Web SearchBibTeXDownload
137Escrowed Deniable Identification Schemes. Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Au, Yi Mu, Duncan S. Wong. FGIT-SecTech 2009, 234-241. Web SearchBibTeXDownload
136Enhanced Target Collision Resistant Hash Functions Revisited. Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu. FSE 2009, 327-344. Web SearchBibTeXDownload
135An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions. Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu. IACR Cryptology ePrint Archive (2009): 506 (2009). Web SearchBibTeXDownload
134Policy-Controlled Signatures. Pairat Thorncharoensri, Willy Susilo, Yi Mu. ICICS 2009, 91-106. Web SearchBibTeXDownload
133A five-round algebraic property of AES and its application to the ALPHA-MAC. Jianyong Huang, Jennifer Seberry, Willy Susilo. IJACT (1): 264-289 (2009). Web SearchBibTeXDownload
132Ranking Attack Graphs with Graph Neural Networks. Liang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi. ISPEC 2009, 345-359. Web SearchBibTeXDownload
131Universal Designated Verifier Signatures with Threshold-Signers. Pairat Thorncharoensri, Willy Susilo, Yi Mu. IWSEC 2009, 89-109. Web SearchBibTeXDownload
130Certificate-based Signatures Revisited. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang. J. UCS (15): 1659-1684 (2009). Web SearchBibTeXDownload
129How to Prove Security of a Signature with a Tighter Security Reduction. Fuchun Guo, Yi Mu, Willy Susilo. ProvSec 2009, 90-103. Web SearchBibTeXDownload
128Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?. Man Ho Au, Willy Susilo, Yi Mu. ProvSec 2009, 129-139. Web SearchBibTeXDownload
127Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles. Pairat Thorncharoensri, Willy Susilo, Yi Mu. WISA 2009, 94-108. Web SearchBibTeXDownload
2008
126Sanitizable Signatures Revisited. Tsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu. CANS 2008, 80-97. Web SearchBibTeXDownload
125RFID Privacy Models Revisited. Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini. ESORICS 2008, 251-266. Web SearchBibTeXDownload
124Practical Anonymous Divisible E-Cash from Bounded Accumulators. Man Ho Au, Willy Susilo, Yi Mu. Financial Cryptography 2008, 287-301. Web SearchBibTeXDownload
123Constant-Size Dynamic $k$-TAA. Man Ho Au, Willy Susilo, Yi Mu. IACR Cryptology ePrint Archive (2008): 136 (2008). Web SearchBibTeXDownload
122Public Key Encryption with Keyword Search Revisited. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo. ICCSA (1) 2008, 1249-1259. Web SearchBibTeXDownload
121How to Balance Privacy with Authenticity. Pairat Thorncharoensri, Willy Susilo, Yi Mu. ICISC 2008, 184-201. Web SearchBibTeXDownload
120A New and Efficient Signature on Commitment Values. Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo. I. J. Network Security (7): 100-105 (2008). Web SearchBibTeXDownload
119Short Designated Verifier Signature Scheme and Its Identity-based Variant. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. I. J. Network Security (6): 82-93 (2008). Web SearchBibTeXDownload
118Efficient generic on-line/off-line (threshold) signatures without key exposure. Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim. Inf. Sci. (178): 4192-4203 (2008). Web SearchBibTeXDownload
117Privacy for Private Key in Signatures. Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo. Inscrypt 2008, 84-95. Web SearchBibTeXDownload
116Publicly Verifiable Privacy-Preserving Group Decryption. Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu. Inscrypt 2008, 72-83. Web SearchBibTeXDownload
115Secure universal designated verifier signature without random oracles. Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu. Int. J. Inf. Sec. (7): 171-183 (2008). Web SearchBibTeXDownload
114A Five-Round Algebraic Property of the Advanced Encryption Standard. Jianyong Huang, Jennifer Seberry, Willy Susilo. ISC 2008, 316-330. Web SearchBibTeXDownload
113A Generic Construction of Identity-Based Online/Offline Signcryption. Dongdong Sun, Yi Mu, Willy Susilo. ISPA 2008, 707-712. Web SearchBibTeXDownload
112Cryptography in Computer System Security. Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart. J. UCS (14): 314-317 (2008). Web SearchBibTeX
111Identity-Based On-Line/Off-Line Signcryption. Dongdong Sun, Xinyi Huang, Yi Mu, Willy Susilo. NPC Workshops 2008, 34-41. Web SearchBibTeXDownload
110Server-Aided Verification Signatures: Definitions and New Constructions. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang. ProvSec 2008, 141-155. Web SearchBibTeXDownload
109Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang. WISA 2008, 99-114. Web SearchBibTeXDownload
2007
108SEFAP: An Email System for Anti-Phishing. Qiong Ren, Yi Mu, Willy Susilo. ACIS-ICIS 2007, 782-787. Web SearchBibTeXDownload
107Practical Compact E-Cash. Man Ho Au, Willy Susilo, Yi Mu. ACISP 2007, 431-445. Web SearchBibTeXDownload
106Certificateless Signature Revisited. Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu. ACISP 2007, 308-322. Web SearchBibTeXDownload
105An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo. ACNS 2007, 65-86. Cited by 1Web SearchBibTeXDownload
104Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu. ACNS 2007, 18-30. Web SearchBibTeXDownload
103Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks. Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini. ACSW Frontiers 2007, 183-191. Web SearchBibTeXDownload
102Identity-Based Proxy Signature from Pairings. Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang. ATC 2007, 22-31. Web SearchBibTeXDownload
101Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin. ATC 2007, 32-41. Web SearchBibTeXDownload
100Achieving Mobility and Anonymity in IP-Based Networks. Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini. CANS 2007, 60-79. Web SearchBibTeXDownload
99A Generic Construction for Universally-Convertible Undeniable Signatures. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu. CANS 2007, 15-33. Web SearchBibTeXDownload
98Compact E-Cash from Bounded Accumulator. Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu. CT-RSA 2007, 178-195. Web SearchBibTeXDownload
97Certificate-Based Signature: Security Model and Efficient Construction. Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu. EuroPKI 2007, 110-125. Web SearchBibTeXDownload
96Nominative Signature: Application, Security Model and Construction. Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo. IACR Cryptology ePrint Archive (2007): 69 (2007). Web SearchBibTeXDownload
95Group Decryption. Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang. IACR Cryptology ePrint Archive (2007): 17 (2007). Web SearchBibTeXDownload
94Practical Anonymous Divisible E-Cash From Bounded Accumulators. Man Ho Au, Willy Susilo, Yi Mu. IACR Cryptology ePrint Archive (2007): 459 (2007). Web SearchBibTeXDownload
93Efficient Partially Blind Signatures with Provable Security. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang. ICCSA (3) 2007, 1096-1105. Web SearchBibTeXDownload
92Formal Definition and Construction of Nominative Signature. Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo. ICICS 2007, 57-68. Web SearchBibTeXDownload
91New Construction of Group Secret Handshakes Based on Pairings. Lan Zhou, Willy Susilo, Yi Mu. ICICS 2007, 16-30. Web SearchBibTeXDownload
90Transport Layer Identification of Skype Traffic. Liang Lu, Jeffrey Horton, Reihaneh Safavi-Naini, Willy Susilo. ICOIN 2007, 465-481. Web SearchBibTeXDownload
89Comparing and debugging firewall rule tables. Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo. IET Information Security (1): 143-151 (2007). Web SearchBibTeXDownload
88Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang. Inscrypt 2007, 25-39. Web SearchBibTeXDownload
87Revocable Ring Signature. Dennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, Duncan S. Wong. J. Comput. Sci. Technol. (22): 785-794 (2007). Web SearchBibTeXDownload
86Short Group Signatures Without Random Oracles. Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang, Zhengtao Jiang. J. Comput. Sci. Technol. (22): 805-821 (2007). Web SearchBibTeXDownload
85Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. J. Comput. Sci. Technol. (22): 71-74 (2007). Web SearchBibTeXDownload
84Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu. Pairing 2007, 367-391. Web SearchBibTeXDownload
83Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. Huafei Zhu, Willy Susilo, Yi Mu. Public Key Cryptography 2007, 134-149. Web SearchBibTeXDownload
82Compact sequential aggregate signatures. Yi Mu, Willy Susilo, Huafei Zhu. SAC 2007, 249-253. Web SearchBibTeXDownload
81Designated Verifier Signature: Definition, Framework and New Constructions. Yong Li, Willy Susilo, Yi Mu, Dingyi Pei. UIC 2007, 1191-1200. Web SearchBibTeXDownload
80Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang. WISA 2007, 16-29. Web SearchBibTeXDownload
2006
79Event-Oriented k-Times Revocable-iff-Linked Group Signatures. Man Ho Au, Willy Susilo, Siu-Ming Yiu. ACISP 2006, 223-234. Web SearchBibTeXDownload
78Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang. ACISP 2006, 99-110. Web SearchBibTeXDownload
77Certificateless Designated Verifier Signature Schemes. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. AINA (2) 2006, 15-19. Web SearchBibTeXDownload
76Designated group credentials. Ching Yu Ng, Willy Susilo, Yi Mu. ASIACCS 2006, 59-65. Web SearchBibTeXDownload
75Self-organised group key management for ad hoc networks. Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo. ASIACCS 2006, 138-147. Web SearchBibTeXDownload
74Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang. ATC 2006, 531-540. Web SearchBibTeXDownload
73Efficient Signcryption Without Random Oracles. Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang. ATC 2006, 449-458. Web SearchBibTeXDownload
72X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. Lan Yu, Willy Susilo, Reihaneh Safavi-Naini. CANS 2006, 364-380. Web SearchBibTeXDownload
71Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. Willy Susilo, Yi Mu. EuroPKI 2006, 68-80. Web SearchBibTeXDownload
70Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo. Financial Cryptography 2006, 251-265. Web SearchBibTeXDownload
69Efficient Partially Blind Signatures with Provable Security. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang. ICCSA (3) 2006, 345-354. Web SearchBibTeXDownload
68Universal Designated Verifier Signature Without Delegatability. Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu. ICICS 2006, 479-498. Web SearchBibTeXDownload
67Convertible identity-based anonymous designated ring signatures. Yiqun Chen, Willy Susilo, Yi Mu. IJSN (1): 218-225 (2006). Web SearchBibTeXDownload
66On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo. ISC 2006, 217-232. Web SearchBibTeXDownload
65Multi-party Concurrent Signatures. Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini. ISC 2006, 131-145. Web SearchBibTeXDownload
64Short (Identity-Based) Strong Designated Verifier Signature Schemes. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. ISPEC 2006, 214-225. Web SearchBibTeXDownload
63Privately Retrieve Data from Large Databases. Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang. ISPEC 2006, 367-378. Web SearchBibTeXDownload
62Three-Round Secret Handshakes Based on ElGamal and DSA. Lan Zhou, Willy Susilo, Yi Mu. ISPEC 2006, 332-342. Web SearchBibTeXDownload
61Identity-based anonymous designated ring signatures. Yiqun Chen, Willy Susilo, Yi Mu. IWCMC 2006, 189-194. Web SearchBibTeXDownload
60Ad Hoc Group Signatures. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang. IWSEC 2006, 120-135. Web SearchBibTeXDownload
59Personal Health Record Systems and Their Security Protection. Khin Than Win, Willy Susilo, Yi Mu. J. Medical Systems (30): 309-315 (2006). Web SearchBibTeXDownload
58Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes. Shidi Xu, Yi Mu, Willy Susilo. JNW (1): 47-53 (2006). Web SearchBibTeXDownload
57Proxy Signature Without Random Oracles. Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu. MSN 2006, 473-484. Web SearchBibTeXDownload
56Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings. Lan Zhou, Willy Susilo, Yi Mu. MSN 2006, 521-532. Web SearchBibTeXDownload
55Constant-Size Dynamic k-TAA. Man Ho Au, Willy Susilo, Yi Mu. SCN 2006, 111-125. Web SearchBibTeXDownload
54Restricted Universal Designated Verifier Signature. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. UIC 2006, 874-882. Web SearchBibTeXDownload
53On the Internal Structure of Alpha-MAC. Jianyong Huang, Jennifer Seberry, Willy Susilo. VIETCRYPT 2006, 271-285. Web SearchBibTeXDownload
52A New Signature Scheme Without Random Oracles from Bilinear Pairings. Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu. VIETCRYPT 2006, 67-80. Web SearchBibTeXDownload
2005
51On the Security of Nominative Signatures. Willy Susilo, Yi Mu. ACISP 2005, 329-335. Web SearchBibTeXDownload
50Reducing Security Overhead for Mobile Networks. Fangguo Zhang, Yi Mu, Willy Susilo. AINA 2005, 398-403. Web SearchBibTeXDownload
49Privacy-Enhanced Internet Storage. Willy Susilo, Fangguo Zhang, Yi Mu. AINA 2005, 603-608. Web SearchBibTeXDownload
48Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. AINA 2005, 649-654. Web SearchBibTeXDownload
47Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03. Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo. Applied Mathematics and Computation (170): 1166-1169 (2005). Web SearchBibTeXDownload
46Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo. ASIACRYPT 2005, 644-661. Web SearchBibTeXDownload
45On Securing RTP-Based Streaming Content with Firewalls. Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo. CANS 2005, 304-319. Cited by 1Web SearchBibTeXDownload
44On the Security of Certificateless Signature Schemes from Asiacrypt 2003. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. CANS 2005, 13-25. Web SearchBibTeXDownload
43Short Designated Verifier Proxy Signature from Pairings. Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang. EUC Workshops 2005, 835-844. Web SearchBibTeXDownload
42Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. Shidi Xu, Yi Mu, Willy Susilo. EUC Workshops 2005, 854-863. Web SearchBibTeXDownload
41Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder. EUC Workshops 2005, 423-432. Web SearchBibTeXDownload
40A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen. EUC Workshops 2005, 480-489. Web SearchBibTeXDownload
39Identity-Based Universal Designated Verifier Signatures. Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen. EUC Workshops 2005, 825-834. Web SearchBibTeXDownload
38Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). Fangguo Zhang, Willy Susilo, Yi Mu. Financial Cryptography 2005, 45-56. Web SearchBibTeXDownload
37Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004. Xinyi Huang, Willy Susilo, Yi Mu. IACR Cryptology ePrint Archive (2005): 122 (2005). Web SearchBibTeXDownload
36A New Short Signature Scheme Without Random Oracles from Bilinear Pairings. Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu. IACR Cryptology ePrint Archive (2005): 386 (2005). Web SearchBibTeXDownload
35Public Key Encryption with Keyword Search Revisited. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo. IACR Cryptology ePrint Archive (2005): 191 (2005). Web SearchBibTeXDownload
34An Efficient Static Blind Ring Signature Scheme. Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu. ICISC 2005, 410-423. Web SearchBibTeXDownload
33Universal Designated Multi Verifier Signature Schemes. Ching Yu Ng, Willy Susilo, Yi Mu. ICPADS (2) 2005, 305-309. Web SearchBibTeXDownload
32Provably secure fail-stop signature schemes based on RSA. Willy Susilo, Yi Mu. IJWMC (1): 53-60 (2005). Web SearchBibTeXDownload
31Certificateless Public Key Encryption Without Pairing. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo. ISC 2005, 134-148. Web SearchBibTeXDownload
30Token-Controlled Public Key Encryption. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo. ISPEC 2005, 386-397. Web SearchBibTeXDownload
29Efficient Broadcast from Trapdoor Functions. Yi Mu, Willy Susilo, Xinyi Huang. IWAP 2005, 240-248. Web SearchBibTeXDownload
28Secure AODV Routing Protocol Using One-Time Signature. Shidi Xu, Yi Mu, Willy Susilo. MSN 2005, 288-297. Web SearchBibTeXDownload
27Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo. Public Key Cryptography 2005, 380-397. Web SearchBibTeXDownload
26Tripartite Concurrent Signatures. Willy Susilo, Yi Mu. SEC 2005, 425-442. Web SearchBibTeX
2004
25Identity-Based Strong Designated Verifier Signature Schemes. Willy Susilo, Fangguo Zhang, Yi Mu. ACISP 2004, 313-324. Web SearchBibTeXDownload
24Deniable Ring Authentication Revisited. Willy Susilo, Yi Mu. ACNS 2004, 149-163. Web SearchBibTeXDownload
23X2Rep: Enhanced Trust Semantics for the XRep Protocol. Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo. ACNS 2004, 205-219. Web SearchBibTeXDownload
22Deniable Partial Proxy Signatures. Yi Mu, Fangguo Zhang, Willy Susilo. ASIAN 2004, 182-194. Web SearchBibTeXDownload
21Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. Yi Mu, Willy Susilo, Yan-Xia Lin, Chun Ruan. ASIAN 2004, 169-181. Web SearchBibTeXDownload
20On the Ambiguity of Concurrent Signatures. Yi Mu, Fangguo Zhang, Willy Susilo. IACR Cryptology ePrint Archive (2004): 96 (2004). Web SearchBibTeXDownload
19Perfect Concurrent Signature Schemes. Willy Susilo, Yi Mu, Fangguo Zhang. ICICS 2004, 14-26. Web SearchBibTeXDownload
18An Efficient Signature Scheme from Bilinear Pairings and Its Applications. Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo. Public Key Cryptography 2004, 277-290. Web SearchBibTeXDownload
2003
17ID-Based Chameleon Hashes from Bilinear Pairings. Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo. IACR Cryptology ePrint Archive (2003): 208 (2003). Web SearchBibTeXDownload
16Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03. Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo. IACR Cryptology ePrint Archive (2003): 129 (2003). Web SearchBibTeXDownload
15Non-interactive Deniable Ring Authentication. Willy Susilo, Yi Mu. ICISC 2003, 386-401. Web SearchBibTeXDownload
14Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo. INDOCRYPT 2003, 191-204. Web SearchBibTeXDownload
13Identity-Based Broadcasting. Yi Mu, Willy Susilo, Yan-Xia Lin. INDOCRYPT 2003, 177-190. Web SearchBibTeXDownload
12On Fail-Stop Verifiable Secret Sharing Schemes. Willy Susilo, Yi Mu. Security and Management 2003, 663-667. Web SearchBibTeX
11On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). Willy Susilo, Jianyong Huang, Jennifer Seberry. Security and Management 2003, 668-674. Web SearchBibTeX
2002
10An Efficient Fail-Stop Signature Scheme Based on Factorization. Willy Susilo, Reihaneh Safavi-Naini. ICISC 2002, 62-74. Web SearchBibTeXDownload
2001
9How to Construct Fail-Stop Confirmer Signature Schemes. Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang. ACISP 2001, 435-444. Web SearchBibTeXDownload
8On Classifying Conference Key Distribution Protocols. Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo. ACISP 2001, 51-59. Web SearchBibTeXDownload
7An Efficient Construction for Fail-Stop Signature for Long Messages. Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang. J. Inf. Sci. Eng. (17): 879-898 (2001). Web SearchBibTeXDownload
2000
6Key Management for Secure Multicast with Dynamic Controller. Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang. ACISP 2000, 178-190. Web SearchBibTeXDownload
5A New and Efficient Fail-stop Signature Scheme. Willy Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry. Comput. J. (43): 430-437 (2000). Web SearchBibTeXDownload
4Fail-Stop Signature for Long Messages. Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang. INDOCRYPT 2000, 165-177. Web SearchBibTeXDownload
3Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. Reihaneh Safavi-Naini, Willy Susilo. ISW 2000, 292-307. Web SearchBibTeXDownload
1999
2Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk. ACISP 1999, 103-116. Web SearchBibTeXDownload
1RSA-Based Fail-Stop Signature Schemes. Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk. ICPP Workshops 1999, 161-166. Web SearchBibTeXDownload
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research