default search action
Willy Susilo
Person information
- affiliation: University of Wollongong, Centre for Computer and Information Security Research, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j405]Meixia Miao, Siqi Zhao, Jiawei Li, Jianghong Wei, Willy Susilo:
Practically secure linear-map vector commitment and its applications. Comput. Stand. Interfaces 91: 103885 (2025) - [j404]Jia-Chng Loh, Fuchun Guo, Willy Susilo:
Improving efficiency and security of Camenisch-Lysyanskaya signatures for anonymous credential systems. Comput. Stand. Interfaces 91: 103886 (2025) - [j403]Yusong Yao, Yiwen Shi, Guohua Tian, Meixia Miao, Willy Susilo:
PSCBO: A provably secure consensus-based blockchain Oracle. Comput. Stand. Interfaces 91: 103892 (2025) - [j402]Jiaming Wen, Willy Susilo, Rupeng Yang, Zuoxia Yu, Huanguo Zhang:
Revocable ring signatures with CCA-anonymity from standard lattices. Comput. Stand. Interfaces 91: 103893 (2025) - [j401]Yanhua Zhang, Willy Susilo, Fuchun Guo:
Lattice-based strong designated verifier signature with non-delegatability. Comput. Stand. Interfaces 92: 103904 (2025) - [j400]Fengmei Tang, Yumei Li, Yudi Zhang, Willy Susilo, Bingbing Li:
Real-time privacy-preserved auditing for shared outsourced data. Comput. Stand. Interfaces 92: 103927 (2025) - [j399]Bo Zhang, Yansong Gao, Boyu Kuang, Changlong Yu, Anmin Fu, Willy Susilo:
A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and Countermeasures. ACM Comput. Surv. 57(3): 62:1-62:36 (2025) - [j398]Wenbo Yang, Hao Wang, Zhi Li, Ziyu Niu, Lei Wu, Xiaochao Wei, Ye Su, Willy Susilo:
Privacy-Preserving Machine Learning in Cloud-Edge-End Collaborative Environments. IEEE Internet Things J. 12(1): 419-434 (2025) - 2024
- [j397]Gelare Oudi Ghadim, Mohammad Dakhilalian, Parvin Rastegari, Faramarz Hendessi, Willy Susilo:
On Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles: Cryptanalysis and Improvements. IEEE Access 12: 167944-167969 (2024) - [j396]Jinguang Han, Willy Susilo, Liquan Chen, Jianchang Lai, Ge Wu:
Privacy-Preserving Confidential Reporting System With Designated Reporters. Comput. J. 67(5): 1951-1962 (2024) - [j395]Deepika Gautam, Sunil Prajapat, Pankaj Kumar, Ashok Kumar Das, Korhan Cengiz, Willy Susilo:
Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage. Clust. Comput. 27(6): 8159-8172 (2024) - [j394]Yanmei Cao, Jianghong Wei, Yang Xiang, Willy Susilo, Xiaofeng Chen:
Abuse-resistant deniable encryption. Comput. Stand. Interfaces 87: 103761 (2024) - [j393]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property. Comput. Stand. Interfaces 87: 103769 (2024) - [j392]Shuaining Gao, Xinjian Chen, Hongbo Li, Willy Susilo, Qiong Huang:
Post-quantum secure group signature with verifier local revocation and backward unlinkability. Comput. Stand. Interfaces 88: 103782 (2024) - [j391]Tao Li, Peiyao Niu, Yilei Wang, Shengke Zeng, Xiaoying Wang, Willy Susilo:
HT2REP: A fair cross-chain atomic exchange protocol under UC framework based on HTLCs and TRE. Comput. Stand. Interfaces 89: 103834 (2024) - [j390]Wei Liang, Yaqin Liu, Ce Yang, Songyou Xie, Kuanching Li, Willy Susilo:
On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive Survey. ACM Comput. Surv. 56(12): 298:1-298:35 (2024) - [j389]Madhav Mukherjee, Ngoc-Thuy Le, Yang-Wai Chow, Willy Susilo:
Strategic Approaches to Cybersecurity Learning: A Study of Educational Models and Outcomes. Inf. 15(2): 117 (2024) - [j388]Yuan Gao, Liquan Chen, Jinguang Han, Ge Wu, Willy Susilo:
IoT Privacy-Preserving Data Mining With Dynamic Incentive Mechanism. IEEE Internet Things J. 11(1): 777-790 (2024) - [j387]Peiheng Zhang, Min Tang, Willy Susilo, Mingwu Zhang:
Efficient Noninteractive Polynomial Commitment Scheme in the Discrete Logarithm Setting. IEEE Internet Things J. 11(5): 8078-8089 (2024) - [j386]Yizhong Liu, Boyu Zhao, Zedan Zhao, Jianwei Liu, Xun Lin, Qianhong Wu, Willy Susilo:
SS-DID: A Secure and Scalable Web3 Decentralized Identity Utilizing Multilayer Sharding Blockchain. IEEE Internet Things J. 11(15): 25694-25705 (2024) - [j385]Kaifeng Xiao, Xinjian Chen, Hongbo Li, Jianye Huang, Willy Susilo, Qiong Huang:
A fully secure lattice-based signcryption with designated equality test in standard model. Inf. Sci. 658: 120015 (2024) - [j384]Yizhong Liu, Zixiao Jia, Zixu Jiang, Xun Lin, Jianwei Liu, Qianhong Wu, Willy Susilo:
BFL-SA: Blockchain-based federated learning via enhanced secure aggregation. J. Syst. Archit. 152: 103163 (2024) - [j383]Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng:
Group encryption: Full dynamicity, message filtering and code-based instantiation. Theor. Comput. Sci. 1007: 114678 (2024) - [j382]Chunpeng Ge, Zhe Liu, Willy Susilo, Liming Fang, Hao Wang:
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract. IEEE Trans. Dependable Secur. Comput. 21(2): 937-948 (2024) - [j381]Chunpeng Ge, Willy Susilo, Zhe Liu, Joonsang Baek, Xiapu Luo, Liming Fang:
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 21(2): 949-960 (2024) - [j380]Yizhong Liu, Xinxin Xing, Ziheng Tong, Xun Lin, Jing Chen, Zhenyu Guan, Qianhong Wu, Willy Susilo:
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain. IEEE Trans. Dependable Secur. Comput. 21(4): 2603-2618 (2024) - [j379]Guohua Tian, Jianghong Wei, Meixia Miao, Fuchun Guo, Willy Susilo, Xiaofeng Chen:
Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing. IEEE Trans. Dependable Secur. Comput. 21(4): 3917-3930 (2024) - [j378]Wenchao Li, Willy Susilo, Chunhe Xia, Luqi Huang, Fuchun Guo, Tianbo Wang:
Secure Data Integrity Check Based on Verified Public Key Encryption With Equality Test for Multi-Cloud Storage. IEEE Trans. Dependable Secur. Comput. 21(6): 5359-5373 (2024) - [j377]Jinguang Han, Patrick Schaumont, Willy Susilo:
Guest Editorial IEEE Transactions on Emerging Topics in Computing Special Section on Advances in Emerging Privacy-Preserving Computing. IEEE Trans. Emerg. Top. Comput. 12(1): 266-268 (2024) - [j376]Jinguang Han, Willy Susilo, Nan Li, Xinyi Huang:
OLBS: Oblivious Location-Based Services. IEEE Trans. Inf. Forensics Secur. 19: 2231-2243 (2024) - [j375]Jianchang Lai, Willy Susilo, Robert H. Deng, Fuchun Guo:
SDSS: Sequential Data Sharing System in IoT. IEEE Trans. Inf. Forensics Secur. 19: 2288-2299 (2024) - [j374]Mei Jiang, Yannan Li, Willy Susilo, Dung Hoang Duong:
Quantum-Safe Puncturable Signatures With Their Application in Blockchain. IEEE Trans. Inf. Forensics Secur. 19: 2761-2770 (2024) - [j373]Fucai Luo, Haiyan Wang, Willy Susilo, Xingfu Yan, Xiaofan Zheng:
Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds. IEEE Trans. Inf. Forensics Secur. 19: 2919-2934 (2024) - [j372]Andi Liu, Yizhong Liu, Qianhong Wu, Boyu Zhao, Dongyu Li, Yuan Lu, Rongxing Lu, Willy Susilo:
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains. IEEE Trans. Inf. Forensics Secur. 19: 3178-3193 (2024) - [j371]Jiale Zhang, Chengcheng Zhu, Xiaobing Sun, Chunpeng Ge, Bing Chen, Willy Susilo, Shui Yu:
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training. IEEE Trans. Inf. Forensics Secur. 19: 4752-4766 (2024) - [j370]Mingzhe Zhai, Qianhong Wu, Yizhong Liu, Bo Qin, Xiaopeng Dai, Qiyuan Gao, Willy Susilo:
Secret Multiple Leaders & Committee Election With Application to Sharding Blockchain. IEEE Trans. Inf. Forensics Secur. 19: 5060-5074 (2024) - [j369]Meiyan Xiao, Qiong Huang, Wenya Chen, Chuan Lyu, Willy Susilo:
Domain-Specific Fine-Grained Access Control for Cloud-Edge Collaborative IoT. IEEE Trans. Inf. Forensics Secur. 19: 6499-6513 (2024) - [j368]Mingzhe Zhai, Yizhong Liu, Qianhong Wu, Bo Qin, Haibin Zheng, Xiaopeng Dai, Zhenyang Ding, Willy Susilo:
Accountable Secret Committee Election and Anonymous Sharding Blockchain Consensus. IEEE Trans. Inf. Forensics Secur. 19: 9158-9172 (2024) - [j367]Qihao Dong, Shengyuan Yang, Zhiyang Dai, Yansong Gao, Shang Wang, Yuan Cao, Anmin Fu, Willy Susilo:
CareFL: Contribution Guided Byzantine-Robust Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 9714-9729 (2024) - [j366]Jianghong Wei, Meixia Miao, Guohua Tian, Jun Shen, Xiaofeng Chen, Willy Susilo:
Optimal Verifiable Data Streaming Under Concurrent Queries. IEEE Trans. Mob. Comput. 23(5): 5543-5557 (2024) - [j365]Zhenhua Chen, Luqi Huang, Guomin Yang, Willy Susilo, Xingbing Fu, Xingxing Jia:
Attribute-Hiding Fuzzy Encryption for Privacy-Preserving Data Evaluation. IEEE Trans. Serv. Comput. 17(3): 789-803 (2024) - [c379]Wei Zong, Yang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim, Seyit Camtepe:
IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking. AAAI 2024: 7837-7845 - [c378]Nam Tran, Khoa Nguyen, Dongxi Liu, Josef Pieprzyk, Willy Susilo:
Improved Multimodal Private Signatures from Lattices. ACISP (2) 2024: 3-23 - [c377]Luqi Huang, Willy Susilo, Guomin Yang, Fuchun Guo:
Key Cooperative Attribute-Based Encryption. ACISP (1) 2024: 241-260 - [c376]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems. ACISP (2) 2024: 269-289 - [c375]Jia-Chng Loh, Fuchun Guo, Willy Susilo:
Pairing-Free ID-Based Signatures as Secure as Discrete Logarithm in AGM. ACISP (1) 2024: 347-367 - [c374]Thanh Xuan Khuc, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Threshold Ring Signatures with Accountability. ACISP (1) 2024: 368-388 - [c373]Xin Liu, Willy Susilo, Joonsang Baek:
Extended Withdrawable Signature. DSPP (1) 2024: 119-140 - [c372]Yumei Li, Willy Susilo, Fuchun Guo:
Public Auditing with Aggregated Tags for Multiple Users. DSPP (2) 2024: 122-139 - [c371]Pingbin Luo, Xinjian Chen, Willy Susilo, Qiong Huang:
Identity-Based Signature from Lattices Without Trapdoors. ICICS (2) 2024: 211-230 - [c370]Yanhua Zhang, Willy Susilo, Yan Chen, Fuchun Guo, Jiaming Wen:
Lattice-Based Universal Designated Multi-verifiers Signature Scheme. ISPEC 2024: 33-54 - [c369]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Shrinkable Ring Signatures: It Wasn't Them! ISPEC 2024: 75-93 - [c368]Yudi Zhang, Yumei Li, Mingwu Zhang, Willy Susilo:
OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT. ISPEC 2024: 383-402 - [c367]Shen Lin, Xiaoyu Zhang, Willy Susilo, Xiaofeng Chen, Jun Liu:
GDR-GMA: Machine Unlearning via Direction-Rectified and Magnitude-Adjusted Gradients. ACM Multimedia 2024: 9087-9095 - [c366]Markus Bläser, Zhili Chen, Dung Hoang Duong, Antoine Joux, Tuong Ngoc Nguyen, Thomas Plantard, Youming Qiao, Willy Susilo, Gang Tang:
On Digital Signatures Based on Group Actions: QROM Security and Ring Signatures. PQCrypto (1) 2024: 227-261 - [c365]Jianghong Wei, Guohua Tian, Ding Wang, Fuchun Guo, Willy Susilo, Xiaofeng Chen:
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus. USENIX Security Symposium 2024 - [i95]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. CoRR abs/2403.15052 (2024) - [i94]Yongqi Jiang, Yansong Gao, Chunyi Zhou, Hongsheng Hu, Anmin Fu, Willy Susilo:
Intellectual Property Protection for Deep Learning Model and Dataset Intelligence. CoRR abs/2411.05051 (2024) - [i93]Sabyasachi Dutta, Partha Sarathi Roy, Reihaneh Safavi-Naini, Willy Susilo:
Password Protected Universal Thresholdizer. IACR Cryptol. ePrint Arch. 2024: 7 (2024) - 2023
- [j364]Zhenhua Chen, Jingjing Nie, Zhanli Li, Chunpeng Ge, Willy Susilo:
Geometric Searchable Encryption Without False Positive And Its Applications. Comput. J. 66(9): 2155-2168 (2023) - [j363]Shijin Chen, Willy Susilo, Yudi Zhang, Bo Yang, Mingwu Zhang:
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing. Comput. Stand. Interfaces 85: 103707 (2023) - [j362]Zhen Zhao, Willy Susilo, Fuchun Guo, Jianchang Lai, Baocang Wang:
Full black-box retrievable and accountable identity-based encryption. Comput. Stand. Interfaces 86: 103741 (2023) - [j361]Hoonyong Park, TaeGuen Kim, Daniel Gerbi Duguma, Jiyoon Kim, Ilsun You, Willy Susilo:
An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS. Comput. Syst. Sci. Eng. 45(2): 1145-1165 (2023) - [j360]Duy Tung Khanh Nguyen, Dung Hoang Duong, Willy Susilo, Yang-Wai Chow, Anh The Ta:
HeFUN: Homomorphic Encryption for Unconstrained Secure Neural Network Inference. Future Internet 15(12): 407 (2023) - [j359]Suryakanta Panda, Samrat Mondal, Ashok Kumar Das, Willy Susilo:
Secure access privilege delegation using attribute-based encryption. Int. J. Inf. Sec. 22(5): 1261-1276 (2023) - [j358]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Willy Susilo, Ilsun You:
Towards secure asynchronous messaging with forward secrecy and mutual authentication. Inf. Sci. 626: 114-132 (2023) - [j357]Gang Shen, Zhiqiang Fu, Yumin Gui, Willy Susilo, Mingwu Zhang:
Efficient and privacy-preserving online diagnosis scheme based on federated learning in e-healthcare system. Inf. Sci. 647: 119261 (2023) - [j356]Jinguang Han, Liqun Chen, Willy Susilo, Liquan Chen, Ge Wu:
DFE-IP: Delegatable functional encryption for inner product. Inf. Sci. 647: 119425 (2023) - [j355]Yang-Wai Chow, Willy Susilo, Yannan Li, Nan Li, Chau Nguyen:
Visualization and Cybersecurity in the Metaverse: A Survey. J. Imaging 9(1): 11 (2023) - [j354]Guohua Tian, Jianghong Wei, Miroslaw Kutylowski, Willy Susilo, Xinyi Huang, Xiaofeng Chen:
VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing. IEEE Trans. Computers 72(7): 1928-1942 (2023) - [j353]Yudi Zhang, Fuchun Guo, Willy Susilo, Guomin Yang:
Balancing Privacy and Flexibility of Cloud-Based Personal Health Records Sharing System. IEEE Trans. Cloud Comput. 11(3): 2420-2430 (2023) - [j352]Jun Shen, Xiaofeng Chen, Jianghong Wei, Fuchun Guo, Willy Susilo:
Blockchain-Based Accountable Auditing With Multi-Ownership Transfer. IEEE Trans. Cloud Comput. 11(3): 2711-2724 (2023) - [j351]Zhen Zhao, Willy Susilo, Baocang Wang, Kai Zeng:
Public-Key Encryption With Tester Verifiable Equality Test for Cloud Computing. IEEE Trans. Cloud Comput. 11(4): 3396-3406 (2023) - [j350]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A new attack on some RSA variants. Theor. Comput. Sci. 960: 113898 (2023) - [j349]Mingwu Zhang, Yu Chen, Willy Susilo:
Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systems. IEEE Trans. Dependable Secur. Comput. 20(5): 3988-4001 (2023) - [j348]Hongbo Li, Qiong Huang, Jianye Huang, Willy Susilo:
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search. IEEE Trans. Inf. Forensics Secur. 18: 396-410 (2023) - [j347]Hua Shen, Ge Wu, Zhe Xia, Willy Susilo, Mingwu Zhang:
A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform. IEEE Trans. Inf. Forensics Secur. 18: 2637-2652 (2023) - [j346]Intae Kim, Willy Susilo, Joonsang Baek, Jongkil Kim, Yang-Wai Chow:
PCSF: Privacy-Preserving Content-Based Spam Filter. IEEE Trans. Inf. Forensics Secur. 18: 2856-2869 (2023) - [j345]Jun Shen, Xiaofeng Chen, Zheli Liu, Willy Susilo:
Verifiable and Redactable Blockchains With Fully Editing Operations. IEEE Trans. Inf. Forensics Secur. 18: 3787-3802 (2023) - [j344]Xueqiao Liu, Guomin Yang, Willy Susilo, Kai He, Robert H. Deng, Jian Weng:
Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits. IEEE Trans. Inf. Forensics Secur. 18: 4929-4943 (2023) - [j343]Mingwu Zhang, Shijin Chen, Jian Shen, Willy Susilo:
PrivacyEAFL: Privacy-Enhanced Aggregation for Federated Learning in Mobile Crowdsensing. IEEE Trans. Inf. Forensics Secur. 18: 5804-5816 (2023) - [j342]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xinyi Huang, Willy Susilo:
Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems. IEEE Trans. Parallel Distributed Syst. 34(2): 552-566 (2023) - [j341]Zhenhua Chen, Jingjing Nie, Li Zhan-Li, Willy Susilo, Chunpeng Ge:
Geometric Searchable Encryption for Privacy-Preserving Location-Based Services. IEEE Trans. Serv. Comput. 16(4): 2672-2684 (2023) - [j340]Peng Jiang, Fuchun Guo, Willy Susilo, Chao Lin, Jiaxi Hu, Zhen Zhao, Liehuang Zhu, Debiao He:
EthereumX: Improving Signature Security With Randomness Preprocessing Module. IEEE Trans. Serv. Comput. 16(5): 3318-3331 (2023) - [j339]Willy Susilo, Fuchun Guo, Zhen Zhao, Yinhao Jiang, Chunpeng Ge:
Secure Replication-Based Outsourced Computation Using Smart Contracts. IEEE Trans. Serv. Comput. 16(5): 3711-3722 (2023) - [j338]Yudi Zhang, Willy Susilo, Fuchun Guo, Guomin Yang:
PPDF: A Privacy-Preserving Cloud-Based Data Distribution System With Filtering. IEEE Trans. Serv. Comput. 16(6): 3920-3930 (2023) - [j337]Hua Shen, Ge Wu, Willy Susilo, Mingwu Zhang:
Data-Matching-Based Privacy-Preserving Statistics and Its Applications in Digital Publishing Industry. IEEE Trans. Serv. Comput. 16(6): 4554-4566 (2023) - [c364]Jia-Chng Loh, Fuchun Guo, Willy Susilo, Guomin Yang:
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM. ACISP 2023: 199-219 - [c363]Chunpeng Ge, Willy Susilo, Zhe Liu, Joonsang Baek, Xiapu Luo, Liming Fang:
Attribute-based Proxy Re-encryption with Direct Revocation Mechanism for Data Sharing in Clouds. ACM TUR-C 2023: 164-165 - [c362]Mengdie Huang, Yi Xie, Xiaofeng Chen, Jin Li, Changyu Dong, Zheli Liu, Willy Susilo:
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup. AsiaCCS 2023: 716-730 - [c361]Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo, Dongxi Liu:
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. AsiaCCS 2023: 938-950 - [c360]Yamin Li, Jianghong Wei, Fuchun Guo, Willy Susilo, Xiaofeng Chen:
Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions. ASIACRYPT (5) 2023: 134-165 - [c359]Khoa Nguyen, Partha Sarathi Roy, Willy Susilo, Yanhong Xu:
Bicameral and Auditably Private Signatures. ASIACRYPT (2) 2023: 313-347 - [c358]Thanh Xuan Khuc, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Compact Accountable Ring Signatures in the Plain Model. Inscrypt (1) 2023: 23-43 - [c357]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Compact Ring Signatures with Post-Quantum Security in Standard Model. Inscrypt (1) 2023: 65-84 - [c356]Shen Lin, Xiaoyu Zhang, Chenyang Chen, Xiaofeng Chen, Willy Susilo:
ERM-KTP: Knowledge-Level Machine Unlearning via Knowledge Transfer. CVPR 2023: 20147-20155 - [c355]Jacob Neil Taylor, Ngoc-Thuy Le, Joonsang Baek, Willy Susilo:
Hyron: A New Approach for Automating the Network ACL Delivery Pipeline. ICCCN 2023: 1-10 - [c354]Xin Liu, Joonsang Baek, Willy Susilo:
Withdrawable Signature: How to Call Off a Signature. ISC 2023: 557-577 - [c353]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. NDSS 2023 - [c352]Minh Thuy Truc Pham, Dung Hoang Duong, Yannan Li, Willy Susilo:
Threshold Ring Signature Scheme from Cryptographic Group Action. ProvSec 2023: 207-227 - [c351]Wei Zong, Yang-Wai Chow, Willy Susilo, Kien Do, Svetha Venkatesh:
TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems. SP 2023: 1667-1683 - [c350]Thanh Xuan Khuc, Anh The Ta, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems. SPACE 2023: 214-241 - [i92]Jinpeng Hou, Yansong Gao, Mang Su, Willy Susilo, Jie Chen, Anmin Fu:
Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys. IACR Cryptol. ePrint Arch. 2023: 180 (2023) - [i91]Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, Zhen Zhao:
Research Philosophy of Modern Cryptography. IACR Cryptol. ePrint Arch. 2023: 715 (2023) - [i90]Khoa Nguyen, Partha Sarathi Roy, Willy Susilo, Yanhong Xu:
Bicameral and Auditably Private Signatures. IACR Cryptol. ePrint Arch. 2023: 1351 (2023) - [i89]Xin Liu, Joonsang Baek, Willy Susilo:
Withdrawable Signature: How to Call off a Signature. IACR Cryptol. ePrint Arch. 2023: 1621 (2023) - 2022
- [j336]Jing Pan, Jiang Zhang, Fangguo Zhang, Xiaofeng Chen, Willy Susilo:
Lattice-based group encryptions with only one trapdoor. Sci. China Inf. Sci. 65(5): 1-18 (2022) - [j335]Parvin Rastegari, Willy Susilo:
On Random-Oracle-Free Top-Level Secure Certificateless Signature Schemes. Comput. J. 65(12): 3049-3061 (2022) - [j334]Boyu Kuang, Anmin Fu, Willy Susilo, Shui Yu, Yansong Gao:
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects. Comput. Secur. 112: 102498 (2022) - [j333]Anmin Fu, Weijia Ding, Boyu Kuang, Qianmu Li, Willy Susilo, Yuqing Zhang:
FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices. Comput. Secur. 116: 102666 (2022) - [j332]