Willy Susilo and Reza Reyhanitabar (eds.),
The Seventh International Conference on Provable Security (ProvSec 2013),
Lecture Notes in Computer Science 8209,
Springer-Verlag, Berlin, 2013.
Rei Safavi-Naini, Vijay Varadhajaran, Udaya Tupakula, Willy Susilo and Wanqing Li (eds.).
Proceedings of the 4th International Symposium on
ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009),
ACM Press, 2009.
Ljiljana Brankovic and Willy Susilo (eds.).
The Seventh Australasian Information Security Conference (AISC 2009),
Conferences in Research and Practice in
Information Technology Vol. 98,
Australian Computer Science Communications, Volume 31, Number 7, 2009.
Rajkumar Buyya, Tianchi Ma, Rei Safavi-Naini, Chris Steketee and Willy Susilo (eds.).
Fourth Australian Information Security Workshop (AISW-Netsec 2006),
Hobart, Australia. Conferences in Research and Practice in Information Technology (CRPIT), Vol. 54, Australian Computer Science Communications, Volume 28 Number 7, ACSW Frontiers 2006, 2006.
Chapters in Books
Joonsang Baek, Willy Susilo and Jianying Zhou.
Fuzzy Identity-based Encryption: New and Efficient Schemes.
Series on Coding Theory and Cryptology - Vol. 4 (Coding and Cryptology),
Y. Li, S. Ling, H. Niederreiter, H. Wang, C. Xing and S. Zhang (eds),
World Scientific Publishing,
pp. 1 - 14,
2008.
Yi Mu, Duncan S. Wong, Liqun Chen, Willy Susilo and Qianhong Wu.
Concurrent Signatures without a Conventional Keystone.
Series on Coding Theory and Cryptology - Vol. 4 (Coding and Cryptology),
Y. Li, S. Ling, H. Niederreiter, H. Wang, C. Xing and S. Zhang (eds),
World Scientific Publishing,
pp. 196 - 213,
2008.
Xinyi Huang, Willy Susilo, Yi Mu and Wei Wu.
Delegating Authentication Power in Mobile Networks.
Security and Privacy in Wireless and Mobile Computing,
S. Gritzalis, T. Karygiannis and C. Skianis (eds), Troubador Publishing,
pp. 217 - 234, 2009.
Willy Susilo, Fangguo Zhang and Yi Mu.
Separable Threshold Decryption for Ad-Hoc Wireless Networks. Chapter 4.
Advances in Wireless Ad Hoc and Sensor Networks, Cheng, Maggie Xiaoyan, Deying Li (eds.),
Springer-Verlag, Berlin, pp. 89 - 101, 2008.
Yi Gao, Willy Susilo, Yi Mu, and Jennifer Seberry.
Efficient Trapdoor Based Client Puzzle Against DoS Attacks.
Network Security,
S. Huang, D. MacCallum and D-Z. Du (eds.),
2008.
Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen and Fangguo Zhang.
Efficient Authentication Schemes for AODV and DSR.
Security in Distributed and Networking Systems,
Computer and Network Security Vol. 1,
World Scientific Publishing, pp. 367 - 390, 2007.
Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu and Yi Mu.
EACSIP: Extendable Access Control System with Integrity Protection for Enhancing Collaboration in the Cloud.
IEEE Transactions on Information Forensics and Security,
2017 (to appear).
Acceptance Date: 24 July 2017.
Jian Shen, Jun Shen, Xiaofeng Chen, Xinyi Huang and Willy Susilo.
An Efficient Public Auditing Protocol with Novel
Dynamic Structure for Cloud Data.
IEEE Transactions on Information Forensics and Security,
2017 (to appear).
Acceptance Date: 8 May 2017.
Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Yang Xiang and Zoe L. Jiang.
A General Framework for Secure Sharing of Personal
Health Records in Cloud System.
Journal of Computer and System Sciences,
2017 (to appear). Acceptance Date: 2 March 2017.
Jongkil Kim, Willy Susilo, Fuchun Guo and Man Ho Au.
Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings.
Designs, Codes and Cryptography,
2017 (to appear).
Acceptance Date: 4 January 2017.
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo and Xinyi Huang .
Strong Authenticated Key Exchange with Auxiliary Inputs,
Designs, Codes and Cryptography, 2017 (to appear). Acceptance Date: 22 October 2016.
Yannan Li, Yong Yu, Geyong Min, Willy Susilo, Jianbing Ni and Kim-Kwang Raymond Choo.
Fuzzy Identity-Based Data Integrity Auditing for
Reliable Cloud Storage Systems.
IEEE Transactions on Dependable and Secure Computing (TDSC),
2017 (to appear).
Acceptance Date: 29 September 2016.
Yinhao Jiang, Willy Susilo, Yi Mu and Fuchun Guo.
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing.
Future Generation Computer Systems,
2017.
Ye Yang, Jinguang Han, Willy Susilo, Tsz Hon Yuen and Jiguo Li.
ABKS-CSC: attribute-based keyword search with
constant-size ciphertexts.
Security and Communication Networks, 9:5003-5015, 2016.
Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo, Jin Li and Jianying Zhou. Anonymous Announcement System (AAS) for Electric Vehicle in VANETs. Computer Journal. 60(4): 588-599, 2017.
Pairat Thorncharoensri, Willy Susilo and Yi Mu.
Policy-controlled signatures and their applications. Computer Standards and Interfaces 50: 26-41, 2017.
Chunpeng Ge, Willy Susilo, Jiandong Wang and Liming Fang.
Identity-based conditional proxy re-encryption with fine grain policy.
Computer Standards and Interfaces 52: 1-9, 2017.
Meixia Miao, Jianfeng Wang, Jianfeng Ma and Willy Susilo.
Publicly verifiable databases with efficient insertion/deletion operations.
Journal of Computer System Sci. 86: 49-58, 2017.
Jorge Munilla, Mike Burmester, Alberto Peinado, Guomin Yang and Willy Susilo.
RFID Ownership Transfer with Positive Secrecy Capacity Channels.
Sensors 17(1): 53, 2017.
Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan.
Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. IEEE Trans. Dependable Sec. Comput. 14(2): 211-220, 2017.
Wei Wang, Peng Xu, Laurence Tianruo Yang, Willy Susilo and Jinjun Chen. Reinforcing Synchronization Securely in Online Contests with Embedded Computing. ACM Transactions on Embedded Computing Systems, 16(2): Vol. 58:1-21, 2017.
Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo and Wenjing Lou. Secure and Efficient Cloud Data Deduplication with Ramdomized Tag. IEEE Transactions in Information Forensics and Security, 12(3): 532-543, 2017.
Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, and Geyong Min. Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage. IEEE Transactions in Information Forensics and Security, 12(4): 767-778, 2017.
Yujue Wang, Qianhong Wu, Bo Qin, Shaohua Tang and Willy Susilo. Online/Offline Provable Data Possession. IEEE Transactions on Information Forensics and Security, 12(5): 1182-1194, 2017.
2016
Joseph K. Liu, Sze Ling Yeo, Wun-She Yap, Sherman S. M. Chow, Duncan S. Wong and Willy Susilo.
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol. Computer Journal 59(7): 945-954, 2016.
Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang and Yongjun Ren.
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles. Computer Journal 59(7): 970-982, 2016.
Fuchun Guo, Willy Susilo and Yi Mu. Generalized Closest Substring Encryption. Designs, Codes and Cryptography, 80(1): 103-124, 2016.
Joseph K. Liu, Willy Susilo, Tsz Hon Yuen, Man Ho Au, Junbing Fang, Zoe L. Jiang and Jianying Zhou.
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
The Computer Journal, 59(7), pp. 1040 - 1053, 2016.
Ilung Pranata and Willy Susilo.
Are the most popular users always trustworthy? The case of Yelp. Electronic Commerce Research and Applications 20: 30-41, 2016.
Clementine Gritti, Willy Susilo and Thomas Plantard.
Logarithmic Size Ring Signatures without Random Oracles. IET Information Security, 10(1): 1-7, 2016.
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh and Willy Susilo.
A Short ID-based Proxy Signature Scheme. International Journal of Communication Systems, 29(5): 859-873, 2016.
Clementine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang and Duncan S. Wong.
Broadcast Encryption with Dealership. International Journal of Information Security (IJIS),
15(3): 271-283, 2016.
Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey Voas and Zhi Quan Zhou.
Metamorphic Testing for Cybersecurity.
Computer,
Issue No.06 - June, vol. 49,
pp. 48 - 55, 2016.
Weiran Liu, Jianwei Liu, Qianhong Wu, Willy Susilo, Hua Deng and Bo Qin.
SAKE: scalable authenticated key exchange for mobile e-health networks.
Security and Communication Networks,
9(15): 2754-2765, 2016.
Willy Susilo, Fuchun Guo and Yi Mu.
Efficient Dynamic Threshold Identity-based Encryption with Constant-size Ciphertext.
Theoretical Computer Science,
Volume 609, Part 1, pp. 49 - 59, January 2016.
Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo and Jianying Zhou.
k-times Attribute-Based Anonymous Access
Control for Cloud Computing.
IEEE Transactions on Computers,
64(9): 2595-2608, 2015.
Jinguang Han, Willy Susilo, Yi Mu, Man Ho Au and Jie Cao.
AAC-OT: Accountable Oblivious Transfer with
Access Control.
IEEE Transactions on Information Forensics and Security,
Vol. 10, Issue 12, pp. 2502 - 2514, 2015.
Nan Li, Yi Mu, Willy Susilo and Vijay Varadharajan.
Shared RFID Ownership Transfer Protocol.
Computer Standards and Interface,
Elsevier,
Vol. 42, pp. 95-104, 2015.
Kaitai Liang, Willy Susilo, Joseph K. Liu and Duncan S. Wong.
Efficient and Fully CCA Secure
Conditional Proxy Re-Encryption
from Hierarchical Identity-Based
Encryption .
The Computer Journal,
Vol. 58 (10), pp. 2778-2792, 2015.
Peng Xu, Qianhong Wu, Wei Wang, Willy Susilo, Josep Domingo-Ferrer and Hai Jin.
Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search.
IEEE Transactions on Information Forensics and Security,
Vol. 9, Issue 10, pp. 1993 - 2006, 2015.
Kefeng Wang, Yi Mu and Willy Susilo.
Identity-Based Quotable Ring Signature.
Information Sciences,
Vol. 321, pp. 71 - 89, 2015.
Kaitai Liang and Willy Susilo.
Searchable Attribute-Based Mechanism with
Efficient Data Sharing for Secure Cloud Storage.
IEEE Transactions on Information Forensics and Security,
Vol. 10, Issue 9, pp. 1981 - 1992, 2015.
Kaitai Liang, Willy Susilo and Joseph K. Liu.
Privacy-Preserving Ciphertext Sharing Mechanism for Big Data Storage.
IEEE Transactions on Information Forensics and Security,
Vol. 10(8), pp. 1578-1589, 2015.
Nan Li, Yi Mu, Willy Susilo, Fuchun Guo and Vijay Varadharajan.
Vulnerabilities of an ECC-Based RFID Authentication Scheme.
Secure Computer Networks,
2015 (to appear).
Acceptance Date: 28 February 2015.
DOI: 10.1002/sec.1250
Clementine Gritti, Willy Susilo, Thomas Plantard and Khin Than Win.
Privacy-Preserving Encryption Scheme using DNA Parentage Test.
Theoretical Computer Science,
Vol. 580, pp. 1 - 13, May 2015.
Jongkil Kim, Willy Susilo, Man Ho Au and Jennifer Seberry.
Adaptively Secure Identity-Based Broadcast Encryption with a Constant-sized Ciphertext.
IEEE Transactions on Information Forensics and Security,
Vol. 10, Issue 3, pp. 679 - 693, 2015.
Joseph K. Liu, Man Ho Au, Willy Susilo, Kaitai Liang, Rongxing Lu and Balasubramaniam Srinivasan.
Secure Sharing and Searching for Real-Time Video Data in Mobile Cloud.
IEEE Network, Vol. 29, Issue 2, pp. 46 - 50, 2015.
Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou and Man Ho Au.
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-based Encryption.
IEEE Transactions on Information Forensics and Security,
Vol. 10, Issue 3, pp. 665 - 678, 2015.
Ibrahim Elashry, Yi Mu and Willy Susilo.
A Resilient Identity-based Authenticated Key Exchange Protocol.
Security and Communication Networks,
Volume 8, Issue 13, pages 2279 - 2290,
September 2015.
Fengtong Wen, Willy Susilo and Guomin Yang.
Analysis and Improvement on a Biometric-based Remote User Authentication Scheme Using Smart Cards.
Wireless Personal Communications,
Springer,
Vol. 80, pp. 1747 - 1760, 2015.
Yilei Wang, Willy Susilo, Tao Li and Qiuliang Xu.
File Sharing in Cloud Computing Using Win Stay Lose Shift Strategy.
International Journal of High
Performance Computing and Networking,
Vol.8, No.2, pp.154 - 166, 2015.
Kaitai Liang, Liming Fang, Duncan S. Wong and Willy Susilo.
A Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Public Clouds.
Concurrency and Computation: Practice and Experience,
Volume 27, Issue 8,
Pages 2004 - 2027,
June 2015.
Yong Yu, Man Ho Au, Yi Mu, Shaohua Tang, Jian Ren, Willy Susilo and Liju Dong.
Enhanced Privacy of a Remote Data Integrity Checking Protocol for Secure Cloud Storage.
International Journal of Information Security,
Volume 14, Issue 4, pp 307-318, August 2015.
Jung Yeon Hwang, Ku-Young Chang, Hyun Sook Cho, Boyeon Song and Willy Susilo.
Collusion-Resistant Convertible Ring Signature Schemes.
Science China Information Sciences,
Springer,
Vol. 58, January,
Issue 1, pp 1-16, 2015.
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh and Willy Susilo.
A Provably Secure Identity-based Proxy Ring Signature based on RSA.
Security and Communication Networks (SCN),
Volume 8, Issue 7, pages 1223 - 1236,
2015.
Thomas Plantard, Willy Susilo and Zhenfei Zhang.
LLL for Ideal Lattices: Re-evaluation of the Security of Gentry-Halevi's FHE Scheme.
Designs, Codes and Cryptography,
Vol. 76, pp. 325 - 344, 2015.
Yong Yu, Man Ho Au, Yi Mu and Willy Susilo.
Secure Delegation of Signing Power from
Factorization.
The Computer Journal,
Vol. 58 (4), pp. 867-877, 2015.
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh and Willy Susilo.
A Short Identity-based Proxy Ring Signature Scheme from RSA.
Computer Standards and Interface,
Volume 38, February 2015, Pages 144 - 151, 2015.
Qiong Huang, Guomin Yang, Duncan S. Wong and Willy Susilo.
Ambiguous Optimistic Fair Exchange: Definition and Constructions.
Theoretical Computer Science,
Volume 562, 11 January 2015, Pages 177 - 193, 2015.
Xiaofeng Chen, Willy Susilo, Jin Li, Duncan S. Wong,
Jianfeng Ma, Shaohua Tang and Qiang Tang.
Efficient Algorithms for Secure Outsourcing of Bilinear Pairings.
Theoretical Computer Science,
Volume 562, 11 January 2015, Pages 112 - 121,
2015.
Yang Wang, Man Ho Au and Willy Susilo.
Optimistic Fair Exchange in the Enhanced Chosen-key Model.
Theoretical Computer Science,
Volume 562, 11 January 2015, Pages 57 - 74,
2015.
2014
Clementine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang and Duncan S. Wong.
Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently.
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA),
Vol. 5, No. 4, pp. 3-28, December 2014.
Yang Wang, Man Ho Au and Willy Susilo.
Revisiting Optimistic Fair Exchange based on Ring Signatures.
IEEE Transactions on Information Forensics and Security,
Vol. 9, No. 11, pp. 1883 - 1892, November 2014.
Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong and Qi Xie.
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing .
IEEE Transactions on Information Forensics and Security,
Vol. 9, No. 10, pp. 1667 - 1680, October 2014.
Yang Wang, Willy Susilo, Man Ho Au and Guilin Wang.
Collusion-Resistance in Optimistic Fair Exchange.
IEEE Transactions on Information Forensics and Security,
Vol. 9 Issue 8, pp. 1227 - 1239, August 2014.
Fuchun Guo, Yi Mu and Willy Susilo.
Subset Membership Encryption and Its Applications to Oblivious Transfer.
IEEE Transactions on Information Forensics and Security,
Vol. 9, No. 7, pp. 1098 - 1107, July 2014.
Fuchun Guo, Yi Mu, Willy Susilo, Duncan S. Wong and Vijay Varadharajan,
CP-ABE with Constant-Size Keys for Lightweight Devices.
IEEE Transactions on Information Forensics and Security,
Vol. 9, No. 5, pp. 763 - 771,,
May 2014.
Yang Wang, Man Ho Au and Willy Susilo.
Attribute-based Optimistic Fair Exchange: How to Restrict Brokers with Policies.
Theoretical Computer Science,
Volume 527, pp. 83 - 96, 27 March 2014.
Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li and Kwangjo Kim.
Identity-Based Chameleon Hashing and
Signatures Without Key Exposure.
Information Sciences,
Volume 265, pp. 198 - 210, 1 May 2014.
Joseph K. Liu, Tsz Hon Yuen, Man Ho Au and Willy Susilo.
Improvements on an Authentication Scheme for Vehicular Sensor Networks.
Expert Systems with Applications.
Volume 41, Issue 5, pp. 2559 - 2564, April 2014.
Tsz Hon Yuen, Willy Susilo and Yi Mu.
Towards a
Cryptographic Treatment of Publish/Subscribe Systems.
Journal of Computer Security,
Volume 22 Issue 1, pp. 33 - 67, January 2014.
Man Ho Au, Joseph K. Liu, Junbin Fang, Zoe L. Jiang, Willy Susilo, Jianying Zhou.
A New Payment System for Enhancing Location
Privacy of Electric Vehicles.
IEEE Transactions on Vehicular Technology,
Vol. 63, No. 1, pp. 3 - 17, 2014.
Willy Susilo, Yang-Wai Chow and Rungrat Wiangsripanawan.
Protecting Peer-to-Peer-based Massively Multiplayer Online
Games.
International Journal of Computational
Science and Engineering,
2014 (to appear). Acceptance Date: 6 December 2012.
Yong Yu, Yi Mu, Willy Susilo and Man Ho Au.
Security Pitfalls of an Efficient Threshold Proxy Signature Scheme for Mobile Agents.
Information Processing Letters,
vol. 114(1-2), pp. 5-8,
2014.
Yong Yu, Lei Niu, Guomin Yang, Yi Mu and Willy Susilo.
On the security of auditing mechanisms for
secure cloud storage.
Future Generation Computer Systems,
Volume 30, pp. 127-132, January 2014.
Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou.
Linkable Ring Signature with Unconditional Anonymity.
IEEE Transactions on Knowledge and Data Engineering,
vol. 26 no. 1, pp. 157-165, 2014.
Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo and Duncan S. Wong.
Identity Based Identification from Algebraic Coding Theory.
Theoretical Computer Science,
Volume 520, pp. 51 - 61, 6 February 2014.
Man Ho Au, Guomin Yang, Willy Susilo and Yunmei Zhang.
(Strong) Multi-Designated Verifiers Signatures Secure Against
Rogue Key Attack.
Concurrency and Computation: Practice and Experience, Wiley,
Volume 26, Issue 8, pp. 1574 - 1592, 10 June 2014.
Jinguang Han, Willy Susilo, Yi Mu and Jun Yan.
Attribute-based Data Transfer with Filtering Scheme in Cloud Computing.
The Computer Journal,
Vol. 57, No. 4, pp. 579-591, 2014.
2013
Thomas Plantard, Willy Susilo and Zhenfei Zhang.
Fully Homomorphic Encryption using Hidden Ideal Lattice.
IEEE Transactions on Information Forensics and Security,
vol. 8(12), pp. 2127-2137, 2013.
Man Ho Au, Joseph K. Liu, Willy Susilo and Jianying Zhou.
Realizing Fully Secure Unrestricted ID-based Ring
Signature in the Standard Model Based on HIBE.
IEEE Transactions on Information Forensics and Security,
vol. 8(12), pp. 1909-1922, 2013.
Fengtong Wen, Willy Susilo and Guomin Yang.
A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks.
Wireless Personal Communications,
vol. 73(3), pp. 993-1004, 2013.
Fengtong Wen, Willy Susilo and Guomin Yang.
A Robust Smart Card Based Anonymous User Authentication
Protocol for Wireless Communications.
Security and Communication Networks,
Volume 7, Issue 6, pp. 987 - 993, June 2014.
Yong Yu, Jianbing Ni, Haomiao Yang, Yi Mu and Willy Susilo.
Efficient Public Key Encryption with Revocable Keyword Search.
Security and Communication Networks,
2013. DOI: 10.1002/sec.790.
Jinguang Han, Willy Susilo and Yi Mu.
Identity-Based Secure Distributed Data Storage Schemes.
IEEE Transactions on Computers,
2013. http://doi.ieeecomputersociety.org/10.1109/TC.2013.26
Fuchun Guo, Yi Mu, Willy Susilo and Vijay Varadharajan.
Server-Aided Signature Verification for Lightweight Devices.
The Computer Journal,
2013. doi: 10.1093/comjnl/bxt003
Jong Hwan Park, Kwangsu Lee, Willy Susilo and Dong Hoon Lee.
Fully Secure Hidden Vector Encryption under Standard Assumptions.
Information Sciences,
Volume 232, 20 May 2013, Pages 188 - 207,
2013.
Sherman S. M. Chow, Man Ho Au and Willy Susilo.
Server-Aided Signatures Verification Secure against Collusion Attack.
Information Security Technical Report,
Elsevier,
Volume 17, Issue 3, February 2013, Pages 46 - 57,
2013.
Man Ho Au, Joseph K. Liu, Willy Susilo and Tsz Hon Yuen.
Secure ID-based linkable and revocable-iff-linked ring signature with
constant-size construction,
Theoretical Computer Science,
Volume 469, 21 January 2013, Pages 1 - 14
2013.
Jinguang Han, Willy Susilo and Yi Mu.
Identity-Based Data Storage in Cloud Computing.
Future Generation Computer Systems,
Volume 29, Issue 3, pp. 673-681, March 2013.
Jinguang Han, Willy Susilo, Yi Mu and Jun Yan,
New Constructions of OSBE Schemes and Their Applications
in Oblivious Access Control,
International Journal of Information Security (IJIS),
Springer,
Volume 11, Issue 6, pp 389-401, November 2012.
Xiaofeng Chen, Jin Li and Willy Susilo.
Efficient Fair Conditional Payments for Outsourcing Computations.
IEEE Transactions on Information Forensics and Security,
Vol. 7(6), 1687-1694, 2012.
Bo Qin, Qianhong Wu, Josep Domingo-Ferrer and Willy Susilo.
Robust distributed privacy-preserving secure aggregation
in vehicular communication.
Control and Cybernetics, Vol. 42, No. 2, 2012.
Jinguang Han, Willy Susilo, Yi Mu and Jun Yan.
Attribute-based Oblivious Access Control.
The Computer Journal,
Vol. 55, pp. 1202 - 1215,
2012.
Jinguang Han, Willy Susilo, Yi Mu and Jun Yan.
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
IEEE Transactions on Parallel and Distributed Systems,
vol. 23 no. 11,
pp. 2150-2162, November 2012.
Miao Zhou, Yi Mu, Willy Susilo, Jun Yan and Liju Dong.
Privacy Enhanced Data Outsourcing in the Cloud.
Journal of Network and Computer Applications, Elsevier,
Vol. 35, no. 4, pp. 1367-1373, 2012.
Liming Fang, Willy Susilo, Chunpeng Ge and Jiandong Wang,
Hierarchical conditional proxy re-encryption.
Computer Standards and Interfaces,
Volume 34, Issue 4, pp. 380 - 389, June 2012.
Raylin Tso, Xinyi Huang and Willy Susilo.
Strongly Secure Certificateless Short Signatures.
Journal of Systems and Software,
Volume 85, Issue 6, June 2012, Pages 1409-1417.
Jinguang Han, Willy Susilo, Yi Mu and Jun Yan.
Efficient Oblivious Transfers with Access Control.
Computers and Mathematics with Applications,
Vol. 63(4), 827-837, 2012.
Fuchun Guo, Yi Mu and Willy Susilo.
Efficient and Secure Stored-Value Cards with Leakage Resilience.
Journal of Computers and Electrical Engineering,
Volume 38, Issue 2, Pages 370-380, March 2012.
Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu and Yang Xiang.
Optimistic Fair Exchange with Strong Resolution-Ambiguity.
IEEE Journal on Selected Areas in Communication,
Special Issue on Advances in Digital Forensics for Communications and Networking,
Vol. 29, Issue 7, pp. 1491 - 1502, August 2011.
Qiong Huang, Guomin Yang, Duncan S. Wong and Willy Susilo.
Identity-based Strong Designated Verifier Signature Revisited.
Journal of Systems and Software,
Vol. 84(1),
pp. 120 - 129,
2011.
Ching Yu Ng, Willy Susilo, Yi Mu and Rei Safavi-Naini.
Practical RFID Ownership Transfer Scheme.
Journal of Computer Security - Special Issue on RFID System Security,
19(2): pp. 319-341, 2011.
2010
Alejandro Enrique Flores Zuniga, Khin Than Win and Willy Susilo.
Functionalities of Free and Open Electronic Health Record Systems.
International Journal of Technology Assessment in Health Care,
26:4, pp. 382 - 389, 2010.
Tsz Hon Yuen, Willy Susilo and Yi Mu.
How to Construct Identity-Based Signatures without the Key Escrow Problem.
International Journal of Information Security (IJIS),
Vol. 9, Issue 4, pp. 297 - 311,
Springer,
2010.
Futai Zhang, Sujuan Li, Songqin Miao, Yi Mu, Willy Susilo and Xinyi Huang.
Cryptanalysis on Two Certificateless Signature Schemes.
International Journal of Computers, Communications & Control,
Vol. V, No. 4, pp. 586-591, 2010.
Hong Yuan, Futai Zhang, Xinyi Huang, Yi Mu, Willy Susilo and Lei Zhang.
Certificateless Threshold Signature Scheme
from Bilinear Pairings,
Information Sciences,
Vol. 180, Issue 23, pp. 4714-4728, 2010.
Yong Li, Willy Susilo, Yi Mu and Dingyi Pei.
Designated verifier signature: definition, framework and new constructions.
Informatica, 2009.
Jianyong Huang, Jennifer Seberry and Willy Susilo.
A Five-Round Algebraic
Property of AES and its
Application to the
ALPHA-MAC.
International Journal of Applied Cryptography. Vol 1, No. 4,
pp. 264 - 289, 2009.
Thomas Plantard, Willy Susilo, Khin Than Win and Qiong Huang.
Efficient Lattice-based Signature Scheme.
International Journal of Applied Cryptography. Vol 1, No. 2, pp. 120 - 132, 2008.
Dennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo and
Duncan S. Wong.
Revocable Ring Signature.
Journal of Computer Science and Technology (JCST),
pp. 785 - 797, November 2007.
Ching Yu Ng, Yi Mu and Willy Susilo.
An Identity-based Broadcast Encryption Scheme for Mobile Ad-Hoc Networks.
Journal of Telecommunications and Information Technology,
Special Issue on Multimedia Communications, Vol. 1, pp. 24 - 29, 2006.
Willy Susilo, Fangguo Zhang and Yi Mu.
Privacy-Enhanced Internet Storage: Non-Interactive Publicly Verifiable
1-out-of-n Encryption Schemes.
International Journal of Computer Science and Network Security (IJCSNS),
Vol. 5 No. 12, pp. 99 - 114, 2005.
Willy Susilo, Russell James Ang, Cameron Allen George McDonald and
Jianyong Huang.
Designing and Implementing Personal Firewall for Pocket PC 2003.
International Journal of Computer Science and Network Security (IJCSNS),
Vol. 5 No. 12, pp. 115 - 123, 2005.
Yi Gao, Yi Mu and Willy Susilo.
A New Client Puzzle Scheme Against DoS/DDoS Attacks.
International Journal of Computer Science and Network Security (IJCSNS),
Vol. 5 No. 10, pp. 189 - 200, 2005.
Fangguo Zhang, Rei Safavi-Naini and Willy Susilo.
Attack on Han et al.'s ID-based Confirmer (Undeniable)
Signature at ACM-EC'03.
Journal of Applied Mathematics and Computation, Vol. 170 Issue 2,
pp. 1166 - 1169, 2005.
Yi Mu, Willy Susilo and Yan-Xia Lin.
Identity-based Delegated Signatures.
Communications of the Chinese Cryptology and Information Security Association (CCISA), Selected Topics of Cryptography and Information Security, Vol. 9, No. 4,
pp. 31 - 43, 2003.
Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang and Yi Mu.
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
The 37th International Cryptology Conference - CRYPTO 2017.
Lecture Notes in Computer Science,
Springer-Verlag,
2017 (to appear).
Shengmin Xu, Guomin Yang, Yi Mu and Willy Susilo.
Mergeable and Revocable Identity-Based Encryption.
The 22nd Australasian Conference on Information Security and Privacy (ACISP 2017).
Lecture Notes in Computer Science,
Vol. 1, pp. 147-167, 2017.
Peng Xu, Shuai Liang, Wei Wang, Willy Susilo, Qianhong Wu and Hai Jin.
Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage.
The 22nd Australasian Conference on Information Security and Privacy (ACISP 2017).
Vol. 1,
Lecture Notes in Computer Science,
pp. 207-226, 2017. (Best paper award)
Yang-Wai Chow, Willy Susilo, Joseph Tonien and Wei Zong.
A QR Code Watermarking Approach Based on the DWT-DCT Technique.
The 22nd Australasian Conference on Information Security and Privacy (ACISP 2017).
Vol. 2,
Lecture Notes in Computer Science,
pp. 314-331, 2017.
Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au and Surya Nepal.
An Efficient KP-ABE with Short Ciphertexts in Prime Order
Groups under Standard Assumption.
ACM Asia Conference on Computer and Communications Security (ASIACCS 2017),
pp. 823-834, 2017.
2016
Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai and Guomin Yang.
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
Advances in Cryptology - Asiacrypt 2016.
Lecture Notes in Computer Science,
Vol. 2, pp. 745-776, 2016.
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo and Mingwu Zhang.
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
Advances in Cryptology - Asiacrypt 2016.
Lecture Notes in Computer Science,
Vol. 1, pp. 844-876, 2016.
Yinhao Jiang, Willy Susilo, Yi Mu and Fuchun Guo.
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update.
The 10th International Conference on Provable Security (ProvSec 2016),
Lecture Notes in Computer Science,
pp. 39-60,
2016.
Jongkil Kim, Willy Susilo, Fuchun Guo and Man Ho Au.
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups.
10th Conference on Security and Cryptography for Networks (SCN 2016),
Lecture Notes in Computer Science,
pp. 3 - 22,
2016.
Yinhao Jiang, Willy Susilo, Yi Mu, and Fuchun Guo.
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance.
21st Australasian Conference on Information Security and Privacy (ACISP 2016),
Lecture Notes in Computer Science 9722,
pp. 477 - 494,
2016.
Tao Jiang, Xiaofeng Chen, Qianhong Wu, Willy Susilo, Jianfeng Ma, and Wenjing Lou. Towards Efficient Fully Randomized Message-Locked Encryption.
21st Australasian Conference on Information Security and Privacy (ACISP 2016),
Lecture Notes in Computer Science 9722,
pp. 361 - 375, 2016.
Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Raymond Choo, and Xinpeng Zhang. Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
21st Australasian Conference on Information Security and Privacy (ACISP 2016),
Lecture Notes in Computer Science 9722,
pp. 389 - 405, 2016.
Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, and Mingwu Zhang. One-Round Strong Oblivious Signature-Based Envelope.
21st Australasian Conference on Information Security and Privacy (ACISP 2016),
Lecture Notes in Computer Science 9722,
pp. 3 - 20, 2016.
Martin Bunder, Abderrahmane Nitaj, Willy Susilo, and Joseph Tonien.
A new attack on three variants of the RSA cryptosystem.
21st Australasian Conference on Information Security and Privacy (ACISP 2016),
Lecture Notes in Computer Science 9722,
pp. 258 - 268, 2016.
Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, and Rongmao Chen.
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing.
21st Australasian Conference on Information Security and Privacy (ACISP 2016),
Lecture Notes in Computer Science 9722,
pp. 223 - 242, 2016.
Yang-Wai Chow, Willy Susilo, Guomin Yang, James Phillips, Ilung Pranata, and Ari Moesriami Barmawi.
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing.
21st Australasian Conference on Information Security and Privacy (ACISP 2016),
Lecture Notes in Computer Science 9722,
pp. 409 - 425, 2016.
Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, and Kaitai Liang.
Edit Distance Based Encryption and Its Application.
21st Australasian Conference on Information Security and Privacy (ACISP 2016),
Lecture Notes in Computer Science 9722,
pp. 103 - 119, 2016.
Willy Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu and Yang-Wai Chow,
``Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext",
The 2016 ACM Asia Conference on
Computer and Communications Security (ASIACCS 2016),
2016 (to appear).
Acceptance Date: 2 February 2016.
Peng Xu, Jun Xu, Wei Wang, Hai Jin, Willy Susilo and Deqing Zou,
``Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds",
The 2016 ACM Asia Conference on
Computer and Communications Security (ASIACCS 2016),
2016 (to appear).
Acceptance Date: 2 February 2016.
Yong Yu, Yafang Zhang, Yi Mu, Willy Susilo and Hongyu Liu, ``Provably Secure Identity based Provable Data Possession",
The 9th International Conference on Provable Security (Provsec 2015),
Lecture Notes in Computer Science 9451, Springer Verlag, 2015.
Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo and Xiaofeng Chen.
Attribute Based Broadcast Encryption
with Short Ciphertext and Decryption Key.
The 20th European Symposium on Research in Computer Security (ESORICS 2015),
Lecture Notes in Computer Science 9327,
Springer-Verlag,
pp. 252 - 269,
2015.
Clementine Gritti, Willy Susilo and Thomas Plantard.
Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy.
The 20th Australasian Conference on Information Security and Privacy (ACISP 2015),
Lecture Notes in Computer Science 9144,
Springer-Verlag,
pp. 395 - 412,
2015.
Jianchang Lai, Yi Mu, Fuchun Guo and Willy Susilo.
Improved Identity-Based Online/Offline
Encryption.
The 20th Australasian Conference on Information Security and Privacy (ACISP 2015),
Lecture Notes in Computer Science 9144,
Springer-Verlag,
pp. 160 - 173,
2015.
Clementine Gritti, Willy Susilo and Thomas Plantard.
Efficient File Sharing in Electronic Health Records.
The 11th Information Security Practice and Experience Conference (ISPEC 2015).
Lecture Notes in Computer Science 9065,
Springer-Verlag,
pp. 498 - 512, 2015.
Nan Li, Yi Mu, Willy Susilo and Vijay Varadharajan.
Anonymous Yoking-Group Proofs.
The 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015),
pp. 615 - 620, 2015.
Hua Deng, Qianhong Wu, Bo Qin, Willy Susilo, Joseph K. Liu and Wenchang Shi.
Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data.
The 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015),
pp. 393 - 404, 2015.
2014
Yang Wai-Chow, Willy Susilo, Man Ho Au and Ari Moesriami Barmawi.
A Visual One-Time Password Authentication
Scheme using Mobile Devices.
The 16th International Conference on Information and Communications Security (ICICS 2014),
Lecture Notes in Computer Science 8958,
Springer-Verlag,
pp. 243 - 257,
2014.
Fuchun Guo, Willy Susilo and Yi Mu.
Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption
(poster).
21st ACM Conference on Computer and Communications Security (ACM CCS 2014),
2014 (to appear).
Acceptance Date: 14 August 2014.
Tran Viet Xuan Phuong, Guomin Yang and Willy Susilo.
Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption
(poster).
21st ACM Conference on Computer and Communications Security (ACM CCS 2014),
2014 (to appear).
Acceptance Date: 14 August 2014.
Pairat Thorncharoensri, Willy Susilo and Yi Mu.
Fair Multi-Signature.
The 15th International Workshop on Information Security Applications (WISA 2014),
Lecture Notes in Computer Science,
Springer-Verlag,
2014 (to appear).
Acceptance Date: 5 August 2014.
Ibrahim Elashry, Yi Mu and Willy Susilo.
Efficient Variant of Boneh-Gentry-Hamburg's Identity-based Encryption without Pairing.
The 15th International Workshop on Information Security Applications (WISA 2014),
Lecture Notes in Computer Science,
Springer-Verlag,
2014 (to appear).
Acceptance Date: 5 August 2014.
Ibrahim Elashry, Yi Mu and Willy Susilo.
Jhanwar-Barua's Identity-based Encryption Revisited
.
The 8th International Conference on Network and System Security (NSS 2014),
Lecture Notes in Computer Science 8792,
pp. 271 - 284,
2014.
Tran Viet Xuan Phuong, Guomin Yang and Willy Susilo.
Efficient Hidden Vector Encryption with Constant-Size Ciphertext.
The 19th European Symposium on Research in Computer Security (ESORICS 2014),
Lecture Notes in Computer Science 8712,
pp. 472 - 487,
2014.
Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou and Man Ho Au.
PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption.
The 19th European Symposium on Research in Computer Security (ESORICS 2014),
Lecture Notes in Computer Science 8712,
pp. 73 - 90,
2014.
Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou and Yong Yu.
New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era.
The 19th European Symposium on Research in Computer Security (ESORICS 2014),
Lecture Notes in Computer Science 8712,
pp. 182 - 199,
2014.
Kaitai Liang, Joseph K. Liu, Duncan S. Wong and Willy Susilo.
Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing.
The 19th European Symposium on Research in Computer Security (ESORICS 2014),
Lecture Notes in Computer Science 8712,
pp. 257 - 272,
2014.
Nan Li, Yi Mu, Willy Susilo, Fuchun Guo and Vijay Varadharajan.
Privacy-preserving Authorized RFID Authentication Protocols.
The 10th Workshop on RFID Security (RFIDSec 2014),
Lecture Notes in Computer Science,
pp. 108 - 122, 2014.
Vu Duc Nguyen, Yang-Wai Chow and Willy Susilo.
A CAPTCHA Scheme based on the Identification of Character Locations.
The 10th International Conference on Information Security Practice and Experience (ISPEC 2014),
Lecture Notes in Computer Science 8434,
pp. 60 - 74,
2014.
Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang and Yong Yu.
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing.
The 10th International Conference on Information Security Practice and Experience (ISPEC 2014),
Lecture Notes in Computer Science 8434,
pp. 448 - 461,
2014.
Kefeng Wang, Yi Mu, Willy Susilo and Fuchun Guo.
Attribute-Based Signature with Message Recovery.
The 10th International Conference on Information Security Practice and Experience (ISPEC 2014),
Lecture Notes in Computer Science 8434,
pp. 433 - 447,
2014.
Man Ho Au and Willy Susilo.
Two-Party (Blind) Ring Signatures and Their Applications.
The 10th International Conference on Information Security Practice and Experience (ISPEC 2014),
Lecture Notes in Computer Science 8434,
pp. 403 - 417,
2014.
Qiong Huang, Duncan S. Wong and Willy Susilo.
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures.
RSA Conference Cryptographers' Track (CT-RSA 2014),
Lecture Notes in Computer Science 8366,
pp. 367 - 384,
2014.
2013
Jongkil Kim, Willy Susilo, Man Ho Au and Jennifer Seberry.
Efficient Semi-static Secure Broadcast Encryption Scheme.
The 6th International Conference on Pairing-Based Cryptography (Pairing 2013),
Lecture Notes in Computer Science 8365,
pp. 62 - 76, 2013.
Willy Susilo, Man Ho Au, Yang Wang and Duncan S. Wong.
Fairness in Concurrent Signatures Revisited.
The 18th Australasian Conference on
Information Security and Privacy (ACISP 2013),
Lecture Notes in Computer Science 7959,
pp. 318 - 329, 2013.
Fuchun Guo, Yi Mu and Willy Susilo.
Membership Encryption and Its Applications.
The 18th Australasian Conference on
Information Security and Privacy (ACISP 2013),
Lecture Notes in Computer Science 7959,
pp. 219 - 234, 2013.
Thomas Plantard, Willy Susilo and Zhenfei Zhang.
Adaptive Precision Floating Point LLL.
The 18th Australasian Conference on
Information Security and Privacy (ACISP 2013),
Lecture Notes in Computer Science 7959,
pp. 104 - 117, 2013.
Yang Wang, Mark Manulis, Man Ho Au and Willy Susilo.
Relations among Privacy Notions for Signcryption and Key Invisible ``Sign-then-Encrypt".
The 18th Australasian Conference on
Information Security and Privacy (ACISP 2013),
Lecture Notes in Computer Science 7959,
pp. 187 - 202, 2013.
Yang Wang, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen and Willy Susilo.
Threshold-Oriented Optimistic Fair Exchange.
The 7th International Conference on Network and System Security (NSS 2013),
Lecture Notes in Computer Science 7873,
pp. 424 - 438, 2013.
Guomin Yang, Yi Mu, Willy Susilo and Duncan S. Wong.
Leakage Resilient Authenticated Key Exchange Secure in The Auxiliary Input Model,
The 9th International Conference on Information Security Practice and Experience (ISPEC 2013),
Lecture Notes in Computer Science 7863,
pp. 204 - 217, 2013.
Nan Li, Yi Mu, Willy Susilo and Vijay Varadharajan.
Secure RFID Ownership Transfer Protocols,
The 9th International Conference on Information Security Practice and Experience (ISPEC 2013),
Lecture Notes in Computer Science 7863,
pp. 189 - 203, 2013.
Kefeng Wang, Yi Mu and Willy Susilo.
Identity-based Multisignature with Message Recovery.
The 9th International Conference on Information Security Practice and Experience (ISPEC 2013),
Lecture Notes in Computer Science 7863,
pp. 91 - 104, 2013.
2012
Vu Duc Nguyen, Yang-Wai Chow and Willy Susilo,
Attacking Animated CAPTCHAs via Character Extraction,
The 11th International Conference on Cryptology and Network Security (CANS 2012),
Lecture Notes in Computer Science 7712,
pp. 98-113, 2012.
Willy Susilo, Yang-Wai Chow and Rungrat Wiangsripanawan,
Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-based Massively Multiplayer Online Games,
The 6th International Conference on Network and System Security (NSS 2012),
Lecture Notes in Computer Science 7645,
pp. 291 - 304,
2012.
Yunmei Zhang, Man Ho Au, Guomin Yang and Willy Susilo,
(Strong) Multi-Designated Verifiers Signatures Secure Against Rogue Key Attack,
The 6th International Conference on Network and System Security (NSS 2012),
Lecture Notes in Computer Science 7645,
2012 (to appear).
Yang Wang, Man Ho Au and Willy Susilo,
Perfect Ambiguous Optimistic Fair Exchange,
The 14th International Conference on Information and Communication Security (ICICS 2012),
Lecture Notes in Computer Science 7618,
2012 (to appear).
Yang-Wai Chow, Willy Susilo and Duncan Wong,
Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme,
The 14th International Conference on Information and Communication Security (ICICS 2012),
Lecture Notes in Computer Science 7618,
pp. 10 -21,
2012.
Tsz Hon Yuen, Joseph Liu, Xinyi Huang, Man Ho Au, Willy Susilo and Jianying Zhou,
Forward Secure Attribute-based Signature,
The 14th International Conference on Information and Communication Security (ICICS 2012),
Lecture Notes in Computer Science 7618,
pp. 167 - 177,
2012.
Pairat Thorncharoensri, Willy Susilo and Yi Mu,
Multi-level Controlled Signature.
The 13th International Workshop
on Information Security Applications (WISA 2012),
Lecture Notes in Computer Science 7690,
pp. 96 - 110,
2012.
Thomas Plantard, Willy Susilo and Zhenfei Zhang,
Lattice Reduction for Modular Knapsack,
The Conference on Selected Areas in Cryptography (SAC 2012),
Lecture Notes in Computer Science 7707,
pp. 275 - 286,
Springer-Verlag,
2012.
Fuchun Guo, Yi Mu and Willy Susilo,
Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext,
The 17th European Symposium on Research in Computer Security (ESORICS 2012),
Lecture Notes in Computer Science 7459,
pp. 609 - 626,
2012.
Joseph K. Liu, Man Ho Au, Willy Susilo and Willy Susilo,
Enhancing Location Privacy for Electric Vehicles (at the right time),
The 17th European Symposium on Research in Computer Security (ESORICS 2012),
Lecture Notes in Computer Science 7459,
pp. 397 - 414,
2012.
Yunmei Zhang, Joseph Liu, Xinyi Huang, Man Ho Au and Willy Susilo,
Efficient Escrow-Free Identity-Based Signature,
The Sixth International Conference on Provable Security (ProvSec 2012),
Lecture Notes in Computer Science 7496,
pp. 161 - 174,
2012.
Mohammad Reza Reyhanitabar and Willy Susilo,
On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties,
The Sixth International Conference on Provable Security (ProvSec 2012),
Lecture Notes in Computer Science 7496,
pp. 288 - 299, 2012.
Vu Duc Nguyen, Yang-Wai Chow and Willy Susilo,
Breaking an Animated CAPTCHA Scheme,
The 10th International Conference on Applied Cryptography and Network Security (ACNS '12) ,
Lecture Notes in Computer Science 7341,
Springer-Verlag,
pp. 12 - 29,
2012.
Fuchun Guo, Yi Mu, Willy Susilo and Vijay Varadharajan,
A Pre-computable Signature Scheme with Efficient Verification for RFID.
The 8th International Conference on Information Security Practice and Experience (ISPEC 2012),
Lecture Notes in Computer Science 7232,
Springer-Verlag,
pp. 1 - 16,
2012.
Zhenfei Zhang, Thomas Plantard and Willy Susilo,
On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers.
The 8th International Conference on Information Security Practice and Experience (ISPEC 2012),
Lecture Notes in Computer Science 7232,
Springer-Verlag,
pp. 353 - 368,
2012.
Yang-Wai Chow and Willy Susilo,
Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family.
The 8th International Conference on Information Security Practice and Experience (ISPEC 2012),
Lecture Notes in Computer Science 7232,
Springer-Verlag,
pp. 170 - 181,
2012.
Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, and Jennifer Seberry,
Fault Analysis of the KATAN Family of Block Ciphers.
The 8th International Conference on Information Security Practice and Experience (ISPEC 2012),
Lecture Notes in Computer Science 7232,
Springer-Verlag,
pp. 319 - 336,
2012.
2011
Duc Vu Nguyen, Yang-Wai Chow and Willy Susilo.
Breaking a 3D-based CAPTCHA Scheme.
The 14th International Conference on Information Security and Cryptology
(ICISC 2011),
Lecture Notes in Computer Science 7259,
pp. 391 - 405,
Springer-Verlag,
2012.
Zhenfei Zhang, Thomas Plantard and Willy Susilo.
Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes.
The 14th International Conference on Information Security and Cryptology
(ICISC 2011),
Lecture Notes in Computer Science,
Springer-Verlag,
2011 (to appear).
Man Ho Au, Apu Kapadia and Willy Susilo.
BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation.
19th Annual Network and Distributed System Security Symposium
(NDSS 2012),
San Diego, CA, February 5-8, 2012.
Nan Li, Yi Mu and Willy Susilo.
Efficient Self-Certified Signatures with Batch Verification.
The 7th International Conference on Information Security and Cryptology (Inscrypt'2011),
Lecture Notes in Computer Science,
Springer-Verlag,
2011 (to appear)
Yang Wai-Chow and Willy Susilo.
AniCAP: An Animated 3D CAPTCHA Scheme based on Motion Parallax.
The 10th International Conference on Cryptography and Network Security (CANS 2011),
Lecture Notes in Computer Science 7092,
pp. 255 - 271,
Springer-Verlag,
2011.
Jianyong Huang, Willy Susilo and Jennifer Seberry.
Repeated Differential Properties of the AES-128 and AES-256 Key Schedules.
IEEE Trustcom 2011,
IEEE,
2011 (to appear).
Miao Zhou, Yi Mu, Willy Susilo, Man Ho Au and Jun Yan.
Piracy-Preserved Access Control for Cloud Computing.
IEEE Trustcom 2011,
IEEE,
2011 (to appear).
Zhi Quan Zhou, Arnaldo Sinaga and Willy Susilo.
On the Fault-Detection Capabilities of Adaptive Random Test Case Prioritization: Case Studies with Large Test Suites.
Hawaii International Conference on System Sciences (HICSS 2011),
2011 (to appear).
Qiong Huang, Duncan S. Wong, Willy Susilo and Bo Yang.
An Efficient Construction of Time-Selective Convertible Undeniable Signature.
The 14th Information Security Conference (ISC 2011),
Lecture Notes in Computer Science 7001,
pp. 355 - 371,
Springer-Verlag,
2011.
Tsz Hon Yuen, Duncan S. Wong, Willy Susilo and Qiong Huang.
Concurrent Signatures with Fully Negotiable Binding Control.
The Fifth International Conference on Provable Security (ProvSec 2011),
Lecture Notes in Computer Science 6980,
pp. 170 - 187,
Springer-Verlag,
2011.
Man Ho Au, Willy Susilo and Yi Mu.
Electronic Cash with Anonymous User Suspension.
The 16th Australasian Conference on Information Security and Privacy (ACISP 2011),
Lecture Notes in Computer Science 6812,
pp. 172 - 188,
Springer-Verlag,
2011.
Michael Rose, Thomas Plantard and Willy Susilo.
Improving BDD Cryptosystems in General Lattices.
The 7th Information Security Practice and Experience Conference (ISPEC 2011),
Lecture Notes in Computer Science 6672,
Springer-Verlag,
pp. 152 - 167,
2011.
Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou.
Threshold Ring Signature without Random Oracles.
The 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011),
pp. 261 - 267,
2011.
Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo and Jennifer Seberry.
Extended Cubes: Enhancing the Cube Attack by Extracting Low-Degree Non-Linear Equations.
The 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011),
pp. 296 - 305,
2011.
Willy Susilo and Joonsang Baek.
On the Security of the Identity-based Encryption based on DHIES from ASIACCS 2010.
The 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011),
pp. 376 - 380,
2011.
Nan Li, Yi Mu, Willy Susilo and Fuchun Guo.
Self-Certified Ring Signatures.
The 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011),
pp. 396 - 400,
2011.
Sherman S. M. Chow, Man Ho Au and Willy Susilo.
Server-Aided Signatures Verification Secure against Collusion Attack.
The 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011),
pp. 401 - 405,
2011.
2010
Fuchun Guo, Yi Mu and Willy Susilo.
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase.
The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010),
Lecture Notes in Computer Science,
Springer-Verlag,
2010 (to appear).
Willy Susilo, Yang-Wai Chow and Huayu Zhou.
STE3D-CAP: Stereoscopic 3D CAPTCHA.
The Ninth International Conference on Cryptology And Network Security (CANS 2010),
Lecture Notes in Computer Science 6467,
pp. 221 - 240,
Springer-Verlag,
2010.
Tsz Hon Yuen, Willy Susilo and Yi Mu.
Towards a Cryptographic Treatment of Publish/Subscribe Systems.
The Ninth International Conference on Cryptology And Network Security (CANS 2010),
Lecture Notes in Computer Science 6467,
pp. 201 - 220,
Springer-Verlag,
2010.
Qiong Huang, Duncan S. Wong and Willy Susilo.
A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange.
The 4th International Conference on Pairing-based Cryptography (Pairing 2010),
Lecture Notes in Computer Science 6487,
pp. 41 - 61,
Springer-Verlag,
2010.
Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo and Duncan S. Wong.
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes.
The Fourth International Conference on Provable Security (ProvSec 2010),
Lecture Notes in Computer Science 6402,
pp. 166 - 183,
Springer-Verlag,
2010.
Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou.
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.
The 15th European Symposium on Research in Computer Security (ESORICS 2010),
Lecture Notes in Computer Science 6345,
pp. 168 - 181,
Springer-Verlag,
2010.
Jinguang Han, Yi Mu, Willy Susilo and Jun Yan.
A Generic Construction of Dynamic Single Sign-on with Strong Security.
The 6th International ICST Conference on Security and Privacy in Communication
Networks (SecureComm 2010),
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), Vol. 50, pp. 181-198. Springer, 2010.
Thomas Plantard and Willy Susilo.
Recursive Lattice Reduction.
The Seventh Conference on Security and Cryptography for Networks (SCN 2010),
Lecture Notes in Computer Science 6280,
pp. 329-344,
Springer-Verlag,
2010.
Jianyong Huang, Willy Susilo and Jennifer Seberry.
Differential Fault Analysis of LEX.
The Seventh Conference on Security and Cryptography for Networks (SCN 2010),
Lecture Notes in Computer Science 6280,
pp. 55-72,
Springer-Verlag,
2010.
Man Ho Au, Willy Susilo and Yi Mu.
Proof-of-Knowledge of Representation of Committed Value and Its Applications.
The 15th Australasian Conference on Information Security and Privacy (ACISP 2010),
Lecture Notes in Computer Science 6168,
pp. 352 - 369,
Springer-Verlag,
2010.
Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li and Kwangjo Kim.
Identity-Based Chameleon Hash Scheme Without Key Exposure.
The 15th Australasian Conference on Information Security and Privacy (ACISP 2010),
Lecture Notes in Computer Science 6168,
pp. 200 - 215,
Springer-Verlag,
2010.
Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo and Jennifer Seberry.
On the Security of NOEKEON against Side Channel Cube Attacks.
The Sixth International Conference on Information Security Practice and Experience Conference (ISPEC 2010),
Lecture Notes in Computer Science 6047,
pp. 45 - 55,
Springer-Verlag,
2010.
Mohammad Reza Reyhanitabar, Willy Susilo and Yi Mu.
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.
The 17th International Workshop on Fast Software Encryption (FSE 2010),
Lecture Notes in Computer Science 6147,
pp. 192 - 211,
Springer-Verlag,
2010.
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie and Kui Ren.
Attribute-based Signature and its Application.
The 5th ACM Symposium on InformAtion, Computer and Communications Security
(ASIACCS 2010),
ACM Press,
pp. 60 - 69,
2010.
Ching Yu Ng, Willy Susilo, Yi Mu and Rei Safavi-Naini.
Practical RFID Ownership Transfer Scheme.
The 2010 Workshop on RFID Security (RFIDsec 2010 Asia),
IOS Press, 2010 (to appear).
2009
Pairat Thorncharoensri, Willy Susilo and Yi Mu.
Policy-controlled Signature.
Eleventh International Conference on Information and Communications Security (ICICS 2009),
Lecture Notes in Computer Science 5927,
pp. 91 - 106,
Springer-Verlag,
2009.
Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou.
Online/Offline Ring Signature Scheme.
Eleventh International Conference on Information and Communications Security (ICICS 2009),
Lecture Notes in Computer Science 5927,
pp. 80 - 90,
Springer-Verlag,
2009.
Liming Fang, Willy Susilo, Chunpeng Ge and Jiandong Wang.
A Secure Channel Free Public Key Encryption With Keyword Search Scheme Without Random Oracle.
The 8th International Conference on Cryptology and Network Security (CANS 2009),
Lecture Notes in Computer Science 5888,
pp. 248 - 258,
Springer-Verlag,
2009.
Tsz Hon Yuen, Willy Susilo and Yi Mu,
How to Construct Identity-Based Signatures without Key Escrow Problem.
Sixth European Workshop on Public Key Services, Applications and Infrastructures
(EuroPKI 2009),
Lecture Notes in Computer Science 6391,
pp. 286 - 301,
Springer-Verlag,
2009.
Pairat Thorncharoensri, Willy Susilo and Yi Mu.
Identity-based Identification Scheme Secure Against Concurrent-Reset Attacks without Random Oracles.
The 10th International Workshop on Information Security Applications (WISA 2009),
Lecture Notes in Computer Science 5932,
pp. 94 - 108,
Springer-Verlag,
2009.
Man Ho Au, Willy Susilo and Yi Mu.
Is the Notion of Divisible On-line/Off-line Signatures Stronger than On-line/Off-line Signatures?
The 3rd Provable Security Conference (ProvSec 2009),
Lecture Notes in Computer Science 5848,
pp. 129 - 139,
Springer-Verlag,
2009.
Fuchun Guo, Yi Mu and Willy Susilo.
How to Prove Security of A Signature with A Tighter Security Reduction .
The 3rd Provable Security Conference (ProvSec 2009),
Lecture Notes in Computer Science 5848,
pp. 90 - 103,
Springer-Verlag,
2009.
Fang Liming, Willy Susilo and Jiandong Wang.
Anonymous Conditional Proxy Re-encryption Without Random Oracle.
The 3rd Provable Security Conference (ProvSec 2009),
Lecture Notes in Computer Science 5848,
pp. 47 - 60,
Springer-Verlag,
2009.
Ching Yu Ng, Willy Susilo, Yi Mu and Rei Safavi-Naini.
New Privacy Results on Synchronized RFID Authentication Protocols Against Tag Tracing.
The 14th European Symposium on Research in Computer Security (ESORICS 2009),
Lecture Notes in Computer Science 5789,
pp. 321 - 336,
Springer-Verlag,
2009.
Pairat Thorncharoensri, Willy Susilo and Yi Mu.
Universal Designated Verifier Signatures with Threshold-Signers.
The Forth International Workshop on Security (IWSEC 2009),
Lecture Notes in Computer Science 5824,
pp. 89 - 109,
Springer-Verlag,
2009.
Mohammad Reza Reyhanitabar, Willy Susilo and Yi Mu.
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders.
The 14th Australasian Conference on Information Security and Privacy (ACISP 2009),
Lecture Notes in Computer Science 5594,
pp. 153 - 170,
Springer-Verlag,
2009.
Tsz Hon Yuen, Qiong Huang, Yi Mu, Willy Susilo, Duncan S. Wong and Guomin Yang.
Efficient Non-Interactive Range Proof.
Proceedings of the 15th International Computing and Combinatorics Conference (COCOON 2009),
Lecture Notes in Computer Science 5609,
pp. 138 - 147,
Springer-Verlag,
2009.
Thomas Plantard and Willy Susilo.
Broadcast Attacks against Lattice-based Cryptosystems.
The 7th International Conference on Applied Cryptography and Network Security (ACNS 2009),
Lecture Notes in Computer Science 5536,
pp. 456 - 472,
Springer-Verlag,
2009.
Joonsang Baek, Willy Susilo, Joseph K. Liu and Jianying Zhou.
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.
The 7th International Conference on Applied Cryptography and Network Security (ACNS 2009),
Lecture Notes in Computer Science 5536,
pp. 143 - 155,
Springer-Verlag,
2009.
Mohammad Reza Reyhanitabar, Willy Susilo and Yi Mu.
Enhanced Target Collision Resistant Hash Functions Revisited.
The 16th International Workshop on Fast Software Encryption (FSE 2009),
Lecture Notes in Computer Science 5665,
pp. 327 - 344,
Springer-Verlag,
2009.
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin and Josep Domingo-Ferrer.
Asymmetric Group Key Agreement.
Advances in Cryptology - Eurocrypt 2009,
Lecture Notes in Computer Science 5479,
pp. 153 - 170,
Springer-Verlag,
2009.
Liang Lu, Rei Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi.
Ranking Attack Graphs with Graph Neural Networks.
The 5th Information Security Practice and Experience Conference (ISPEC 2009),
Lecture Notes in Computer Science 5451,
pp. 345 - 359,
2009.
Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, and Dong Hoon Lee.
Improved Searchable Public Key Encryption with Designated Tester.
ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009),
pp. 376-379,
2009.
2008
Bo Qin, Qianhong Wu, Willy Susilo and Yi Mu.
Publicly Verifiable Privacy-preserving Group Decryption.
The 4th International Conferences on Information Security and Cryptology (Inscrypt 2008),
Lecture Notes in Computer Science 5487,
pp. 72 - 83,
Springer-Verlag,
2009.
Qianhong Wu, Bo Qin, Yi Mu and Willy Susilo.
Privacy for Private Key in Signature.
The 4th International Conferences on Information Security and Cryptology (Inscrypt 2008),
Lecture Notes in Computer Science 5487,
pp. 84 - 95,
Springer-Verlag,
2009.
Pairat Thorncharoensri, Willy Susilo and Yi Mu.
How to Balance Privacy with Authenticity.
The 11th International Conference on Information Security and Cryptology (ICISC 2008),
Lecture Notes in Computer Science 5461,
Springer-Verlag,
pp. 184 - 201, 2008.
Wei Wu, Yi Mu, Willy Susilo and Xinyi Huang.
Certificate-Based Signatures: New Definitions and A Generic Construction from Certificateless Signatures .
The 9th International Workshop on Information Security Applications (WISA 2008),
Lecture Notes in Computer Science ???,
Springer-Verlag,
2008 (to appear).
Wei Wu, Yi Mu, Willy Susilo and Xinyi Huang.
Server-Aided Verification Signatures: Definitions and New Constructions.
The 2nd Provable Security conference (ProvSec 2008),
Lecture Notes in Computer Science 5324,
Springer-Verlag, pp. 141 - 155,
2008.
Tsz Hon Yuen, Willy Susilo, Joseph K. Liu and Yi Mu.
Sanitizable Signatures Revisited.
The 7th International Conference on Cryptology and Network Security (CANS 2008),
Lecture Notes in Computer Science 5339,
Springer-Verlag, pp. 80 - 97,
2008.
Ching Yu Ng, Willy Susilo, Yi Mu and Rei Safavi-Naini.
RFID Privacy Models Revisited.
13th European Symposium on Research in Computer Security (ESORICS 08),
Lecture Notes in Computer Science 5283,
Springer-Verlag, pp. 251 - 266,
2008.
Joonsang Baek, David Galindo, Willy Susilo and Jianying Zhou.
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework).
Sixth Conference on Security and Cryptography for Networks (SCN 2008),
Lecture Notes in Computer Science 5529,
Springer-Verlag, pp. 358 - 374,
2008.
Jianyong Huang, Jennifer Seberry and Willy Susilo.
A Five-Round Algebraic Property of the Advanced Encryption Standard.
11th Information Security Conference (ISC'08),
Lecture Notes in Computer Science 5222,
Springer-Verlag, pp. 318 - 330,
2008.
Joseph K. Liu, Joonsang Baek, Willy Susilo and Jianying Zhou.
Certificate Based Signature Schemes without Pairings or Random Oracles.
11th Information Security Conference (ISC'08),
Lecture Notes in Computer Science 5222,
Springer-Verlag, pp. 285 - 297,
2008.
Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong
and Guomin Yang.
Traceable and Retrievable Identity-based Encryption.
6th International Conference on Applied Cryptography and Network Security
(ACNS'08),
Lecture Notes in Computer Science 5037,
Springer-Verlag, pp. 94 - 110,
2008.
Man Ho Au, Willy Susilo and Yi Mu.
Practical Anonymous Divisible E-Cash From Bounded Accumulators.
Financial Cryptography and Data Security 2008 (FC 2008),
Lecture Notes in Computer Science 5143,
Springer-Verlag, pp. 287 - 301,
2008.
Qiong Huang, Guomin Yang, Duncan S. Wong and Willy Susilo.
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and
Chosen-key Model without Random Oracles.
RSA Conference 2008, Cryptographers' Track (CT-RSA 2008),
Lecture Notes in Computer Science 4964, Springer-Verlag,
pp. 106 - 120,
2008.
Lan Zhou, Willy Susilo and Yi Mu.
New Construction of Group Secret Handshakes Based on Pairings.
The 9th International Conference on Information and Communications Security (ICICS 2007),
Lecture Notes in Computer Science 4861,
Springer-Verlag, pp. 16 - 30, 2007.
Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang,
Qiong Huang, Yi Mu and Willy Susilo.
Formal Definition and Construction of Nominative Signature.
The 9th International Conference on Information and Communications Security (ICICS 2007),
Lecture Notes in Computer Science 4861,
Springer-Verlag, pp. 57 - 68, 2007.
Tsz Hon Yuen, Man Ho Au, Joseph K. Liu and Willy Susilo.
(Convertible) Undeniable Signatures Without Random Oracles.
The 9th International Conference on Information and Communications Security (ICICS 2007),
Lecture Notes in Computer Science 4861,
Springer-Verlag, pp. 83 - 97, 2007.
Rungrat Wiangsripanawan, Willy Susilo and Rei Safavi-Naini.
Achieving Mobility and Anonymity in IP-based Networks.
The 6th International Conference on Cryptology and Network Security (CANS'07),
Lecture Notes in Computer Science 4856,
Springer-Verlag, pp. 60 - 79, 2007.
Xinyi Huang, Yi Mu, Willy Susilo and Wei Wu.
A Generic Construction for Universally Convertible Undeniable Signatures.
The 6th International Conference on Cryptology and Network Security (CANS'07),
Lecture Notes in Computer Science 4856,
Springer-Verlag, pp. 15 - 33, 2007.
Wei Wu, Yi Mu, Willy Susilo and Xinyi Huang.
Provably Secure Identity-based Undeniable Signatures with Selective and Universal Convertibility.
The 3rd International SKLOIS Conference on Information Security and Cryptology
(Inscrypt 2007), Lecture Notes in Computer Science ???,
Springer-Verlag, 2007 (to appear).
Wei Wu, Yi Mu, Willy Susilo and Xinyi Huang.
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.
The 8th International Workshop on Information Security Applications (WISA 2007),
Lecture Notes in Computer Science ???, Springer-Verlag, 2007 (to appear).
Man Ho Au, Willy Susilo and Yi Mu.
Practical Compact E-Cash.
Information Security and Privacy, 12th Australasian Conference, ACISP 2007,
Lecture Notes in Computer Science 4586, Springer-Verlag,
pp. 431 - 445, 2007.
Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong and Wei Wu.
Certificateless Signature Revisited.
Information Security and Privacy, 12th Australasian Conference, ACISP 2007,
Lecture Notes in Computer Science 4586, Springer-Verlag,
pp. 308 - 322, 2007.
Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo and Qianhong Wu.
Certificate-Based Signature: Security Model and Efficient Construction.
Fourth European PKI Workshop (EuroPKI 2007),
Lecture Notes in Computer Science 4582, Springer-Verlag,
pp. 110 - 125, 2007.
Xinyi Huang, Yi Mu, Willy Susilo and Wei Wu.
Provably Secure Pairing-based Convertible Undeniable Signature with Short Signature Length.
International Conference on Pairing-based Cryptography (Pairing 2007),
Lecture Notes in Computer Science 4575, Springer-Verlag,
pp. 367 - 391, 2007.
Xiaofeng Chen, Fangguo Zhang, Willy Susilo and Yi Mu.
Efficient Generic On-line/Off-line Signatures Without Key Exposure.
The 5th International Conference on Applied Cryptography
and Network Security (ACNS'07),
Lecture Notes in Computer Science 4521, Springer-Verlag,
pp. 18-30, 2007.
Liang Lu, Jeffrey Horton, Rei Safavi-Naini and Willy Susilo.
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.
The 5th International Conference on Applied Cryptography
and Network Security (ACNS'07),
Lecture Notes in Computer Science 4521, Springer-Verlag,
pp. 65-86, 2007.
Man Ho Au, Joseph K. Liu, Willy Susilo and Tsz Hon Yuen.
Certificate Based (Linkable) Ring Signature.
The 3rd Information Security Practice and Experience Conference (ISPEC 2007),
Lecture Notes in Computer Science 4464,
Springer-Verlag, pp. 79 - 92, 2007.
Joseph K. Liu, Man Ho Au and Willy Susilo.
Self-Generated-Certificate Public Key
Cryptography and Certificateless Signature / Encryption Scheme in the
Standard Model.
2007 ACM Symposium on InformAtion, Computer and Communications Security
(ASIACCS'07), pp. 273 - 283, 2007.
Joonsang Baek, Willy Susilo and Jianying Zhou.
New Constructions of Fuzzy
Identity-Based Encryption.
2007 ACM Symposium on InformAtion, Computer and Communications Security
(ASIACCS'07), pp. 368 - 370, 2007.
Liang Lu, Jeffrey Horton, Rei Safavi-Naini and Willy Susilo.
Transport Layer Identification of Skype Traffic.
The International Conference on Information Networking (ICOIN 2007),
Lecture Notes in Computer Science 5200, Springer-Verlag,
pp. 465 - 281, 2008.
Rungrat Wiangsripanawan, Willy Susilo and Rei Safavi-Naini.
Design Principles for Low Latency Anonymous Network Systems.
Australasian Information Security Workshop 2007
(Privacy Enhancing Technologies) AISW-PET2007,
Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW '07),
pp. 183 - 191, 2007.
Yi Mu, Willy Susilo and Huafei Zhu.
Compact Sequential Aggregate Signatures.
The 22nd ACM Symposium on Applied Computing (Security Track),
ACM Press, pp. 249 - 253, 2007.
Man Ho Au, Qianhong Wu, Willy Susilo and Yi Mu.
Compact E-Cash from Bounded Accumulator.
RSA Conference 2007, Cryptographers' Track (CT-RSA 2007),
Lecture Notes in Computer Science 4377,
pp. 178 - 195, Springer-Verlag, 2007.
2006
Man Ho Au, Joseph K. Liu, Willy Susilo and Tsz Hon Yuen.
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature.
7th International Conference on Cryptology in India (Indocrypt 2006),
Lecture Notes in Computer Science 4329, pp. 364 - 378, Springer-Verlag, 2006.
Xinyi Huang, Willy Susilo, Yi Mu and Wei Wu.
Universal Designated Verifier Signature without Delegatability.
The Eighth International Conference on Information and Communications Security (ICICS 2006),
Lecture Notes in Computer Science 4307, pp. 479 - 498, Springer-Verlag, 2006.
Tao Mai, Willy Susilo and Yi Mu.
Novel Stream Authentication Scheme for Securing Voice over IP.
The 5th Workshop on the Internet, Telecommunications and Signal Processing
(WITSP 2006), 2006.
Willy Susilo, Wei Wu, Yi Mu and Xinyi Huang.
On the "Non-Delegatability" Notion of Designated Verifier Signature Schemes.
The 5th International Workshop for Applied PKC (IWAP 2006),
Lecture Notes in Computer Science, Springer-Verlag, 2006.
Wei Wu, Xinyi Huang, Willy Susilo, Yi Mu and Jennifer Seberry.
Proxy Signature Scheme: New Constructions based on
Computational Diffie-Hellman Problem and Their Stronger
Security Notions.
The 5th International Workshop for Applied PKC (IWAP 2006),
Lecture Notes in Computer Science, Springer-Verlag, 2006.
Xinyi Huang, Willy Susilo, Yi Mu and Wei Wu.
Proxy Signature without Random Oracles.
The Second International Conference on Mobile Ad Hoc and Sensor Networks (MSN 2006), Lecture Notes in Computer Science 4325, pp. 473 - 484,
Springer-Verlag, 2006.
Lan Zhou, Willy Susilo and Yi Mu.
Efficient ID-based Authenticated Group Key Agreement from Bilinear Pairings.
The Second International Conference on Mobile Ad Hoc and Sensor Networks (MSN 2006), Lecture Notes in Computer Science 4325, pp. 521 - 532, Springer-Verlag, 2006.
Lan Yu, Willy Susilo and Rei Safavi-Naini.
X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks.
The 5th International Conference on Cryptology and Network Security (CANS 2006),
Lecture Notes in Computer Science 4301, pp. 364 - 380, Springer-Verlag, 2006.
Fangguo Zhang, Xiaofeng Chen, Willy Susilo and Yi Mu.
A New Short Signature Scheme Without Random Oracles from Bilinear Pairings.
International Conference on Cryptology in Vietnam 2006 (Vietcrypt 2006),
Lecture Notes in Computer Science 4341, Springer-Verlag,
pp. 67 - 80, 2006.
Jianyong Huang, Jennifer Seberry and Willy Susilo.
On the Internal Structure of ALPHA-MAC.
International Conference on Cryptology in Vietnam 2006 (Vietcrypt 2006),
Lecture Notes in Computer Science 4341, Springer-Verlag,
pp. 271-285, 2006.
Sherman S. M. Chow, Willy Susilo and Tsz Hon Yuen.
Escrowed Linkability of Ring Signatures and its Applications.
International Conference on Cryptology in Vietnam 2006 (Vietcrypt 2006),
Lecture Notes in Computer Science 4341, Springer-Verlag,
pp. 175-192, 2006.
Qianhong Wu, Willy Susilo, Yi Mu and Fangguo Zhang.
Ad Hoc Group Signatures.
The First International Workshop on Security (IWSEC 2006),
Lecture Notes in Computer Science 4266, pp. 120 - 135, Springer-Verlag, 2006.
Joseph K. Liu, Willy Susilo and Duncan S. Wong.
Ring Signature with Designated Linkability.
The First International Workshop on Security (IWSEC 2006),
Lecture Notes in Computer Science 4266, pp. 104 - 119, Springer-Verlag, 2006.
Man Ho Au, Willy Susilo and Yi Mu.
Constant-Size Dynamic k-TAA.
The Fifth Conference on Security and Cryptography for Networks (SCN 2006),
Lecture Notes in Computer Science 4116, pp. 111-125, Springer-Verlag, 2006.
Xinyi Huang, Willy Susilo, Yi Mu and Futai Zhang.
Restricted Universal Designated Verifier Signature.
The 3rd International Conference on Ubiquitous Intelligence and Computing (UIC-06),
Lecture Notes in Computer Science 4159, pp. 874 - 882, Springer-Verlag, 2006.
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu and Yumin Wang.
Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel
Identification/Signature Scheme).
The 3rd International Conference on
Autonomic and Trusted Computing (ATC-06),
Lecture Notes in Computer Science 4158, pp. 531 - 540, Springer-Verlag,
2006.
Qianhong Wu, Yi Mu, Willy Susilo and Fangguo Zhang.
Efficient Signcryption without Random Oracles.
The 3rd International Conference on
Autonomic and Trusted Computing (ATC-06),
Lecture Notes in Computer Science 4158, pp. 449 - 458, Springer-Verlag,
2006.
Dongvu Tonien, Willy Susilo and Rei Safavi-Naini.
Multi-party Concurrent Signatures.
The 9th Information Security Conference, ISC 2006,
Lecture Notes in Computer Science 4176, pp. 131 - 145, Springer-Verlag, 2006.
Joonsang Baek, Rei Safavi-Naini and Willy Susilo.
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search.
The 9th Information Security Conference, ISC 2006,
Lecture Notes in Computer Science 4176, pp. 217 - 232, Springer-Verlag, 2006.
Shidi Xu, Yi Mu and Willy Susilo.
Online/Offline Signatures and Multisignatures for AODV and
DSR Routing Security.
Information Security and Privacy, 11th Australasian Conference, ACISP 2006,
Lecture Notes in Computer Science 4058, pp. 99 - 110, Springer-Verlag, 2006.
Man Ho Au, Willy Susilo and Siu-Ming Yiu.
Event-Oriented k-times Revocable-iff-Linked Group Signatures.
Information Security and Privacy, 11th Australasian Conference, ACISP 2006,
Lecture Notes in Computer Science 4058, pp. 223 - 234, Springer-Verlag, 2006.
Yiqun Chen, Willy Susilo and Yi Mu.
Identity-based Anonymous Designated Ring Signatures.
International Wireless Communications and Mobile Computing Conference
(IWCMC 2006), Computer and Network Security Symposium, pp. 189 - 194, ACM,
2006.
Willy Susilo and Yi Mu.
Separable Identity-based Deniable Authentication: Cryptographic Primitive for Fighting Phishing.
Third European PKI Workshop: theory and practice (EuroPKI 2006),
Lecture Notes in Computer Science 4043, Springer-Verlag,
Berlin, pp. 68 - 80, 2006.
Man Ho Au, Sherman S.M. Chow, Willy Susilo and Patrick P. Tsang.
Short Linkable Ring Signature Revisited.
Third European PKI Workshop: theory and practice (EuroPKI 2006),
Lecture Notes in Computer Science 4043, Springer-Verlag,
Berlin, pp. 101 - 115, 2006.
Qianhong Wu, Willy Susilo, Yi Mu and Fangguo Zhang.
Efficient Partially Blind Signatures with Provable Security.
Applied Cryptography and Information Security 06 (ACIS06),
Computational Science and Its Applications (ICCSA 2006),
Lecture Notes in Computer Science 3982, Springer-Verlag,
Berlin, pp. 345 - 354, 2006.
Joonsang Baek, Rei Safavi-Naini and Willy Susilo.
Public Key Encryption with Keyword Search Revisited.
Applied Cryptography and Information Security 06 (ACIS06),
Lecture Notes in Computer Science 5072, Springer-Verlag,
Berlin, pp. 1249 - 1259, 2008.
Lan Zhou, Willy Susilo and Yi Mu.
Three-move Secret Handshakes based on ElGamal and DSA.
The 2nd Information Security Practice and Experience Conference (ISPEC 2006),
Lecture Notes in Computer Science 3903, Springer-Verlag,
Berlin, pp. 332 - 342, 2006.
Qianhong Wu, Yi Mu, Willy Susilo and Fangguo Zhang.
Privately Retrieve Data From Large Databases.
The 2nd Information Security Practice and Experience Conference (ISPEC 2006),
Lecture Notes in Computer Science 3903, Springer-Verlag,
Berlin, pp. 367 - 378, 2006.
Xinyi Huang, Willy Susilo, Yi Mu and Futai Zhang.
Short (Identity-based) Strong Designated Verifier Signature Schemes.
The 2nd Information Security Practice and Experience Conference (ISPEC 2006),
Lecture Notes in Computer Science 3903, Springer-Verlag,
Berlin, pp. 214 - 225, 2006.
Xinyi Huang, Willy Susilo, Yi Mu and Futai Zhang.
Certificateless Designated Verifier Signature Schemes.
The Second International Workshop on Security in Networks and Distributed
Systems (SNDS 2006), pp. 15 - 19, Vol. 2, 2006.
Xiaofeng Chen, Fangguo Zhang, Yi Mu and Willy Susilo.
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.
Financial Cryptography and Data Security (FC'06),
Lecture Notes in Computer Science 4107, pp. 251 - 265, Springer-Verlag,
Berlin, 2006.
Ching Yu Ng, Willy Susilo and Yi Mu.
Designated Group Credentials.
ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS'06), pp. 59 - 65, ACM, 2006.
Ling Luo, Rei Safavi-Naini, Joonsang Baek and Willy Susilo.
Self-Organised Group Key Management for Ad-hoc Networks.
ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS'06), pp. 138 - 147, ACM, 2006.
2005
Qianhong Wu, Fangguo Zhang, Willy Susilo and Yi Mu.
An Efficient Static Blind Ring Signature Scheme.
The 8th Annual International Conference on Information Security and
Cryptology (ICISC 2005),
Lecture Notes in Computer Science 3935, Springer-Verlag, Berlin,
pp. 410 - 423, 2005.
Willy Susilo, Yi Mu and Xinyi Huang.
Secure Key Extraction in Computer Networks.
8th International Symposium on DSP and Communication Systems &
4th Workshop on the Internet, Telecommunications and Signal Processing,
(DSPCS'2005 & WITSP'2005), pp. 94 - 100, 2005.
Man Ho Au, Sherman S. M. Chow and Willy Susilo.
Short E-Cash.
6th International Conference on Cryptology in India (Indocrypt 2005),
Lecture Notes in Computer Science 3797, Springer-Verlag, Berlin,
pp. 332 - 346, 2005.
Rungrat Wiangsripanawan, Rei Safavi-Naini and Willy Susilo.
Location Privacy in Mobile IP.
IEEE International Conference on Networks (ICON 2005),
IEEE, 2005.
Yi Mu, Fangguo Zhang and Willy Susilo.
Secure and Anonymous Mobile Ad-Hoc Networks.
IEEE International Conference on Networks (ICON 2005),
IEEE, 2005.
Sherman S. M. Chow and Willy Susilo.
Generic Construction of (Identity-based) Perfect Concurrent Signatures.
The Seventh International Conference on Information and Communications Security
(ICICS05), Lecture Notes in Computer Science 3783,
Springer-Verlag, pp. 194 - 206, 2005.
Xinyi Huang, Willy Susilo, Yi Mu and Futai Zhang.
On The Security of Certificateless Signature Schemes from Asiacrypt 2003.
The 4th International Conference on Cryptology and Network Security (CANS2005),
Lecture Notes in Computer Science 3810, Springer-Verlag, pp. 13 - 25, 2005.
Liang Lu, Rei Safavi-Naini, Jeffrey Horton and Willy Susilo.
On Securing RTP-Based Streaming Content With Firewalls.
The 4th International Conference on Cryptology and Network Security (CANS2005),
Lecture Notes in Computer Science 3810, Springer-Verlag, pp. 304 - 319, 2005.
Fangguo Zhang, Willy Susilo, Yi Mu and Xiaofeng Chen.
Identity-based Universal Designated Verifier Signatures.
The First International Workshop on Security in Ubiquitous
Computing Systems (SecUbiq'05),
EUC Workshop 2005, Lecture Notes in Computer Science 3823,
Springer-Verlag, pp. 825 - 834, 2005.
Shidi Xu, Yi Mu and Willy Susilo.
Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks.
The First International Workshop on Security in Ubiquitous
Computing Systems (SecUbiq'05),
EUC Workshop 2005, Lecture Notes in Computer Science 3823,
Springer-Verlag, pp. 854 - 863, 2005.
Xinyi Huang, Yi Mu, Willy Susilo and Futai Zhang.
Short Designated Verifier Proxy Signature from Pairings.
The First International Workshop on Security in Ubiquitous
Computing Systems (SecUbiq'05),
EUC Workshops 2005, Lecture Notes in Computer Science 3823,
Springer-Verlag, pp. 835 - 844, 2005.
Jianyong Huang, Jennifer Seberry, Willy Susilo and Martin Bunder.
Security Analysis of Michael: the IEEE 802.11i Message Integrity Code.
Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW2005), Lecture Notes in Computer Science 3823, Springer-Verlag, pp. 423 - 432, 2005.
Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang and Xiaofeng Chen.
A Short Proxy Signature Scheme: Efficient Authentication in the
Ubiquitous World.
Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW2005), Lecture Notes in Computer Science 3823, Springer-Verlag, pp. 480 - 489, 2005.
Shidi Xu, Yi Mu and Willy Susilo.
Secure AODV Routing Protocol Using One-Time Signature.
International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2005),
Lecture Notes in Computer Science 3794, Springer-Verlag, pp. 288 - 297, 2005.
Yi Gao, Yi Mu and Willy Susilo.
Preventing DoS Attacks with A New Client Puzzle Scheme.
The AUUG'2005 Annual Conference, pp. 3 - 16, 2005.
Jian Wen, Yi Mu and Willy Susilo.
SQL Structure Rebuilder: Preventing SQL Injection Attacks.
The AUUG'2005 Annual Conference, pp. 225 - 234, 2005.
Yi Mu, Willy Susilo and Xinyi Huang.
Efficient Broadcast from Trapdoor
Functions. The 4th International Workshop for Applied PKI
(IWAP'05), IOS Press, pp. 240-248, 2005.
Joonsang Baek, Rei Safavi-Naini and Willy Susilo.
Certificateless Public Key Encryption without Pairing.
8th Information Security Conference (ISC 2005),
Lecture Notes in Computer Science 3650, Springer-Verlag, pp. 134 - 148, 2005.
Willy Susilo and Yi Mu.
On The Security of Nominative Signatures.
Information Security and Privacy, 10th Australasian Conference, ACISP 2005,
Lecture Notes in Computer Science 3574, Springer-Verlag, pp. 329 - 335, 2005
Ching Yu Ng, Willy Susilo and Yi Mu.
Universal Designated Multi Verifier Signature Schemes.
The First International Workshop on Security in Networks and Distributed
Systems (SNDS2005), IEEE Press, pp. 305 - 309, 2005.
Willy Susilo and Yi Mu.
Tripartite Concurrent Signatures.
The 20th IFIP International Information Security Conference (IFIP/SEC 2005),
Springer, pp. 425 - 441, 2005.
Joonsang Baek, Rei Safavi-Naini and Willy Susilo.
Token-Controlled Public Key Encryption.
The First Information Security Practice and Experience Conference (ISPEC2005),
Lecture Notes in Computer Science 3439, Springer-Verlag, pp. 386 - 397, 2005.
Xinyi Huang, Willy Susilo, Yi Mu and Futai Zhang.
Identity-based Ring Signcryption Schemes: Cryptographic Primitives for
Preserving Privacy and Authenticity in the Ubiquitous World.
The First International Workshop on Ubiquitous Smart Worlds
(USW 2005), IEEE Computer Society, Vol. II pp. 649 - 654, 2005.
Willy Susilo, Russell J. Ang, Cameron A. McDonald and Jianyong Huang.
Personal Firewall for Pocket PC 2003: Design & Implementation.
The First International Workshop on Ubiquitous Smart Worlds
(USW 2005), IEEE Computer Society, Vol. II pp. 661 - 666, 2005.
Willy Susilo, Fangguo Zhang and Yi Mu.
Privacy-Enhanced Internet Storage.
The 19th International Conference on Advanced Information
Networking and Applications (AINA2005), IEEE Computer Society,
Vol. 1 pp. 603 - 608, 2005.
Fangguo Zhang, Yi Mu and Willy Susilo.
Reducing Security Overhead for Mobile Networks.
The 19th International Conference on Advanced Information
Networking and Applications (AINA2005), IEEE Computer Society,
Vol. 1 pp. 398 - 403, 2005.
Fangguo Zhang, Willy Susilo and Yi Mu.
Identity-based Partial Message Recovery Signatures (or How to Shorten ID-based Signatures).
Financial Cryptography and Data Security (FC'05),
Lecture Notes in Computer Science 3570, Springer-Verlag, pp. 45 - 56, 2005.
Ching Yu Ng, Yi Mu and Willy Susilo.
A Secure Identity-Based Mobile Ad-Hoc Protocol.
The 3rd Workshop on the Internet, Telecommunications and Signal Processing
(WITSP 2004), pp. 112 - 118, 2004.
Jianyong Huang, Willy Susilo and Jennifer Seberry.
Observations on the Message Integrity Code in IEEE 802.11 Wireless LANs.
The 3rd Workshop on the Internet, Telecommunications and Signal Processing
(WITSP 2004), pp. 328 - 332, 2004.
Liang Lu, Rei Safavi-Naini and Willy Susilo.
Design of Policy Tables For Implementation of Hybrid Distributed Firewalls.
Australian Telecommunication Networks and Applications Conference (ATNAC) 2004,
pp. 68 - 73, 2004.
Ling Luo, Rei Safavi-Naini, Willy Susilo and Rongbo Du.
Implementing Firmato for Distributed Firewall with Content Filtering.
Australian Telecommunication Networks and Applications Conference (ATNAC) 2004,
pp. 421 - 424, 2004.
Graham Edward Peter Gatus, Rei Safavi-Naini and Willy Susilo.
Policy Distribution Using COPS-PR in a Distributed Firewall.
Australian Telecommunication Networks and Applications Conference (ATNAC) 2004,
pp. 60 - 67, 2004.
Yi Mu, Fangguo Zhang and Willy Susilo.
Deniable Partial Proxy Signatures.
Ninth Asian Computing Science Conference (ASIAN'04),
Lecture Notes in Computer Science 3321, Springer-Verlag, pp. 182 - 194, 2004.
Yi Mu, Willy Susilo, Yan-Xia Lin and Chun Ruan.
Identity-based Authenticated Broadcast Encryption and Distributed Authenticated Encryption.
Ninth Asian Computing Science Conference (ASIAN'04),
Lecture Notes in Computer Science 3321, Springer-Verlag, pp. 169 - 181, 2004.
Willy Susilo and Yi Mu.
Authentication System for Supporting Mobile Multimedia Technologies. The Second International Conference on Advances in Mobile Multimedia (MoMM2004), pp. 393 - 397, 2004.
Yi Mu, Willy Susilo and Fangguo Zhang.
Privacy Preserved Electronic Commerce in Wireless Mobile Networks.
The Second International Conference on Advances in Mobile Multimedia (MoMM2004), pp. 403 - 412, 2004.
Willy Susilo, Yi Mu and Fangguo Zhang.
Perfect Concurrent Signature Schemes.
Sixth International Conference on Information and Communications Security,
ICICS 2004, Lecture Notes in Computer Science 3269, Springer-Verlag, pp. 14 - 26, 2004.
Joonsang Baek, Jan Newmarch, Rei Safavi-Naini and Willy Susilo.
A Survey of Identity-based Cryptography.
The AUUG'2004 Annual Conference, pp. 95 - 102, 2004.
Yi Mu and Willy Susilo.
Identity-Based Instantaneous Broadcast System in Mobile Ad-Hoc Networks.
The 2004 International Workshop on Mobile Systems, E-commerce and Agent Technology (MSEAT 2004), pp. 35 - 40, 2004.
Willy Susilo, Fangguo Zhang and Yi Mu.
Identity-based Strong Designated Verifier Signature Schemes.
Information Security and Privacy, 9th Australasian Conference, ACISP 2004,
Lecture Notes in Computer Science 3108, Springer-Verlag, pp. 313 - 324, 2004.
Nathan Curtis, Rei Safavi-Naini and Willy Susilo.
X2Rep: Enhanched Trust Semantics for the XRep Protocol.
The Second Applied Cryptography and Network Security (ACNS04),
Lecture Notes in Computer Science 3089, Springer-Verlag, pp. 205 - 219,
2004.
Willy Susilo and Yi Mu.
Deniable Ring Authentication Revisited.
The Second Applied Cryptography and Network Security (ACNS04),
Lecture Notes in Computer Science 3089, Springer-Verlag, pp. 149 - 163,
2004.
Willy Susilo and Yi Mu.
A Model of Secure Dynamic Ad-Hoc Mobile Networks.
Chinacrypt 2004, Science Press, pp. 416 - 425, 2004.
2003
Willy Susilo and Yi Mu.
Non-Interactive Deniable Ring Authentication.
The 6th International Conference on Information Security and Cryptology (ICISC 2003),
Lecture Notes of Computer Science 2971, Springer-Verlag, pp. 386 - 401,
2003.
Rongbo Du, Willy Susilo, Farzad Safaei and Paul Boustead.
Protecting an MPLS-based Programmable Virtual Network using Distributed Firewall.
2003 Australian Telecommunications, Networks and Applications Conference (ATNAC), 2003.
Rei Safavi-Naini, Willy Susilo, Takeyuki Uehara and Yvo Desmedt.
Denial of Power Attacks.
4th Australian Information Warfare & IT Security Conference (AIWSC03),
pp. 283 - 301, 2003.
Fangguo Zhang, Rei Safavi-Naini and Willy Susilo.
Efficient Verifiable Encrypted Signature and Partially Blind Signature
from Bilinear Pairings.
4th International Conference on Cryptology in India, Indocrypt 2003,
Lecture Notes of Computer Science 2904, Springer-Verlag,
pp. 191 - 204, 2003.
Revised Version is available from here.
Yi Mu, Willy Susilo and Yan-Xia Lin.
Identity-based Broadcasting.
4th International Conference on Cryptology in India, Indocrypt 2003,
Lecture Notes of Computer Science 2904, Springer-Verlag,
pp. 177 - 190, 2003.
Yi Mu and Willy Susilo.
Anonymous Digital-Copyrighted Content Distribution.
The 7th International Symposium On DSP and Communication Systems and 2nd Workshop on The Internet and Telecommunications and Signal Processing (DSPCS'03 & WITSP'03), pp. 32 - 37, 2003.
Yejing Wang, Jennifer Seberry, Beata Wysocki, Tad Wysocki, Willy Susilo, Tianbing Xia, Ying Zhao and Le Chung Tran.
Combinatorial Constructions of 3- and 4-Secure Codes.
The 7th International Symposium On DSP and Communication Systems and 2nd Workshop on The Internet and Telecommunications and Signal Processing (DSPCS'03 & WITSP'03), pp. 549 - 552, 2003.
Willy Susilo and Yi Mu.
RSA-based Fail-Stop Signature Schemes Revisited.
The 2003 International Workshop on Cryptology and Network Security (CANS03),
pp. 657 - 662, 2003.
Rongbo Du, Rei Safavi-Naini and Willy Susilo.
Web Filtering Using Text Classification.
The 11th IEEE International Conference on Network (ICON 2003), pp. 325 - 330, 2003.
Rungrat Wiangsripanawan, Rei Safavi-Naini and Willy Susilo.
Securing Mobile IP Enabled Laptop.
The 11th IEEE International Conference on Network (ICON 2003), pp. 693 - 698, 2003.
Willy Susilo and Yi Mu.
On Fail-Stop Verifiable Secret Sharing Schemes.
The 2003 International Conference on Security and Management (SAM '03),
pp. 663 - 667, 2003.
Willy Susilo, Jianyong Huang and Jennifer Seberry.
On Using Fast Exponentiation Algorithm in PDA.
The 2003 International Conference on Security and Management (SAM '03),
pp. 668 - 674, 2003.
2002
Willy Susilo and Rei Safavi-Naini. An Efficient Fail-Stop Signature Scheme based on Factorization.
The 5th International Conference on Information Security and Cryptology (ICISC 2002),
Lecture Notes of Computer Science 2587, Springer-Verlag,
pp. 62 - 74, 2002.
Willy Susilo. Securing Handheld Devices. The 10th IEEE International
Conference on Network (ICON 2002), pp. 349 - 354, 2002.
Lan Nguyen, Rei Safavi-Naini, Willy Susilo and Tad Wysocki. Secure Authorization,
Access Control and Data Integrity in Bluetooth. The 10th IEEE International
Conference on Network (ICON 2002), pp. 428 - 433, 2002.
2001
Rei Safavi-Naini, Willy Susilo and Gelareh Taban.
Towards Securing 3G
Mobile Phones. The 9th IEEE International Conference on Network (ICON
2001), pp. 222 - 227, 2001.
Rongbo Du, Rei Safavi-Naini and Willy Susilo. Design and implementation
of Content Filtering Firewall. In the Proceedings of Information Technology
and The Emerging Law 2001 Conference, 2001.
Shahrokh Saeednia, Rei Safavi-Naini and Willy Susilo.
On Classifying
Conference Key Distribution Protocols. Lecture Notes in Computer Science
2119. Information Security and Privacy, 6th Australasian Conference, ACISP
2001, pp. 51 - 59, 2001.
Rei Safavi-Naini, Willy Susilo and Huaxiong Wang.
How to Construct Fail-Stop
Confirmer Signature Schemes. Lecture Notes in Computer Science 2119.
Information Security and Privacy, 6th Australasian Conference, ACISP 2001,
pp. 435 - 444, 2001.
2000
Hartono Kurnio, Rei Safavi-Naini, Willy Susilo and Huaxiong Wang.
Key
Management for Secure Multicast with Dynamic Controller. Lecture Notes
in Computer Science 1841. Information Security and Privacy, 5th Australasian
Conference, ACISP 2000, pp. 178 - 190, 2000.
Rei Safavi-Naini and Willy Susilo.
Threshold Fail-Stop Signature Schemes
based on Discrete Logarithm and Factorization. Lecture Notes in Computer
Science 1975. The Third International Workshop on Information Security,
ISW 2000, pp. 292 - 307, Springer-Verlag, Berlin, 2000.
Rei Safavi-Naini, Willy Susilo and Huaxiong Wang.
Fail-Stop Signature
for Long Messages. Lecture Notes in Computer Science 1977. Progress
in Cryptology - Indocrypt 2000, The First Conference on Cryptology in India,
Calcutta, India, December 2000, pp. 165 - 177, Springer-Verlag, Berlin,
2000.
1999
Willy Susilo, Rei Safavi-Naini, and Josef Pieprzyk.
Fail-Stop Threshold
Signature Schemes based on Elliptic Curve . Lecture Notes in Computer
Science 1587, Information Security and Privacy, 4th Australasian Conference,
ACISP '99, pp. 103-116, 1999.
Willy Susilo, Rei Safavi-Naini, and Josef Pieprzyk.
RSA-Based Fail-Stop
Signature Schemes . International Workshop on Security (IWSEC '99),
21-24 September 1999, Aizu-Wakamatsu City, Japan, IEEE Computer Society
Press, pp. 161 - 166, 1999.
Chih-Hung Li, Willy Susilo, Josef Pieprzyk, and Rei Safavi-Naini.
Efficient
Key Agreement in Hierarchical Groups . Proceedings of the 22nd Australasian
Computer Science, ACSC '99, Auckland, New Zealand, 18-21 January 1999,
pp. 469-479, 1999.