Fakultät für Informatik
-
Technische Universität München
Lehrstuhl für Effiziente Algorithmen
Die bibliographische Datenbank LEABib
Suchen
•
Liste der Journale
•
Liste der Serien
•
Liste der Konferenzen
•
Ausgewählte Publikationen
[1]
Hilfe
Suche: Author="Susilo, Willy"
Als [
bib
] [
pdf
] [
ps
] [
dvi
] [
xml
] herunterladen.
Privacy-preserving encryption scheme using DNA parentage test
Clémentine Gritti
,
Willy Susilo
,
Thomas Plantard
,
Khin Than Win
Theoretical Computer Science
580
, 2015, pp. 1-13
Efficient algorithms for secure outsourcing of bilinear pairings
Xiaofeng Chen
,
Willy Susilo
,
Jin Li
,
Duncan S. Wong
,
Jianfeng Ma
,
Shaohua Tang
,
Qiang Tang
Theoretical Computer Science
562
, 2014, pp. 112-121
Ambiguous optimistic fair exchange: Definition and constructions
Qiong Huang
,
Guomin Yang
,
Duncan S. Wong
,
Willy Susilo
Theoretical Computer Science
562
, 2014, pp. 177-193
Attribute-based optimistic fair exchange: How to restrict brokers with policies
Yang Wang
,
Man Ho Au
,
Willy Susilo
Theoretical Computer Science
527
, 2014, pp. 83-96
Optimistic fair exchange in the enhanced chosen-key model
Yang Wang
,
Man Ho Au
,
Willy Susilo
Theoretical Computer Science
562
, 2014, pp. 57-74
Identity based identification from algebraic coding theory
Guomin Yang
,
Chik How Tan
,
Yi Mu
,
Willy Susilo
,
Duncan S. Wong
Theoretical Computer Science
520
, 2014, pp. 51-61
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
Yong Yu
,
Yi Mu
,
Willy Susilo
,
Man Ho Au
Information Processing Letters
114
(1-2), 2014, pp. 5-8
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
Man Ho Au
,
Joseph K. Liu
,
Willy Susilo
,
Tsz Hon Yuen
Theoretical Computer Science
469
, 2013, pp. 1-14
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
Liming Fang
,
Willy Susilo
,
Chunpeng Ge
,
Jiandong Wang
Theoretical Computer Science
462
, 2012, pp. 39-58
Identity-based trapdoor mercurial commitments and applications
Xiaofeng Chen
,
Willy Susilo
,
Fangguo Zhang
,
Haibo Tian
,
Jin Li
Theoretical Computer Science
412
(39), 2011, pp. 5498-5512
Short fail-stop signature scheme based on factorization and discrete logarithm assumptions
Willy Susilo
Theoretical Computer Science
410
(8-10), 2009, pp. 736-744
Efficient non-interactive range proof
Tsz Hon Yuen
,
Qiong Huang
,
Yi Mu
,
Willy Susilo
,
Duncan S. Wong
,
Guomin Yang
Lecture Notes in Computer Science
5609
, 2009, pp. 138-147