An efficient signature scheme from bilinear pairings and its applications F Zhang, R Safavi-Naini, W Susilo Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004 | 732 | 2004 |
Public key encryption with keyword search revisited J Baek, R Safavi-Naini, W Susilo Computational Science and Its Applications–ICCSA 2008: International …, 2008 | 731 | 2008 |
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage Y Yu, MH Au, G Ateniese, X Huang, W Susilo, Y Dai, G Min IEEE Transactions on Information Forensics and Security 12 (4), 767-778, 2016 | 500 | 2016 |
On the security of certificateless signature schemes from Asiacrypt 2003 X Huang, W Susilo, Y Mu, F Zhang Cryptology and Network Security: 4th International Conference, CANS 2005 …, 2005 | 432 | 2005 |
An efficient public auditing protocol with novel dynamic structure for cloud data J Shen, J Shen, X Chen, X Huang, W Susilo IEEE Transactions on Information Forensics and Security 12 (10), 2402-2415, 2017 | 397 | 2017 |
Certificateless signature revisited X Huang, Y Mu, W Susilo, DS Wong, W Wu Australasian Conference on Information Security and Privacy, 308-322, 2007 | 397 | 2007 |
Attribute-based signature and its applications J Li, MH Au, W Susilo, D Xie, K Ren Proceedings of the 5th ACM symposium on information, computer and …, 2010 | 373 | 2010 |
Trapdoor security in a searchable public-key encryption scheme with a designated tester HS Rhee, JH Park, W Susilo, DH Lee Journal of systems and software 83 (5), 763-771, 2010 | 357 | 2010 |
Constant-Size Dynamic k-TAA MH Au, W Susilo, Y Mu Security and Cryptography for Networks: 5th International Conference, SCN …, 2006 | 350 | 2006 |
Secure remote user authenticated key establishment protocol for smart home environment M Wazid, AK Das, V Odelu, N Kumar, W Susilo IEEE Transactions on Dependable and Secure Computing 17 (2), 391-406, 2017 | 346 | 2017 |
A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security K Liang, L Fang, W Susilo, DS Wong 2013 5th international conference on intelligent networking and …, 2013 | 325 | 2013 |
Certificateless public key encryption without pairing J Baek, R Safavi-Naini, W Susilo International conference on information security, 134-148, 2005 | 307 | 2005 |
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model JK Liu, MH Au, W Susilo Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 294 | 2007 |
Anonymous and traceable group data sharing in cloud computing J Shen, T Zhou, X Chen, J Li, W Susilo IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017 | 275 | 2017 |
Fuzzy identity-based data integrity auditing for reliable cloud storage systems Y Li, Y Yu, G Min, W Susilo, J Ni, KKR Choo IEEE Transactions on Dependable and Secure Computing 16 (1), 72-83, 2017 | 264 | 2017 |
Public key encryption with keyword search secure against keyword guessing attacks without random oracle L Fang, W Susilo, C Ge, J Wang Information sciences 238, 221-241, 2013 | 260 | 2013 |
Searchable attribute-based mechanism with efficient data sharing for secure cloud storage K Liang, W Susilo IEEE Transactions on Information Forensics and Security 10 (9), 1981-1992, 2015 | 251 | 2015 |
Asymmetric group key agreement Q Wu, Y Mu, W Susilo, B Qin, J Domingo-Ferrer Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009 | 248 | 2009 |
Privacy-preserving decentralized key-policy attribute-based encryption J Han, W Susilo, Y Mu, J Yan IEEE transactions on parallel and distributed systems 23 (11), 2150-2162, 2012 | 245 | 2012 |
Efficient multi-receiver identity-based encryption and its application to broadcast encryption J Baek, R Safavi-Naini, W Susilo Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and …, 2005 | 245 | 2005 |