Willy Susilo
University of Wollongong
H-index: 85
Oceania-Australia
Top articles of Willy Susilo
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
A fully secure lattice-based signcryption with designated equality test in standard model | Information Sciences | Kaifeng Xiao Xinjian Chen Hongbo Li Jianye Huang Willy Susilo | 2024/2/1 |
Password Protected Universal Thresholdizer | Cryptology ePrint Archive | Sabyasachi Dutta Partha Sarathi Roy Reihaneh Safavi-Naini Willy Susilo | 2024 |
The power of bamboo: On the post-compromise security for searchable symmetric encryption | arXiv preprint arXiv:2403.15052 | Tianyang Chen Peng Xu Stjepan Picek Bo Luo Willy Susilo | 2024/3/22 |
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains | IEEE Transactions on Information Forensics and Security | Andi Liu Yizhong Liu Qianhong Wu Boyu Zhao Dongyu Li | 2024/1/26 |
Secret Multiple Leaders & Committee Election with Application to Sharding Blockchain | IEEE Transactions on Information Forensics and Security | Mingzhe Zhai Qianhong Wu Yizhong Liu Bo Qin Xiaopeng Dai | 2024/4/17 |
Guest Editorial IEEE Transactions on Emerging Topics in Computing Special Section on Advances in Emerging Privacy-Preserving Computing | Gianluca Furano Marco Ottavi | 2021/3/8 | |
Development and evaluation of an immersive VR-CFD-Based tool for dust exposure mitigation in underground tunnelling operations | Tunnelling and Underground Space Technology | Ting Ren Ming Qiao Jon Roberts Jennifer Hines Yang-Wai Chow | 2024/1/1 |
Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage | Cluster Computing | Deepika Gautam Sunil Prajapat Pankaj Kumar Ashok Kumar Das Korhan Cengiz | 2024/4/7 |
Attribute-hiding fuzzy encryption for privacy-preserving data evaluation | IEEE Transactions on Services Computing | Zhenhua Chen Luqi Huang Guomin Yang Willy Susilo Xingbing Fu | 2024/3/12 |
Public Trace-and-Revoke Proxy Re-encryption for Secure Data Sharing in Clouds | IEEE Transactions on Information Forensics and Security | Fucai Luo Haiyan Wang Willy Susilo Xingfu Yan Xiaofan Zheng | 2024/1/22 |
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property | Computer Standards & Interfaces | Abderrahmane Nitaj Willy Susilo Joseph Tonien | 2024/1/1 |
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training | IEEE Transactions on Information Forensics and Security | Jiale Zhang Chengcheng Zhu Xiaobing Sun Chunpeng Ge Bing Chen | 2024/4/4 |
Post-quantum secure group signature with verifier local revocation and backward unlinkability | Computer Standards & Interfaces | Shuaining Gao Xinjian Chen Hongbo Li Willy Susilo Qiong Huang | 2024/3/1 |
Quantum-safe Puncturable Signatures with Their Application in Blockchain | IEEE Transactions on Information Forensics and Security | Mei Jiang Yannan Li Willy Susilo Dung Duong | 2024/1/11 |
Abuse-resistant deniable encryption | Computer Standards & Interfaces | Yanmei Cao Jianghong Wei Yang Xiang Willy Susilo Xiaofeng Chen | 2024/1/1 |
Strategic Approaches to Cybersecurity Learning: A Study of Educational Models and Outcomes | Madhav Mukherjee Ngoc Thuy Le Yang-Wai Chow Willy Susilo | 2024/2/18 | |
HT2REP: A fair cross-chain atomic exchange protocol under UC framework based on HTLCs and TRE | Computer Standards & Interfaces | Tao Li Peiyao Niu Yilei Wang Shengke Zeng Xiaoying Wang | 2024/4/1 |
incorporating Trenchless Technology Research | Tunnelling and Underground Space Technology | Fenghua Liu Jianxiao Liu Hanbin Luo | 2023 |
Public-Key Encryption with Tester Verifiable Equality Test for Cloud Computing | IEEE Transactions on Cloud Computing | Zhen Zhao Willy Susilo Baocang Wang Kai Zeng | 2023/6/20 |
Hyron: A New Approach for Automating the Network ACL Delivery Pipeline | Jacob Neil Taylor Ngoc Thuy Le Joonsang Baek Willy Susilo | 2023/7/24 |