Search Results - "Susilo, Willy"

Refine Results
  1. 1

    Secure Keyword Search and Data Sharing Mechanism for Cloud Computing by Ge, Chunpeng, Susilo, Willy, Liu, Zhe, Xia, Jinyue, Szalachowski, Pawel, Fang, Liming

    “…The emergence of cloud infrastructure has significantly reduced the costs of hardware and software resources in computing infrastructure. To ensure security,…”
    Get full text
    Journal Article
  2. 2

    Blockchain-based fair payment smart contract for public cloud storage auditing by Wang, Hao, Qin, Hong, Zhao, Minghao, Wei, Xiaochao, Shen, Hua, Susilo, Willy

    Published in Information sciences (01-05-2020)
    “…Cloud storage plays an important role in today’s cloud ecosystem. Increasingly clients tend to outsource their data to the cloud. In spite of its copious…”
    Get full text
    Journal Article
  3. 3

    Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing by Jiang, Yinhao, Susilo, Willy, Mu, Yi, Guo, Fuchun

    Published in Future generation computer systems (01-01-2018)
    “…In Fog Computing, fragile connection between Fog and Cloud causes problems of the authentication and authorization. Recently, Stojmenovic, Wen, Huang and Luan…”
    Get full text
    Journal Article
  4. 4

    A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks by Asaar, Maryam Rajabzadeh, Salmasizadeh, Mahmoud, Susilo, Willy, Majidi, Akbar

    Published in IEEE transactions on vehicular technology (01-06-2018)
    “…Vehicular ad-hoc networks (VANETs) are under active development, thanks in part to recent advances in wireless communication and networking technologies. The…”
    Get full text
    Journal Article
  5. 5

    Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks by Peng Xu, Shuanghong He, Wei Wang, Susilo, Willy, Hai Jin

    “…The industrial Internet of Things is flourishing, which is unprecedentedly driven by the rapid development of wireless sensor networks (WSNs) with the…”
    Get full text
    Journal Article
  6. 6

    Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies by Li, Yannan, Susilo, Willy, Yang, Guomin, Yu, Yong, Du, Xiaojiang, Liu, Dongxi, Guizani, Nadra

    Published in IEEE network (01-09-2019)
    “…Privacy is supreme in cryptocurrencies since most users do not want to reveal their identities or the transaction amount in financial transactions…”
    Get full text
    Journal Article
  7. 7

    A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system by Ge, Chunpeng, Susilo, Willy, Fang, Liming, Wang, Jiandong, Shi, Yunqing

    Published in Designs, codes, and cryptography (01-11-2018)
    “…The notion of attribute-based proxy re-encryption extends the traditional proxy re-encryption to the attribute-based setting. In an attribute-based proxy…”
    Get full text
    Journal Article
  8. 8

    Improvements on an authentication scheme for vehicular sensor networks by Liu, Joseph K., Yuen, Tsz Hon, Au, Man Ho, Susilo, Willy

    Published in Expert systems with applications (01-04-2014)
    “…In a recent paper, Shim (2012) presented a very interesting authentication scheme for vehicular sensor networks. Shim claimed that the scheme is secure against…”
    Get full text
    Journal Article
  9. 9

    On delegatability of MDVS schemes by Rastegari, Parvin, Susilo, Willy

    “…In a designated verifier signature (DVS) scheme, a signer (Alice) generates a signature which can only be verified by a designated verifier (Bob) chosen by…”
    Get full text
    Journal Article
  10. 10

    Efficient algorithms for secure outsourcing of bilinear pairings by Chen, Xiaofeng, Susilo, Willy, Li, Jin, Wong, Duncan S., Ma, Jianfeng, Tang, Shaohua, Tang, Qiang

    Published in Theoretical computer science (2015)
    “…The computation of bilinear pairings has been considered the most expensive operation in pairing-based cryptographic protocols. In this paper, we first propose…”
    Get full text
    Journal Article
  11. 11

    Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage by Li, Hongbo, Huang, Qiong, Ma, Sha, Shen, Jian, Susilo, Willy

    Published in IEEE access (2019)
    “…With the higher rate of using cloud storage, protecting data privacy becomes an important issue. The most effective solution is to encrypt data before…”
    Get full text
    Journal Article
  12. 12

    Visualization and Cybersecurity in the Metaverse: A Survey by Chow, Yang-Wai, Susilo, Willy, Li, Yannan, Li, Nan, Nguyen, Chau

    Published in Journal of imaging (31-12-2022)
    “…The popularity of the Metaverse has rapidly increased in recent years. However, despite the attention, investment, and promise of the Metaverse, there are…”
    Get full text
    Journal Article
  13. 13

    CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud by Sun, Yinxia, Susilo, Willy, Zhang, Futai, Fu, Anmin

    Published in IEEE access (2018)
    “…Identity-based encryption (IBE) is a very attractive cryptographic primitive due to its unnecessity of any certificate managements. Nevertheless, the user…”
    Get full text
    Journal Article
  14. 14

    A systematic literature review on security and privacy of electronic health record systems: Technical perspectives by Rezaeibagha, Fatemeh, Win, Khin Than, Susilo, Willy

    “…Background: Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security…”
    Get full text
    Journal Article
  15. 15

    A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks by Zhu, Binrui, Susilo, Willy, Qin, Jing, Guo, Fuchun, Zhao, Zhen, Ma, Jixin

    Published in Sensors (Basel, Switzerland) (06-06-2019)
    “…Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the…”
    Get full text
    Journal Article
  16. 16

    Short fail-stop signature scheme based on factorization and discrete logarithm assumptions by Susilo, Willy

    Published in Theoretical computer science (01-03-2009)
    “…Fail-stop signature (FSS) schemes protect a signer against a forger with unlimited computational power by enabling the signer to provide a proof of forgery, if…”
    Get full text
    Journal Article
  17. 17

    Aggregatable Certificateless Designated Verifier Signature by Thorncharoensri, Pairat, Susilo, Willy, Baek, Joonsang

    Published in IEEE access (2020)
    “…In recent years, the Internet of Things (IoT) devices have become increasingly deployed in many industries and generated a large amount of data that needs to…”
    Get full text
    Journal Article
  18. 18

    Strategic Approaches to Cybersecurity Learning: A Study of Educational Models and Outcomes by Mukherjee, Madhav, Le, Ngoc Thuy, Chow, Yang-Wai, Susilo, Willy

    Published in Information (Basel) (01-02-2024)
    “…As the demand for cybersecurity experts in the industry grows, we face a widening shortage of skilled professionals. This pressing concern has spurred…”
    Get full text
    Journal Article
  19. 19

    Applied methods to detect and prevent vulnerabilities within PLC alarms code by Serhane, Abraham, Raad, Raad, Susilo, Willy, Raad, Mohamad

    Published in SN applied sciences (01-04-2022)
    “…Adversaries may target alerting alarms raised by PLCs (Programmable Logic Controllers) to prevent notifying operators of critical conditions, to hide faults,…”
    Get full text
    Journal Article
  20. 20

    Efficient and Privacy-Preserving Massive Data Processing for Smart Grids by Shen, Hua, Zhang, Mingwu, Wang, Hao, Guo, Fuchun, Susilo, Willy

    Published in IEEE access (2021)
    “…Analysis and utilization of massive meter data can help decision-makers provide reasonable decisions. Therefore, multi-functional meter data processing has…”
    Get full text
    Journal Article