Search Results - "Susilo, Willy"
-
1
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
Published in IEEE transactions on dependable and secure computing (01-11-2021)“…The emergence of cloud infrastructure has significantly reduced the costs of hardware and software resources in computing infrastructure. To ensure security,…”
Get full text
Journal Article -
2
Blockchain-based fair payment smart contract for public cloud storage auditing
Published in Information sciences (01-05-2020)“…Cloud storage plays an important role in today’s cloud ecosystem. Increasingly clients tend to outsource their data to the cloud. In spite of its copious…”
Get full text
Journal Article -
3
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
Published in Future generation computer systems (01-01-2018)“…In Fog Computing, fragile connection between Fog and Cloud causes problems of the authentication and authorization. Recently, Stojmenovic, Wen, Huang and Luan…”
Get full text
Journal Article -
4
A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks
Published in IEEE transactions on vehicular technology (01-06-2018)“…Vehicular ad-hoc networks (VANETs) are under active development, thanks in part to recent advances in wireless communication and networking technologies. The…”
Get full text
Journal Article -
5
Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks
Published in IEEE transactions on industrial informatics (01-08-2018)“…The industrial Internet of Things is flourishing, which is unprecedentedly driven by the rapid development of wireless sensor networks (WSNs) with the…”
Get full text
Journal Article -
6
Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies
Published in IEEE network (01-09-2019)“…Privacy is supreme in cryptocurrencies since most users do not want to reveal their identities or the transaction amount in financial transactions…”
Get full text
Journal Article -
7
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
Published in Designs, codes, and cryptography (01-11-2018)“…The notion of attribute-based proxy re-encryption extends the traditional proxy re-encryption to the attribute-based setting. In an attribute-based proxy…”
Get full text
Journal Article -
8
Improvements on an authentication scheme for vehicular sensor networks
Published in Expert systems with applications (01-04-2014)“…In a recent paper, Shim (2012) presented a very interesting authentication scheme for vehicular sensor networks. Shim claimed that the scheme is secure against…”
Get full text
Journal Article -
9
On delegatability of MDVS schemes
Published in Journal of Computer Virology and Hacking Techniques (2022)“…In a designated verifier signature (DVS) scheme, a signer (Alice) generates a signature which can only be verified by a designated verifier (Bob) chosen by…”
Get full text
Journal Article -
10
Efficient algorithms for secure outsourcing of bilinear pairings
Published in Theoretical computer science (2015)“…The computation of bilinear pairings has been considered the most expensive operation in pairing-based cryptographic protocols. In this paper, we first propose…”
Get full text
Journal Article -
11
Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage
Published in IEEE access (2019)“…With the higher rate of using cloud storage, protecting data privacy becomes an important issue. The most effective solution is to encrypt data before…”
Get full text
Journal Article -
12
Visualization and Cybersecurity in the Metaverse: A Survey
Published in Journal of imaging (31-12-2022)“…The popularity of the Metaverse has rapidly increased in recent years. However, despite the attention, investment, and promise of the Metaverse, there are…”
Get full text
Journal Article -
13
CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud
Published in IEEE access (2018)“…Identity-based encryption (IBE) is a very attractive cryptographic primitive due to its unnecessity of any certificate managements. Nevertheless, the user…”
Get full text
Journal Article -
14
A systematic literature review on security and privacy of electronic health record systems: Technical perspectives
Published in Health Information Management Journal (2015)“…Background: Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security…”
Get full text
Journal Article -
15
A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks
Published in Sensors (Basel, Switzerland) (06-06-2019)“…Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the…”
Get full text
Journal Article -
16
Short fail-stop signature scheme based on factorization and discrete logarithm assumptions
Published in Theoretical computer science (01-03-2009)“…Fail-stop signature (FSS) schemes protect a signer against a forger with unlimited computational power by enabling the signer to provide a proof of forgery, if…”
Get full text
Journal Article -
17
Aggregatable Certificateless Designated Verifier Signature
Published in IEEE access (2020)“…In recent years, the Internet of Things (IoT) devices have become increasingly deployed in many industries and generated a large amount of data that needs to…”
Get full text
Journal Article -
18
Strategic Approaches to Cybersecurity Learning: A Study of Educational Models and Outcomes
Published in Information (Basel) (01-02-2024)“…As the demand for cybersecurity experts in the industry grows, we face a widening shortage of skilled professionals. This pressing concern has spurred…”
Get full text
Journal Article -
19
Applied methods to detect and prevent vulnerabilities within PLC alarms code
Published in SN applied sciences (01-04-2022)“…Adversaries may target alerting alarms raised by PLCs (Programmable Logic Controllers) to prevent notifying operators of critical conditions, to hide faults,…”
Get full text
Journal Article -
20
Efficient and Privacy-Preserving Massive Data Processing for Smart Grids
Published in IEEE access (2021)“…Analysis and utilization of massive meter data can help decision-makers provide reasonable decisions. Therefore, multi-functional meter data processing has…”
Get full text
Journal Article