Search filters

List of works by Willy Susilo

A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT

scientific article published in 2022

A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system

scientific article published in 2018

A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion

A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search

scientific article published in 2022

A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy

scientific article published in 2022

A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks

scientific article published on 06 June 2019

A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds

scientific article published in 2022

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects

scientific article published in 2022

Accountable identity-based encryption with distributed private key generators

scientific article published in 2019

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data

scientific article published in 2017

Anonymous and Traceable Group Data Sharing in Cloud Computing

scientific article published in 2018

Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage

scientific article published in 2020

Attribute-Based Encryption with Reliable Outsourced Decryption in Cloud Computing Using Smart Contract

scientific article published in 2023

Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds

scientific article published in 2023

Attribute-based Proxy Re-encryption with Direct Revocation Mechanism for Data Sharing in Clouds

scientific article published on 25 September 2023

Blockchain Assisted Multi-Copy Provable Data Possession With Faults Localization in Multi-Cloud Storage

scientific article published in 2022

Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption

scientific article published in 2022

Chosen-ciphertext lattice-based public key encryption with equality test in standard model

scientific article published in 2022

Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization

scientific article published in 2022

DO-RA: Data-oriented runtime attestation for IoT devices

scientific article published in 2020

Designated-server identity-based authenticated encryption with keyword search for encrypted emails

scientific article published in 2019

Efficient and Privacy-Preserving Massive Data Processing for Smart Grids

scientific article published in 2021

Efficient dynamic threshold identity-based encryption with constant-size ciphertext

scientific article published in 2016

Functional Encryption for Pattern Matching with a Hidden String

scientific article published in 2021

GDR-GMA: Machine Unlearning via Direction-Rectified and Magnitude-Adjusted Gradients

scientific article published on 26 October 2024

Geometric Searchable Encryption for Privacy-Preserving Location-Based Services

scientific article published in 2023

Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption

scientific article published in 2022

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

scientific article published in 2017

Lattice Blind Signatures with Forward Security

scientific article published in 2020

Lattice-based public-key encryption with equality test supporting flexible authorization in standard model

scientific article published in 2022

Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks

scientific article published in 2018

Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage

scientific article published in 2022

Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security

scientific article published in 2022

New proofs of ownership for efficient data deduplication in the adversarial conspiracy model

scientific article published in 2021

On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive Survey

scientific article published on 29 June 2024

On the security of text-based 3D CAPTCHAs

scientific article published in 2014

Online/Offline Provable Data Possession

P2DPI: Practical and Privacy-Preserving Deep Packet Inspection

scientific article published on 04 June 2021

PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing

scientific article published in 2022

PPFilter: Provider Privacy-Aware Encrypted Filtering System

scientific article published in 2021

Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server

scientific article published in 2021

Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems

scientific article published in 2021

Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption

scientific article published in 2022

Private Set Intersection With Authorization Over Outsourced Encrypted Datasets

scientific article published in 2021

Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups

scientific article published in 2019

Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search

scientific article published in 2023

Public-Key Encryption with Tester Verifiable Equality Test for Cloud Computing

scientific article published in 2023

Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption

scientific article published in 2020

RFID Ownership Transfer with Positive Secrecy Capacity Channels.

scientific article published on 29 December 2016

ROSE: Robust Searchable Encryption With Forward and Backward Security

scientific article published in 2022

Revocable Attribute-Based Encryption With Data Integrity in Clouds

scientific article published in 2022

Secure Infectious Diseases Detection System with IoT-Based e-Health Platforms

scientific article published in 2022

Secure and Efficient Cloud Data Deduplication With Randomized Tag

scientific article published in 2017

Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More

scientific article published in 2022

Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model

scientific article published in 2020

Verifiable and Redactable Blockchains With Fully Editing Operations

scientific article published in 2023

Wildcarded identity-based encryption from lattices

scientific article published in 2022

Witness-based searchable encryption

scientific article published in 2018