2023 - Research.com Computer Science in Australia Leader Award
2022 - Research.com Computer Science in Australia Leader Award
2021 - IEEE Fellow For contributions to cloud computing security
Willy Susilo mainly focuses on Computer security, Encryption, Public-key cryptography, Random oracle and Theoretical computer science. His study in Computer security is interdisciplinary in nature, drawing from both Scheme, Signature and Cloud computing. His research on Encryption concerns the broader Computer network.
The concepts of his Public-key cryptography study are interwoven with issues in Certificate and Adversary. His Random oracle study combines topics in areas such as Chosen-ciphertext attack, Schnorr signature, Oracle, Proxy and Authentication. His research investigates the connection between Theoretical computer science and topics such as Merkle signature scheme that intersect with problems in ElGamal signature scheme and Hash function.
His main research concerns Computer security, Encryption, Theoretical computer science, Public-key cryptography and Scheme. Willy Susilo has researched Computer security in several fields, including Signature and Digital signature. His work in Encryption addresses subjects such as Cloud computing, which are connected to disciplines such as Server.
The study incorporates disciplines such as Distributed computing, Hash function and Standard model in addition to Theoretical computer science. Public-key cryptography is a subfield of Key that Willy Susilo studies. His Scheme research is multidisciplinary, incorporating elements of Identity, Protocol and Authentication.
His primary scientific interests are in Computer security, Encryption, Cloud computing, Public-key cryptography and Ciphertext. His multidisciplinary approach integrates Computer security and Delegation in his work. Willy Susilo has included themes like Scheme, Theoretical computer science, Standard model and Lattice in his Encryption study.
His Theoretical computer science study integrates concerns from other disciplines, such as Hash function and Digital signature. His Cloud computing study also includes fields such as
Willy Susilo mostly deals with Computer security, Encryption, Cloud computing, Server and Cloud storage. His work in the fields of Computer security, such as Security analysis, overlaps with other areas such as Accountability. His study in Ciphertext and Public-key cryptography is done as part of Encryption.
His research integrates issues of Data integrity, Computer security model, Cryptography and Data management in his study of Cloud computing. His Cryptography research incorporates elements of Computer network and Threat model. In his research, Information privacy and Security token is intimately related to Distributed computing, which falls under the overarching field of Cloud storage.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
An Efficient Signature Scheme from Bilinear Pairings and Its Applications
Fangguo Zhang;Reihaneh Safavi-Naini;Willy Susilo.
public key cryptography (2004)
Public Key Encryption with Keyword Search Revisited
Joonsang Baek;Reihaneh Safavi-Naini;Willy Susilo.
international conference on computational science and its applications (2008)
On the security of certificateless signature schemes from asiacrypt 2003
Xinyi Huang;Willy Susilo;Yi Mu;Futai Zhang.
cryptology and network security (2005)
Certificateless signature revisited
Xinyi Huang;Yi Mu;Willy Susilo;Duncan S. Wong.
australasian conference on information security and privacy (2007)
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
Yong Yu;Man Ho Au;Giuseppe Ateniese;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)
Attribute-based signature and its applications
Jin Li;Man Ho Au;Willy Susilo;Dongqing Xie.
computer and communications security (2010)
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data
Jian Shen;Jun Shen;Xiaofeng Chen;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)
Certificateless public key encryption without pairing
Joonsang Baek;Reihaneh Safavi-Naini;Willy Susilo.
international conference on information security (2005)
A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security
Kaitai Liang;Liming Fang;Willy Susilo;Duncan S. Wong.
intelligent networking and collaborative systems (2013)
Trapdoor security in a searchable public-key encryption scheme with a designated tester
Hyun Sook Rhee;Jong Hwan Park;Willy Susilo;Dong Hoon Lee.
Journal of Systems and Software (2010)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Fujian Normal University
University of Hong Kong
Singapore Management University
Monash University
Fujian Normal University
City University of Hong Kong
Sun Yat-sen University
Singapore University of Technology and Design
University of Wollongong
Beihang University
University of Connecticut
Northwestern University
Osaka University
University of Houston
University of Chicago
University of Queensland
University of Ferrara
KU Leuven
Texas A&M University
University of Girona
Alfred Wegener Institute for Polar and Marine Research
Cornell University
Kitasato University
Emory University
University of Oslo
King's College London