D-Index & Metrics Best Publications
Computer Science
Australia
2023

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 75 Citations 19,405 753 World Ranking 853 National Ranking 12

Research.com Recognitions

Awards & Achievements

2023 - Research.com Computer Science in Australia Leader Award

2022 - Research.com Computer Science in Australia Leader Award

2021 - IEEE Fellow For contributions to cloud computing security

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer security
  • Computer network
  • The Internet

Willy Susilo mainly focuses on Computer security, Encryption, Public-key cryptography, Random oracle and Theoretical computer science. His study in Computer security is interdisciplinary in nature, drawing from both Scheme, Signature and Cloud computing. His research on Encryption concerns the broader Computer network.

The concepts of his Public-key cryptography study are interwoven with issues in Certificate and Adversary. His Random oracle study combines topics in areas such as Chosen-ciphertext attack, Schnorr signature, Oracle, Proxy and Authentication. His research investigates the connection between Theoretical computer science and topics such as Merkle signature scheme that intersect with problems in ElGamal signature scheme and Hash function.

His most cited work include:

  • An Efficient Signature Scheme from Bilinear Pairings and Its Applications (411 citations)
  • Public Key Encryption with Keyword Search Revisited (310 citations)
  • On the security of certificateless signature schemes from asiacrypt 2003 (210 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer security, Encryption, Theoretical computer science, Public-key cryptography and Scheme. Willy Susilo has researched Computer security in several fields, including Signature and Digital signature. His work in Encryption addresses subjects such as Cloud computing, which are connected to disciplines such as Server.

The study incorporates disciplines such as Distributed computing, Hash function and Standard model in addition to Theoretical computer science. Public-key cryptography is a subfield of Key that Willy Susilo studies. His Scheme research is multidisciplinary, incorporating elements of Identity, Protocol and Authentication.

He most often published in these fields:

  • Computer security (52.34%)
  • Encryption (30.47%)
  • Theoretical computer science (24.65%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (52.34%)
  • Encryption (30.47%)
  • Cloud computing (10.24%)

In recent papers he was focusing on the following fields of study:

His primary scientific interests are in Computer security, Encryption, Cloud computing, Public-key cryptography and Ciphertext. His multidisciplinary approach integrates Computer security and Delegation in his work. Willy Susilo has included themes like Scheme, Theoretical computer science, Standard model and Lattice in his Encryption study.

His Theoretical computer science study integrates concerns from other disciplines, such as Hash function and Digital signature. His Cloud computing study also includes fields such as

  • Server which intersects with area such as Cryptography, Information sensitivity and Access control,
  • Computer network which connect with Mobile device. His Ciphertext research is multidisciplinary, incorporating perspectives in Plaintext, Homomorphic encryption, Attribute-based encryption and Broadcast encryption.

Between 2019 and 2021, his most popular works were:

  • Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment (91 citations)
  • Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage (25 citations)
  • Blockchain-based fair payment smart contract for public cloud storage auditing (17 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Computer network
  • Operating system

Willy Susilo mostly deals with Computer security, Encryption, Cloud computing, Server and Cloud storage. His work in the fields of Computer security, such as Security analysis, overlaps with other areas such as Accountability. His study in Ciphertext and Public-key cryptography is done as part of Encryption.

His research integrates issues of Data integrity, Computer security model, Cryptography and Data management in his study of Cloud computing. His Cryptography research incorporates elements of Computer network and Threat model. In his research, Information privacy and Security token is intimately related to Distributed computing, which falls under the overarching field of Cloud storage.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

An Efficient Signature Scheme from Bilinear Pairings and Its Applications

Fangguo Zhang;Reihaneh Safavi-Naini;Willy Susilo.
public key cryptography (2004)

664 Citations

Public Key Encryption with Keyword Search Revisited

Joonsang Baek;Reihaneh Safavi-Naini;Willy Susilo.
international conference on computational science and its applications (2008)

563 Citations

On the security of certificateless signature schemes from asiacrypt 2003

Xinyi Huang;Willy Susilo;Yi Mu;Futai Zhang.
cryptology and network security (2005)

429 Citations

Certificateless signature revisited

Xinyi Huang;Yi Mu;Willy Susilo;Duncan S. Wong.
australasian conference on information security and privacy (2007)

379 Citations

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu;Man Ho Au;Giuseppe Ateniese;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)

348 Citations

Attribute-based signature and its applications

Jin Li;Man Ho Au;Willy Susilo;Dongqing Xie.
computer and communications security (2010)

334 Citations

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data

Jian Shen;Jun Shen;Xiaofeng Chen;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)

314 Citations

Certificateless public key encryption without pairing

Joonsang Baek;Reihaneh Safavi-Naini;Willy Susilo.
international conference on information security (2005)

295 Citations

A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security

Kaitai Liang;Liming Fang;Willy Susilo;Duncan S. Wong.
intelligent networking and collaborative systems (2013)

292 Citations

Trapdoor security in a searchable public-key encryption scheme with a designated tester

Hyun Sook Rhee;Jong Hwan Park;Willy Susilo;Dong Hoon Lee.
Journal of Systems and Software (2010)

290 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Willy Susilo

Yi Mu

Yi Mu

Fujian Normal University

Publications: 79

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 78

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 69

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 61

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 55

Jin Li

Jin Li

Chinese Academy of Sciences

Publications: 55

Debiao He

Debiao He

Wuhan University

Publications: 54

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 51

Sherman S. M. Chow

Sherman S. M. Chow

Chinese University of Hong Kong

Publications: 45

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 45

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 40

Hui Li

Hui Li

Xidian University

Publications: 39

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 37

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 36

Jian Weng

Jian Weng

Jinan University

Publications: 35

Josep Domingo-Ferrer

Josep Domingo-Ferrer

Rovira i Virgili University

Publications: 34

Trending Scientists

Sanguthevar Rajasekaran

Sanguthevar Rajasekaran

University of Connecticut

Morton I. Kamien

Morton I. Kamien

Northwestern University

Ken-ichi Kitayama

Ken-ichi Kitayama

Osaka University

Ralph S. Becker

Ralph S. Becker

University of Houston

Stephen B. H. Kent

Stephen B. H. Kent

University of Chicago

Vicki Chen

Vicki Chen

University of Queensland

Pier Giovanni Baraldi

Pier Giovanni Baraldi

University of Ferrara

Hilde Van Esch

Hilde Van Esch

KU Leuven

Manjusha Gaglani

Manjusha Gaglani

Texas A&M University

Jesús Colprim

Jesús Colprim

University of Girona

Karsten Reise

Karsten Reise

Alfred Wegener Institute for Polar and Marine Research

David M. Nanus

David M. Nanus

Cornell University

Kanji Nagai

Kanji Nagai

Kitasato University

Benjamin G. Druss

Benjamin G. Druss

Emory University

Willy Pedersen

Willy Pedersen

University of Oslo

Christophe Jaffrelot

Christophe Jaffrelot

King's College London

Something went wrong. Please try again later.