H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 72 Citations 17,895 570 World Ranking 726 National Ranking 10

Research.com Recognitions

Awards & Achievements

2021 - IEEE Fellow For contributions to cloud computing security

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer security
  • Computer network
  • The Internet

Willy Susilo mainly focuses on Computer security, Encryption, Public-key cryptography, Random oracle and Theoretical computer science. His study in Computer security is interdisciplinary in nature, drawing from both Scheme, Signature and Cloud computing. His research on Encryption concerns the broader Computer network.

The concepts of his Public-key cryptography study are interwoven with issues in Certificate and Adversary. His Random oracle study combines topics in areas such as Chosen-ciphertext attack, Schnorr signature, Oracle, Proxy and Authentication. His research investigates the connection between Theoretical computer science and topics such as Merkle signature scheme that intersect with problems in ElGamal signature scheme and Hash function.

His most cited work include:

  • An Efficient Signature Scheme from Bilinear Pairings and Its Applications (411 citations)
  • Public Key Encryption with Keyword Search Revisited (310 citations)
  • On the security of certificateless signature schemes from asiacrypt 2003 (210 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer security, Encryption, Theoretical computer science, Public-key cryptography and Scheme. Willy Susilo has researched Computer security in several fields, including Signature and Digital signature. His work in Encryption addresses subjects such as Cloud computing, which are connected to disciplines such as Server.

The study incorporates disciplines such as Distributed computing, Hash function and Standard model in addition to Theoretical computer science. Public-key cryptography is a subfield of Key that Willy Susilo studies. His Scheme research is multidisciplinary, incorporating elements of Identity, Protocol and Authentication.

He most often published in these fields:

  • Computer security (52.34%)
  • Encryption (30.47%)
  • Theoretical computer science (24.65%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (52.34%)
  • Encryption (30.47%)
  • Cloud computing (10.24%)

In recent papers he was focusing on the following fields of study:

His primary scientific interests are in Computer security, Encryption, Cloud computing, Public-key cryptography and Ciphertext. His multidisciplinary approach integrates Computer security and Delegation in his work. Willy Susilo has included themes like Scheme, Theoretical computer science, Standard model and Lattice in his Encryption study.

His Theoretical computer science study integrates concerns from other disciplines, such as Hash function and Digital signature. His Cloud computing study also includes fields such as

  • Server which intersects with area such as Cryptography, Information sensitivity and Access control,
  • Computer network which connect with Mobile device. His Ciphertext research is multidisciplinary, incorporating perspectives in Plaintext, Homomorphic encryption, Attribute-based encryption and Broadcast encryption.

Between 2019 and 2021, his most popular works were:

  • Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment (91 citations)
  • Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage (25 citations)
  • Blockchain-based fair payment smart contract for public cloud storage auditing (17 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Computer network
  • Operating system

Willy Susilo mostly deals with Computer security, Encryption, Cloud computing, Server and Cloud storage. His work in the fields of Computer security, such as Security analysis, overlaps with other areas such as Accountability. His study in Ciphertext and Public-key cryptography is done as part of Encryption.

His research integrates issues of Data integrity, Computer security model, Cryptography and Data management in his study of Cloud computing. His Cryptography research incorporates elements of Computer network and Threat model. In his research, Information privacy and Security token is intimately related to Distributed computing, which falls under the overarching field of Cloud storage.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

An Efficient Signature Scheme from Bilinear Pairings and Its Applications

Fangguo Zhang;Reihaneh Safavi-Naini;Willy Susilo.
public key cryptography (2004)

635 Citations

Public Key Encryption with Keyword Search Revisited

Joonsang Baek;Reihaneh Safavi-Naini;Willy Susilo.
international conference on computational science and its applications (2008)

500 Citations

On the security of certificateless signature schemes from asiacrypt 2003

Xinyi Huang;Willy Susilo;Yi Mu;Futai Zhang.
cryptology and network security (2005)

412 Citations

Certificateless signature revisited

Xinyi Huang;Yi Mu;Willy Susilo;Duncan S. Wong.
australasian conference on information security and privacy (2007)

365 Citations

Attribute-based signature and its applications

Jin Li;Man Ho Au;Willy Susilo;Dongqing Xie.
computer and communications security (2010)

290 Citations

Certificateless public key encryption without pairing

Joonsang Baek;Reihaneh Safavi-Naini;Willy Susilo.
international conference on information security (2005)

286 Citations

A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security

Kaitai Liang;Liming Fang;Willy Susilo;Duncan S. Wong.
intelligent networking and collaborative systems (2013)

283 Citations

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu;Man Ho Au;Giuseppe Ateniese;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)

259 Citations

Trapdoor security in a searchable public-key encryption scheme with a designated tester

Hyun Sook Rhee;Jong Hwan Park;Willy Susilo;Dong Hoon Lee.
Journal of Systems and Software (2010)

251 Citations

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data

Jian Shen;Jun Shen;Xiaofeng Chen;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)

242 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Willy Susilo

Yi Mu

Yi Mu

Fujian Normal University

Publications: 79

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 78

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 69

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 61

Jin Li

Jin Li

Guangzhou University

Publications: 55

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 55

Debiao He

Debiao He

Wuhan University

Publications: 54

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 51

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 45

Sherman S. M. Chow

Sherman S. M. Chow

Chinese University of Hong Kong

Publications: 45

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 40

Hui Li

Hui Li

Xidian University

Publications: 39

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 37

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 36

Jian Weng

Jian Weng

Jinan University

Publications: 35

Something went wrong. Please try again later.