Browsing byAuthorSusilo, W
Showing results 1 to 9 of 9
Issue Date | Title | Author(s) |
2022-04-01 | A model-driven approach to reengineering processes in cloud computing | Fahmideh, M; Grundy, J; Beydoun, G; Zowghi, D; Susilo, W; Mougouei, D |
2022-01-01 | A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects | Kuang, B; Fu, A; Susilo, W; Yu, S; Gao, Y |
2022-01-01 | Attribute-Based Hierarchical Access Control With Extendable Policy | Xiao, M; Li, H; Huang, Q; Yu, S; Susilo, W |
2016-09-01 | Cloud data integrity checking with an identity-based auditing mechanism from RSA | Yu, Y; Xue, L; Au, MH; Susilo, W; Ni, J; Zhang, Y; Vasilakos, AV; Shen, J |
2024-01-01 | FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training | Zhang, J; Zhu, C; Sun, X; Ge, C; Chen, B; Susilo, W; Yu, S |
2024-01-01 | On Digital Signatures Based on Group Actions: QROM Security and Ring Signatures | Bläser, M; Chen, Z; Duong, DH; Joux, A; Nguyen, T; Plantard, T; Qiao, Y; Susilo, W; Tang, G |
2022-05-25 | Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms | Tang, G; Duong, DH; Joux, A; Plantard, T; Qiao, Y; Susilo, W |
2017-01-01 | Securely reinforcing synchronization for embedded online contests | Wang, W; Xu, P; Yang, LT; Susilo, W; Chen, J |
2022-01-01 | Software Engineering for Internet of Things | Fahmideh, M; Abbasi, AA; Behnaz, A; Grundy, J; Susilo, W |