Skip to main content

Susilo, Willy Senior Professor

Head of School, School of Computing and Information Technology

  • Faculty of Engineering and Information Sciences
  • School of Computing & Information Technology
  • Director - Institute of Cybersecurity and Cryptology

Overview


Willy Susilo is a Senior Professor in the School of Computing and Information Technology, Faculty of Engineering and Information Sciences in University of Wollongong, Australia.
He is the director of Institute of Cybersecurity and Cryptology (iC2), School of Computing and Information Technology, University of Wollongong. Willy is an innovative educator and researcher.

Currently, he is the Head of School of Computing and Information Technology at UOW (2015 - now). Prior to this role, he was awarded the prestigious Australian Research Council Future Fellowship in 2009. He was the former Head of School of Computer Science and Software Engineering (2009 - 2010) and the Deputy Director of ICT Research Institute at UOW (2006 - 2008).

He is the Editor in Chief of the Information journal. He has served as an Associate Editor in IEEE Transactions in Information Forensics and Computing and he is currently serving as an Associate Editor in IEEE Transactions in Dependable and Secure Computing.

Willy obtained his PhD from the University of Wollongong in 2001. He has published more than 500 research papers in journals and conference proceedings in cryptography and network security.

He has served as the program committee member in dozens of international conferences.

In 2016, he was awarded the ”Researcher of the Year” at UOW, due to his research excellence and contributions. His work on the creation of short signature schemes has been well cited and it is part of the IETF draft.

Top Publications


Research Overview


  • My research is in the area of cybersecurity and cryptography. My primary research focus is to design solutions and cryptographic algorithms to contribute towards securing the cyberspace.

Available as Research Supervisor

Selected Publications


Investigator On


Impact Story


Available as Research Supervisor

Potential Supervision Topics


    • Blockchain, cryptocurrency
    • Postquantum cryptography

Advisees


  • Graduate Advising Relationship

    Degree Research Title Advisee
    Doctor of Philosophy Un Similarity-Based Software Text case Prioritisation Liu, Chen
    Doctor of Philosophy Lattice-based Cryptology Sipasseuth, Arnaud
    Doctor of Philosophy Metamorphic Testing applied to citation systems and other border applications Witheridge, Matt
    Doctor of Philosophy Research on Privacy Enhancing Techniques in Blockchain-based Cryptocurrencies Li, Yannan
    Doctor of Philosophy PLCs - Security, Vulnerabilities, and Threats. Serhane, Abraham
    Doctor of Philosophy Lattices for a post-quantum cryptography Lesavourey, Andrea
    Doctor of Philosophy Software testing of web and cloud based applications Han, Jiacheng
    Master of Philosophy - EIS A Case Study of Web Security on Social Media Advertising Liu, Yelin
    Doctor of Philosophy (Integrated) Enhancing Attribute-Based Encryption Technology based on Extendable Access Control System with Integrity Protection (EACSIP) Zhang, Jingliang
    Doctor of Philosophy Efficient Constructions of K-times Anonymous Authentication Huang, Jianye
    Master of Philosophy - EIS A 3D Visualisation Approach to Optimising Artificial Neural Network in Intrusion Detection Zong, Wei
    Doctor of Philosophy Internet of Things and Cloud Based Privacy-Preserving Computations: Machine Learning in Combination with Fully Homomorphic Encryption Le, Huy
    Doctor of Philosophy (Integrated) On Antomated Testing of Web Applications Selay, Elmin

Keywords


  • cryptography, computer-security, information-technology, cyber-security, network-security, networks-and-information-systems, computer-science

Top Publications


Research Overview


  • My research is in the area of cybersecurity and cryptography. My primary research focus is to design solutions and cryptographic algorithms to contribute towards securing the cyberspace.

Selected Publications