default search action
Joonsang Baek
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Ilsun You, Gunwoo Kim, Seonghan Shin, Hoseok Kwon, Jongkil Kim, Joonsang Baek:
5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy. Sensors 24(1): 159 (2024) - [j36]Chunpeng Ge, Willy Susilo, Zhe Liu, Joonsang Baek, Xiapu Luo, Liming Fang:
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 21(2): 949-960 (2024) - [c64]Wei Zong, Yang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim, Seyit Camtepe:
IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking. AAAI 2024: 7837-7845 - [c63]Xin Liu, Willy Susilo, Joonsang Baek:
Extended Withdrawable Signature. DSPP (1) 2024: 119-140 - 2023
- [j35]Intae Kim, Willy Susilo, Joonsang Baek, Jongkil Kim, Yang-Wai Chow:
PCSF: Privacy-Preserving Content-Based Spam Filter. IEEE Trans. Inf. Forensics Secur. 18: 2856-2869 (2023) - [c62]Chunpeng Ge, Willy Susilo, Zhe Liu, Joonsang Baek, Xiapu Luo, Liming Fang:
Attribute-based Proxy Re-encryption with Direct Revocation Mechanism for Data Sharing in Clouds. ACM TUR-C 2023: 164-165 - [c61]Jacob Neil Taylor, Ngoc-Thuy Le, Joonsang Baek, Willy Susilo:
Hyron: A New Approach for Automating the Network ACL Delivery Pipeline. ICCCN 2023: 1-10 - [c60]Xin Liu, Joonsang Baek, Willy Susilo:
Withdrawable Signature: How to Call Off a Signature. ISC 2023: 557-577 - [i12]Xin Liu, Joonsang Baek, Willy Susilo:
Withdrawable Signature: How to Call off a Signature. IACR Cryptol. ePrint Arch. 2023: 1621 (2023) - 2022
- [j34]Jongkil Kim, Yang-Wai Chow, Willy Susilo, Joonsang Baek, Intae Kim:
Functional Encryption for Pattern Matching with a Hidden String. Cryptogr. 6(1): 1 (2022) - [j33]Intae Kim, Willy Susilo, Joonsang Baek, Jongkil Kim:
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption. IEEE Trans. Dependable Secur. Comput. 19(3): 1856-1870 (2022) - [j32]Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu, Jinyue Xia, Liming Fang:
Revocable Attribute-Based Encryption With Data Integrity in Clouds. IEEE Trans. Dependable Secur. Comput. 19(5): 2864-2872 (2022) - [j31]Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu, Jinyue Xia, Liming Fang:
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 19(5): 2907-2919 (2022) - [j30]Junjie Jiang, Willy Susilo, Joonsang Baek:
Security Analysis of "SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks". IEEE Trans. Inf. Forensics Secur. 17: 3006-3007 (2022) - [c59]Intae Kim, Willy Susilo, Joonsang Baek, Jongkil Kim, Yang-Wai Chow:
TLS Goes Low Cost: When TLS Meets Edge. WISA 2022: 102-113 - 2021
- [j29]Yang-Wai Chow, Willy Susilo, Jianfeng Wang, Richard Buckland, Joonsang Baek, Jongkil Kim, Nan Li:
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning. J. Netw. Comput. Appl. 173: 102834 (2021) - [j28]Yang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim, Wei Zong:
Exploiting QR Code Error Correction for Digital Image Watermarking. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(2): 114-140 (2021) - [c58]Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal:
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection. AsiaCCS 2021: 135-146 - [c57]Xin Liu, Willy Susilo, Joonsang Baek:
Secure Computation of Shared Secrets and Its Applications. WISA 2021: 119-131 - [c56]Jongkil Kim, Willy Susilo, Yang-Wai Chow, Joonsang Baek, Intae Kim:
Pattern Matching over Encrypted Data with a Short Ciphertext. WISA 2021: 132-143 - [e4]Joonsang Baek, Sushmita Ruj:
Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings. Lecture Notes in Computer Science 13083, Springer 2021, ISBN 978-3-030-90566-8 [contents] - [i11]Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal:
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection. IACR Cryptol. ePrint Arch. 2021: 789 (2021) - 2020
- [j27]Pairat Thorncharoensri, Willy Susilo, Joonsang Baek:
Aggregatable Certificateless Designated Verifier Signature. IEEE Access 8: 95019-95031 (2020) - [j26]Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Joonsang Baek, Partha Sarathi Roy:
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions. J. Internet Serv. Inf. Secur. 10(4): 1-22 (2020) - [c55]Intae Kim, Seong Oun Hwang, Willy Susilo, Joonsang Baek, Jongkil Kim:
Efficient Anonymous Multi-group Broadcast Encryption. ACNS (1) 2020: 251-270 - [c54]Joonsang Baek, Jongkil Kim, Willy Susilo:
Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception. AsiaCCS 2020: 116-126 - [c53]Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Joonsang Baek, Partha Sarathi Roy:
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction. WISA 2020: 245-257 - [i10]Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Joonsang Baek, Partha Sarathi Roy:
Lattice-based Unidirectional IBPRE Secure in Standard Model. CoRR abs/2005.06741 (2020)
2010 – 2019
- 2019
- [j25]Joonsang Baek, Willy Susilo, Jongkil Kim, Yang-Wai Chow:
Subversion in Practice: How to Efficiently Undermine Signatures. IEEE Access 7: 68799-68811 (2019) - [j24]Joonsang Baek, Willy Susilo, Jongkil Kim:
Guest Editorial: Security and Privacy for Contemporary Network Computing Environment. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(1): 1-3 (2019) - [j23]Ziba Eslami, Mahnaz Noroozi, Joonsang Baek:
On the Security of a Privacy-Preserving Ranked Multi-Keyword Search Scheme. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(1): 75-85 (2019) - [j22]Pairat Thorncharoensri, Willy Susilo, Joonsang Baek:
Efficient Controlled Signature for a Large Network with Multi Security-level Setting. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(3): 1-20 (2019) - [j21]Yang Wang, Willy Susilo, Joonsang Baek, Jongkil Kim, Intae Kim:
Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(4): 68-87 (2019) - [j20]Yunling Wang, Jianfeng Wang, Shifeng Sun, Joseph K. Liu, Willy Susilo, Joonsang Baek, Ilsun You, Xiaofeng Chen:
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. J. Univers. Comput. Sci. 25(3): 222-244 (2019) - [c52]Jongkil Kim, Willy Susilo, Joonsang Baek, Surya Nepal, Dongxi Liu:
Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach. ACISP 2019: 3-20 - [c51]Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li:
A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups. ACNS 2019: 406-425 - [c50]Jongkil Kim, Seyit Camtepe, Willy Susilo, Surya Nepal, Joonsang Baek:
Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing. AsiaCCS 2019: 55-66 - [c49]Yang-Wai Chow, Willy Susilo, Jianfeng Wang, Richard Buckland, Joonsang Baek, Jongkil Kim, Nan Li:
Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes. ML4CS 2019: 320-335 - [c48]Amril Syalim, Bayu Anggorojati, Joonsang Baek, Daniel Gerbi, Ilsun You:
Aggregate Authentication for Massive Internet of Things in 5G Networks. MobiSec 2019: 3-12 - [c47]Yang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim:
QR Code Watermarking for Digital Images. WISA 2019: 25-37 - [c46]Jongkil Kim, Joonsang Baek, Willy Susilo, Yang-Wai Chow:
Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof. WISA 2019: 206-216 - [p2]Joonsang Baek, Willy Susilo, Khaled Salah, Jun Su Ha, Ernesto Damiani, Ilsun You:
Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment. Advances in Cyber Security 2019: 1-22 - [i9]Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li:
A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups. IACR Cryptol. ePrint Arch. 2019: 1479 (2019) - 2018
- [j19]Ilsun You, Carol J. Fung, Joonsang Baek, Victor C. M. Leung:
IEEE Access Special Section Editorial: Security and Privacy in Applications and Services for Future Internet of Things. IEEE Access 6: 39398-39400 (2018) - [j18]Jin Yang, Liangming Wang, Joonsang Baek:
A privacy preserving and fine-grained access control scheme in DaaS based on efficient DSP re-encryption. Int. J. High Perform. Comput. Netw. 11(3): 231-241 (2018) - [e3]Joonsang Baek, Willy Susilo, Jongkil Kim:
Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings. Lecture Notes in Computer Science 11192, Springer 2018, ISBN 978-3-030-01445-2 [contents] - [i8]Joonsang Baek, Willy Susilo, Jongkil Kim, Yang-Wai Chow:
Subversion in Practice: How to Efficiently Undermine Signatures. IACR Cryptol. ePrint Arch. 2018: 1201 (2018) - 2017
- [j17]Yang-Wai Chow, Willy Susilo, James G. Phillips, Joonsang Baek, Elena Vlahu-Gjorgievska:
Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(3): 18-35 (2017) - [j16]Joonsang Baek, Eman Hableel, Young-Ji Byon, Duncan S. Wong, Kitae Jang, Hwasoo Yeo:
How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption. IEEE Trans. Intell. Transp. Syst. 18(3): 690-700 (2017) - [j15]Anjia Yang, Xiao Tan, Joonsang Baek, Duncan S. Wong:
A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification. IEEE Trans. Serv. Comput. 10(2): 165-175 (2017) - [j14]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Joonsang Baek, Mahmoud Al-Qutayri:
Lightweight Security Protocol for ECG Bio-Sensors. Wirel. Pers. Commun. 95(4): 5097-5120 (2017) - [c45]Yang-Wai Chow, Willy Susilo, Joonsang Baek:
Covert QR Codes: How to Hide in the Crowd. ISPEC 2017: 678-693 - [e2]Joonsang Baek, Rui Zhang:
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017. ACM 2017, ISBN 978-1-4503-4973-4 [contents] - 2016
- [j13]Joonsang Baek, Duncan S. Wong, Jin Li, Man Ho Au:
Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction. Comput. J. 59(4): 508-521 (2016) - [j12]Joonsang Baek, Ilsun You:
Efficient Subversion of Symmetric Encryption with Random Initialization Vector. IEICE Trans. Inf. Syst. 99-D(4): 1251-1254 (2016) - [c44]Sanaah Al Salami, Joonsang Baek, Khaled Salah, Ernesto Damiani:
Lightweight Encryption for Smart Home. ARES 2016: 382-388 - [c43]Fatema Al Mansoori, Joonsang Baek, Khaled Salah:
Subverting MAC: How authentication in mobile environment can be undermined. INFOCOM Workshops 2016: 870-874 - 2015
- [j11]Lingling Xu, Jin Li, Shaohua Tang, Joonsang Baek:
Server-Aided Verification Signature with Privacy for Mobile Computing. Mob. Inf. Syst. 2015: 626415:1-626415:11 (2015) - [j10]Joonsang Baek, Young-Ji Byon, Eman Hableel, Mahmoud Al-Qutayri:
Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature. Secur. Commun. Networks 8(5): 740-750 (2015) - [j9]Joonsang Baek, Quang Hieu Vu, Joseph K. Liu, Xinyi Huang, Yang Xiang:
A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid. IEEE Trans. Cloud Comput. 3(2): 233-244 (2015) - [c42]Abdulhadi Shoufan, Hassan Alnoon, Joonsang Baek:
Secure Communication in Civil Drones. ICISSP (Revised Selected Papers) 2015: 177-195 - [c41]Abdulhadi Shoufan, Hassan Alnoon, Joonsang Baek:
On the Power Consumption of Cryptographic Processors in Civil Microdrones. ICISSP 2015: 283-290 - [c40]Eman Hableel, Joonsang Baek, Young-Ji Byon, Duncan S. Wong:
How to protect ADS-B: Confidentiality framework for future air traffic communication. INFOCOM Workshops 2015: 155-160 - 2013
- [j8]Joonsang Baek, Quang Hieu Vu, Abdulhadi Shoufan, Andrew Jones, Duncan S. Wong:
Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure. Comput. J. 56(4): 497-507 (2013) - [j7]Noura Al Ebri, Joonsang Baek, Abdulhadi Shoufan, Quang Hieu Vu:
Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(1): 32-54 (2013) - [c39]Joonsang Baek, Young-Ji Byon, Eman Hableel, Mahmoud Al-Qutayri:
An Authentication Framework for Automatic Dependent Surveillance-Broadcast Based on Online/Offline Identity-Based Signature. 3PGCIC 2013: 358-363 - [c38]Young-Ji Byon, Young-Seon Jeong, Said M. Easa, Joonsang Baek:
Feasibility analysis of transportation applications based on APIs of social network services. ICITST 2013: 59-64 - [c37]Eman Hableel, Young-Ji Byon, Joonsang Baek:
Public key infrastructure for UAE: a case study. SIN 2013: 336-340 - 2012
- [j6]Jangseong Kim, Joonsang Baek, Jianying Zhou, Taeshik Shon:
An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments. IEICE Trans. Inf. Syst. 95-D(1): 117-125 (2012) - [c36]Noura Al Ebri, Joonsang Baek, Abdulhadi Shoufan, Quang Hieu Vu:
Efficient Generic Construction of Forward-Secure Identity-Based Signature. ARES 2012: 55-64 - [c35]Joonsang Baek, Quang Hieu Vu, Andrew Jones, Sameera Al-Mulla, Chan Yeob Yeun:
Smart-frame: A flexible, scalable, and secure information management framework for smart grids. ICITST 2012: 668-673 - 2011
- [j5]Jangseong Kim, Joonsang Baek, Taeshik Shon:
An efficient and scalable re-authentication protocol over wireless sensor network. IEEE Trans. Consumer Electron. 57(2): 516-522 (2011) - [c34]Joonsang Baek, Jianying Zhou:
Compact identity-based encryption without strong symmetric cipher. AsiaCCS 2011: 61-70 - [c33]Willy Susilo, Joonsang Baek:
On the security of the identity-based encryption based on DHIES from ASIACCS 2010. AsiaCCS 2011: 376-380 - [c32]Joonsang Baek, Cheng-Kang Chu, Jianying Zhou:
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes. CT-RSA 2011: 302-318 - [c31]Muna Abdulla Al Shehhi, Joonsang Baek, Chan Yeob Yeun:
The use of Boolean functions in stream ciphers. ICITST 2011: 29-33 - [c30]Noura Al Ebri, Joonsang Baek, Chan Yeob Yeun:
Study on Secret Sharing Schemes (SSS) and their applications. ICITST 2011: 40-45 - [c29]Ameera Salem Abdouli, Joonsang Baek, Chan Yeob Yeun:
Survey on computationally hard problems and their applications to cryptography. ICITST 2011: 46-52 - [c28]Hajer Al Housani, Joonsang Baek, Chan Yeob Yeun:
Survey on certificateless public key cryptography. ICITST 2011: 53-58 - 2010
- [j4]Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong:
Efficient online/offline identity-based signature for wireless sensor network. Int. J. Inf. Sec. 9(4): 287-296 (2010) - [j3]Ying Qiu, Jianying Zhou, Joonsang Baek, Javier López:
Authentication and Key Establishment in Dynamic Wireless Sensor Networks. Sensors 10(4): 3718-3731 (2010) - [c27]Joseph K. Liu, Joonsang Baek, Jianying Zhou:
Online/Offline Identity-Based Signcryption Revisited. Inscrypt 2010: 36-51 - [c26]Jangseong Kim, Joonsang Baek, Kwangjo Kim, Jianying Zhou:
A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments. EuroPKI 2010: 45-60 - [p1]Joonsang Baek, Ron Steinfeld:
Security for Signcryption: The Multi-User Model. Practical Signcryption 2010: 43-53 - [i7]Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong:
Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network. IACR Cryptol. ePrint Arch. 2010: 3 (2010) - [i6]Joseph K. Liu, Joonsang Baek, Jianying Zhou:
Online/Offline Identity-Based Signcryption Revisited. IACR Cryptol. ePrint Arch. 2010: 274 (2010)
2000 – 2009
- 2009
- [c25]Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou:
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. ACNS 2009: 143-155 - [c24]Joseph K. Liu, Joonsang Baek, Jianying Zhou:
Certificate-based sequential aggregate signature. WISEC 2009: 21-28 - 2008
- [c23]Joonsang Baek, Jianying Zhou, Feng Bao:
Generic Constructions of Stateful Public Key Encryption and Their Applications. ACNS 2008: 75-93 - [c22]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo:
Public Key Encryption with Keyword Search Revisited. ICCSA (1) 2008: 1249-1259 - [c21]Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou:
Certificate-Based Signature Schemes without Pairings or Random Oracles. ISC 2008: 285-297 - [c20]Joonsang Baek, David Galindo, Willy Susilo, Jianying Zhou:
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). SCN 2008: 358-374 - [c19]Joonsang Baek, Han Chiang Tan, Jianying Zhou, Jun Wen Wong:
Realizing Stateful Public Key Encryption in Wireless Sensor Network. SEC 2008: 95-107 - [e1]Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai:
Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings. Lecture Notes in Computer Science 5324, Springer 2008, ISBN 978-3-540-88732-4 [contents] - [i5]Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou:
Certificate-Based Signature Schemes without Pairings or Random Oracles. IACR Cryptol. ePrint Arch. 2008: 275 (2008) - [i4]Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou:
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. IACR Cryptol. ePrint Arch. 2008: 449 (2008) - 2007
- [j2]Joonsang Baek, Ron Steinfeld, Yuliang Zheng:
Formal Proofs for the Security of Signcryption. J. Cryptol. 20(2): 203-235 (2007) - [c18]Yinxia Sun, Futai Zhang, Joonsang Baek:
Strongly Secure Certificateless Public Key Encryption Without Pairing. CANS 2007: 194-208 - [c17]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek:
Concurrently-secure credential ownership proofs. AsiaCCS 2007: 161-172 - [c16]Joonsang Baek, Willy Susilo, Jianying Zhou:
New constructions of fuzzy identity-based encryption. AsiaCCS 2007: 368-370 - [c15]Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao:
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. Public Key Cryptography 2007: 43-60 - [i3]Joonsang Baek, Willy Susilo, Jianying Zhou:
New Constructions of Fuzzy Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2007: 47 (2007) - 2006
- [c14]Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo:
Self-organised group key management for ad hoc networks. AsiaCCS 2006: 138-147 - [c13]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo:
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. ISC 2006: 217-232 - 2005
- [c12]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo:
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). ASIACRYPT 2005: 644-661 - [c11]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo:
Token-Controlled Public Key Encryption. ISPEC 2005: 386-397 - [c10]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo:
Certificateless Public Key Encryption Without Pairing. ISC 2005: 134-148 - [c9]Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen:
Server-Aided RSA Key Generation Against Collusion Attack. MADNES 2005: 27-37 - [c8]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo:
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Public Key Cryptography 2005: 380-397 - [i2]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo:
Public Key Encryption with Keyword Search Revisited. IACR Cryptol. ePrint Arch. 2005: 191 (2005) - 2004
- [c7]Joonsang Baek, Yuliang Zheng:
Identity-Based Threshold Signature Scheme from the Bilinear Pairings. ITCC (1) 2004: 124-128 - [c6]Joonsang Baek, Yuliang Zheng:
Identity-Based Threshold Decryption. Public Key Cryptography 2004: 262-276 - 2003
- [j1]Joonsang Baek, Yuliang Zheng:
Zheng and Seberry's public key encryption scheme revisited. Int. J. Inf. Sec. 2(1): 37-44 (2003) - [c5]Joonsang Baek, Yuliang Zheng:
Simple and efficient threshold cryptosystem from the Gap Diffie-Hellman group. GLOBECOM 2003: 1491-1495 - [i1]Joonsang Baek, Yuliang Zheng:
Identity-Based Threshold Decryption. IACR Cryptol. ePrint Arch. 2003: 164 (2003) - 2002
- [c4]Ron Steinfeld, Joonsang Baek, Yuliang Zheng:
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. ACISP 2002: 241-256 - [c3]Joonsang Baek, Ron Steinfeld, Yuliang Zheng:
Formal Proofs for the Security of Signcryption. Public Key Cryptography 2002: 80-98 - 2000
- [c2]Joonsang Baek, Byoungcheon Lee, Kwangjo Kim:
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. ACISP 2000: 49-58
1990 – 1999
- 1999
- [c1]Kwangjo Kim, Sangjoon Park, Joonsang Baek:
Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. ICPP Workshops 1999: 140-145
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint