default search action
BibTeX records: Joonsang Baek
@article{DBLP:journals/sensors/YouKSKKB24, author = {Ilsun You and Gunwoo Kim and Seonghan Shin and Hoseok Kwon and Jongkil Kim and Joonsang Baek}, title = {5G-AKA-FS: {A} 5G Authentication and Key Agreement Protocol for Forward Secrecy}, journal = {Sensors}, volume = {24}, number = {1}, pages = {159}, year = {2024}, url = {https://doi.org/10.3390/s24010159}, doi = {10.3390/S24010159}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/YouKSKKB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GeSLBLF24, author = {Chunpeng Ge and Willy Susilo and Zhe Liu and Joonsang Baek and Xiapu Luo and Liming Fang}, title = {Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {949--960}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3265979}, doi = {10.1109/TDSC.2023.3265979}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GeSLBLF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/ZongCSBKC24, author = {Wei Zong and Yang{-}Wai Chow and Willy Susilo and Joonsang Baek and Jongkil Kim and Seyit Camtepe}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {IPRemover: {A} Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {7837--7845}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i7.28619}, doi = {10.1609/AAAI.V38I7.28619}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/ZongCSBKC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KimSBKC23, author = {Intae Kim and Willy Susilo and Joonsang Baek and Jongkil Kim and Yang{-}Wai Chow}, title = {{PCSF:} Privacy-Preserving Content-Based Spam Filter}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {2856--2869}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3255172}, doi = {10.1109/TIFS.2023.3255172}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KimSBKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmturc/GeS0BL023, author = {Chunpeng Ge and Willy Susilo and Zhe Liu and Joonsang Baek and Xiapu Luo and Liming Fang}, title = {Attribute-based Proxy Re-encryption with Direct Revocation Mechanism for Data Sharing in Clouds}, booktitle = {Proceedings of the {ACM} Turing Award Celebration Conference - China 2023, {ACM} {TURC} 2023, Wuhan, China, July 28-30, 2023}, pages = {164--165}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3603165.3607460}, doi = {10.1145/3603165.3607460}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acmturc/GeS0BL023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/TaylorLBS23, author = {Jacob Neil Taylor and Ngoc{-}Thuy Le and Joonsang Baek and Willy Susilo}, title = {Hyron: {A} New Approach for Automating the Network {ACL} Delivery Pipeline}, booktitle = {32nd International Conference on Computer Communications and Networks, {ICCCN} 2023, Honolulu, HI, USA, July 24-27, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCN58024.2023.10230146}, doi = {10.1109/ICCCN58024.2023.10230146}, timestamp = {Sat, 10 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccn/TaylorLBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LiuBS23, author = {Xin Liu and Joonsang Baek and Willy Susilo}, editor = {Elias Athanasopoulos and Bart Mennink}, title = {Withdrawable Signature: How to Call Off a Signature}, booktitle = {Information Security - 26th International Conference, {ISC} 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14411}, pages = {557--577}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-49187-0\_28}, doi = {10.1007/978-3-031-49187-0\_28}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/LiuBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuBS23, author = {Xin Liu and Joonsang Baek and Willy Susilo}, title = {Withdrawable Signature: How to Call off a Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1621}, year = {2023}, url = {https://eprint.iacr.org/2023/1621}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KimCSBK22, author = {Jongkil Kim and Yang{-}Wai Chow and Willy Susilo and Joonsang Baek and Intae Kim}, title = {Functional Encryption for Pattern Matching with a Hidden String}, journal = {Cryptogr.}, volume = {6}, number = {1}, pages = {1}, year = {2022}, url = {https://doi.org/10.3390/cryptography6010001}, doi = {10.3390/CRYPTOGRAPHY6010001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KimCSBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KimSBK22, author = {Intae Kim and Willy Susilo and Joonsang Baek and Jongkil Kim}, title = {Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {3}, pages = {1856--1870}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3040712}, doi = {10.1109/TDSC.2020.3040712}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KimSBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GeSBLXF22, author = {Chunpeng Ge and Willy Susilo and Joonsang Baek and Zhe Liu and Jinyue Xia and Liming Fang}, title = {Revocable Attribute-Based Encryption With Data Integrity in Clouds}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {2864--2872}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3065999}, doi = {10.1109/TDSC.2021.3065999}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GeSBLXF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GeSBLXF22a, author = {Chunpeng Ge and Willy Susilo and Joonsang Baek and Zhe Liu and Jinyue Xia and Liming Fang}, title = {A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {2907--2919}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3076580}, doi = {10.1109/TDSC.2021.3076580}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GeSBLXF22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangSB22, author = {Junjie Jiang and Willy Susilo and Joonsang Baek}, title = {Security Analysis of "SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {3006--3007}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3198858}, doi = {10.1109/TIFS.2022.3198858}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiangSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimSBKC22, author = {Intae Kim and Willy Susilo and Joonsang Baek and Jongkil Kim and Yang{-}Wai Chow}, editor = {Ilsun You and Taek{-}Young Youn}, title = {{TLS} Goes Low Cost: When {TLS} Meets Edge}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {102--113}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_8}, doi = {10.1007/978-3-031-25659-2\_8}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimSBKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChowSWBBKL21, author = {Yang{-}Wai Chow and Willy Susilo and Jianfeng Wang and Richard Buckland and Joonsang Baek and Jongkil Kim and Nan Li}, title = {Utilizing {QR} codes to verify the visual fidelity of image datasets for machine learning}, journal = {J. Netw. Comput. Appl.}, volume = {173}, pages = {102834}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2020.102834}, doi = {10.1016/J.JNCA.2020.102834}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ChowSWBBKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChowSBKZ21, author = {Yang{-}Wai Chow and Willy Susilo and Joonsang Baek and Jongkil Kim and Wei Zong}, title = {Exploiting {QR} Code Error Correction for Digital Image Watermarking}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {2}, pages = {114--140}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.06.30.114}, doi = {10.22667/JOWUA.2021.06.30.114}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChowSBKZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/KimCBSPN21, author = {Jongkil Kim and Seyit Camtepe and Joonsang Baek and Willy Susilo and Josef Pieprzyk and Surya Nepal}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {{P2DPI:} Practical and Privacy-Preserving Deep Packet Inspection}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {135--146}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3437525}, doi = {10.1145/3433210.3437525}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiaccs/KimCBSPN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiuSB21, author = {Xin Liu and Willy Susilo and Joonsang Baek}, editor = {Hyoungshick Kim}, title = {Secure Computation of Shared Secrets and Its Applications}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {119--131}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_10}, doi = {10.1007/978-3-030-89432-0\_10}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LiuSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimSCBK21, author = {Jongkil Kim and Willy Susilo and Yang{-}Wai Chow and Joonsang Baek and Intae Kim}, editor = {Hyoungshick Kim}, title = {Pattern Matching over Encrypted Data with a Short Ciphertext}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {132--143}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_11}, doi = {10.1007/978-3-030-89432-0\_11}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimSCBK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2021, editor = {Joonsang Baek and Sushmita Ruj}, title = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5}, doi = {10.1007/978-3-030-90567-5}, isbn = {978-3-030-90566-8}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimCBSPN21, author = {Jongkil Kim and Seyit Camtepe and Joonsang Baek and Willy Susilo and Josef Pieprzyk and Surya Nepal}, title = {{P2DPI:} Practical and Privacy-Preserving Deep Packet Inspection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {789}, year = {2021}, url = {https://eprint.iacr.org/2021/789}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimCBSPN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Thorncharoensri20, author = {Pairat Thorncharoensri and Willy Susilo and Joonsang Baek}, title = {Aggregatable Certificateless Designated Verifier Signature}, journal = {{IEEE} Access}, volume = {8}, pages = {95019--95031}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2987336}, doi = {10.1109/ACCESS.2020.2987336}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Thorncharoensri20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/DuttaSDBR20, author = {Priyanka Dutta and Willy Susilo and Dung Hoang Duong and Joonsang Baek and Partha Sarathi Roy}, title = {Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {4}, pages = {1--22}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.11.30.001}, doi = {10.22667/JISIS.2020.11.30.001}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/DuttaSDBR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KimHSBK20, author = {Intae Kim and Seong Oun Hwang and Willy Susilo and Joonsang Baek and Jongkil Kim}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {Efficient Anonymous Multi-group Broadcast Encryption}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12146}, pages = {251--270}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57808-4\_13}, doi = {10.1007/978-3-030-57808-4\_13}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KimHSBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BaekKS20, author = {Joonsang Baek and Jongkil Kim and Willy Susilo}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Inspecting {TLS} Anytime Anywhere: {A} New Approach to {TLS} Interception}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {116--126}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3372199}, doi = {10.1145/3320269.3372199}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BaekKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/DuttaSDB020, author = {Priyanka Dutta and Willy Susilo and Dung Hoang Duong and Joonsang Baek and Partha Sarathi Roy}, editor = {Ilsun You}, title = {Identity-Based Unidirectional Proxy Re-encryption in Standard Model: {A} Lattice-Based Construction}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {245--257}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_19}, doi = {10.1007/978-3-030-65299-9\_19}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/DuttaSDB020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-06741, author = {Priyanka Dutta and Willy Susilo and Dung Hoang Duong and Joonsang Baek and Partha Sarathi Roy}, title = {Lattice-based Unidirectional {IBPRE} Secure in Standard Model}, journal = {CoRR}, volume = {abs/2005.06741}, year = {2020}, url = {https://arxiv.org/abs/2005.06741}, eprinttype = {arXiv}, eprint = {2005.06741}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-06741.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BaekSKC19, author = {Joonsang Baek and Willy Susilo and Jongkil Kim and Yang{-}Wai Chow}, title = {Subversion in Practice: How to Efficiently Undermine Signatures}, journal = {{IEEE} Access}, volume = {7}, pages = {68799--68811}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2918550}, doi = {10.1109/ACCESS.2019.2918550}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/BaekSKC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BaekSK19, author = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {Guest Editorial: Security and Privacy for Contemporary Network Computing Environment}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {1}, pages = {1--3}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.03.31.001}, doi = {10.22667/JOWUA.2019.03.31.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BaekSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/EslamiNB19, author = {Ziba Eslami and Mahnaz Noroozi and Joonsang Baek}, title = {On the Security of a Privacy-Preserving Ranked Multi-Keyword Search Scheme}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {1}, pages = {75--85}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.03.31.075}, doi = {10.22667/JOWUA.2019.03.31.075}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/EslamiNB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Thorncharoensri19, author = {Pairat Thorncharoensri and Willy Susilo and Joonsang Baek}, title = {Efficient Controlled Signature for a Large Network with Multi Security-level Setting}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {3}, pages = {1--20}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.09.30.001}, doi = {10.22667/JOWUA.2019.09.30.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Thorncharoensri19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/WangSBKK19, author = {Yang Wang and Willy Susilo and Joonsang Baek and Jongkil Kim and Intae Kim}, title = {Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {4}, pages = {68--87}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.12.31.068}, doi = {10.22667/JOWUA.2019.12.31.068}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/WangSBKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/WangWSLSBYC19, author = {Yunling Wang and Jianfeng Wang and Shifeng Sun and Joseph K. Liu and Willy Susilo and Joonsang Baek and Ilsun You and Xiaofeng Chen}, title = {Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption}, journal = {J. Univers. Comput. Sci.}, volume = {25}, number = {3}, pages = {222--244}, year = {2019}, url = {http://www.jucs.org/jucs\_25\_3/towards\_multi\_user\_searchable}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/WangWSLSBYC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimSBNL19, author = {Jongkil Kim and Willy Susilo and Joonsang Baek and Surya Nepal and Dongxi Liu}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Ciphertext-Delegatable {CP-ABE} for a Dynamic Credential: {A} Modular Approach}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {3--20}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_1}, doi = {10.1007/978-3-030-21548-4\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimSBNL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KimSGB019, author = {Jongkil Kim and Willy Susilo and Fuchun Guo and Joonsang Baek and Nan Li}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {406--425}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_20}, doi = {10.1007/978-3-030-21568-2\_20}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KimSGB019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimCSNB19, author = {Jongkil Kim and Seyit Camtepe and Willy Susilo and Surya Nepal and Joonsang Baek}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {55--66}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329825}, doi = {10.1145/3321705.3329825}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KimCSNB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/ChowSWBBK019, author = {Yang{-}Wai Chow and Willy Susilo and Jianfeng Wang and Richard Buckland and Joonsang Baek and Jongkil Kim and Nan Li}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Protecting the Visual Fidelity of Machine Learning Datasets Using {QR} Codes}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {320--335}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_23}, doi = {10.1007/978-3-030-30619-9\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/ChowSWBBK019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/SyalimABGY19, author = {Amril Syalim and Bayu Anggorojati and Joonsang Baek and Daniel Gerbi and Ilsun You}, editor = {Ilsun You and Hsing{-}Chung Chen and Fang{-}Yie Leu and Igor V. Kotenko}, title = {Aggregate Authentication for Massive Internet of Things in 5G Networks}, booktitle = {Mobile Internet Security - 4th International Symposium, MobiSec 2019, Taichung, Taiwan, October 17-19, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1121}, pages = {3--12}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-9609-4\_1}, doi = {10.1007/978-981-15-9609-4\_1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec2/SyalimABGY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChowSBK19, author = {Yang{-}Wai Chow and Willy Susilo and Joonsang Baek and Jongkil Kim}, editor = {Ilsun You}, title = {{QR} Code Watermarking for Digital Images}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {25--37}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_3}, doi = {10.1007/978-3-030-39303-8\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChowSBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimBSC19, author = {Jongkil Kim and Joonsang Baek and Willy Susilo and Yang{-}Wai Chow}, editor = {Ilsun You}, title = {Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {206--216}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_16}, doi = {10.1007/978-3-030-39303-8\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimBSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/BaekSSHDY19, author = {Joonsang Baek and Willy Susilo and Khaled Salah and Jun Su Ha and Ernesto Damiani and Ilsun You}, editor = {Kuan{-}Ching Li and Xiaofeng Chen and Willy Susilo}, title = {Stateful Public-Key Encryption: {A} Security Solution for Resource-Constrained Environment}, booktitle = {Advances in Cyber Security: Principles, Techniques, and Applications}, pages = {1--22}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-1483-4\_1}, doi = {10.1007/978-981-13-1483-4\_1}, timestamp = {Thu, 14 Oct 2021 08:45:55 +0200}, biburl = {https://dblp.org/rec/books/sp/18/BaekSSHDY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimSGB019, author = {Jongkil Kim and Willy Susilo and Fuchun Guo and Joonsang Baek and Nan Li}, title = {A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1479}, year = {2019}, url = {https://eprint.iacr.org/2019/1479}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimSGB019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YouFBL18, author = {Ilsun You and Carol J. Fung and Joonsang Baek and Victor C. M. Leung}, title = {{IEEE} Access Special Section Editorial: Security and Privacy in Applications and Services for Future Internet of Things}, journal = {{IEEE} Access}, volume = {6}, pages = {39398--39400}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2855258}, doi = {10.1109/ACCESS.2018.2855258}, timestamp = {Thu, 04 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YouFBL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpcn/YangWB18, author = {Jin Yang and Liangming Wang and Joonsang Baek}, title = {A privacy preserving and fine-grained access control scheme in DaaS based on efficient {DSP} re-encryption}, journal = {Int. J. High Perform. Comput. Netw.}, volume = {11}, number = {3}, pages = {231--241}, year = {2018}, url = {https://doi.org/10.1504/IJHPCN.2018.10012999}, doi = {10.1504/IJHPCN.2018.10012999}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpcn/YangWB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/provsec/2018, editor = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11192}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01446-9}, doi = {10.1007/978-3-030-01446-9}, isbn = {978-3-030-01445-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaekSKC18, author = {Joonsang Baek and Willy Susilo and Jongkil Kim and Yang{-}Wai Chow}, title = {Subversion in Practice: How to Efficiently Undermine Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1201}, year = {2018}, url = {https://eprint.iacr.org/2018/1201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaekSKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChowSPBV17, author = {Yang{-}Wai Chow and Willy Susilo and James G. Phillips and Joonsang Baek and Elena Vlahu{-}Gjorgievska}, title = {Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {3}, pages = {18--35}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.09.30.018}, doi = {10.22667/JOWUA.2017.09.30.018}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChowSPBV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/BaekHBWJY17, author = {Joonsang Baek and Eman Hableel and Young{-}Ji Byon and Duncan S. Wong and Kitae Jang and Hwasoo Yeo}, title = {How to Protect {ADS-B:} Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {18}, number = {3}, pages = {690--700}, year = {2017}, url = {https://doi.org/10.1109/TITS.2016.2586301}, doi = {10.1109/TITS.2016.2586301}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/BaekHBWJY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/YangTBW17, author = {Anjia Yang and Xiao Tan and Joonsang Baek and Duncan S. Wong}, title = {A New {ADS-B} Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {10}, number = {2}, pages = {165--175}, year = {2017}, url = {https://doi.org/10.1109/TSC.2015.2459709}, doi = {10.1109/TSC.2015.2459709}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/YangTBW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/HamadiGBA17, author = {Hussam M. N. Al Hamadi and Amjad Gawanmeh and Joonsang Baek and Mahmoud Al{-}Qutayri}, title = {Lightweight Security Protocol for {ECG} Bio-Sensors}, journal = {Wirel. Pers. Commun.}, volume = {95}, number = {4}, pages = {5097--5120}, year = {2017}, url = {https://doi.org/10.1007/s11277-017-4147-x}, doi = {10.1007/S11277-017-4147-X}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/HamadiGBA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ChowSB17, author = {Yang{-}Wai Chow and Willy Susilo and Joonsang Baek}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Covert {QR} Codes: How to Hide in the Crowd}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {678--693}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_42}, doi = {10.1007/978-3-319-72359-4\_42}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ChowSB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2017asiapkc, editor = {Joonsang Baek and Rui Zhang}, title = {Proceedings of the 4th {ACM} International Workshop on {ASIA} Public-Key Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055504}, doi = {10.1145/3055504}, isbn = {978-1-4503-4973-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2017asiapkc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BaekWLA16, author = {Joonsang Baek and Duncan S. Wong and Jin Li and Man Ho Au}, title = {Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction}, journal = {Comput. J.}, volume = {59}, number = {4}, pages = {508--521}, year = {2016}, url = {https://doi.org/10.1093/comjnl/bxv070}, doi = {10.1093/COMJNL/BXV070}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BaekWLA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/BaekY16, author = {Joonsang Baek and Ilsun You}, title = {Efficient Subversion of Symmetric Encryption with Random Initialization Vector}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {4}, pages = {1251--1254}, year = {2016}, url = {https://doi.org/10.1587/transinf.2015EDL8224}, doi = {10.1587/TRANSINF.2015EDL8224}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/BaekY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SalamiBSD16, author = {Sanaah Al Salami and Joonsang Baek and Khaled Salah and Ernesto Damiani}, title = {Lightweight Encryption for Smart Home}, booktitle = {11th International Conference on Availability, Reliability and Security, {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016}, pages = {382--388}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ARES.2016.40}, doi = {10.1109/ARES.2016.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SalamiBSD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/MansooriBS16, author = {Fatema Al Mansoori and Joonsang Baek and Khaled Salah}, title = {Subverting {MAC:} How authentication in mobile environment can be undermined}, booktitle = {{IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {870--874}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFCOMW.2016.7562200}, doi = {10.1109/INFCOMW.2016.7562200}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/MansooriBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/XuLTB15, author = {Lingling Xu and Jin Li and Shaohua Tang and Joonsang Baek}, title = {Server-Aided Verification Signature with Privacy for Mobile Computing}, journal = {Mob. Inf. Syst.}, volume = {2015}, pages = {626415:1--626415:11}, year = {2015}, url = {https://doi.org/10.1155/2015/626415}, doi = {10.1155/2015/626415}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/XuLTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BaekBHA15, author = {Joonsang Baek and Young{-}Ji Byon and Eman Hableel and Mahmoud Al{-}Qutayri}, title = {Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast {(ADS-B)} based on online/offline identity-based signature}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {740--750}, year = {2015}, url = {https://doi.org/10.1002/sec.1021}, doi = {10.1002/SEC.1021}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BaekBHA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/BaekVLHX15, author = {Joonsang Baek and Quang Hieu Vu and Joseph K. Liu and Xinyi Huang and Yang Xiang}, title = {A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {3}, number = {2}, pages = {233--244}, year = {2015}, url = {https://doi.org/10.1109/TCC.2014.2359460}, doi = {10.1109/TCC.2014.2359460}, timestamp = {Thu, 24 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/BaekVLHX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ShoufanAB15a, author = {Abdulhadi Shoufan and Hassan Alnoon and Joonsang Baek}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Secure Communication in Civil Drones}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {177--195}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_11}, doi = {10.1007/978-3-319-27668-7\_11}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ShoufanAB15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ShoufanAB15, author = {Abdulhadi Shoufan and Hassan Alnoon and Joonsang Baek}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {On the Power Consumption of Cryptographic Processors in Civil Microdrones}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {283--290}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005273402830290}, doi = {10.5220/0005273402830290}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ShoufanAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HableelBBW15, author = {Eman Hableel and Joonsang Baek and Young{-}Ji Byon and Duncan S. Wong}, title = {How to protect {ADS-B:} Confidentiality framework for future air traffic communication}, booktitle = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops, Hong Kong, China, April 26 - May 1, 2015}, pages = {155--160}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFCOMW.2015.7179377}, doi = {10.1109/INFCOMW.2015.7179377}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/HableelBBW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BaekVSJW13, author = {Joonsang Baek and Quang Hieu Vu and Abdulhadi Shoufan and Andrew Jones and Duncan S. Wong}, title = {Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure}, journal = {Comput. J.}, volume = {56}, number = {4}, pages = {497--507}, year = {2013}, url = {https://doi.org/10.1093/comjnl/bxs151}, doi = {10.1093/COMJNL/BXS151}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/BaekVSJW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/EbriBSV13, author = {Noura Al Ebri and Joonsang Baek and Abdulhadi Shoufan and Quang Hieu Vu}, title = {Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {32--54}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.032}, doi = {10.22667/JOWUA.2013.03.31.032}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/EbriBSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/BaekBHA13, author = {Joonsang Baek and Young{-}Ji Byon and Eman Hableel and Mahmoud Al{-}Qutayri}, editor = {Fatos Xhafa and Leonard Barolli and Dritan Nace and Salvatore Venticinque and Alain Bui}, title = {An Authentication Framework for Automatic Dependent Surveillance-Broadcast Based on Online/Offline Identity-Based Signature}, booktitle = {Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2013, Compiegne, France, October 28-30, 2013}, pages = {358--363}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/3PGCIC.2013.61}, doi = {10.1109/3PGCIC.2013.61}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/3pgcic/BaekBHA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ByonJEB13, author = {Young{-}Ji Byon and Young{-}Seon Jeong and Said M. Easa and Joonsang Baek}, title = {Feasibility analysis of transportation applications based on APIs of social network services}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {59--64}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750162}, doi = {10.1109/ICITST.2013.6750162}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ByonJEB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/HableelBB13, author = {Eman Hableel and Young{-}Ji Byon and Joonsang Baek}, editor = {Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Oleg B. Makarevich}, title = {Public key infrastructure for {UAE:} a case study}, booktitle = {The 6th International Conference on Security of Information and Networks, {SIN} '13, Aksaray, Turkey, November 26-28, 2013}, pages = {336--340}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523514.2527099}, doi = {10.1145/2523514.2527099}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/HableelBB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimBZS12, author = {Jangseong Kim and Joonsang Baek and Jianying Zhou and Taeshik Shon}, title = {An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {95-D}, number = {1}, pages = {117--125}, year = {2012}, url = {https://doi.org/10.1587/transinf.E95.D.117}, doi = {10.1587/TRANSINF.E95.D.117}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimBZS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/EbriBSV12, author = {Noura Al Ebri and Joonsang Baek and Abdulhadi Shoufan and Quang Hieu Vu}, title = {Efficient Generic Construction of Forward-Secure Identity-Based Signature}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {55--64}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.53}, doi = {10.1109/ARES.2012.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/EbriBSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BaekVJAY12, author = {Joonsang Baek and Quang Hieu Vu and Andrew Jones and Sameera Al{-}Mulla and Chan Yeob Yeun}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Smart-frame: {A} flexible, scalable, and secure information management framework for smart grids}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {668--673}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470900/}, timestamp = {Thu, 10 Mar 2022 09:31:39 +0100}, biburl = {https://dblp.org/rec/conf/icitst/BaekVJAY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/KimBS11, author = {Jangseong Kim and Joonsang Baek and Taeshik Shon}, title = {An efficient and scalable re-authentication protocol over wireless sensor network}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {57}, number = {2}, pages = {516--522}, year = {2011}, url = {https://doi.org/10.1109/TCE.2011.5955187}, doi = {10.1109/TCE.2011.5955187}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/KimBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BaekZ11, author = {Joonsang Baek and Jianying Zhou}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {Compact identity-based encryption without strong symmetric cipher}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {61--70}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966923}, doi = {10.1145/1966913.1966923}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BaekZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SusiloB11, author = {Willy Susilo and Joonsang Baek}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {On the security of the identity-based encryption based on {DHIES} from {ASIACCS} 2010}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {376--380}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966962}, doi = {10.1145/1966913.1966962}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SusiloB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BaekCZ11, author = {Joonsang Baek and Cheng{-}Kang Chu and Jianying Zhou}, editor = {Aggelos Kiayias}, title = {On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {302--318}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_20}, doi = {10.1007/978-3-642-19074-2\_20}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BaekCZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShehhiBY11, author = {Muna Abdulla Al Shehhi and Joonsang Baek and Chan Yeob Yeun}, title = {The use of Boolean functions in stream ciphers}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {29--33}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148355/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShehhiBY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EbriBY11, author = {Noura Al Ebri and Joonsang Baek and Chan Yeob Yeun}, title = {Study on Secret Sharing Schemes {(SSS)} and their applications}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {40--45}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148357/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/EbriBY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbdouliBY11, author = {Ameera Salem Abdouli and Joonsang Baek and Chan Yeob Yeun}, title = {Survey on computationally hard problems and their applications to cryptography}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {46--52}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148358/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbdouliBY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HousaniBY11, author = {Hajer Al Housani and Joonsang Baek and Chan Yeob Yeun}, title = {Survey on certificateless public key cryptography}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {53--58}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148359/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HousaniBY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LiuBZYW10, author = {Joseph K. Liu and Joonsang Baek and Jianying Zhou and Yanjiang Yang and Jun Wen Wong}, title = {Efficient online/offline identity-based signature for wireless sensor network}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {4}, pages = {287--296}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0109-y}, doi = {10.1007/S10207-010-0109-Y}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LiuBZYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/QiuZBL10, author = {Ying Qiu and Jianying Zhou and Joonsang Baek and Javier L{\'{o}}pez}, title = {Authentication and Key Establishment in Dynamic Wireless Sensor Networks}, journal = {Sensors}, volume = {10}, number = {4}, pages = {3718--3731}, year = {2010}, url = {https://doi.org/10.3390/s100403718}, doi = {10.3390/S100403718}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/QiuZBL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiuBZ10, author = {Joseph K. Liu and Joonsang Baek and Jianying Zhou}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Online/Offline Identity-Based Signcryption Revisited}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {36--51}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_3}, doi = {10.1007/978-3-642-21518-6\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiuBZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/KimBKZ10, author = {Jangseong Kim and Joonsang Baek and Kwangjo Kim and Jianying Zhou}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {45--60}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_4}, doi = {10.1007/978-3-642-22633-5\_4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/KimBKZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BaekS10, author = {Joonsang Baek and Ron Steinfeld}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Security for Signcryption: The Multi-User Model}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {43--53}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_3}, doi = {10.1007/978-3-540-89411-7\_3}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/series/isc/BaekS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuBZYW10, author = {Joseph K. Liu and Joonsang Baek and Jianying Zhou and Yanjiang Yang and Jun Wen Wong}, title = {Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2010}, url = {http://eprint.iacr.org/2010/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuBZYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuBZ10, author = {Joseph K. Liu and Joonsang Baek and Jianying Zhou}, title = {Online/Offline Identity-Based Signcryption Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {274}, year = {2010}, url = {http://eprint.iacr.org/2010/274}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuBZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BaekSLZ09, author = {Joonsang Baek and Willy Susilo and Joseph K. Liu and Jianying Zhou}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {A New Variant of the Cramer-Shoup {KEM} Secure against Chosen Ciphertext Attack}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {143--155}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_9}, doi = {10.1007/978-3-642-01957-9\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BaekSLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LiuBZ09, author = {Joseph K. Liu and Joonsang Baek and Jianying Zhou}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Certificate-based sequential aggregate signature}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {21--28}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514278}, doi = {10.1145/1514274.1514278}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LiuBZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BaekZB08, author = {Joonsang Baek and Jianying Zhou and Feng Bao}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Generic Constructions of Stateful Public Key Encryption and Their Applications}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {75--93}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_5}, doi = {10.1007/978-3-540-68914-0\_5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BaekZB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/BaekSS08, author = {Joonsang Baek and Reihaneh Safavi{-}Naini and Willy Susilo}, editor = {Osvaldo Gervasi and Beniamino Murgante and Antonio Lagan{\`{a}} and David Taniar and Youngsong Mun and Marina L. Gavrilova}, title = {Public Key Encryption with Keyword Search Revisited}, booktitle = {Computational Science and Its Applications - {ICCSA} 2008, International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {5072}, pages = {1249--1259}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69839-5\_96}, doi = {10.1007/978-3-540-69839-5\_96}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/BaekSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LiuBSZ08, author = {Joseph K. Liu and Joonsang Baek and Willy Susilo and Jianying Zhou}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {Certificate-Based Signature Schemes without Pairings or Random Oracles}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {285--297}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_20}, doi = {10.1007/978-3-540-85886-7\_20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/LiuBSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BaekGSZ08, author = {Joonsang Baek and David Galindo and Willy Susilo and Jianying Zhou}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Constructing Strong {KEM} from Weak {KEM} (or How to Revive the {KEM/DEM} Framework)}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {358--374}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_24}, doi = {10.1007/978-3-540-85855-3\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BaekGSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BaekTZW08, author = {Joonsang Baek and Han Chiang Tan and Jianying Zhou and Jun Wen Wong}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Realizing Stateful Public Key Encryption in Wireless Sensor Network}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {95--107}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_7}, doi = {10.1007/978-0-387-09699-5\_7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BaekTZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/provsec/2008, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1}, doi = {10.1007/978-3-540-88733-1}, isbn = {978-3-540-88732-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuBSZ08, author = {Joseph K. Liu and Joonsang Baek and Willy Susilo and Jianying Zhou}, title = {Certificate-Based Signature Schemes without Pairings or Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {275}, year = {2008}, url = {http://eprint.iacr.org/2008/275}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuBSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaekSLZ08, author = {Joonsang Baek and Willy Susilo and Joseph K. Liu and Jianying Zhou}, title = {A New Variant of the Cramer-Shoup {KEM} Secure against Chosen Ciphertext Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {449}, year = {2008}, url = {http://eprint.iacr.org/2008/449}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaekSLZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BaekSZ07, author = {Joonsang Baek and Ron Steinfeld and Yuliang Zheng}, title = {Formal Proofs for the Security of Signcryption}, journal = {J. Cryptol.}, volume = {20}, number = {2}, pages = {203--235}, year = {2007}, url = {https://doi.org/10.1007/s00145-007-0211-0}, doi = {10.1007/S00145-007-0211-0}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/BaekSZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SunZB07, author = {Yinxia Sun and Futai Zhang and Joonsang Baek}, editor = {Feng Bao and San Ling and Tatsuaki Okamoto and Huaxiong Wang and Chaoping Xing}, title = {Strongly Secure Certificateless Public Key Encryption Without Pairing}, booktitle = {Cryptology and Network Security, 6th International Conference, {CANS} 2007, Singapore, December 8-10, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4856}, pages = {194--208}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76969-9\_13}, doi = {10.1007/978-3-540-76969-9\_13}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/SunZB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShahandashtiSB07, author = {Siamak Fayyaz Shahandashti and Reihaneh Safavi{-}Naini and Joonsang Baek}, editor = {Feng Bao and Steven Miller}, title = {Concurrently-secure credential ownership proofs}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {161--172}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229309}, doi = {10.1145/1229285.1229309}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShahandashtiSB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BaekSZ07, author = {Joonsang Baek and Willy Susilo and Jianying Zhou}, editor = {Feng Bao and Steven Miller}, title = {New constructions of fuzzy identity-based encryption}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {368--370}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229330}, doi = {10.1145/1229285.1229330}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BaekSZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WangBWB07, author = {Guilin Wang and Joonsang Baek and Duncan S. Wong and Feng Bao}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {43--60}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_4}, doi = {10.1007/978-3-540-71677-8\_4}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WangBWB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaekSZ07, author = {Joonsang Baek and Willy Susilo and Jianying Zhou}, title = {New Constructions of Fuzzy Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2007}, url = {http://eprint.iacr.org/2007/047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaekSZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuoSBS06, author = {Ling Luo and Reihaneh Safavi{-}Naini and Joonsang Baek and Willy Susilo}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Self-organised group key management for ad hoc networks}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {138--147}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128839}, doi = {10.1145/1128817.1128839}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LuoSBS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BaekSS06, author = {Joonsang Baek and Reihaneh Safavi{-}Naini and Willy Susilo}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search}, booktitle = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, pages = {217--232}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810\_16}, doi = {10.1007/11836810\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BaekSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BaekSS05, author = {Joonsang Baek and Reihaneh Safavi{-}Naini and Willy Susilo}, editor = {Bimal K. Roy}, title = {Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature)}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {644--661}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_35}, doi = {10.1007/11593447\_35}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BaekSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/BaekSS05, author = {Joonsang Baek and Reihaneh Safavi{-}Naini and Willy Susilo}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Token-Controlled Public Key Encryption}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {386--397}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_33}, doi = {10.1007/978-3-540-31979-5\_33}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/BaekSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BaekSS05, author = {Joonsang Baek and Reihaneh Safavi{-}Naini and Willy Susilo}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {Certificateless Public Key Encryption Without Pairing}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {134--148}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_10}, doi = {10.1007/11556992\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BaekSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/madnes/ChenSBC05, author = {Yun Chen and Reihaneh Safavi{-}Naini and Joonsang Baek and Xin Chen}, editor = {Mike Burmester and Alec Yasinsac}, title = {Server-Aided {RSA} Key Generation Against Collusion Attack}, booktitle = {Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, {MADNES} 2005, Singapore, September 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4074}, pages = {27--37}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11801412\_4}, doi = {10.1007/11801412\_4}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/madnes/ChenSBC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BaekSS05, author = {Joonsang Baek and Reihaneh Safavi{-}Naini and Willy Susilo}, editor = {Serge Vaudenay}, title = {Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {380--397}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_26}, doi = {10.1007/978-3-540-30580-4\_26}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BaekSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaekSS05, author = {Joonsang Baek and Reihaneh Safavi{-}Naini and Willy Susilo}, title = {Public Key Encryption with Keyword Search Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2005}, url = {http://eprint.iacr.org/2005/191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaekSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/BaekZ04, author = {Joonsang Baek and Yuliang Zheng}, title = {Identity-Based Threshold Signature Scheme from the Bilinear Pairings}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {124--128}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286437}, doi = {10.1109/ITCC.2004.1286437}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/BaekZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BaekZ04, author = {Joonsang Baek and Yuliang Zheng}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Identity-Based Threshold Decryption}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {262--276}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_19}, doi = {10.1007/978-3-540-24632-9\_19}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BaekZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BaekZ03, author = {Joonsang Baek and Yuliang Zheng}, title = {Zheng and Seberry's public key encryption scheme revisited}, journal = {Int. J. Inf. Sec.}, volume = {2}, number = {1}, pages = {37--44}, year = {2003}, url = {https://doi.org/10.1007/s10207-003-0023-7}, doi = {10.1007/S10207-003-0023-7}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/BaekZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/BaekZ03, author = {Joonsang Baek and Yuliang Zheng}, title = {Simple and efficient threshold cryptosystem from the Gap Diffie-Hellman group}, booktitle = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM} '03, San Francisco, CA, USA, 1-5 December 2003}, pages = {1491--1495}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/GLOCOM.2003.1258486}, doi = {10.1109/GLOCOM.2003.1258486}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/BaekZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaekZ03, author = {Joonsang Baek and Yuliang Zheng}, title = {Identity-Based Threshold Decryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {164}, year = {2003}, url = {http://eprint.iacr.org/2003/164}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BaekZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SteinfeldBZ02, author = {Ron Steinfeld and Joonsang Baek and Yuliang Zheng}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {241--256}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_20}, doi = {10.1007/3-540-45450-0\_20}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SteinfeldBZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BaekSZ02, author = {Joonsang Baek and Ron Steinfeld and Yuliang Zheng}, editor = {David Naccache and Pascal Paillier}, title = {Formal Proofs for the Security of Signcryption}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {80--98}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_6}, doi = {10.1007/3-540-45664-3\_6}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BaekSZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaekLK00, author = {Joonsang Baek and Byoungcheon Lee and Kwangjo Kim}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {49--58}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_5}, doi = {10.1007/10718964\_5}, timestamp = {Sat, 19 Oct 2019 20:34:19 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BaekLK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icppw/KimPB99, author = {Kwangjo Kim and Sangjoon Park and Joonsang Baek}, title = {Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol}, booktitle = {Proceedings of the 1999 International Conference on Parallel Processing Workshops, {ICPPW} 1999, Wakamatsu, Japan, September 21-24, 1999}, pages = {140--145}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/ICPPW.1999.800053}, doi = {10.1109/ICPPW.1999.800053}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icppw/KimPB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.