BibTeX records: Joonsang Baek

download as .bib file

@article{DBLP:journals/sensors/YouKSKKB24,
  author       = {Ilsun You and
                  Gunwoo Kim and
                  Seonghan Shin and
                  Hoseok Kwon and
                  Jongkil Kim and
                  Joonsang Baek},
  title        = {5G-AKA-FS: {A} 5G Authentication and Key Agreement Protocol for Forward
                  Secrecy},
  journal      = {Sensors},
  volume       = {24},
  number       = {1},
  pages        = {159},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24010159},
  doi          = {10.3390/S24010159},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/YouKSKKB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GeSLBLF24,
  author       = {Chunpeng Ge and
                  Willy Susilo and
                  Zhe Liu and
                  Joonsang Baek and
                  Xiapu Luo and
                  Liming Fang},
  title        = {Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism
                  for Data Sharing in Clouds},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {949--960},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3265979},
  doi          = {10.1109/TDSC.2023.3265979},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GeSLBLF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/ZongCSBKC24,
  author       = {Wei Zong and
                  Yang{-}Wai Chow and
                  Willy Susilo and
                  Joonsang Baek and
                  Jongkil Kim and
                  Seyit Camtepe},
  editor       = {Michael J. Wooldridge and
                  Jennifer G. Dy and
                  Sriraam Natarajan},
  title        = {IPRemover: {A} Generative Model Inversion Attack against Deep Neural
                  Network Fingerprinting and Watermarking},
  booktitle    = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2024, Thirty-Sixth Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver,
                  Canada},
  pages        = {7837--7845},
  publisher    = {{AAAI} Press},
  year         = {2024},
  url          = {https://doi.org/10.1609/aaai.v38i7.28619},
  doi          = {10.1609/AAAI.V38I7.28619},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/ZongCSBKC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimSBKC23,
  author       = {Intae Kim and
                  Willy Susilo and
                  Joonsang Baek and
                  Jongkil Kim and
                  Yang{-}Wai Chow},
  title        = {{PCSF:} Privacy-Preserving Content-Based Spam Filter},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {2856--2869},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3255172},
  doi          = {10.1109/TIFS.2023.3255172},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KimSBKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acmturc/GeS0BL023,
  author       = {Chunpeng Ge and
                  Willy Susilo and
                  Zhe Liu and
                  Joonsang Baek and
                  Xiapu Luo and
                  Liming Fang},
  title        = {Attribute-based Proxy Re-encryption with Direct Revocation Mechanism
                  for Data Sharing in Clouds},
  booktitle    = {Proceedings of the {ACM} Turing Award Celebration Conference - China
                  2023, {ACM} {TURC} 2023, Wuhan, China, July 28-30, 2023},
  pages        = {164--165},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3603165.3607460},
  doi          = {10.1145/3603165.3607460},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acmturc/GeS0BL023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/TaylorLBS23,
  author       = {Jacob Neil Taylor and
                  Ngoc{-}Thuy Le and
                  Joonsang Baek and
                  Willy Susilo},
  title        = {Hyron: {A} New Approach for Automating the Network {ACL} Delivery
                  Pipeline},
  booktitle    = {32nd International Conference on Computer Communications and Networks,
                  {ICCCN} 2023, Honolulu, HI, USA, July 24-27, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCN58024.2023.10230146},
  doi          = {10.1109/ICCCN58024.2023.10230146},
  timestamp    = {Sat, 10 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/TaylorLBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LiuBS23,
  author       = {Xin Liu and
                  Joonsang Baek and
                  Willy Susilo},
  editor       = {Elias Athanasopoulos and
                  Bart Mennink},
  title        = {Withdrawable Signature: How to Call Off a Signature},
  booktitle    = {Information Security - 26th International Conference, {ISC} 2023,
                  Groningen, The Netherlands, November 15-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14411},
  pages        = {557--577},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-49187-0\_28},
  doi          = {10.1007/978-3-031-49187-0\_28},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/LiuBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuBS23,
  author       = {Xin Liu and
                  Joonsang Baek and
                  Willy Susilo},
  title        = {Withdrawable Signature: How to Call off a Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1621},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1621},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KimCSBK22,
  author       = {Jongkil Kim and
                  Yang{-}Wai Chow and
                  Willy Susilo and
                  Joonsang Baek and
                  Intae Kim},
  title        = {Functional Encryption for Pattern Matching with a Hidden String},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {1},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6010001},
  doi          = {10.3390/CRYPTOGRAPHY6010001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KimCSBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KimSBK22,
  author       = {Intae Kim and
                  Willy Susilo and
                  Joonsang Baek and
                  Jongkil Kim},
  title        = {Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based
                  Encryption},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {3},
  pages        = {1856--1870},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3040712},
  doi          = {10.1109/TDSC.2020.3040712},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KimSBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GeSBLXF22,
  author       = {Chunpeng Ge and
                  Willy Susilo and
                  Joonsang Baek and
                  Zhe Liu and
                  Jinyue Xia and
                  Liming Fang},
  title        = {Revocable Attribute-Based Encryption With Data Integrity in Clouds},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {2864--2872},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3065999},
  doi          = {10.1109/TDSC.2021.3065999},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GeSBLXF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GeSBLXF22a,
  author       = {Chunpeng Ge and
                  Willy Susilo and
                  Joonsang Baek and
                  Zhe Liu and
                  Jinyue Xia and
                  Liming Fang},
  title        = {A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for
                  Data Sharing in Clouds},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {2907--2919},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3076580},
  doi          = {10.1109/TDSC.2021.3076580},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GeSBLXF22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangSB22,
  author       = {Junjie Jiang and
                  Willy Susilo and
                  Joonsang Baek},
  title        = {Security Analysis of "SMAKA: Secure Many-to-Many Authentication
                  and Key Agreement Scheme for Vehicular Networks"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {3006--3007},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3198858},
  doi          = {10.1109/TIFS.2022.3198858},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimSBKC22,
  author       = {Intae Kim and
                  Willy Susilo and
                  Joonsang Baek and
                  Jongkil Kim and
                  Yang{-}Wai Chow},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {{TLS} Goes Low Cost: When {TLS} Meets Edge},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {102--113},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_8},
  doi          = {10.1007/978-3-031-25659-2\_8},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimSBKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ChowSWBBKL21,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  Jianfeng Wang and
                  Richard Buckland and
                  Joonsang Baek and
                  Jongkil Kim and
                  Nan Li},
  title        = {Utilizing {QR} codes to verify the visual fidelity of image datasets
                  for machine learning},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {173},
  pages        = {102834},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2020.102834},
  doi          = {10.1016/J.JNCA.2020.102834},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/ChowSWBBKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChowSBKZ21,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  Joonsang Baek and
                  Jongkil Kim and
                  Wei Zong},
  title        = {Exploiting {QR} Code Error Correction for Digital Image Watermarking},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {2},
  pages        = {114--140},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.06.30.114},
  doi          = {10.22667/JOWUA.2021.06.30.114},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChowSBKZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/KimCBSPN21,
  author       = {Jongkil Kim and
                  Seyit Camtepe and
                  Joonsang Baek and
                  Willy Susilo and
                  Josef Pieprzyk and
                  Surya Nepal},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {{P2DPI:} Practical and Privacy-Preserving Deep Packet Inspection},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {135--146},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3437525},
  doi          = {10.1145/3433210.3437525},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiaccs/KimCBSPN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LiuSB21,
  author       = {Xin Liu and
                  Willy Susilo and
                  Joonsang Baek},
  editor       = {Hyoungshick Kim},
  title        = {Secure Computation of Shared Secrets and Its Applications},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {119--131},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_10},
  doi          = {10.1007/978-3-030-89432-0\_10},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/LiuSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimSCBK21,
  author       = {Jongkil Kim and
                  Willy Susilo and
                  Yang{-}Wai Chow and
                  Joonsang Baek and
                  Intae Kim},
  editor       = {Hyoungshick Kim},
  title        = {Pattern Matching over Encrypted Data with a Short Ciphertext},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {132--143},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_11},
  doi          = {10.1007/978-3-030-89432-0\_11},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimSCBK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2021,
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5},
  doi          = {10.1007/978-3-030-90567-5},
  isbn         = {978-3-030-90566-8},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimCBSPN21,
  author       = {Jongkil Kim and
                  Seyit Camtepe and
                  Joonsang Baek and
                  Willy Susilo and
                  Josef Pieprzyk and
                  Surya Nepal},
  title        = {{P2DPI:} Practical and Privacy-Preserving Deep Packet Inspection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {789},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/789},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimCBSPN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Thorncharoensri20,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Joonsang Baek},
  title        = {Aggregatable Certificateless Designated Verifier Signature},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {95019--95031},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2987336},
  doi          = {10.1109/ACCESS.2020.2987336},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Thorncharoensri20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/DuttaSDBR20,
  author       = {Priyanka Dutta and
                  Willy Susilo and
                  Dung Hoang Duong and
                  Joonsang Baek and
                  Partha Sarathi Roy},
  title        = {Identity-based Unidirectional Proxy Re-Encryption and Re-Signature
                  in Standard Model: Lattice-based Constructions},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {1--22},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.11.30.001},
  doi          = {10.22667/JISIS.2020.11.30.001},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/DuttaSDBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KimHSBK20,
  author       = {Intae Kim and
                  Seong Oun Hwang and
                  Willy Susilo and
                  Joonsang Baek and
                  Jongkil Kim},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {Efficient Anonymous Multi-group Broadcast Encryption},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12146},
  pages        = {251--270},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57808-4\_13},
  doi          = {10.1007/978-3-030-57808-4\_13},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KimHSBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BaekKS20,
  author       = {Joonsang Baek and
                  Jongkil Kim and
                  Willy Susilo},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {Inspecting {TLS} Anytime Anywhere: {A} New Approach to {TLS} Interception},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {116--126},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3372199},
  doi          = {10.1145/3320269.3372199},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BaekKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DuttaSDB020,
  author       = {Priyanka Dutta and
                  Willy Susilo and
                  Dung Hoang Duong and
                  Joonsang Baek and
                  Partha Sarathi Roy},
  editor       = {Ilsun You},
  title        = {Identity-Based Unidirectional Proxy Re-encryption in Standard Model:
                  {A} Lattice-Based Construction},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {245--257},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_19},
  doi          = {10.1007/978-3-030-65299-9\_19},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/DuttaSDB020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-06741,
  author       = {Priyanka Dutta and
                  Willy Susilo and
                  Dung Hoang Duong and
                  Joonsang Baek and
                  Partha Sarathi Roy},
  title        = {Lattice-based Unidirectional {IBPRE} Secure in Standard Model},
  journal      = {CoRR},
  volume       = {abs/2005.06741},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.06741},
  eprinttype    = {arXiv},
  eprint       = {2005.06741},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-06741.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BaekSKC19,
  author       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim and
                  Yang{-}Wai Chow},
  title        = {Subversion in Practice: How to Efficiently Undermine Signatures},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {68799--68811},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2918550},
  doi          = {10.1109/ACCESS.2019.2918550},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/BaekSKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BaekSK19,
  author       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {Guest Editorial: Security and Privacy for Contemporary Network Computing
                  Environment},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {1},
  pages        = {1--3},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.03.31.001},
  doi          = {10.22667/JOWUA.2019.03.31.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BaekSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/EslamiNB19,
  author       = {Ziba Eslami and
                  Mahnaz Noroozi and
                  Joonsang Baek},
  title        = {On the Security of a Privacy-Preserving Ranked Multi-Keyword Search
                  Scheme},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {1},
  pages        = {75--85},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.03.31.075},
  doi          = {10.22667/JOWUA.2019.03.31.075},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/EslamiNB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Thorncharoensri19,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Joonsang Baek},
  title        = {Efficient Controlled Signature for a Large Network with Multi Security-level
                  Setting},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {3},
  pages        = {1--20},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.09.30.001},
  doi          = {10.22667/JOWUA.2019.09.30.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Thorncharoensri19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/WangSBKK19,
  author       = {Yang Wang and
                  Willy Susilo and
                  Joonsang Baek and
                  Jongkil Kim and
                  Intae Kim},
  title        = {Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {4},
  pages        = {68--87},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.12.31.068},
  doi          = {10.22667/JOWUA.2019.12.31.068},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/WangSBKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/WangWSLSBYC19,
  author       = {Yunling Wang and
                  Jianfeng Wang and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Willy Susilo and
                  Joonsang Baek and
                  Ilsun You and
                  Xiaofeng Chen},
  title        = {Towards Multi-user Searchable Encryption Supporting Boolean Query
                  and Fast Decryption},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {25},
  number       = {3},
  pages        = {222--244},
  year         = {2019},
  url          = {http://www.jucs.org/jucs\_25\_3/towards\_multi\_user\_searchable},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/WangWSLSBYC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimSBNL19,
  author       = {Jongkil Kim and
                  Willy Susilo and
                  Joonsang Baek and
                  Surya Nepal and
                  Dongxi Liu},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Ciphertext-Delegatable {CP-ABE} for a Dynamic Credential: {A} Modular
                  Approach},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_1},
  doi          = {10.1007/978-3-030-21548-4\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimSBNL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KimSGB019,
  author       = {Jongkil Kim and
                  Willy Susilo and
                  Fuchun Guo and
                  Joonsang Baek and
                  Nan Li},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {A New Encoding Framework for Predicate Encryption with Non-linear
                  Structures in Prime Order Groups},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {406--425},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_20},
  doi          = {10.1007/978-3-030-21568-2\_20},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KimSGB019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KimCSNB19,
  author       = {Jongkil Kim and
                  Seyit Camtepe and
                  Willy Susilo and
                  Surya Nepal and
                  Joonsang Baek},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Identity-Based Broadcast Encryption with Outsourced Partial Decryption
                  for Hybrid Security Models in Edge Computing},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {55--66},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329825},
  doi          = {10.1145/3321705.3329825},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KimCSNB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/ChowSWBBK019,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  Jianfeng Wang and
                  Richard Buckland and
                  Joonsang Baek and
                  Jongkil Kim and
                  Nan Li},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Protecting the Visual Fidelity of Machine Learning Datasets Using
                  {QR} Codes},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {320--335},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_23},
  doi          = {10.1007/978-3-030-30619-9\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/ChowSWBBK019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec2/SyalimABGY19,
  author       = {Amril Syalim and
                  Bayu Anggorojati and
                  Joonsang Baek and
                  Daniel Gerbi and
                  Ilsun You},
  editor       = {Ilsun You and
                  Hsing{-}Chung Chen and
                  Fang{-}Yie Leu and
                  Igor V. Kotenko},
  title        = {Aggregate Authentication for Massive Internet of Things in 5G Networks},
  booktitle    = {Mobile Internet Security - 4th International Symposium, MobiSec 2019,
                  Taichung, Taiwan, October 17-19, 2019, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1121},
  pages        = {3--12},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-9609-4\_1},
  doi          = {10.1007/978-981-15-9609-4\_1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec2/SyalimABGY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChowSBK19,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  Joonsang Baek and
                  Jongkil Kim},
  editor       = {Ilsun You},
  title        = {{QR} Code Watermarking for Digital Images},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {25--37},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_3},
  doi          = {10.1007/978-3-030-39303-8\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChowSBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimBSC19,
  author       = {Jongkil Kim and
                  Joonsang Baek and
                  Willy Susilo and
                  Yang{-}Wai Chow},
  editor       = {Ilsun You},
  title        = {Efficient Decentralized Random Commitment Key Generation for Mixnet
                  Shuffle Proof},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {206--216},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_16},
  doi          = {10.1007/978-3-030-39303-8\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimBSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/BaekSSHDY19,
  author       = {Joonsang Baek and
                  Willy Susilo and
                  Khaled Salah and
                  Jun Su Ha and
                  Ernesto Damiani and
                  Ilsun You},
  editor       = {Kuan{-}Ching Li and
                  Xiaofeng Chen and
                  Willy Susilo},
  title        = {Stateful Public-Key Encryption: {A} Security Solution for Resource-Constrained
                  Environment},
  booktitle    = {Advances in Cyber Security: Principles, Techniques, and Applications},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-13-1483-4\_1},
  doi          = {10.1007/978-981-13-1483-4\_1},
  timestamp    = {Thu, 14 Oct 2021 08:45:55 +0200},
  biburl       = {https://dblp.org/rec/books/sp/18/BaekSSHDY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimSGB019,
  author       = {Jongkil Kim and
                  Willy Susilo and
                  Fuchun Guo and
                  Joonsang Baek and
                  Nan Li},
  title        = {A New Encoding Framework for Predicate Encryption with Non-Linear
                  Structures in Prime Order Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1479},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1479},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimSGB019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YouFBL18,
  author       = {Ilsun You and
                  Carol J. Fung and
                  Joonsang Baek and
                  Victor C. M. Leung},
  title        = {{IEEE} Access Special Section Editorial: Security and Privacy in Applications
                  and Services for Future Internet of Things},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {39398--39400},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2855258},
  doi          = {10.1109/ACCESS.2018.2855258},
  timestamp    = {Thu, 04 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YouFBL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/YangWB18,
  author       = {Jin Yang and
                  Liangming Wang and
                  Joonsang Baek},
  title        = {A privacy preserving and fine-grained access control scheme in DaaS
                  based on efficient {DSP} re-encryption},
  journal      = {Int. J. High Perform. Comput. Netw.},
  volume       = {11},
  number       = {3},
  pages        = {231--241},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJHPCN.2018.10012999},
  doi          = {10.1504/IJHPCN.2018.10012999},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpcn/YangWB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2018,
  editor       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
                  South Korea, October 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11192},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01446-9},
  doi          = {10.1007/978-3-030-01446-9},
  isbn         = {978-3-030-01445-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaekSKC18,
  author       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim and
                  Yang{-}Wai Chow},
  title        = {Subversion in Practice: How to Efficiently Undermine Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1201},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaekSKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChowSPBV17,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  James G. Phillips and
                  Joonsang Baek and
                  Elena Vlahu{-}Gjorgievska},
  title        = {Video Games and Virtual Reality as Persuasive Technologies for Health
                  Care: An Overview},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {3},
  pages        = {18--35},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.09.30.018},
  doi          = {10.22667/JOWUA.2017.09.30.018},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChowSPBV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/BaekHBWJY17,
  author       = {Joonsang Baek and
                  Eman Hableel and
                  Young{-}Ji Byon and
                  Duncan S. Wong and
                  Kitae Jang and
                  Hwasoo Yeo},
  title        = {How to Protect {ADS-B:} Confidentiality Framework and Efficient Realization
                  Based on Staged Identity-Based Encryption},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {18},
  number       = {3},
  pages        = {690--700},
  year         = {2017},
  url          = {https://doi.org/10.1109/TITS.2016.2586301},
  doi          = {10.1109/TITS.2016.2586301},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/BaekHBWJY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/YangTBW17,
  author       = {Anjia Yang and
                  Xiao Tan and
                  Joonsang Baek and
                  Duncan S. Wong},
  title        = {A New {ADS-B} Authentication Framework Based on Efficient Hierarchical
                  Identity-Based Signature with Batch Verification},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {10},
  number       = {2},
  pages        = {165--175},
  year         = {2017},
  url          = {https://doi.org/10.1109/TSC.2015.2459709},
  doi          = {10.1109/TSC.2015.2459709},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/YangTBW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/HamadiGBA17,
  author       = {Hussam M. N. Al Hamadi and
                  Amjad Gawanmeh and
                  Joonsang Baek and
                  Mahmoud Al{-}Qutayri},
  title        = {Lightweight Security Protocol for {ECG} Bio-Sensors},
  journal      = {Wirel. Pers. Commun.},
  volume       = {95},
  number       = {4},
  pages        = {5097--5120},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-017-4147-x},
  doi          = {10.1007/S11277-017-4147-X},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/HamadiGBA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ChowSB17,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  Joonsang Baek},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Covert {QR} Codes: How to Hide in the Crowd},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {678--693},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_42},
  doi          = {10.1007/978-3-319-72359-4\_42},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ChowSB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017asiapkc,
  editor       = {Joonsang Baek and
                  Rui Zhang},
  title        = {Proceedings of the 4th {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
                  April 2, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055504},
  doi          = {10.1145/3055504},
  isbn         = {978-1-4503-4973-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2017asiapkc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/BaekWLA16,
  author       = {Joonsang Baek and
                  Duncan S. Wong and
                  Jin Li and
                  Man Ho Au},
  title        = {Efficient Generic Construction of CCA-Secure Identity-Based Encryption
                  from Randomness Extraction},
  journal      = {Comput. J.},
  volume       = {59},
  number       = {4},
  pages        = {508--521},
  year         = {2016},
  url          = {https://doi.org/10.1093/comjnl/bxv070},
  doi          = {10.1093/COMJNL/BXV070},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/BaekWLA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/BaekY16,
  author       = {Joonsang Baek and
                  Ilsun You},
  title        = {Efficient Subversion of Symmetric Encryption with Random Initialization
                  Vector},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {4},
  pages        = {1251--1254},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2015EDL8224},
  doi          = {10.1587/TRANSINF.2015EDL8224},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/BaekY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SalamiBSD16,
  author       = {Sanaah Al Salami and
                  Joonsang Baek and
                  Khaled Salah and
                  Ernesto Damiani},
  title        = {Lightweight Encryption for Smart Home},
  booktitle    = {11th International Conference on Availability, Reliability and Security,
                  {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016},
  pages        = {382--388},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ARES.2016.40},
  doi          = {10.1109/ARES.2016.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SalamiBSD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/MansooriBS16,
  author       = {Fatema Al Mansoori and
                  Joonsang Baek and
                  Khaled Salah},
  title        = {Subverting {MAC:} How authentication in mobile environment can be
                  undermined},
  booktitle    = {{IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops 2016, San Francisco, CA, USA, April 10-14, 2016},
  pages        = {870--874},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/INFCOMW.2016.7562200},
  doi          = {10.1109/INFCOMW.2016.7562200},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/MansooriBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/XuLTB15,
  author       = {Lingling Xu and
                  Jin Li and
                  Shaohua Tang and
                  Joonsang Baek},
  title        = {Server-Aided Verification Signature with Privacy for Mobile Computing},
  journal      = {Mob. Inf. Syst.},
  volume       = {2015},
  pages        = {626415:1--626415:11},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/626415},
  doi          = {10.1155/2015/626415},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/XuLTB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BaekBHA15,
  author       = {Joonsang Baek and
                  Young{-}Ji Byon and
                  Eman Hableel and
                  Mahmoud Al{-}Qutayri},
  title        = {Making air traffic surveillance more reliable: a new authentication
                  framework for automatic dependent surveillance-broadcast {(ADS-B)}
                  based on online/offline identity-based signature},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {740--750},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1021},
  doi          = {10.1002/SEC.1021},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BaekBHA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/BaekVLHX15,
  author       = {Joonsang Baek and
                  Quang Hieu Vu and
                  Joseph K. Liu and
                  Xinyi Huang and
                  Yang Xiang},
  title        = {A Secure Cloud Computing Based Framework for Big Data Information
                  Management of Smart Grid},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {3},
  number       = {2},
  pages        = {233--244},
  year         = {2015},
  url          = {https://doi.org/10.1109/TCC.2014.2359460},
  doi          = {10.1109/TCC.2014.2359460},
  timestamp    = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/BaekVLHX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ShoufanAB15a,
  author       = {Abdulhadi Shoufan and
                  Hassan Alnoon and
                  Joonsang Baek},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Secure Communication in Civil Drones},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {177--195},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_11},
  doi          = {10.1007/978-3-319-27668-7\_11},
  timestamp    = {Wed, 29 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ShoufanAB15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ShoufanAB15,
  author       = {Abdulhadi Shoufan and
                  Hassan Alnoon and
                  Joonsang Baek},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {On the Power Consumption of Cryptographic Processors in Civil Microdrones},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {283--290},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005273402830290},
  doi          = {10.5220/0005273402830290},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ShoufanAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HableelBBW15,
  author       = {Eman Hableel and
                  Joonsang Baek and
                  Young{-}Ji Byon and
                  Duncan S. Wong},
  title        = {How to protect {ADS-B:} Confidentiality framework for future air traffic
                  communication},
  booktitle    = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops, Hong Kong, China, April 26 - May 1, 2015},
  pages        = {155--160},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFCOMW.2015.7179377},
  doi          = {10.1109/INFCOMW.2015.7179377},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/HableelBBW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/BaekVSJW13,
  author       = {Joonsang Baek and
                  Quang Hieu Vu and
                  Abdulhadi Shoufan and
                  Andrew Jones and
                  Duncan S. Wong},
  title        = {Stateful Public-Key Encryption Schemes Forward-Secure Against State
                  Exposure},
  journal      = {Comput. J.},
  volume       = {56},
  number       = {4},
  pages        = {497--507},
  year         = {2013},
  url          = {https://doi.org/10.1093/comjnl/bxs151},
  doi          = {10.1093/COMJNL/BXS151},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/BaekVSJW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/EbriBSV13,
  author       = {Noura Al Ebri and
                  Joonsang Baek and
                  Abdulhadi Shoufan and
                  Quang Hieu Vu},
  title        = {Forward-Secure Identity-Based Signature: New Generic Constructions
                  and Their Applications},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {32--54},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.032},
  doi          = {10.22667/JOWUA.2013.03.31.032},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/EbriBSV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/3pgcic/BaekBHA13,
  author       = {Joonsang Baek and
                  Young{-}Ji Byon and
                  Eman Hableel and
                  Mahmoud Al{-}Qutayri},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Dritan Nace and
                  Salvatore Venticinque and
                  Alain Bui},
  title        = {An Authentication Framework for Automatic Dependent Surveillance-Broadcast
                  Based on Online/Offline Identity-Based Signature},
  booktitle    = {Eighth International Conference on P2P, Parallel, Grid, Cloud and
                  Internet Computing, 3PGCIC 2013, Compiegne, France, October 28-30,
                  2013},
  pages        = {358--363},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/3PGCIC.2013.61},
  doi          = {10.1109/3PGCIC.2013.61},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/3pgcic/BaekBHA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ByonJEB13,
  author       = {Young{-}Ji Byon and
                  Young{-}Seon Jeong and
                  Said M. Easa and
                  Joonsang Baek},
  title        = {Feasibility analysis of transportation applications based on APIs
                  of social network services},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {59--64},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750162},
  doi          = {10.1109/ICITST.2013.6750162},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ByonJEB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/HableelBB13,
  author       = {Eman Hableel and
                  Young{-}Ji Byon and
                  Joonsang Baek},
  editor       = {Atilla El{\c{c}}i and
                  Manoj Singh Gaur and
                  Mehmet A. Orgun and
                  Oleg B. Makarevich},
  title        = {Public key infrastructure for {UAE:} a case study},
  booktitle    = {The 6th International Conference on Security of Information and Networks,
                  {SIN} '13, Aksaray, Turkey, November 26-28, 2013},
  pages        = {336--340},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523514.2527099},
  doi          = {10.1145/2523514.2527099},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/HableelBB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimBZS12,
  author       = {Jangseong Kim and
                  Joonsang Baek and
                  Jianying Zhou and
                  Taeshik Shon},
  title        = {An Efficient and Secure Service Discovery Protocol for Ubiquitous
                  Computing Environments},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {95-D},
  number       = {1},
  pages        = {117--125},
  year         = {2012},
  url          = {https://doi.org/10.1587/transinf.E95.D.117},
  doi          = {10.1587/TRANSINF.E95.D.117},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KimBZS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/EbriBSV12,
  author       = {Noura Al Ebri and
                  Joonsang Baek and
                  Abdulhadi Shoufan and
                  Quang Hieu Vu},
  title        = {Efficient Generic Construction of Forward-Secure Identity-Based Signature},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {55--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.53},
  doi          = {10.1109/ARES.2012.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/EbriBSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BaekVJAY12,
  author       = {Joonsang Baek and
                  Quang Hieu Vu and
                  Andrew Jones and
                  Sameera Al{-}Mulla and
                  Chan Yeob Yeun},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Smart-frame: {A} flexible, scalable, and secure information management
                  framework for smart grids},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {668--673},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470900/},
  timestamp    = {Thu, 10 Mar 2022 09:31:39 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/BaekVJAY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/KimBS11,
  author       = {Jangseong Kim and
                  Joonsang Baek and
                  Taeshik Shon},
  title        = {An efficient and scalable re-authentication protocol over wireless
                  sensor network},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {57},
  number       = {2},
  pages        = {516--522},
  year         = {2011},
  url          = {https://doi.org/10.1109/TCE.2011.5955187},
  doi          = {10.1109/TCE.2011.5955187},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/KimBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BaekZ11,
  author       = {Joonsang Baek and
                  Jianying Zhou},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Compact identity-based encryption without strong symmetric cipher},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966923},
  doi          = {10.1145/1966913.1966923},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BaekZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SusiloB11,
  author       = {Willy Susilo and
                  Joonsang Baek},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {On the security of the identity-based encryption based on {DHIES}
                  from {ASIACCS} 2010},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {376--380},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966962},
  doi          = {10.1145/1966913.1966962},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SusiloB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BaekCZ11,
  author       = {Joonsang Baek and
                  Cheng{-}Kang Chu and
                  Jianying Zhou},
  editor       = {Aggelos Kiayias},
  title        = {On Shortening Ciphertexts: New Constructions for Compact Public Key
                  and Stateful Encryption Schemes},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {302--318},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_20},
  doi          = {10.1007/978-3-642-19074-2\_20},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BaekCZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShehhiBY11,
  author       = {Muna Abdulla Al Shehhi and
                  Joonsang Baek and
                  Chan Yeob Yeun},
  title        = {The use of Boolean functions in stream ciphers},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {29--33},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148355/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShehhiBY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/EbriBY11,
  author       = {Noura Al Ebri and
                  Joonsang Baek and
                  Chan Yeob Yeun},
  title        = {Study on Secret Sharing Schemes {(SSS)} and their applications},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {40--45},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148357/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/EbriBY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbdouliBY11,
  author       = {Ameera Salem Abdouli and
                  Joonsang Baek and
                  Chan Yeob Yeun},
  title        = {Survey on computationally hard problems and their applications to
                  cryptography},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {46--52},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148358/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbdouliBY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HousaniBY11,
  author       = {Hajer Al Housani and
                  Joonsang Baek and
                  Chan Yeob Yeun},
  title        = {Survey on certificateless public key cryptography},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {53--58},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148359/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HousaniBY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LiuBZYW10,
  author       = {Joseph K. Liu and
                  Joonsang Baek and
                  Jianying Zhou and
                  Yanjiang Yang and
                  Jun Wen Wong},
  title        = {Efficient online/offline identity-based signature for wireless sensor
                  network},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {4},
  pages        = {287--296},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0109-y},
  doi          = {10.1007/S10207-010-0109-Y},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LiuBZYW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/QiuZBL10,
  author       = {Ying Qiu and
                  Jianying Zhou and
                  Joonsang Baek and
                  Javier L{\'{o}}pez},
  title        = {Authentication and Key Establishment in Dynamic Wireless Sensor Networks},
  journal      = {Sensors},
  volume       = {10},
  number       = {4},
  pages        = {3718--3731},
  year         = {2010},
  url          = {https://doi.org/10.3390/s100403718},
  doi          = {10.3390/S100403718},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/QiuZBL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiuBZ10,
  author       = {Joseph K. Liu and
                  Joonsang Baek and
                  Jianying Zhou},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Online/Offline Identity-Based Signcryption Revisited},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {36--51},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_3},
  doi          = {10.1007/978-3-642-21518-6\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiuBZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/KimBKZ10,
  author       = {Jangseong Kim and
                  Joonsang Baek and
                  Kwangjo Kim and
                  Jianying Zhou},
  editor       = {Jan Camenisch and
                  Costas Lambrinoudakis},
  title        = {A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous
                  Computing Environments},
  booktitle    = {Public Key Infrastructures, Services and Applications - 7th European
                  Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6711},
  pages        = {45--60},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22633-5\_4},
  doi          = {10.1007/978-3-642-22633-5\_4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/KimBKZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BaekS10,
  author       = {Joonsang Baek and
                  Ron Steinfeld},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Security for Signcryption: The Multi-User Model},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {43--53},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_3},
  doi          = {10.1007/978-3-540-89411-7\_3},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/series/isc/BaekS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuBZYW10,
  author       = {Joseph K. Liu and
                  Joonsang Baek and
                  Jianying Zhou and
                  Yanjiang Yang and
                  Jun Wen Wong},
  title        = {Efficient Online/Offline Identity-Based Signature for Wireless Sensor
                  Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuBZYW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuBZ10,
  author       = {Joseph K. Liu and
                  Joonsang Baek and
                  Jianying Zhou},
  title        = {Online/Offline Identity-Based Signcryption Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {274},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/274},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuBZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BaekSLZ09,
  author       = {Joonsang Baek and
                  Willy Susilo and
                  Joseph K. Liu and
                  Jianying Zhou},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {A New Variant of the Cramer-Shoup {KEM} Secure against Chosen Ciphertext
                  Attack},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {143--155},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_9},
  doi          = {10.1007/978-3-642-01957-9\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BaekSLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LiuBZ09,
  author       = {Joseph K. Liu and
                  Joonsang Baek and
                  Jianying Zhou},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Certificate-based sequential aggregate signature},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {21--28},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514278},
  doi          = {10.1145/1514274.1514278},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LiuBZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BaekZB08,
  author       = {Joonsang Baek and
                  Jianying Zhou and
                  Feng Bao},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Generic Constructions of Stateful Public Key Encryption and Their
                  Applications},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {75--93},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_5},
  doi          = {10.1007/978-3-540-68914-0\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BaekZB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/BaekSS08,
  author       = {Joonsang Baek and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  editor       = {Osvaldo Gervasi and
                  Beniamino Murgante and
                  Antonio Lagan{\`{a}} and
                  David Taniar and
                  Youngsong Mun and
                  Marina L. Gavrilova},
  title        = {Public Key Encryption with Keyword Search Revisited},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2008, International
                  Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5072},
  pages        = {1249--1259},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69839-5\_96},
  doi          = {10.1007/978-3-540-69839-5\_96},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/BaekSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LiuBSZ08,
  author       = {Joseph K. Liu and
                  Joonsang Baek and
                  Willy Susilo and
                  Jianying Zhou},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {Certificate-Based Signature Schemes without Pairings or Random Oracles},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {285--297},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_20},
  doi          = {10.1007/978-3-540-85886-7\_20},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LiuBSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BaekGSZ08,
  author       = {Joonsang Baek and
                  David Galindo and
                  Willy Susilo and
                  Jianying Zhou},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Constructing Strong {KEM} from Weak {KEM} (or How to Revive the {KEM/DEM}
                  Framework)},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {358--374},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_24},
  doi          = {10.1007/978-3-540-85855-3\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BaekGSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BaekTZW08,
  author       = {Joonsang Baek and
                  Han Chiang Tan and
                  Jianying Zhou and
                  Jun Wen Wong},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Realizing Stateful Public Key Encryption in Wireless Sensor Network},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {95--107},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_7},
  doi          = {10.1007/978-0-387-09699-5\_7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BaekTZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2008,
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1},
  doi          = {10.1007/978-3-540-88733-1},
  isbn         = {978-3-540-88732-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuBSZ08,
  author       = {Joseph K. Liu and
                  Joonsang Baek and
                  Willy Susilo and
                  Jianying Zhou},
  title        = {Certificate-Based Signature Schemes without Pairings or Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {275},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/275},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuBSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaekSLZ08,
  author       = {Joonsang Baek and
                  Willy Susilo and
                  Joseph K. Liu and
                  Jianying Zhou},
  title        = {A New Variant of the Cramer-Shoup {KEM} Secure against Chosen Ciphertext
                  Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/449},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaekSLZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BaekSZ07,
  author       = {Joonsang Baek and
                  Ron Steinfeld and
                  Yuliang Zheng},
  title        = {Formal Proofs for the Security of Signcryption},
  journal      = {J. Cryptol.},
  volume       = {20},
  number       = {2},
  pages        = {203--235},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00145-007-0211-0},
  doi          = {10.1007/S00145-007-0211-0},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/BaekSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SunZB07,
  author       = {Yinxia Sun and
                  Futai Zhang and
                  Joonsang Baek},
  editor       = {Feng Bao and
                  San Ling and
                  Tatsuaki Okamoto and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {Strongly Secure Certificateless Public Key Encryption Without Pairing},
  booktitle    = {Cryptology and Network Security, 6th International Conference, {CANS}
                  2007, Singapore, December 8-10, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4856},
  pages        = {194--208},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76969-9\_13},
  doi          = {10.1007/978-3-540-76969-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/SunZB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShahandashtiSB07,
  author       = {Siamak Fayyaz Shahandashti and
                  Reihaneh Safavi{-}Naini and
                  Joonsang Baek},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Concurrently-secure credential ownership proofs},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {161--172},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229309},
  doi          = {10.1145/1229285.1229309},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ShahandashtiSB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BaekSZ07,
  author       = {Joonsang Baek and
                  Willy Susilo and
                  Jianying Zhou},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {New constructions of fuzzy identity-based encryption},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {368--370},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229330},
  doi          = {10.1145/1229285.1229330},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BaekSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WangBWB07,
  author       = {Guilin Wang and
                  Joonsang Baek and
                  Duncan S. Wong and
                  Feng Bao},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {On the Generic and Efficient Constructions of Secure Designated Confirmer
                  Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {43--60},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_4},
  doi          = {10.1007/978-3-540-71677-8\_4},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WangBWB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaekSZ07,
  author       = {Joonsang Baek and
                  Willy Susilo and
                  Jianying Zhou},
  title        = {New Constructions of Fuzzy Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaekSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuoSBS06,
  author       = {Ling Luo and
                  Reihaneh Safavi{-}Naini and
                  Joonsang Baek and
                  Willy Susilo},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Self-organised group key management for ad hoc networks},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {138--147},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128839},
  doi          = {10.1145/1128817.1128839},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LuoSBS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BaekSS06,
  author       = {Joonsang Baek and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {On the Integration of Public Key Data Encryption and Public Key Encryption
                  with Keyword Search},
  booktitle    = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  pages        = {217--232},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810\_16},
  doi          = {10.1007/11836810\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BaekSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaekSS05,
  author       = {Joonsang Baek and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  editor       = {Bimal K. Roy},
  title        = {Universal Designated Verifier Signature Proof (or How to Efficiently
                  Prove Knowledge of a Signature)},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {644--661},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_35},
  doi          = {10.1007/11593447\_35},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BaekSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/BaekSS05,
  author       = {Joonsang Baek and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  editor       = {Robert H. Deng and
                  Feng Bao and
                  HweeHwa Pang and
                  Jianying Zhou},
  title        = {Token-Controlled Public Key Encryption},
  booktitle    = {Information Security Practice and Experience, First International
                  Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3439},
  pages        = {386--397},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31979-5\_33},
  doi          = {10.1007/978-3-540-31979-5\_33},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/BaekSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BaekSS05,
  author       = {Joonsang Baek and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Certificateless Public Key Encryption Without Pairing},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {134--148},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_10},
  doi          = {10.1007/11556992\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BaekSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/madnes/ChenSBC05,
  author       = {Yun Chen and
                  Reihaneh Safavi{-}Naini and
                  Joonsang Baek and
                  Xin Chen},
  editor       = {Mike Burmester and
                  Alec Yasinsac},
  title        = {Server-Aided {RSA} Key Generation Against Collusion Attack},
  booktitle    = {Secure Mobile Ad-hoc Networks and Sensors, First International Workshop,
                  {MADNES} 2005, Singapore, September 20-22, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4074},
  pages        = {27--37},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11801412\_4},
  doi          = {10.1007/11801412\_4},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/madnes/ChenSBC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaekSS05,
  author       = {Joonsang Baek and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  editor       = {Serge Vaudenay},
  title        = {Efficient Multi-receiver Identity-Based Encryption and Its Application
                  to Broadcast Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {380--397},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_26},
  doi          = {10.1007/978-3-540-30580-4\_26},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BaekSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaekSS05,
  author       = {Joonsang Baek and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  title        = {Public Key Encryption with Keyword Search Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaekSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/BaekZ04,
  author       = {Joonsang Baek and
                  Yuliang Zheng},
  title        = {Identity-Based Threshold Signature Scheme from the Bilinear Pairings},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {124--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286437},
  doi          = {10.1109/ITCC.2004.1286437},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/BaekZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaekZ04,
  author       = {Joonsang Baek and
                  Yuliang Zheng},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Identity-Based Threshold Decryption},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {262--276},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_19},
  doi          = {10.1007/978-3-540-24632-9\_19},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BaekZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BaekZ03,
  author       = {Joonsang Baek and
                  Yuliang Zheng},
  title        = {Zheng and Seberry's public key encryption scheme revisited},
  journal      = {Int. J. Inf. Sec.},
  volume       = {2},
  number       = {1},
  pages        = {37--44},
  year         = {2003},
  url          = {https://doi.org/10.1007/s10207-003-0023-7},
  doi          = {10.1007/S10207-003-0023-7},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/BaekZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/BaekZ03,
  author       = {Joonsang Baek and
                  Yuliang Zheng},
  title        = {Simple and efficient threshold cryptosystem from the Gap Diffie-Hellman
                  group},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM}
                  '03, San Francisco, CA, USA, 1-5 December 2003},
  pages        = {1491--1495},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/GLOCOM.2003.1258486},
  doi          = {10.1109/GLOCOM.2003.1258486},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/BaekZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaekZ03,
  author       = {Joonsang Baek and
                  Yuliang Zheng},
  title        = {Identity-Based Threshold Decryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/164},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BaekZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SteinfeldBZ02,
  author       = {Ron Steinfeld and
                  Joonsang Baek and
                  Yuliang Zheng},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {On the Necessity of Strong Assumptions for the Security of a Class
                  of Asymmetric Encryption Schemes},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {241--256},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_20},
  doi          = {10.1007/3-540-45450-0\_20},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SteinfeldBZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaekSZ02,
  author       = {Joonsang Baek and
                  Ron Steinfeld and
                  Yuliang Zheng},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Formal Proofs for the Security of Signcryption},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {80--98},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_6},
  doi          = {10.1007/3-540-45664-3\_6},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BaekSZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaekLK00,
  author       = {Joonsang Baek and
                  Byoungcheon Lee and
                  Kwangjo Kim},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman
                  Assumption},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {49--58},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_5},
  doi          = {10.1007/10718964\_5},
  timestamp    = {Sat, 19 Oct 2019 20:34:19 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BaekLK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/KimPB99,
  author       = {Kwangjo Kim and
                  Sangjoon Park and
                  Joonsang Baek},
  title        = {Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation
                  Protocol},
  booktitle    = {Proceedings of the 1999 International Conference on Parallel Processing
                  Workshops, {ICPPW} 1999, Wakamatsu, Japan, September 21-24, 1999},
  pages        = {140--145},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/ICPPW.1999.800053},
  doi          = {10.1109/ICPPW.1999.800053},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icppw/KimPB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}