Seguir
Joonsang Baek
Joonsang Baek
Associate Professor, University of Wollongong, Australia
Dirección de correo verificada de uow.edu.au
Título
Citado por
Citado por
Año
Public key encryption with keyword search revisited
J Baek, R Safavi-Naini, W Susilo
Computational Science and Its Applications–ICCSA 2008: International …, 2008
7252008
Formal proofs for the security of signcryption
J Baek, R Steinfeld, Y Zheng
International Workshop on Public Key Cryptography, 80-98, 2002
3562002
A secure cloud computing based framework for big data information management of smart grid
J Baek, QH Vu, JK Liu, X Huang, Y Xiang
IEEE transactions on cloud computing 3 (2), 233-244, 2014
3102014
Certificateless public key encryption without pairing
J Baek, R Safavi-Naini, W Susilo
International conference on information security, 134-148, 2005
3032005
Identity-based threshold decryption
J Baek, Y Zheng
International Workshop on Public Key Cryptography, 262-276, 2004
2662004
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
J Baek, R Safavi-Naini, W Susilo
Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and …, 2005
2442005
Formal proofs for the security of signcryption
J Baek, R Steinfeld, Y Zheng
Journal of cryptology 20, 203-235, 2007
1762007
Efficient online/offline identity-based signature for wireless sensor network
JK Liu, J Baek, J Zhou, Y Yang, JW Wong
International Journal of Information Security 9, 287-296, 2010
1752010
A survey of identity-based cryptography
J Baek, J Newmarch, R Safavi-Naini, W Susilo
Proc. of Australian Unix Users Group Annual Conference, 95-102, 2004
1542004
On the integration of public key data encryption and public key encryption with keyword search
J Baek, R Safavi-Naini, W Susilo
Information Security: 9th International Conference, ISC 2006, Samos Island …, 2006
1492006
Identity-based threshold signature scheme from the bilinear pairings
J Baek, Y Zheng
International Conference on Information Technology: Coding and Computing …, 2004
1482004
Secret computation with secrets for mobile agent using one-time proxy signature
H Kim, J Baek, B Lee, K Kim
Cryptography and information security 2001, 845-850, 2001
1452001
Revocable attribute-based encryption with data integrity in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 2864-2872, 2021
1292021
Certificate-based signature schemes without pairings or random oracles
JK Liu, J Baek, W Susilo, J Zhou
International Conference on Information Security, 285-297, 2008
1192008
New constructions of fuzzy identity-based encryption
J Baek, W Susilo, J Zhou
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1182007
Lightweight encryption for smart home
S Al Salami, J Baek, K Salah, E Damiani
2016 11th International conference on availability, reliability and security …, 2016
1172016
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 2907-2919, 2021
1052021
Strongly secure certificateless public key encryption without pairing
Y Sun, F Zhang, J Baek
Cryptology and Network Security: 6th International Conference, CANS 2007 …, 2007
892007
A new ADS-B authentication framework based on efficient hierarchical identity-based signature with batch verification
A Yang, X Tan, J Baek, DS Wong
IEEE Transactions on Services Computing 10 (2), 165-175, 2015
832015
Improving fairness and privacy of Zhou-Gollmann's fair non-repudiation protocol
K Kim, S Park, J Baek
Proceedings of the 1999 ICPP Workshops on Collaboration and Mobile Computing …, 1999
681999
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20