Joonsang Baek
Joonsang Baek
Senior Lecturer, University of Wollongong, Australia
Verified email at uow.edu.au
Title
Cited by
Cited by
Year
Public key encryption with keyword search revisited
J Baek, R Safavi-Naini, W Susilo
International conference on Computational Science and Its Applications, 1249 …, 2008
5162008
Formal proofs for the security of signcryption
J Baek, R Steinfeld, Y Zheng
International Workshop on Public Key Cryptography, 80-98, 2002
3242002
Certificateless public key encryption without pairing
J Baek, R Safavi-Naini, W Susilo
International conference on information security, 134-148, 2005
2682005
Identity-based threshold decryption
J Baek, Y Zheng
International Workshop on Public Key Cryptography, 262-276, 2004
2532004
A secure cloud computing based framework for big data information management of smart grid
J Baek, QH Vu, JK Liu, X Huang, Y Xiang
IEEE transactions on cloud computing 3 (2), 233-244, 2014
2292014
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
J Baek, R Safavi-Naini, W Susilo
International workshop on public key cryptography, 380-397, 2005
2052005
Formal proofs for the security of signcryption
J Baek, R Steinfeld, Y Zheng
Journal of cryptology 20 (2), 203-235, 2007
1602007
Efficient online/offline identity-based signature for wireless sensor network
JK Liu, J Baek, J Zhou, Y Yang, JW Wong
International Journal of Information Security 9 (4), 287-296, 2010
1462010
Identity-based threshold signature scheme from the bilinear pairings
J Baek, Y Zheng
International Conference on Information Technology: Coding and Computing …, 2004
1382004
Secret computation with secrets for mobile agent using one-time proxy signature
H Kim, J Baek, B Lee, K Kim
Cryptography and information security 2001, 845-850, 2001
1382001
A survey of identity-based cryptography
J Baek, J Newmarch, R Safavi-Naini, W Susilo
Proc. of Australian Unix Users Group Annual Conference, 95-102, 2004
1302004
On the integration of public key data encryption and public key encryption with keyword search
J Baek, R Safavi-Naini, W Susilo
International Conference on Information Security, 217-232, 2006
1212006
Certificate-based signature schemes without pairings or random oracles
JK Liu, J Baek, W Susilo, J Zhou
International Conference on Information Security, 285-297, 2008
1062008
New constructions of fuzzy identity-based encryption
J Baek, W Susilo, J Zhou
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1052007
Strongly secure certificateless public key encryption without pairing
Y Sun, F Zhang, J Baek
International conference on cryptology and network security, 194-208, 2007
752007
Improving fairness and privacy of Zhou-Gollmann's fair non-repudiation protocol
K Kim, S Park, J Baek
Proceedings of the 1999 ICPP Workshops on Collaboration and Mobile Computing …, 1999
651999
Lightweight encryption for smart home
S Al Salami, J Baek, K Salah, E Damiani
2016 11th International Conference on Availability, Reliability and Security …, 2016
592016
Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature)
J Baek, R Safavi-Naini, W Susilo
International Conference on the Theory and Application of Cryptology and …, 2005
512005
A new ADS-B authentication framework based on efficient hierarchical identity-based signature with batch verification
A Yang, X Tan, J Baek, DS Wong
IEEE Transactions on Services Computing 10 (2), 165-175, 2015
452015
Authentication and key establishment in dynamic wireless sensor networks
Y Qiu, J Zhou, J Baek, J Lopez
Sensors 10 (4), 3718-3731, 2010
432010
The system can't perform the operation now. Try again later.
Articles 1–20