متابعة
Joonsang Baek
Joonsang Baek
Associate Professor, University of Wollongong, Australia
بريد إلكتروني تم التحقق منه على uow.edu.au
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Public key encryption with keyword search revisited
J Baek, R Safavi-Naini, W Susilo
Computational Science and Its Applications–ICCSA 2008: International …, 2008
7482008
Formal proofs for the security of signcryption
J Baek, R Steinfeld, Y Zheng
Public Key Cryptography: 5th International Workshop on Practice and Theory …, 2002
3572002
A secure cloud computing based framework for big data information management of smart grid
J Baek, QH Vu, JK Liu, X Huang, Y Xiang
IEEE transactions on cloud computing 3 (2), 233-244, 2014
3242014
Certificateless public key encryption without pairing
J Baek, R Safavi-Naini, W Susilo
International conference on information security, 134-148, 2005
3102005
Identity-based threshold decryption
J Baek, Y Zheng
International Workshop on Public Key Cryptography, 262-276, 2004
2702004
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
J Baek, R Safavi-Naini, W Susilo
Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and …, 2005
2482005
Formal proofs for the security of signcryption
J Baek, R Steinfeld, Y Zheng
Journal of cryptology 20, 203-235, 2007
1892007
Efficient online/offline identity-based signature for wireless sensor network
JK Liu, J Baek, J Zhou, Y Yang, JW Wong
International Journal of Information Security 9, 287-296, 2010
1742010
Revocable attribute-based encryption with data integrity in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 2864-2872, 2021
1622021
A survey of identity-based cryptography
J Baek, J Newmarch, R Safavi-Naini, W Susilo
Proc. of Australian Unix Users Group Annual Conference, 95-102, 2004
1582004
On the integration of public key data encryption and public key encryption with keyword search
J Baek, R Safavi-Naini, W Susilo
Information Security: 9th International Conference, ISC 2006, Samos Island …, 2006
1542006
Identity-based threshold signature scheme from the bilinear pairings
J Baek, Y Zheng
International Conference on Information Technology: Coding and Computing …, 2004
1502004
Secret computation with secrets for mobile agent using one-time proxy signature
H Kim, J Baek, B Lee, K Kim
Cryptography and information security 2001, 845-850, 2001
1482001
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 2907-2919, 2021
1402021
Lightweight encryption for smart home
S Al Salami, J Baek, K Salah, E Damiani
2016 11th International conference on availability, reliability and security …, 2016
1272016
New constructions of fuzzy identity-based encryption
J Baek, W Susilo, J Zhou
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1222007
Certificate-based signature schemes without pairings or random oracles
JK Liu, J Baek, W Susilo, J Zhou
International Conference on Information Security, 285-297, 2008
1212008
A new ADS-B authentication framework based on efficient hierarchical identity-based signature with batch verification
A Yang, X Tan, J Baek, DS Wong
IEEE Transactions on Services Computing 10 (2), 165-175, 2015
972015
Strongly secure certificateless public key encryption without pairing
Y Sun, F Zhang, J Baek
Cryptology and Network Security: 6th International Conference, CANS 2007 …, 2007
912007
Improving fairness and privacy of Zhou-Gollmann's fair non-repudiation protocol
K Kim, S Park, J Baek
Proceedings of the 1999 ICPP Workshops on Collaboration and Mobile Computing …, 1999
681999
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20