Follow
Joonsang Baek
Joonsang Baek
Associate Professor, University of Wollongong, Australia
Verified email at uow.edu.au
Title
Cited by
Cited by
Year
Public key encryption with keyword search revisited
J Baek, R Safavi-Naini, W Susilo
Computational Science and Its Applications–ICCSA 2008: International …, 2008
7252008
Formal proofs for the security of signcryption
J Baek, R Steinfeld, Y Zheng
International Workshop on Public Key Cryptography, 80-98, 2002
3562002
A secure cloud computing based framework for big data information management of smart grid
J Baek, QH Vu, JK Liu, X Huang, Y Xiang
IEEE transactions on cloud computing 3 (2), 233-244, 2014
3102014
Certificateless public key encryption without pairing
J Baek, R Safavi-Naini, W Susilo
International conference on information security, 134-148, 2005
3032005
Identity-based threshold decryption
J Baek, Y Zheng
International Workshop on Public Key Cryptography, 262-276, 2004
2662004
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
J Baek, R Safavi-Naini, W Susilo
Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and …, 2005
2442005
Formal proofs for the security of signcryption
J Baek, R Steinfeld, Y Zheng
Journal of cryptology 20, 203-235, 2007
1762007
Efficient online/offline identity-based signature for wireless sensor network
JK Liu, J Baek, J Zhou, Y Yang, JW Wong
International Journal of Information Security 9, 287-296, 2010
1752010
A survey of identity-based cryptography
J Baek, J Newmarch, R Safavi-Naini, W Susilo
Proc. of Australian Unix Users Group Annual Conference, 95-102, 2004
1542004
On the integration of public key data encryption and public key encryption with keyword search
J Baek, R Safavi-Naini, W Susilo
Information Security: 9th International Conference, ISC 2006, Samos Island …, 2006
1492006
Identity-based threshold signature scheme from the bilinear pairings
J Baek, Y Zheng
International Conference on Information Technology: Coding and Computing …, 2004
1482004
Secret computation with secrets for mobile agent using one-time proxy signature
H Kim, J Baek, B Lee, K Kim
Cryptography and information security 2001, 845-850, 2001
1452001
Revocable attribute-based encryption with data integrity in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 2864-2872, 2021
1292021
Certificate-based signature schemes without pairings or random oracles
JK Liu, J Baek, W Susilo, J Zhou
International Conference on Information Security, 285-297, 2008
1192008
New constructions of fuzzy identity-based encryption
J Baek, W Susilo, J Zhou
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1182007
Lightweight encryption for smart home
S Al Salami, J Baek, K Salah, E Damiani
2016 11th International conference on availability, reliability and security …, 2016
1172016
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 2907-2919, 2021
1052021
Strongly secure certificateless public key encryption without pairing
Y Sun, F Zhang, J Baek
Cryptology and Network Security: 6th International Conference, CANS 2007 …, 2007
892007
A new ADS-B authentication framework based on efficient hierarchical identity-based signature with batch verification
A Yang, X Tan, J Baek, DS Wong
IEEE Transactions on Services Computing 10 (2), 165-175, 2015
832015
Improving fairness and privacy of Zhou-Gollmann's fair non-repudiation protocol
K Kim, S Park, J Baek
Proceedings of the 1999 ICPP Workshops on Collaboration and Mobile Computing …, 1999
681999
The system can't perform the operation now. Try again later.
Articles 1–20