Intae Kim

Orcid: 0000-0001-8603-4401

According to our database1, Intae Kim authored at least 23 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
PCSF: Privacy-Preserving Content-Based Spam Filter.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption.
IEEE Trans. Dependable Secur. Comput., 2022

Functional Encryption for Pattern Matching with a Hidden String.
Cryptogr., 2022

TLS Goes Low Cost: When TLS Meets Edge.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

2021
Pattern Matching over Encrypted Data with a Short Ciphertext.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

2020
An efficient public key functional encryption for inner product evaluations.
Neural Comput. Appl., 2020

Efficient Anonymous Multi-group Broadcast Encryption.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

2018
An efficient detection of TCP Syn flood attacks with spoofed IP addresses.
J. Intell. Fuzzy Syst., 2018

2016
An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs.
IEEE Trans. Computers, 2016

Efficient certificate-based encryption schemes without pairing.
Secur. Commun. Networks, 2016

2015
Evaluation of Chemical Interactions between Small Molecules in the Gas Phase Using Chemical Force Microscopy.
Sensors, 2015

Optical Detection of Paraoxon Using Single-Walled Carbon Nanotube Films with Attached Organophosphorus Hydrolase-Expressed <i>Escherichia coli</i>.
Sensors, 2015

Privacy preserving revocable predicate encryption revisited.
Secur. Commun. Networks, 2015

2014
Efficient identity-based broadcast signcryption schemes.
Secur. Commun. Networks, 2014

Modeling and simulation of pyroprocessing oxide reduction.
Proceedings of the 4th International Conference On Simulation And Modeling Methodologies, 2014

Discrete Event System Based Pyroprocessing Modeling and Simulation.
Proceedings of the ICINCO 2014 - Proceedings of the 11th International Conference on Informatics in Control, Automation and Robotics, Volume 1, Vienna, Austria, 1, 2014

2013
An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks.
IEICE Trans. Commun., 2013

2012
Flexible authorization in home network environments.
Clust. Comput., 2012

An Efficient Anonymous Identity-Based Broadcast Encryption for Large-Scale Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012

2011
Implementation of Bilinear Pairings over Elliptic Curves with Embedding Degree 24.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

2010
Secure OSGi Platform against Service Injection.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

2006
Service Mobility Manager for OSGi Framework.
Proceedings of the Computational Science and Its Applications, 2006


  Loading...