Joonsang Baek
Orcid: 0000-0003-2613-2127
According to our database1,
Joonsang Baek
authored at least 102 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2024
Sensors, 2024
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Inf. Forensics Secur., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
2022
Security Analysis of "SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks".
IEEE Trans. Inf. Forensics Secur., 2022
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption.
IEEE Trans. Dependable Secur. Comput., 2022
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning.
J. Netw. Comput. Appl., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Information Security Applications - 22nd International Conference, 2021
Proceedings of the Information Security Applications - 22nd International Conference, 2021
2020
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions.
J. Internet Serv. Inf. Secur., 2020
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
J. Univers. Comput. Sci., 2019
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
Efficient Controlled Signature for a Large Network with Multi Security-level Setting.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
Guest Editorial: Security and Privacy for Contemporary Network Computing Environment.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
A privacy preserving and fine-grained access control scheme in DaaS based on efficient DSP re-encryption.
Int. J. High Perform. Comput. Netw., 2018
IEEE Access Special Section Editorial: Security and Privacy in Applications and Services for Future Internet of Things.
IEEE Access, 2018
2017
A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification.
IEEE Trans. Serv. Comput., 2017
How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption.
IEEE Trans. Intell. Transp. Syst., 2017
Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017
Proceedings of the Information Security Practice and Experience, 2017
2016
IEICE Trans. Inf. Syst., 2016
Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction.
Comput. J., 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid.
IEEE Trans. Cloud Comput., 2015
Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature.
Secur. Commun. Networks, 2015
Mob. Inf. Syst., 2015
How to protect ADS-B: Confidentiality framework for future air traffic communication.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the Information Systems Security and Privacy, 2015
Proceedings of the ICISSP 2015, 2015
2013
Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Comput. J., 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Feasibility analysis of transportation applications based on APIs of social network services.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
An Authentication Framework for Automatic Dependent Surveillance-Broadcast Based on Online/Offline Identity-Based Signature.
Proceedings of the Eighth International Conference on P2P, 2013
2012
An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments.
IEICE Trans. Inf. Syst., 2012
Smart-frame: A flexible, scalable, and secure information management framework for smart grids.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
IEEE Trans. Consumer Electron., 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the Practical Signcryption, 2010
Sensors, 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010
2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.
Proceedings of the Public Key Cryptography, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
2006
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search.
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption.
Proceedings of the Public Key Cryptography, 2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Information Security Practice and Experience, 2005
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature).
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
2003
Proceedings of the Global Telecommunications Conference, 2003
2002
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2000
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999