Joonsang Baek
Joonsang Baek
Senior Lecturer, University of Wollongong, Australia
Verified email at uow.edu.au
TitleCited byYear
Public key encryption with keyword search revisited
J Baek, R Safavi-Naini, W Susilo
International conference on Computational Science and Its Applications, 1249 …, 2008
4602008
Formal proofs for the security of signcryption
J Baek, R Steinfeld, Y Zheng
International Workshop on Public Key Cryptography, 80-98, 2002
3112002
Certificateless public key encryption without pairing
J Baek, R Safavi-Naini, W Susilo
International Conference on Information Security, 134-148, 2005
2512005
Identity-based threshold decryption
J Baek, Y Zheng
International Workshop on Public Key Cryptography, 262-276, 2004
2472004
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
J Baek, R Safavi-Naini, W Susilo
International Workshop on Public Key Cryptography, 380-397, 2005
1932005
A secure cloud computing based framework for big data information management of smart grid
J Baek, QH Vu, JK Liu, X Huang, Y Xiang
IEEE transactions on cloud computing 3 (2), 233-244, 2014
1922014
Formal proofs for the security of signcryption
J Baek, R Steinfeld, Y Zheng
Journal of cryptology 20 (2), 203-235, 2007
1522007
Secret computation with secrets for mobile agent using one-time proxy signature
H Kim, J Baek, B Lee, K Kim
Cryptography and information security 2001, 845-850, 2001
1322001
Identity-based threshold signature scheme from the bilinear pairings
J Baek, Y Zheng
International Conference on Information Technology: Coding and Computing …, 2004
1312004
Efficient online/offline identity-based signature for wireless sensor network
JK Liu, J Baek, J Zhou, Y Yang, JW Wong
International Journal of Information Security 9 (4), 287-296, 2010
1282010
A survey of identity-based cryptography
J Baek, J Newmarch, R Safavi-Naini, W Susilo
Proc. of Australian Unix Users Group Annual Conference, 95-102, 2004
1242004
On the integration of public key data encryption and public key encryption with keyword search
J Baek, R Safavi-Naini, W Susilo
International Conference on Information Security, 217-232, 2006
1042006
Certificate-based signature schemes without pairings or random oracles
JK Liu, J Baek, W Susilo, J Zhou
International Conference on Information Security, 285-297, 2008
1022008
New constructions of fuzzy identity-based encryption
J Baek, W Susilo, J Zhou
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
992007
Strongly secure certificateless public key encryption without pairing
Y Sun, F Zhang, J Baek
International Conference on Cryptology and Network Security, 194-208, 2007
702007
Improving fairness and privacy of Zhou-Gollmann's fair non-repudiation protocol
K Kim, S Park, J Baek
Proceedings of the 1999 ICPP Workshops on Collaboration and Mobile Computing …, 1999
631999
Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature)
J Baek, R Safavi-Naini, W Susilo
International Conference on the Theory and Application of Cryptology and …, 2005
502005
Authentication and key establishment in dynamic wireless sensor networks
Y Qiu, J Zhou, J Baek, J Lopez
Sensors 10 (4), 3718-3731, 2010
392010
Lightweight encryption for smart home
S Al Salami, J Baek, K Salah, E Damiani
2016 11th International Conference on Availability, Reliability and Security …, 2016
352016
Still jumping on the balance beam: Continued use of perceptual motor programs in Australian schools
J Stephenson, M Carter, K Wheldall
Australian journal of Education 51 (1), 6-18, 2007
35*2007
The system can't perform the operation now. Try again later.
Articles 1–20