Follow
Jongkil Kim
Jongkil Kim
Verified email at ewha.ac.kr
Title
Cited by
Cited by
Year
Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext
J Kim, W Susilo, MH Au, J Seberry
IEEE Transactions on Information Forensics and Security 10 (3), 679-693, 2015
822015
Security and performance considerations in ros 2: A balancing act
J Kim, JM Smereka, C Cheung, S Nepal, M Grobler
arXiv preprint arXiv:1809.09566, 2018
592018
Harnessing policy authenticity for hidden ciphertext policy attribute-based encryption
I Kim, W Susilo, J Baek, J Kim
IEEE Transactions on Dependable and Secure Computing 19 (3), 1856-1870, 2020
342020
P2DPI: practical and privacy-preserving deep packet inspection
J Kim, S Camtepe, J Baek, W Susilo, J Pieprzyk, S Nepal
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
262021
A cryptographically enforced access control with a flexible user revocation on untrusted cloud storage
J Kim, S Nepal
Data Science and Engineering 1 (3), 149-160, 2016
252016
Efficient semi-static secure broadcast encryption scheme
J Kim, W Susilo, MH Au, J Seberry
Pairing-Based Cryptography–Pairing 2013: 6th International Conference …, 2014
212014
Efficient IoT management with resilience to unauthorized access to cloud storage
C Hahn, J Kim, H Kwon, J Hur
IEEE transactions on cloud computing 10 (2), 1008-1020, 2020
182020
Crowdsensing and privacy in smart city applications
R Gaire, RK Ghosh, J Kim, A Krumpholz, R Ranjan, RK Shyamasundar, ...
Smart cities cybersecurity and privacy, 57-73, 2019
172019
Internet of Things (IoT) and cloud computing enabled disaster management
R Gaire, C Sriharsha, D Puthal, H Wijaya, J Kim, P Keshari, R Ranjan, ...
Handbook of Integration of Cloud Computing, Cyber Physical Systems and …, 2020
162020
Identity-based broadcast encryption with outsourced partial decryption for hybrid security models in edge computing
J Kim, S Camtepe, W Susilo, S Nepal, J Baek
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
162019
Puncturable proxy re-encryption supporting to group messaging service
TVX Phuong, W Susilo, J Kim, G Yang, D Liu
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
152019
Compact-LWE: Enabling practically lightweight public key encryption for leveled IoT device authentication
D Liu, N Li, J Kim, S Nepal
Cryptology ePrint Archive, 2017
152017
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning
YW Chow, W Susilo, J Wang, R Buckland, J Baek, J Kim, N Li
Journal of Network and Computer Applications 173, 102834, 2021
122021
Inspecting TLS anytime anywhere: a new approach to TLS interception
J Baek, J Kim, W Susilo
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
122020
An efficient KP-ABE with short ciphertexts in prime ordergroups under standard assumption
J Kim, W Susilo, F Guo, MH Au, S Nepal
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
122017
Subversion in practice: How to efficiently undermine signatures
J Baek, W Susilo, J Kim, YW Chow
IEEE Access 7, 68799-68811, 2019
102019
A tag based encoding: an efficient encoding for predicate encryption in prime order groups
J Kim, W Susilo, F Guo, MH Au
Security and Cryptography for Networks: 10th International Conference, SCN …, 2016
102016
Ciphertext-delegatable CP-ABE for a dynamic credential: A modular approach
J Kim, W Susilo, J Baek, S Nepal, D Liu
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
62019
Verifiable outsourced decryption of encrypted data from heterogeneous trust networks
C Hahn, J Kim
IEEE Internet of Things Journal 9 (22), 22559-22570, 2022
42022
QR code watermarking for digital images
YW Chow, W Susilo, J Baek, J Kim
Information Security Applications: 20th International Conference, WISA 2019 …, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20