2009 |
26 | EE | Joseph K. Liu,
Joonsang Baek,
Jianying Zhou:
Certificate-based sequential aggregate signature.
WISEC 2009: 21-28 |
2008 |
25 | | Joonsang Baek,
Feng Bao,
Kefei Chen,
Xuejia Lai:
Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings
Springer 2008 |
24 | EE | Joonsang Baek,
Jianying Zhou,
Feng Bao:
Generic Constructions of Stateful Public Key Encryption and Their Applications.
ACNS 2008: 75-93 |
23 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Public Key Encryption with Keyword Search Revisited.
ICCSA (1) 2008: 1249-1259 |
22 | EE | Joseph K. Liu,
Joonsang Baek,
Willy Susilo,
Jianying Zhou:
Certificate-Based Signature Schemes without Pairings or Random Oracles.
ISC 2008: 285-297 |
21 | EE | Joonsang Baek,
David Galindo,
Willy Susilo,
Jianying Zhou:
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework).
SCN 2008: 358-374 |
20 | EE | Joonsang Baek,
Han Chiang Tan,
Jianying Zhou,
Jun Wen Wong:
Realizing Stateful Public Key Encryption in Wireless Sensor Network.
SEC 2008: 95-107 |
2007 |
19 | EE | Siamak Fayyaz Shahandashti,
Reihaneh Safavi-Naini,
Joonsang Baek:
Concurrently-secure credential ownership proofs.
ASIACCS 2007: 161-172 |
18 | EE | Joonsang Baek,
Willy Susilo,
Jianying Zhou:
New constructions of fuzzy identity-based encryption.
ASIACCS 2007: 368-370 |
17 | EE | Yinxia Sun,
Futai Zhang,
Joonsang Baek:
Strongly Secure Certificateless Public Key Encryption Without Pairing.
CANS 2007: 194-208 |
16 | EE | Guilin Wang,
Joonsang Baek,
Duncan S. Wong,
Feng Bao:
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.
Public Key Cryptography 2007: 43-60 |
15 | EE | Joonsang Baek,
Ron Steinfeld,
Yuliang Zheng:
Formal Proofs for the Security of Signcryption.
J. Cryptology 20(2): 203-235 (2007) |
2006 |
14 | EE | Ling Luo,
Reihaneh Safavi-Naini,
Joonsang Baek,
Willy Susilo:
Self-organised group key management for ad hoc networks.
ASIACCS 2006: 138-147 |
13 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search.
ISC 2006: 217-232 |
2005 |
12 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature).
ASIACRYPT 2005: 644-661 |
11 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Certificateless Public Key Encryption Without Pairing.
ISC 2005: 134-148 |
10 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Token-Controlled Public Key Encryption.
ISPEC 2005: 386-397 |
9 | EE | Yun Chen,
Reihaneh Safavi-Naini,
Joonsang Baek,
Xin Chen:
Server-Aided RSA Key Generation Against Collusion Attack.
MADNES 2005: 27-37 |
8 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption.
Public Key Cryptography 2005: 380-397 |
2004 |
7 | EE | Joonsang Baek,
Yuliang Zheng:
Identity-Based Threshold Signature Scheme from the Bilinear Pairings.
ITCC (1) 2004: 124-128 |
6 | EE | Joonsang Baek,
Yuliang Zheng:
Identity-Based Threshold Decryption.
Public Key Cryptography 2004: 262-276 |
2003 |
5 | EE | Joonsang Baek,
Yuliang Zheng:
Zheng and Seberry's public key encryption scheme revisited.
Int. J. Inf. Sec. 2(1): 37-44 (2003) |
2002 |
4 | EE | Ron Steinfeld,
Joonsang Baek,
Yuliang Zheng:
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes.
ACISP 2002: 241-256 |
3 | EE | Joonsang Baek,
Ron Steinfeld,
Yuliang Zheng:
Formal Proofs for the Security of Signcryption.
Public Key Cryptography 2002: 80-98 |
2000 |
2 | | Joonsang Baek,
Byoungcheon Lee,
Kwangjo Kim:
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption.
ACISP 2000: 49-58 |
1999 |
1 | EE | Kwangjo Kim,
Sangjoon Park,
Joonsang Baek:
Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol.
ICPP Workshops 1999: 140-145 |