| 2009 |
| 26 | EE | Joseph K. Liu,
Joonsang Baek,
Jianying Zhou:
Certificate-based sequential aggregate signature.
WISEC 2009: 21-28 |
| 2008 |
| 25 | | Joonsang Baek,
Feng Bao,
Kefei Chen,
Xuejia Lai:
Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings
Springer 2008 |
| 24 | EE | Joonsang Baek,
Jianying Zhou,
Feng Bao:
Generic Constructions of Stateful Public Key Encryption and Their Applications.
ACNS 2008: 75-93 |
| 23 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Public Key Encryption with Keyword Search Revisited.
ICCSA (1) 2008: 1249-1259 |
| 22 | EE | Joseph K. Liu,
Joonsang Baek,
Willy Susilo,
Jianying Zhou:
Certificate-Based Signature Schemes without Pairings or Random Oracles.
ISC 2008: 285-297 |
| 21 | EE | Joonsang Baek,
David Galindo,
Willy Susilo,
Jianying Zhou:
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework).
SCN 2008: 358-374 |
| 20 | EE | Joonsang Baek,
Han Chiang Tan,
Jianying Zhou,
Jun Wen Wong:
Realizing Stateful Public Key Encryption in Wireless Sensor Network.
SEC 2008: 95-107 |
| 2007 |
| 19 | EE | Siamak Fayyaz Shahandashti,
Reihaneh Safavi-Naini,
Joonsang Baek:
Concurrently-secure credential ownership proofs.
ASIACCS 2007: 161-172 |
| 18 | EE | Joonsang Baek,
Willy Susilo,
Jianying Zhou:
New constructions of fuzzy identity-based encryption.
ASIACCS 2007: 368-370 |
| 17 | EE | Yinxia Sun,
Futai Zhang,
Joonsang Baek:
Strongly Secure Certificateless Public Key Encryption Without Pairing.
CANS 2007: 194-208 |
| 16 | EE | Guilin Wang,
Joonsang Baek,
Duncan S. Wong,
Feng Bao:
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.
Public Key Cryptography 2007: 43-60 |
| 15 | EE | Joonsang Baek,
Ron Steinfeld,
Yuliang Zheng:
Formal Proofs for the Security of Signcryption.
J. Cryptology 20(2): 203-235 (2007) |
| 2006 |
| 14 | EE | Ling Luo,
Reihaneh Safavi-Naini,
Joonsang Baek,
Willy Susilo:
Self-organised group key management for ad hoc networks.
ASIACCS 2006: 138-147 |
| 13 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search.
ISC 2006: 217-232 |
| 2005 |
| 12 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature).
ASIACRYPT 2005: 644-661 |
| 11 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Certificateless Public Key Encryption Without Pairing.
ISC 2005: 134-148 |
| 10 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Token-Controlled Public Key Encryption.
ISPEC 2005: 386-397 |
| 9 | EE | Yun Chen,
Reihaneh Safavi-Naini,
Joonsang Baek,
Xin Chen:
Server-Aided RSA Key Generation Against Collusion Attack.
MADNES 2005: 27-37 |
| 8 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption.
Public Key Cryptography 2005: 380-397 |
| 2004 |
| 7 | EE | Joonsang Baek,
Yuliang Zheng:
Identity-Based Threshold Signature Scheme from the Bilinear Pairings.
ITCC (1) 2004: 124-128 |
| 6 | EE | Joonsang Baek,
Yuliang Zheng:
Identity-Based Threshold Decryption.
Public Key Cryptography 2004: 262-276 |
| 2003 |
| 5 | EE | Joonsang Baek,
Yuliang Zheng:
Zheng and Seberry's public key encryption scheme revisited.
Int. J. Inf. Sec. 2(1): 37-44 (2003) |
| 2002 |
| 4 | EE | Ron Steinfeld,
Joonsang Baek,
Yuliang Zheng:
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes.
ACISP 2002: 241-256 |
| 3 | EE | Joonsang Baek,
Ron Steinfeld,
Yuliang Zheng:
Formal Proofs for the Security of Signcryption.
Public Key Cryptography 2002: 80-98 |
| 2000 |
| 2 | | Joonsang Baek,
Byoungcheon Lee,
Kwangjo Kim:
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption.
ACISP 2000: 49-58 |
| 1999 |
| 1 | EE | Kwangjo Kim,
Sangjoon Park,
Joonsang Baek:
Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol.
ICPP Workshops 1999: 140-145 |