The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Joonsang Baek: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joonsang Baek, Byoungcheon Lee, Kwangjo Kim
    Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:49-58 [Conf]
  2. Ron Steinfeld, Joonsang Baek, Yuliang Zheng
    On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:241-256 [Conf]
  3. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:644-661 [Conf]
  4. Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo
    Self-organised group key management for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:138-147 [Conf]
  5. Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek
    Concurrently-secure credential ownership proofs. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:161-172 [Conf]
  6. Joonsang Baek, Willy Susilo, Jianying Zhou
    New constructions of fuzzy identity-based encryption. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:368-370 [Conf]
  7. Kwangjo Kim, Sangjoon Park, Joonsang Baek
    Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:140-145 [Conf]
  8. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    Token-Controlled Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:386-397 [Conf]
  9. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    Certificateless Public Key Encryption Without Pairing. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:134-148 [Conf]
  10. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:217-232 [Conf]
  11. Joonsang Baek, Yuliang Zheng
    Identity-Based Threshold Signature Scheme from the Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:124-128 [Conf]
  12. Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen
    Server-Aided RSA Key Generation Against Collusion Attack. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:27-37 [Conf]
  13. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:380-397 [Conf]
  14. Joonsang Baek, Ron Steinfeld, Yuliang Zheng
    Formal Proofs for the Security of Signcryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:80-98 [Conf]
  15. Joonsang Baek, Yuliang Zheng
    Identity-Based Threshold Decryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:262-276 [Conf]
  16. Joonsang Baek, Yuliang Zheng
    Zheng and Seberry's public key encryption scheme revisited. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2003, v:2, n:1, pp:37-44 [Journal]
  17. Yinxia Sun, Futai Zhang, Joonsang Baek
    Strongly Secure Certificateless Public Key Encryption Without Pairing. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:194-208 [Conf]
  18. Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao
    On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:43-60 [Conf]
  19. Joonsang Baek, Ron Steinfeld, Yuliang Zheng
    Formal Proofs for the Security of Signcryption. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:2, pp:203-235 [Journal]

  20. Generic Constructions of Stateful Public Key Encryption and Their Applications. [Citation Graph (, )][DBLP]


  21. A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. [Citation Graph (, )][DBLP]


  22. Public Key Encryption with Keyword Search Revisited. [Citation Graph (, )][DBLP]


  23. Certificate-Based Signature Schemes without Pairings or Random Oracles. [Citation Graph (, )][DBLP]


  24. Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). [Citation Graph (, )][DBLP]


  25. Realizing Stateful Public Key Encryption in Wireless Sensor Network. [Citation Graph (, )][DBLP]


  26. Certificate-based sequential aggregate signature. [Citation Graph (, )][DBLP]


Search in 0.177secs, Finished in 0.179secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002