The SCEAS System
| |||||||

## Search the dblp DataBase
Joonsang Baek:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Joonsang Baek, Byoungcheon Lee, Kwangjo Kim
**Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption.**[Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:49-58 [Conf] - Ron Steinfeld, Joonsang Baek, Yuliang Zheng
**On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes.**[Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:241-256 [Conf] - Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
**Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature).**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:644-661 [Conf] - Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo
**Self-organised group key management for ad hoc networks.**[Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:138-147 [Conf] - Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek
**Concurrently-secure credential ownership proofs.**[Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:161-172 [Conf] - Joonsang Baek, Willy Susilo, Jianying Zhou
**New constructions of fuzzy identity-based encryption.**[Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:368-370 [Conf] - Kwangjo Kim, Sangjoon Park, Joonsang Baek
**Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol.**[Citation Graph (0, 0)][DBLP] ICPP Workshops, 1999, pp:140-145 [Conf] - Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
**Token-Controlled Public Key Encryption.**[Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:386-397 [Conf] - Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
**Certificateless Public Key Encryption Without Pairing.**[Citation Graph (0, 0)][DBLP] ISC, 2005, pp:134-148 [Conf] - Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
**On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search.**[Citation Graph (0, 0)][DBLP] ISC, 2006, pp:217-232 [Conf] - Joonsang Baek, Yuliang Zheng
**Identity-Based Threshold Signature Scheme from the Bilinear Pairings.**[Citation Graph (0, 0)][DBLP] ITCC (1), 2004, pp:124-128 [Conf] - Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen
**Server-Aided RSA Key Generation Against Collusion Attack.**[Citation Graph (0, 0)][DBLP] MADNES, 2005, pp:27-37 [Conf] - Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
**Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2005, pp:380-397 [Conf] - Joonsang Baek, Ron Steinfeld, Yuliang Zheng
**Formal Proofs for the Security of Signcryption.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2002, pp:80-98 [Conf] - Joonsang Baek, Yuliang Zheng
**Identity-Based Threshold Decryption.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2004, pp:262-276 [Conf] - Joonsang Baek, Yuliang Zheng
**Zheng and Seberry's public key encryption scheme revisited.**[Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2003, v:2, n:1, pp:37-44 [Journal] - Yinxia Sun, Futai Zhang, Joonsang Baek
**Strongly Secure Certificateless Public Key Encryption Without Pairing.**[Citation Graph (0, 0)][DBLP] CANS, 2007, pp:194-208 [Conf] - Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao
**On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:43-60 [Conf] - Joonsang Baek, Ron Steinfeld, Yuliang Zheng
**Formal Proofs for the Security of Signcryption.**[Citation Graph (0, 0)][DBLP] J. Cryptology, 2007, v:20, n:2, pp:203-235 [Journal] **Generic Constructions of Stateful Public Key Encryption and Their Applications.**[Citation Graph (, )][DBLP]**A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.**[Citation Graph (, )][DBLP]**Public Key Encryption with Keyword Search Revisited.**[Citation Graph (, )][DBLP]**Certificate-Based Signature Schemes without Pairings or Random Oracles.**[Citation Graph (, )][DBLP]**Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework).**[Citation Graph (, )][DBLP]**Realizing Stateful Public Key Encryption in Wireless Sensor Network.**[Citation Graph (, )][DBLP]**Certificate-based sequential aggregate signature.**[Citation Graph (, )][DBLP]
Search in 0.177secs, Finished in 0.179secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |