|
Search the dblp DataBase
Joonsang Baek:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Joonsang Baek, Byoungcheon Lee, Kwangjo Kim
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:49-58 [Conf]
- Ron Steinfeld, Joonsang Baek, Yuliang Zheng
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:241-256 [Conf]
- Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:644-661 [Conf]
- Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo
Self-organised group key management for ad hoc networks. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:138-147 [Conf]
- Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek
Concurrently-secure credential ownership proofs. [Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:161-172 [Conf]
- Joonsang Baek, Willy Susilo, Jianying Zhou
New constructions of fuzzy identity-based encryption. [Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:368-370 [Conf]
- Kwangjo Kim, Sangjoon Park, Joonsang Baek
Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 1999, pp:140-145 [Conf]
- Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
Token-Controlled Public Key Encryption. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:386-397 [Conf]
- Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
Certificateless Public Key Encryption Without Pairing. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:134-148 [Conf]
- Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:217-232 [Conf]
- Joonsang Baek, Yuliang Zheng
Identity-Based Threshold Signature Scheme from the Bilinear Pairings. [Citation Graph (0, 0)][DBLP] ITCC (1), 2004, pp:124-128 [Conf]
- Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen
Server-Aided RSA Key Generation Against Collusion Attack. [Citation Graph (0, 0)][DBLP] MADNES, 2005, pp:27-37 [Conf]
- Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2005, pp:380-397 [Conf]
- Joonsang Baek, Ron Steinfeld, Yuliang Zheng
Formal Proofs for the Security of Signcryption. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2002, pp:80-98 [Conf]
- Joonsang Baek, Yuliang Zheng
Identity-Based Threshold Decryption. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2004, pp:262-276 [Conf]
- Joonsang Baek, Yuliang Zheng
Zheng and Seberry's public key encryption scheme revisited. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2003, v:2, n:1, pp:37-44 [Journal]
- Yinxia Sun, Futai Zhang, Joonsang Baek
Strongly Secure Certificateless Public Key Encryption Without Pairing. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:194-208 [Conf]
- Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:43-60 [Conf]
- Joonsang Baek, Ron Steinfeld, Yuliang Zheng
Formal Proofs for the Security of Signcryption. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2007, v:20, n:2, pp:203-235 [Journal]
Generic Constructions of Stateful Public Key Encryption and Their Applications. [Citation Graph (, )][DBLP]
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. [Citation Graph (, )][DBLP]
Public Key Encryption with Keyword Search Revisited. [Citation Graph (, )][DBLP]
Certificate-Based Signature Schemes without Pairings or Random Oracles. [Citation Graph (, )][DBLP]
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). [Citation Graph (, )][DBLP]
Realizing Stateful Public Key Encryption in Wireless Sensor Network. [Citation Graph (, )][DBLP]
Certificate-based sequential aggregate signature. [Citation Graph (, )][DBLP]
Search in 0.177secs, Finished in 0.179secs
|