Jongkil Kim

Orcid: 0000-0001-5755-108X

According to our database1, Jongkil Kim authored at least 39 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy.
Sensors, 2024

IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
PCSF: Privacy-Preserving Content-Based Spam Filter.
IEEE Trans. Inf. Forensics Secur., 2023

Backward Compatible Identity-Based Encryption.
Sensors, 2023

2022
Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns.
J. Imaging, December, 2022

Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks.
IEEE Internet Things J., 2022

Functional Encryption for Pattern Matching with a Hidden String.
Cryptogr., 2022

TLS Goes Low Cost: When TLS Meets Edge.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

2021
Exploiting QR Code Error Correction for Digital Image Watermarking.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Utilizing QR codes to verify the visual fidelity of image datasets for machine learning.
J. Netw. Comput. Appl., 2021

P2DPI: Practical and Privacy-Preserving Deep Packet Inspection.
IACR Cryptol. ePrint Arch., 2021

Pattern Matching over Encrypted Data with a Short Ciphertext.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

Trojan Attacks and Defense for Speech Recognition.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Efficient Anonymous Multi-group Broadcast Encryption.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Guest Editorial: Security and Privacy for Contemporary Network Computing Environment.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Puncturable Proxy Re-Encryption supporting to Group Messaging Service.
IACR Cryptol. ePrint Arch., 2019

A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2019

Subversion in Practice: How to Efficiently Undermine Signatures.
IEEE Access, 2019

Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof.
Proceedings of the Information Security Applications - 20th International Conference, 2019

QR Code Watermarking for Digital Images.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Functional encryption for computational hiding in prime order groups via pair encodings.
Des. Codes Cryptogr., 2018

Security and Performance Considerations in ROS 2: A Balancing Act.
CoRR, 2018

Crowdsensing and privacy in smart city applications.
CoRR, 2018

Internet of Things (IoT) and Cloud Computing Enabled Disaster Management.
CoRR, 2018

2017
Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication.
IACR Cryptol. ePrint Arch., 2017

An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2016

A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage.
Data Sci. Eng., 2016

A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

2015
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext.
IEEE Trans. Inf. Forensics Secur., 2015

2013
Efficient Semi-static Secure Broadcast Encryption Scheme.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013


  Loading...