Joonsang Baek

Orcid: 0000-0003-2613-2127

According to our database1, Joonsang Baek authored at least 101 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2024

5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy.
Sensors, 2024

IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
PCSF: Privacy-Preserving Content-Based Spam Filter.
IEEE Trans. Inf. Forensics Secur., 2023

Withdrawable Signature: How to Call off a Signature.
IACR Cryptol. ePrint Arch., 2023

Hyron: A New Approach for Automating the Network ACL Delivery Pipeline.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

2022
Security Analysis of "SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks".
IEEE Trans. Inf. Forensics Secur., 2022

Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption.
IEEE Trans. Dependable Secur. Comput., 2022

A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

Revocable Attribute-Based Encryption With Data Integrity in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

Functional Encryption for Pattern Matching with a Hidden String.
Cryptogr., 2022

TLS Goes Low Cost: When TLS Meets Edge.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

2021
Exploiting QR Code Error Correction for Digital Image Watermarking.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Utilizing QR codes to verify the visual fidelity of image datasets for machine learning.
J. Netw. Comput. Appl., 2021

P2DPI: Practical and Privacy-Preserving Deep Packet Inspection.
IACR Cryptol. ePrint Arch., 2021

Secure Computation of Shared Secrets and Its Applications.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

Pattern Matching over Encrypted Data with a Short Ciphertext.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

2020
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions.
J. Internet Serv. Inf. Secur., 2020

Lattice-based Unidirectional IBPRE Secure in Standard Model.
CoRR, 2020

Aggregatable Certificateless Designated Verifier Signature.
IEEE Access, 2020

Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Efficient Anonymous Multi-group Broadcast Encryption.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
J. Univers. Comput. Sci., 2019

Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Efficient Controlled Signature for a Large Network with Multi Security-level Setting.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

On the Security of a Privacy-Preserving Ranked Multi-Keyword Search Scheme.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Guest Editorial: Security and Privacy for Contemporary Network Computing Environment.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2019

Subversion in Practice: How to Efficiently Undermine Signatures.
IEEE Access, 2019

Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof.
Proceedings of the Information Security Applications - 20th International Conference, 2019

QR Code Watermarking for Digital Images.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Aggregate Authentication for Massive Internet of Things in 5G Networks.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019

Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
A privacy preserving and fine-grained access control scheme in DaaS based on efficient DSP re-encryption.
Int. J. High Perform. Comput. Netw., 2018

IEEE Access Special Section Editorial: Security and Privacy in Applications and Services for Future Internet of Things.
IEEE Access, 2018

2017
Lightweight Security Protocol for ECG Bio-Sensors.
Wirel. Pers. Commun., 2017

A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification.
IEEE Trans. Serv. Comput., 2017

How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption.
IEEE Trans. Intell. Transp. Syst., 2017

Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Covert QR Codes: How to Hide in the Crowd.
Proceedings of the Information Security Practice and Experience, 2017

2016
Efficient Subversion of Symmetric Encryption with Random Initialization Vector.
IEICE Trans. Inf. Syst., 2016

Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction.
Comput. J., 2016

Subverting MAC: How authentication in mobile environment can be undermined.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Lightweight Encryption for Smart Home.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid.
IEEE Trans. Cloud Comput., 2015

Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature.
Secur. Commun. Networks, 2015

Server-Aided Verification Signature with Privacy for Mobile Computing.
Mob. Inf. Syst., 2015

How to protect ADS-B: Confidentiality framework for future air traffic communication.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Secure Communication in Civil Drones.
Proceedings of the Information Systems Security and Privacy, 2015

On the Power Consumption of Cryptographic Processors in Civil Microdrones.
Proceedings of the ICISSP 2015, 2015

2013
Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure.
Comput. J., 2013

Public key infrastructure for UAE: a case study.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Feasibility analysis of transportation applications based on APIs of social network services.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

An Authentication Framework for Automatic Dependent Surveillance-Broadcast Based on Online/Offline Identity-Based Signature.
Proceedings of the Eighth International Conference on P2P, 2013

2012
An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments.
IEICE Trans. Inf. Syst., 2012

Smart-frame: A flexible, scalable, and secure information management framework for smart grids.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Efficient Generic Construction of Forward-Secure Identity-Based Signature.
Proceedings of the Seventh International Conference on Availability, 2012

2011
An efficient and scalable re-authentication protocol over wireless sensor network.
IEEE Trans. Consumer Electron., 2011

The use of Boolean functions in stream ciphers.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Survey on certificateless public key cryptography.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Study on Secret Sharing Schemes (SSS) and their applications.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Survey on computationally hard problems and their applications to cryptography.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

On the security of the identity-based encryption based on DHIES from ASIACCS 2010.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Compact identity-based encryption without strong symmetric cipher.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Security for Signcryption: The Multi-User Model.
Proceedings of the Practical Signcryption, 2010

Authentication and Key Establishment in Dynamic Wireless Sensor Networks.
Sensors, 2010

Efficient online/offline identity-based signature for wireless sensor network.
Int. J. Inf. Sec., 2010

Online/Offline Identity-Based Signcryption Revisited.
IACR Cryptol. ePrint Arch., 2010

A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

2009
Certificate-based sequential aggregate signature.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

2008
Certificate-Based Signature Schemes without Pairings or Random Oracles.
IACR Cryptol. ePrint Arch., 2008

A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.
IACR Cryptol. ePrint Arch., 2008

Realizing Stateful Public Key Encryption in Wireless Sensor Network.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework).
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Generic Constructions of Stateful Public Key Encryption and Their Applications.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Formal Proofs for the Security of Signcryption.
J. Cryptol., 2007

New Constructions of Fuzzy Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2007

On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.
Proceedings of the Public Key Cryptography, 2007

Concurrently-secure credential ownership proofs.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Strongly Secure Certificateless Public Key Encryption Without Pairing.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

2006
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search.
Proceedings of the Information Security, 9th International Conference, 2006

Self-organised group key management for ad hoc networks.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Public Key Encryption with Keyword Search Revisited.
IACR Cryptol. ePrint Arch., 2005

Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption.
Proceedings of the Public Key Cryptography, 2005

Server-Aided RSA Key Generation Against Collusion Attack.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Certificateless Public Key Encryption Without Pairing.
Proceedings of the Information Security, 8th International Conference, 2005

Token-Controlled Public Key Encryption.
Proceedings of the Information Security Practice and Experience, 2005

Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature).
Proceedings of the Advances in Cryptology, 2005

2004
Identity-Based Threshold Signature Scheme from the Bilinear Pairings.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

2003
Zheng and Seberry's public key encryption scheme revisited.
Int. J. Inf. Sec., 2003

Identity-Based Threshold Decryption.
IACR Cryptol. ePrint Arch., 2003

Simple and efficient threshold cryptosystem from the Gap Diffie-Hellman group.
Proceedings of the Global Telecommunications Conference, 2003

2002
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2000
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999


  Loading...