What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Joonsang Baek
Google Scholar
ORCID:
0000-0003-2613-2127
37
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
How to Terminate Service Requests in Outsourcing: A Seamless Solution From Withdrawable Signatures.
Xin Liu
Willy Susilo
Joonsang Baek
2025
conf/esorics
Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing.
Joonsang Baek
Seongbong Choi
Willy Susilo
Partha Sarathi Roy
Hyung Tae Lee
2025
conf/uss
AudioMarkNet: Audio Watermarking for Deepfake Speech Detection.
Wei Zong
Yang-Wai Chow
Willy Susilo
Joonsang Baek
Seyit Camtepe
2024
conf/provsec
Generic Construction of Withdrawable Signature from Hash-Then-One-Way Signature.
Xin Liu
Willy Susilo
Joonsang Baek
2023
journals/tifs
PCSF: Privacy-Preserving Content-Based Spam Filter.
Intae Kim
Willy Susilo
Joonsang Baek
Jongkil Kim
Yang-Wai Chow
2022
journals/tifs
Security Analysis of "SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks".
Junjie Jiang
Willy Susilo
Joonsang Baek
2022
conf/wisa
TLS Goes Low Cost: When TLS Meets Edge.
Intae Kim
Willy Susilo
Joonsang Baek
Jongkil Kim
Yang-Wai Chow
2021
conf/asiaccs
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection.
Jongkil Kim
Seyit Camtepe
Joonsang Baek
Willy Susilo
Josef Pieprzyk
Surya Nepal
2021
conf/wisa
Pattern Matching over Encrypted Data with a Short Ciphertext.
Jongkil Kim
Willy Susilo
Yang-Wai Chow
Joonsang Baek
Intae Kim
2021
conf/wisa
Secure Computation of Shared Secrets and Its Applications.
Xin Liu
Willy Susilo
Joonsang Baek
2020
conf/ccs
Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception.
Joonsang Baek
Jongkil Kim
Willy Susilo
2020
conf/acns
Efficient Anonymous Multi-group Broadcast Encryption.
Intae Kim
Seong Oun Hwang
Willy Susilo
Joonsang Baek
Jongkil Kim
2020
conf/wisa
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction.
Priyanka Dutta
Willy Susilo
Dung Hoang Duong
Joonsang Baek
Partha Sarathi Roy
2019
conf/ccs
Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing.
Jongkil Kim
Seyit Camtepe
Willy Susilo
Surya Nepal
Joonsang Baek
2019
conf/acisp
Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach.
Jongkil Kim
Willy Susilo
Joonsang Baek
Surya Nepal
Dongxi Liu
2019
conf/acns
A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups.
Jongkil Kim
Willy Susilo
Fuchun Guo
Joonsang Baek
Nan Li
2019
conf/wisa
QR Code Watermarking for Digital Images.
Yang-Wai Chow
Willy Susilo
Joonsang Baek
Jongkil Kim
2019
conf/wisa
Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof.
Jongkil Kim
Joonsang Baek
Willy Susilo
Yang-Wai Chow
2011
conf/ccs
On the security of the identity-based encryption based on DHIES from ASIACCS 2010.
Willy Susilo
Joonsang Baek
2011
conf/ccs
Compact identity-based encryption without strong symmetric cipher.
Joonsang Baek
Jianying Zhou
2011
conf/ctrsa
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes.
Joonsang Baek
Cheng-Kang Chu
Jianying Zhou
2009
conf/acns
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.
Joonsang Baek
Willy Susilo
Joseph K. Liu
Jianying Zhou
2009
conf/wisec
Certificate-based sequential aggregate signature.
Joseph K. Liu
Joonsang Baek
Jianying Zhou
2008
conf/sec
Realizing Stateful Public Key Encryption in Wireless Sensor Network.
Joonsang Baek
Han Chiang Tan
Jianying Zhou
Jun Wen Wong
2008
conf/acns
Generic Constructions of Stateful Public Key Encryption and Their Applications.
Joonsang Baek
Jianying Zhou
Feng Bao
2007
journals/joc
Formal Proofs for the Security of Signcryption.
Joonsang Baek
Ron Steinfeld
Yuliang Zheng
2007
conf/ccs
Concurrently-secure credential ownership proofs.
Siamak Fayyaz Shahandashti
Reihaneh Safavi-Naini
Joonsang Baek
2007
conf/ccs
New constructions of fuzzy identity-based encryption.
Joonsang Baek
Willy Susilo
Jianying Zhou
2007
conf/pkc
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.
Guilin Wang
Joonsang Baek
Duncan S. Wong
Feng Bao
2007
conf/cans
Strongly Secure Certificateless Public Key Encryption Without Pairing.
Yinxia Sun
Futai Zhang
Joonsang Baek
2006
conf/ccs
Self-organised group key management for ad hoc networks.
Ling Luo
Reihaneh Safavi-Naini
Joonsang Baek
Willy Susilo
2005
conf/pkc
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption.
Joonsang Baek
Reihaneh Safavi-Naini
Willy Susilo
2005
conf/asiacrypt
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature).
Joonsang Baek
Reihaneh Safavi-Naini
Willy Susilo
2004
conf/pkc
Identity-Based Threshold Decryption.
Joonsang Baek
Yuliang Zheng
2002
conf/acisp
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes.
Ron Steinfeld
Joonsang Baek
Yuliang Zheng
2002
conf/pkc
Formal Proofs for the Security of Signcryption.
Joonsang Baek
Ron Steinfeld
Yuliang Zheng
2000
conf/acisp
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption.
Joonsang Baek
Byoungcheon Lee
Kwangjo Kim
Coauthors
Byoungcheon Lee
(1)
Cheng-Kang Chu
(1)
Dongxi Liu
(1)
Duncan S. Wong
(1)
Dung Hoang Duong
(1)
Feng Bao
(2)
Fuchun Guo
(1)
Futai Zhang
(1)
Guilin Wang
(1)
Han Chiang Tan
(1)
Hyung Tae Lee
(1)
Intae Kim
(4)
Jianying Zhou
(7)
Jongkil Kim
(11)
Joonsang Baek
(37)
Josef Pieprzyk
(1)
Joseph K. Liu
(2)
Jun Wen Wong
(1)
Junjie Jiang
(1)
Kwangjo Kim
(1)
Ling Luo
(1)
Nan Li
(1)
Partha Sarathi Roy
(2)
Priyanka Dutta
(1)
Reihaneh Safavi-Naini
(4)
Ron Steinfeld
(3)
Seong Oun Hwang
(1)
Seongbong Choi
(1)
Seyit Camtepe
(3)
Siamak Fayyaz Shahandashti
(1)
Surya Nepal
(3)
Wei Zong
(1)
Willy Susilo
(24)
Xin Liu
(3)
Yang-Wai Chow
(6)
Yinxia Sun
(1)
Yuliang Zheng
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to