Baek, Joonsang
119  Ergebnisse:
Personensuche X
?
1

Attribute-Based Proxy Re-Encryption With Direct Revocation ..:

Ge, Chunpeng ; Susilo, Willy ; Liu, Zhe...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  2 - p. 949-960 , 2024
 
?
2

PCSF: Privacy-Preserving Content-Based Spam Filter:

Kim, Intae ; Susilo, Willy ; Baek, Joonsang..
IEEE Transactions on Information Forensics and Security.  18 (2023)  - p. 2856-2869 , 2023
 
?
3

Hyron: A New Approach for Automating the Network ACL Delive..:

, In: 2023 32nd International Conference on Computer Communications and Networks (ICCCN),
 
?
4

Withdrawable Signature: How to Call Off a Signature:

, In: Lecture Notes in Computer Science; Information Security,
Liu, Xin ; Baek, Joonsang ; Susilo, Willy - p. 557-577 , 2023
 
?
6

TLS Goes Low Cost: When TLS Meets Edge:

, In: Information Security Applications; Lecture Notes in Computer Science,
Kim, Intae ; Susilo, Willy ; Baek, Joonsang.. - p. 102-113 , 2023
 
?
7

Attribute-based Proxy Re-encryption with Direct Revocation ..:

, In: Proceedings of the ACM Turing Award Celebration Conference - China 2023,
Ge, Chunpeng ; Susilo, Willy ; Liu, Zhe... - p. 164-165 , 2023
 
?
8

Revocable Attribute-Based Encryption With Data Integrity in..:

Ge, Chunpeng ; Susilo, Willy ; Baek, Joonsang...
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  5 - p. 2864-2872 , 2022
 
?
9

A Verifiable and Fair Attribute-Based Proxy Re-Encryption S..:

Ge, Chunpeng ; Susilo, Willy ; Baek, Joonsang...
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  5 - p. 2907-2919 , 2022
 
?
10

Security Analysis of "SMAKA: Secure Many-to-Many Authentica..:

Jiang, Junjie ; Susilo, Willy ; Baek, Joonsang
IEEE Transactions on Information Forensics and Security.  17 (2022)  - p. 3006-3007 , 2022
 
?
11

Harnessing Policy Authenticity for Hidden Ciphertext Policy..:

Kim, Intae ; Susilo, Willy ; Baek, Joonsang.
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  3 - p. 1856-1870 , 2022
 
?
13

Pattern Matching over Encrypted Data with a Short Ciphertex:

, In: Information Security Applications; Lecture Notes in Computer Science,
Kim, Jongkil ; Susilo, Willy ; Chow, Yang-Wai.. - p. 132-143 , 2021
 
?
14

Utilizing QR codes to verify the visual fidelity of image d..:

Chow, Yang-Wai ; Susilo, Willy ; Wang, Jianfeng...
Journal of Network and Computer Applications.  173 (2021)  - p. 102834 , 2021
 
?
15

P2DPI: Practical and Privacy-Preserving Deep Packet Inspect..:

, In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security,
Kim, Jongkil ; Camtepe, Seyit ; Baek, Joonsang... - p. 135-146 , 2021
 
1-15