Publications

Edited Books

  1. J. Baek, F. Bao, K. Chen and X. Lai, Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings Springer 2008.
  2. J. Baek and R. Zhang, APKC@AsiaCCS 2017, Proceedings of the 4th ACM International Workshop on ASIA Public- Key Cryptography, Abu Dhabi, United Arab Emirates, ACM 2017, ISBN 978-1-4503-4973-4, April 2, 2017.

Book Chpaters

  1. J. Baek, W. Susilo and J. Zhou, Fuzzy Identity-based Encryption: New and Efficient Schemes, Series on Coding Theory and Cryptology Vol. 4, ISBN 978-981-283-223-8, World Scientific Press, pp. 1-14, 2008.
  2. J. Baek, E. Foo, H. Tan and J. Zhou, Securing Wireless Sensor Networks - Threats and Countermeasures, Security and Privacy in Wireless and Mobile Computing, ISBN 978-1905886- 906, Troubador Publishing, 2008.
  3. J. Baek and R. Steinfeld, Security for Signcryption: The Multi-User Model, Practical Sign- cryption, A. Dent and Y. Zheng (eds.), Springer Verlag, pp.43-53, 2009.

Referred Journal Papers

  1. J. Baek, E. Hableel, Y. Byon, D. S. Wong, K. Jang and H. Yeo, How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption, IEEE Trans. Intelligent Transportation Systems 18(3): 690-700, 2017.
  2. Y. Chow, W. Susilo, J. G. Phillips, J. Baek, E. Vlahu-Gjorgievska, Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 8(3), pp. 18-35, 2017.
  3. H. Al-Hamadi, A. Gawanmeh, J. Baek, and M. Al-Qutayri, Lightweight Security Protocol for ECG Bio-Sensors, Wireless Personal Communications 95(4): 5097-5120, 2017.
  4. A. Yang, S. Tan, J. Baek and D. S. Wong, A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification, IEEE Trans. Services Computing 10(2): 165-175, 2017.
  5. J. Baek, D. S. Wong, Jin Li and M. Au, Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction, The Computer Journal, 59(4): 508-521, 2016.
  6. J. Baek and I. You, Efficient Subversion of Symmetric Encryption with Random Initialization Vector, IEICE Transactions on Information Systems, 99-D(4): 1251-1254, 2016.
  7. J. Ha, Y. Byon, J. Baek and P. Seong, Method for Inference of Operator's Thought with Eye Movement Data in Nuclear Power Plants, Nuclear Engineering and Technology, 48(1): 129-143, 2016.
  8. J. Baek, Y. Byon, E. Hableel and M. Al-Qutayri, Making Air Traffic Surveillance More Reliable: A New Authentication Framework for Automatic Dependent Surveillance-Broadcast (ADS-B) Based on Online/Offline Identity-Based Signature, Security and Communication Networks 8(5): 740-750, 2015.
  9. L. Xu, J. Li, S. Tang and J. Baek, Server-Aided Verification Signature with Privacy for Mobile Computing, Mobile Information Systems, Online Published Vol. 2015, Article ID 626415, 11 pages, 2015. doi:10.1155/2015/626415, 2015.
  10. J. Baek, Q. Vu, J. Liu, X. Huang and Y. Xiang, A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid, IEEE Transactions on Cloud Computing, 3(2): 233-244, 2015.
  11. J. Baek, Q. Vu, A. Shoufan, A. Jones, and D. S. Wong, Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure, The Computer Journal, 56(4): 497-507, Oxford Press, 2013.
  12. N. Al Ebri, J. Baek, A. Shoufan, Q. Vu, Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 4(1): 32-54, 2013.
  13. J. Kim, J. Baek and T. Shon,An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments, IEICE Transactions on Fundamentals of Electronics, IEICE Transactions 95-D(1): 117-125, 2012.
  14. J. Kim, J. Baek and T. Shon,An Efficient and Scalable Re-authentication Protocol over Wireless Sensor Network, IEEE Transaction on Consumer Electronics, pp. 516-522, IEEE Press, 2011.
  15. J. K. Liu, J. Baek, J. Zhou, Y. Yang and J. Wong,Efficient online/offline Identity-Based Signature for Wireless Sensor Network, International Journal of Information Security (IJIS), 9(4): 287-296, Springer-Verlag, 2010.
  16. J. Baek, R. Steinfeld and Y. Zheng, Formal Proofs for the Security of Signcryption, Journal of Cryptology, Vol. 20, No. 2, April, pp 203-235, Springer-Verlag, 2007.
  17. J. Baek and Y. Zheng, Zheng and Seberry's Public Key Encryption Scheme Revisited, International Journal of Information Security (IJIS), Springer-Verlag, Vol. 2, No. 1, November, pp. 37-44, 2003.
  18. J. Baek, B. Lee and K. Kim, Provably Secure Length-Saving Public-Key Encryption Scheme under the Computational Diffie-Hellman Assumption, ETRI Journal Vol. 22, No.4, December, pp. 25-31, 2000.
  19. J. Baek and K. Kim, Remarks on the Unknown Key-Share Attacks, IEICE (Institute of Electronics, Information and Communications Engineers) Transactions on Fundamentals of Elec- tronics, Vol. E83-A, No.12, December, pp. 2766-2769, 2000.

Referred Conference Papers

  1. Y. Chow, W. Susilo, J. Baek, Covert QR Codes: How to Hide in the Crowd, ISPEC 2017, pp. 678-693, 2017.
  2. S. Al Salami, J. Baek and K. Salah, Ernesto Damiani, Lightweight Encryption for Smart Home, ARES 2016: 382-388, 2016.
  3. F. Al Mansoori, J. Baek, and K. Salah, Subverting MAC: How Authentication in Mobile Environment Can Be Undermined, IEEE Infocom Workshop on Mobility Management in the Networks of the Future World 2016, pp. 870-874, 2016.
  4. E. Hableel, J. Baek, Y. Byon and D. S. Wong,How to Protect ADS-B: Confidentiality Framework for Future Air Traffic Communication, IEEE Infocom Workshop on Mobility Manage- ment in the Networks of the Future World 2015, pp. 155-160, 2015.
  5. H. AlNoon, A. Shoufan and J. Baek, On the Power Consumption of Cryptographic Processors in Civil Microdrones, International Conference on Information Systems Security and Privacy (ICISSP), pp. 283-290, 2015.
  6. E. Hableel, C. Yeun and J. Baek, Emerging Trend of Cybercrime in the UAE, The 6th FTRA International Symposium on Advances in Computing, Communications, Security, and Applications (ACSA-14), 2014.
  7. E. Al-Alkeem, C. Yeun and J. Baek, Secure NFC Authentication Protocol Based on LTE Network, Ubiquitous Information Technologies and Applications, Lecture Notes in Electrical Engineering Volume 280, 2014, pp 363-371.
  8. Y. Byon, Y. Jeong, S. Essa and J. Baek, Feasibility Analysis of Transportation Applications Based on APIs of Social Network Services, IEEE ICITST 2013, pp 59-64.
  9. E. Hableel, J. Baek and Y. Byon, Public Key Infrastructure for UAE: A Case Study, SIN 2013, pp. 336-340.
  10. J. Baek, Y. Byon, E. Hableel and M. Al-Qutayri, An Authentication Framework for Automatic Dependent Surveillance-Broadcast Based on Online/Offline Identity-Based Signature, The Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet 3PGCIC 2013: pp. 358-363, IEEE Computer Society
  11. J. Baek, Q. Vu, A. Jones, S. Al-Mulla, C. Yeun, Smart-Frame: A Flexible, Scalable, and Secure Information Management Framework for Smart Grids, ICITST 2012: pp. 668-673, IEEE, 2012.
  12. N. Al Ebri, J. Baek, A. Shoufan, Q. Vu,Efficient Generic Construction of Forward-Secure Identity-Based Signature, Conference on Availability, Reliability and Security (ARES 2012), pp. 55-64, IEEE Computer Society.
  13. J. Baek and J. Zhou, Compact Identity-Based Encryption without Strong Symmetric Cipher, Proc. of ACM Symposium on Information, Computer and Communications Security (ASI- ACCS 2011), pp. 61-70, 2011.
  14. W. Susilo and J. Baek, On the Security of the Identity-based Encryption Based on DHIES from ASIACCS 2010, Proc. of ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), pp. 376-380, 2011.
  15. J. Baek, C. Chu and J. Zhou, On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes, The Cryptographers’ Track at the RSA Conference 2011 (CT-RSA 2011) Lecture Notes in Computer Science 6558, pp. 302-318, Springer-Verlag, 2011.
  16. J. Baek, W. Susilo, J. K. Liu and J. Zhou, A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack, Proc. of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009), Lecture Notes in Computer Science 5536, pp. 143-155, Springer-Verlag, 2009.
  17. J. K. Liu, J. Baek and J. Zhou, Certificate-Based Sequential Aggregate Signature, Proc. of the 2nd ACM Conference on Wireless Network Security (Wisec 2009), pp.21-28, ACM, 2009.
  18. J. Baek, D. Galindo, W. Susilo and J. Zhou, Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework), Proc. of the 6th Conference on Security and Cryptography for Networks (SCN 2008), Lecture Notes in Computer Science 5229, pp. 358-374, Springer-Verlag, 2008.
  19. J. K. Liu, J. Baek, W. Susilo and J. Zhou, Certificate Based Signature Schemes without Pairings or Random Oracles, Proc. of the 11th Information Security Conference (ISC 2008), Lecture Notes in Computer Science 5222, pp. 285-297, Springer-Verlag, 2008.
  20. J. Baek, H. Tan, J. Zhou and J. Wong, Realizing Stateful Public Key Encryption in Wireless Sensor Network, Proc. of the 23rd International Information Security Conference (IFIP-SEC 2008), pp. 95-107, Springer, 2008.
  21. J. Baek, J. Zhou and F. Bao, Generic Constructions of Stateful Public Key Encryption and Their Applications, Proc. of the 6th International Conference on Applied Cryptography and Network Security (ACNS 2008), Lecture Notes in Computer Science 5037, pp. 75-93, Springer- Verlag, 2008.
  22. J. Baek, R. Safavi-Naini and W. Susilo, Public Key Encryption with Keyword Search Revisited, Proc. of ICCSA 2008, Lecture Notes in Computer Science 5072, pp. 1249-1259, Springer- Verlag, 2008.
  23. Y. Sun, F. Zhang and J. Baek, Strongly Secure Certificateless Public Key Encryption without Pairing, Proc. of the 6th International Conference on Cryptology and Network Security (CANS 2007), Lecture Notes in Computer Science 4856, pp. 194-208, Springer-Verlag, 2007.
  24. G. Wang, J. Baek, D. S. Wong and F. Bao. On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures, Proc. of International Workshop on Public Key Cryptography 2007 (PKC 2007), Lecture Notes in Computer Science 4450, pp. 43-60, Springer-Verlag, 2007.
  25. J. Baek, W. Susilo and J. Zhou, New Constructions of Fuzzy Identity-Based Encryption, Proc. of ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), pp. 368-370, ACM Press, 2007.
  26. S. Shahandashti, R. Safavi-Naini and J. Baek, Concurrently-Secure Credential Ownership Proofs, Proc. of ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), pp. 161-172, ACM Press, 2007.
  27. J. Baek, R. Safavi-Naini and W. Susilo, Public Key Encryption with Keyword Search, Proc. of Information Security Conference 2006 (ISC 2006), Lecture Notes in Computer Science 4176, pp. 217-232, Springer-Verlag, 2006.
  28. L. Luo, R. Safavi-Naini, J. Baek and W. Susilo, Self-Organised Group Key Management for Ad-hoc Networks, Proc. of the 1st ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), pp. 138-147, ACM Press, 2006.
  29. J. Baek, R. Safavi-Naini and W. Susilo, Universal Designated Signature Proof (or How to Efficiently Prove the Knowledge of a Signature), Advances in Cryptology -Proc. of Asiacrypt 2005, Lecture Notes in Computer Science 3788, pp. 644-661, Springer-Verlag, 2006.
  30. Y Chen, R. Safavi-Naini and J. Baek, Server-Aided RSA Key Generation against Collusion Attack, Proc. of Secure Mobile Ad-hoc Networks and Sensors 2005 (MADNES 2005), Lecture Notes in Computer Science 4074, pp. 27-37, Springer-Verlag, 2006.
  31. J. Baek, R. Safavi-Naini and W. Susilo, Certificateless Public Key Encryption without Pairing, Proc. of Information Security Conference 2005 (ISC 2005), Lecture Notes in Computer Science 3650, pp. 134-148, Springer-Verlag, 2005.
  32. J. Baek, R. Safavi-Naini and W. Susilo, Token-Controlled Public Key Encryption, Proc. of Information Security Practice and Experience Conference 2005 (ISPEC 2005), Lecture Notes in Computer Science 3439, pp. 386-397, Springer-Verlag, 2005.
  33. J. Baek, R. Safavi-Naini and W. Susilo, Efficient Multi-Reciever Identity-Based Encryption and Its Application to Broadcast Encryption, Proc. of International Workshop on Public Key Cryptography 2005 (PKC 2005), Lecture Notes in Computer Science 3386, pp. 380-397, Springer-Verlag, 2005.
  34. J. Baek, J. Newmarch, R. Safavi-Naini and W. Susilo, A Survey of Identity-Based Cryptography, Proc. of Australian Unix Users Group Annual Conference 2004 (AUUG 2004), pp. 95-102, 2004.
  35. J. Baek and Y. Zheng, Identity-Based Threshold Signature Scheme from the Bilinear Pairing, Proc. of the Information Assurance and Security (IAS) track of International Conference on Information Technology, Coding and Computing 2004 (ITCC 2004), pp. 124-128, IEEE Computer Society, 2004.
  36. J. Baek and Y. Zheng, Identity-Based Threshold Decryption, Proc. of International Workshop on Public Key Cryptography 2004 (PKC 2004), Lecture Notes in Computer Science 2947, pp. 262-276, Springer-Verlag, 2004.

Patents

  1. J. Liu, J. Baek, and J. Zhou, Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network, US Provisional Patent No. 61/057043, Filed on 29 May 2008.
  2. Y. Qiu, J. Zhou, J. Baek and H. Tan, Authentication and Key Establishment in Wireless Sensor Networks, (1) Singapore Patent No. 167070, Granted on 31 August 2011. (2) US Provisional Patent No. 61/056560, Filed on 29 May 2008.
  3. J. Baek, B. Lee, K. Kim, Public-Key Encryption Scheme for Providing Provable Security Based on Computational Diffie-Hellman Assumption, US Patent No. 09825876, 5 April, 2001.