Seguir
Jongkil Kim
Jongkil Kim
Email confirmado em ewha.ac.kr
Título
Citado por
Citado por
Ano
Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext
J Kim, W Susilo, MH Au, J Seberry
IEEE Transactions on Information Forensics and Security 10 (3), 679-693, 2015
812015
Security and performance considerations in ros 2: A balancing act
J Kim, JM Smereka, C Cheung, S Nepal, M Grobler
arXiv preprint arXiv:1809.09566, 2018
452018
Harnessing policy authenticity for hidden ciphertext policy attribute-based encryption
I Kim, W Susilo, J Baek, J Kim
IEEE Transactions on Dependable and Secure Computing 19 (3), 1856-1870, 2020
272020
A cryptographically enforced access control with a flexible user revocation on untrusted cloud storage
J Kim, S Nepal
Data Science and Engineering 1 (3), 149-160, 2016
242016
Efficient semi-static secure broadcast encryption scheme
J Kim, W Susilo, MH Au, J Seberry
Pairing-Based Cryptography–Pairing 2013: 6th International Conference …, 2014
212014
P2DPI: practical and privacy-preserving deep packet inspection
J Kim, S Camtepe, J Baek, W Susilo, J Pieprzyk, S Nepal
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
182021
Internet of Things (IoT) and cloud computing enabled disaster management
R Gaire, C Sriharsha, D Puthal, H Wijaya, J Kim, P Keshari, R Ranjan, ...
Handbook of Integration of Cloud Computing, Cyber Physical Systems and …, 2020
162020
Crowdsensing and privacy in smart city applications
R Gaire, RK Ghosh, J Kim, A Krumpholz, R Ranjan, RK Shyamasundar, ...
Smart cities cybersecurity and privacy, 57-73, 2019
162019
Identity-based broadcast encryption with outsourced partial decryption for hybrid security models in edge computing
J Kim, S Camtepe, W Susilo, S Nepal, J Baek
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
152019
Compact-LWE: Enabling practically lightweight public key encryption for leveled IoT device authentication
D Liu, N Li, J Kim, S Nepal
Cryptology ePrint Archive, 2017
152017
Efficient IoT management with resilience to unauthorized access to cloud storage
C Hahn, J Kim, H Kwon, J Hur
IEEE transactions on cloud computing 10 (2), 1008-1020, 2020
132020
Inspecting TLS anytime anywhere: a new approach to TLS interception
J Baek, J Kim, W Susilo
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
122020
An efficient KP-ABE with short ciphertexts in prime ordergroups under standard assumption
J Kim, W Susilo, F Guo, MH Au, S Nepal
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
112017
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning
YW Chow, W Susilo, J Wang, R Buckland, J Baek, J Kim, N Li
Journal of Network and Computer Applications 173, 102834, 2021
92021
Puncturable proxy re-encryption supporting to group messaging service
TVX Phuong, W Susilo, J Kim, G Yang, D Liu
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
92019
Subversion in practice: How to efficiently undermine signatures
J Baek, W Susilo, J Kim, YW Chow
IEEE Access 7, 68799-68811, 2019
82019
A tag based encoding: an efficient encoding for predicate encryption in prime order groups
J Kim, W Susilo, F Guo, MH Au
Security and Cryptography for Networks: 10th International Conference, SCN …, 2016
82016
Ciphertext-delegatable CP-ABE for a dynamic credential: A modular approach
J Kim, W Susilo, J Baek, S Nepal, D Liu
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
62019
QR code watermarking for digital images
YW Chow, W Susilo, J Baek, J Kim
Information Security Applications: 20th International Conference, WISA 2019 …, 2020
32020
Verifiable outsourced decryption of encrypted data from heterogeneous trust networks
C Hahn, J Kim
IEEE Internet of Things Journal 9 (22), 22559-22570, 2022
22022
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20