Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext J Kim, W Susilo, MH Au, J Seberry IEEE Transactions on Information Forensics and Security 10 (3), 679-693, 2015 | 82 | 2015 |
Security and performance considerations in ros 2: A balancing act J Kim, JM Smereka, C Cheung, S Nepal, M Grobler arXiv preprint arXiv:1809.09566, 2018 | 59 | 2018 |
Harnessing policy authenticity for hidden ciphertext policy attribute-based encryption I Kim, W Susilo, J Baek, J Kim IEEE Transactions on Dependable and Secure Computing 19 (3), 1856-1870, 2020 | 34 | 2020 |
P2DPI: practical and privacy-preserving deep packet inspection J Kim, S Camtepe, J Baek, W Susilo, J Pieprzyk, S Nepal Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 26 | 2021 |
A cryptographically enforced access control with a flexible user revocation on untrusted cloud storage J Kim, S Nepal Data Science and Engineering 1 (3), 149-160, 2016 | 25 | 2016 |
Efficient semi-static secure broadcast encryption scheme J Kim, W Susilo, MH Au, J Seberry Pairing-Based Cryptography–Pairing 2013: 6th International Conference …, 2014 | 21 | 2014 |
Efficient IoT management with resilience to unauthorized access to cloud storage C Hahn, J Kim, H Kwon, J Hur IEEE transactions on cloud computing 10 (2), 1008-1020, 2020 | 18 | 2020 |
Crowdsensing and privacy in smart city applications R Gaire, RK Ghosh, J Kim, A Krumpholz, R Ranjan, RK Shyamasundar, ... Smart cities cybersecurity and privacy, 57-73, 2019 | 17 | 2019 |
Internet of Things (IoT) and cloud computing enabled disaster management R Gaire, C Sriharsha, D Puthal, H Wijaya, J Kim, P Keshari, R Ranjan, ... Handbook of Integration of Cloud Computing, Cyber Physical Systems and …, 2020 | 16 | 2020 |
Identity-based broadcast encryption with outsourced partial decryption for hybrid security models in edge computing J Kim, S Camtepe, W Susilo, S Nepal, J Baek Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019 | 16 | 2019 |
Puncturable proxy re-encryption supporting to group messaging service TVX Phuong, W Susilo, J Kim, G Yang, D Liu Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 15 | 2019 |
Compact-LWE: Enabling practically lightweight public key encryption for leveled IoT device authentication D Liu, N Li, J Kim, S Nepal Cryptology ePrint Archive, 2017 | 15 | 2017 |
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning YW Chow, W Susilo, J Wang, R Buckland, J Baek, J Kim, N Li Journal of Network and Computer Applications 173, 102834, 2021 | 12 | 2021 |
Inspecting TLS anytime anywhere: a new approach to TLS interception J Baek, J Kim, W Susilo Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 12 | 2020 |
An efficient KP-ABE with short ciphertexts in prime ordergroups under standard assumption J Kim, W Susilo, F Guo, MH Au, S Nepal Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 12 | 2017 |
Subversion in practice: How to efficiently undermine signatures J Baek, W Susilo, J Kim, YW Chow IEEE Access 7, 68799-68811, 2019 | 10 | 2019 |
A tag based encoding: an efficient encoding for predicate encryption in prime order groups J Kim, W Susilo, F Guo, MH Au Security and Cryptography for Networks: 10th International Conference, SCN …, 2016 | 10 | 2016 |
Ciphertext-delegatable CP-ABE for a dynamic credential: A modular approach J Kim, W Susilo, J Baek, S Nepal, D Liu Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019 | 6 | 2019 |
Verifiable outsourced decryption of encrypted data from heterogeneous trust networks C Hahn, J Kim IEEE Internet of Things Journal 9 (22), 22559-22570, 2022 | 4 | 2022 |
QR code watermarking for digital images YW Chow, W Susilo, J Baek, J Kim Information Security Applications: 20th International Conference, WISA 2019 …, 2020 | 4 | 2020 |