Jongkil Kim
Jongkil Kim
Verified email at
Cited by
Cited by
Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext
J Kim, W Susilo, MH Au, J Seberry
IEEE Transactions on Information Forensics and Security 10 (3), 679-693, 2015
Security and performance considerations in ros 2: A balancing act
J Kim, JM Smereka, C Cheung, S Nepal, M Grobler
arXiv preprint arXiv:1809.09566, 2018
Harnessing policy authenticity for hidden ciphertext policy attribute-based encryption
I Kim, W Susilo, J Baek, J Kim
IEEE Transactions on Dependable and Secure Computing 19 (3), 1856-1870, 2020
A cryptographically enforced access control with a flexible user revocation on untrusted cloud storage
J Kim, S Nepal
Data Science and Engineering 1 (3), 149-160, 2016
Efficient semi-static secure broadcast encryption scheme
J Kim, W Susilo, MH Au, J Seberry
Pairing-Based Cryptography–Pairing 2013: 6th International Conference …, 2014
P2DPI: practical and privacy-preserving deep packet inspection
J Kim, S Camtepe, J Baek, W Susilo, J Pieprzyk, S Nepal
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
Internet of Things (IoT) and cloud computing enabled disaster management
R Gaire, C Sriharsha, D Puthal, H Wijaya, J Kim, P Keshari, R Ranjan, ...
Handbook of Integration of Cloud Computing, Cyber Physical Systems and …, 2020
Crowdsensing and privacy in smart city applications
R Gaire, RK Ghosh, J Kim, A Krumpholz, R Ranjan, RK Shyamasundar, ...
Smart cities cybersecurity and privacy, 57-73, 2019
Identity-based broadcast encryption with outsourced partial decryption for hybrid security models in edge computing
J Kim, S Camtepe, W Susilo, S Nepal, J Baek
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
Compact-LWE: Enabling practically lightweight public key encryption for leveled IoT device authentication
D Liu, N Li, J Kim, S Nepal
Cryptology ePrint Archive, 2017
Efficient IoT management with resilience to unauthorized access to cloud storage
C Hahn, J Kim, H Kwon, J Hur
IEEE transactions on cloud computing 10 (2), 1008-1020, 2020
Inspecting TLS anytime anywhere: a new approach to TLS interception
J Baek, J Kim, W Susilo
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
An efficient KP-ABE with short ciphertexts in prime ordergroups under standard assumption
J Kim, W Susilo, F Guo, MH Au, S Nepal
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning
YW Chow, W Susilo, J Wang, R Buckland, J Baek, J Kim, N Li
Journal of Network and Computer Applications 173, 102834, 2021
Subversion in practice: How to efficiently undermine signatures
J Baek, W Susilo, J Kim, YW Chow
IEEE Access 7, 68799-68811, 2019
Puncturable proxy re-encryption supporting to group messaging service
TVX Phuong, W Susilo, J Kim, G Yang, D Liu
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
A tag based encoding: an efficient encoding for predicate encryption in prime order groups
J Kim, W Susilo, F Guo, MH Au
Security and Cryptography for Networks: 10th International Conference, SCN …, 2016
Ciphertext-delegatable CP-ABE for a dynamic credential: A modular approach
J Kim, W Susilo, J Baek, S Nepal, D Liu
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
Verifiable outsourced decryption of encrypted data from heterogeneous trust networks
C Hahn, J Kim
IEEE Internet of Things Journal 9 (22), 22559-22570, 2022
QR code watermarking for digital images
YW Chow, W Susilo, J Baek, J Kim
Information Security Applications: 20th International Conference, WISA 2019 …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20