This map shows the geographic impact of Joonsang Baek's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Joonsang Baek with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Joonsang Baek more than expected).
This network shows the impact of papers produced by Joonsang Baek. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Joonsang Baek. The network helps show where Joonsang Baek may publish in the future.
Co-authorship network of co-authors of Joonsang Baek
This figure shows the co-authorship network connecting the top 25 collaborators of Joonsang Baek.
A scholar is included among the top collaborators of Joonsang Baek based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Joonsang Baek. Joonsang Baek is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Chow, Yang-Wai, Willy Susilo, James G. Phillips, Joonsang Baek, & Elena Vlahu‐Gjorgievska. (2017). Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview. Research Online (University of Wollongong).16 indexed citations
Baek, Joonsang, et al.. (2013). Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications.. Research Online (University of Wollongong). 4. 32–54.4 indexed citations
11.
Baek, Joonsang, et al.. (2011). Survey on computationally hard problems and their applications to cryptography. International Conference for Internet Technology and Secured Transactions. 46–52.4 indexed citations
12.
Baek, Joonsang, et al.. (2011). Survey on certificateless public key cryptography. International Conference for Internet Technology and Secured Transactions. 53–58.10 indexed citations
13.
Baek, Joonsang, et al.. (2011). The use of Boolean functions in stream ciphers. International Conference for Internet Technology and Secured Transactions. 29–33.1 indexed citations
14.
Baek, Joonsang, et al.. (2011). Study on Secret Sharing Schemes (SSS) and their applications. International Conference for Internet Technology and Secured Transactions. 40–45.30 indexed citations
Baek, Joonsang, Reihaneh Safavi–Naini, & Willy Susilo. (2005). Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature. Research Online (University of Wollongong).1 indexed citations
18.
Baek, Joonsang, et al.. (2001). Computing with secrets for mobile agent using one-time proxy signature. 845–850.13 indexed citations
19.
Baek, Joonsang, et al.. (2001). Secret Computation with Secrets for Mobile Agent using One-time Proxy Signature.25 indexed citations
20.
Baek, Joonsang & Kwangjo Kim. (2000). Remarks on the Unknown Key Share Attacks. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 83(12). 2766–2769.8 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.