Strong Proxy Signature and its Applications B Lee, H Kim, K Kim | 604* | |
Secure Mobile Agent using Strong Non-designated Proxy Signature B Lee, H Kim, K Kim | 311* | |
Secure key issuing in ID-based cryptography B Lee, C Boyd, E Dawson, K Kim, J Yang, S Yoo Proceedings of the second workshop on Australasian information security ¡¦, 2004 | 185 | 2004 |
Receipt-free electronic voting scheme with a tamper-resistant randomizer B Lee, K Kim International conference on information security and cryptology, 389-406, 2002 | 181 | 2002 |
Providing receipt-freeness in mixnet-based voting protocols B Lee, C Boyd, E Dawson, K Kim, J Yang, S Yoo International conference on information security and cryptology, 245-258, 2003 | 178 | 2003 |
Secret computation with secrets for mobile agent using one-time proxy signature H Kim, J Baek, B Lee, K Kim Cryptography and information security 2001, 845-850, 2001 | 141 | 2001 |
Multiplicative homomorphic e-voting K Peng, R Aditya, C Boyd, E Dawson, B Lee International Conference on Cryptology in India, 61-72, 2004 | 76 | 2004 |
An efficient mixnet-based voting scheme providing receipt-freeness R Aditya, B Lee, C Boyd, E Dawson International Conference on Trust, Privacy and Security in Digital Business ¡¦, 2004 | 60 | 2004 |
Efficient public auction with one-time registration and public verifiability B Lee, K Kim, J Ma International Conference on Cryptology in India, 162-174, 2001 | 51 | 2001 |
Receipt-free electronic auction schemes using homomorphic encryption X Chen, B Lee, K Kim International Conference on Information Security and Cryptology, 259-273, 2003 | 49 | 2003 |
Security framework for RFID-based applications in smart home environment DM Konidala, DY Kim, CY Yeun, BC Lee Journal of Information Processing Systems 7 (1), 111-120, 2011 | 48 | 2011 |
Self-certified signatures B Lee, K Kim International Conference on Cryptology in India, 199-214, 2002 | 46 | 2002 |
New receipt-free voting scheme using double-trapdoor commitment X Chen, Q Wu, F Zhang, H Tian, B Wei, B Lee, H Lee, K Kim Information Sciences 181 (8), 1493-1502, 2011 | 41 | 2011 |
Experimental design of worldwide internet voting system using pki K Kim, J Kim, B Lee, G Ahn | 35 | 2001 |
Self-certificate: PKI using self-certified key B Lee, K Kim Proc. of Conference on Information Security and Cryptology 10 (1), 65-73, 2000 | 34 | 2000 |
Batch verification for equality of discrete logarithms and threshold decryptions R Aditya, K Peng, C Boyd, E Dawson, B Lee International Conference on Applied Cryptography and Network Security, 494-508, 2004 | 32 | 2004 |
Exploring signature schemes with subliminal channel F Zhang, B Lee, K Kim SCIS2003, 245-250, 2003 | 30 | 2003 |
Secure length-saving ElGamal encryption under the computational Diffie-Hellman assumption J Baek, B Lee, K Kim Australasian Conference on Information Security and Privacy, 49-58, 2000 | 27 | 2000 |
Design and implementation of an efficient fair off-line e-cash system based on elliptic curve discrete logarithm problem M Lee, G Ahn, J Kim, J Park, B Lee, K Kim, H Lee Journal of Communications and Networks 4 (2), 81-89, 2002 | 26 | 2002 |
Implementation issues in secure e-voting schemes R Aditya, B Lee, C Boyd, E Dawson Proceedings of Abstracts and Papers (On CD-Rom) of the Fifth Asia-Pacific ¡¦, 2004 | 25 | 2004 |