팔로우
Byoungcheon Lee
Byoungcheon Lee
Professor, Department of Information Security, Joongbu University
joongbu.ac.kr의 이메일 확인됨 - 홈페이지
제목
인용
인용
연도
Strong Proxy Signature and its Applications
B Lee, H Kim, K Kim
618*
Secure Mobile Agent using Strong Non-designated Proxy Signature
B Lee, H Kim, K Kim
319*
Secure key issuing in ID-based cryptography
B Lee, C Boyd, E Dawson, K Kim, J Yang, S Yoo
Proceedings of the second workshop on Australasian information security …, 2004
1912004
Receipt-free electronic voting scheme with a tamper-resistant randomizer
B Lee, K Kim
Information Security and Cryptology—ICISC 2002: 5th International …, 2003
1872003
Providing receipt-freeness in mixnet-based voting protocols
B Lee, C Boyd, E Dawson, K Kim, J Yang, S Yoo
ICISC 3, 245-258, 2003
1862003
Secret computation with secrets for mobile agent using one-time proxy signature
H Kim, J Baek, B Lee, K Kim
Cryptography and information security 2001, 845-850, 2001
1442001
Multiplicative homomorphic e-voting
K Peng, R Aditya, C Boyd, E Dawson, B Lee
Progress in Cryptology-INDOCRYPT 2004: 5th International Conference on …, 2005
762005
An efficient mixnet-based voting scheme providing receipt-freeness
R Aditya, B Lee, C Boyd, E Dawson
Trust and Privacy in Digital Business: First International Conference …, 2004
662004
Efficient public auction with one-time registration and public verifiability
B Lee, K Kim, J Ma
Progress in Cryptology—INDOCRYPT 2001: Second International Conference on …, 2001
532001
Receipt-free electronic auction schemes using homomorphic encryption
X Chen, B Lee, K Kim
Information Security and Cryptology-ICISC 2003: 6th International Conference …, 2004
522004
Security framework for RFID-based applications in smart home environment
DM Konidala, DY Kim, CY Yeun, BC Lee
Journal of Information Processing Systems 7 (1), 111-120, 2011
492011
Self-certified signatures
B Lee, K Kim
Progress in Cryptology—INDOCRYPT 2002: Third International Conference on …, 2002
492002
New receipt-free voting scheme using double-trapdoor commitment
X Chen, Q Wu, F Zhang, H Tian, B Wei, B Lee, H Lee, K Kim
Information Sciences 181 (8), 1493-1502, 2011
412011
Experimental design of worldwide internet voting system using pki
K Kim, J Kim, B Lee, G Ahn
SSGRR2001, 0-0, 2001
372001
Self-certificate: PKI using self-certified key
B Lee, K Kim
Proc. of Conference on Information Security and Cryptology 10 (1), 65-73, 2000
362000
Batch verification for equality of discrete logarithms and threshold decryptions
R Aditya, K Peng, C Boyd, E Dawson, B Lee
Applied Cryptography and Network Security: Second International Conference …, 2004
302004
Exploring signature schemes with subliminal channel
F Zhang, B Lee, K Kim
SCIS2003, 245-250, 2003
292003
Secure length-saving ElGamal encryption under the computational Diffie-Hellman assumption
J Baek, B Lee, K Kim
Information Security and Privacy: 5th Australasian Conference, ACISP 2000 …, 2000
292000
Design and implementation of an efficient fair off-line e-cash system based on elliptic curve discrete logarithm problem
M Lee, G Ahn, J Kim, J Park, B Lee, K Kim, H Lee
Journal of Communications and Networks 4 (2), 81-89, 2002
272002
An efficient and verifiable solution to the millionaire problem
K Peng, C Boyd, E Dawson, B Lee
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
262005
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20