Security analysis and improvement of fingerprint authentication for smartphones YH Jo, SY Jeon, JH Im, MK Lee Mobile Information Systems 2016, 2016 | 25 | 2016 |
Privacy-preserving palm print authentication using homomorphic encryption JH Im, JC Choi, DH Nyang, MK Lee 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th ¡¦, 2016 | 7 | 2016 |
Privacy-preserving peer-to-peer energy trading in blockchain-enabled smart grids using functional encryption YB Son, JH Im, HY Kwon, SY Jeon, MK Lee Energies 13 (6), 1321, 2020 | 6 | 2020 |
Vulnerability analysis on smartphone fingerprint templates YH Jo, SY Jeon, JH Im, MK Lee Advanced Multimedia and Ubiquitous Engineering, 71-77, 2016 | 4 | 2016 |
Practical Privacy-Preserving Face Authentication for Smartphones Secure Against Malicious Clients JH Im, SY Jeon, MK Lee IEEE Transactions on Information Forensics and Security 15, 2386-2401, 2020 | 3 | 2020 |
Privacy-Preserving Electricity Billing System Using Functional Encryption JH Im, HY Kwon, SY Jeon, MK Lee Energies 12 (7), 1237, 2019 | 3 | 2019 |
Requirement for Secure Biometric System Design on Smartphones. JH Im, MK Lee Proceedings of the Korea Information Processing Society Conference, 870-871, 2015 | 1 | 2015 |
ÇÔ¼ö ¾ÏÈ£ ±â¹ÝÀÇ ¹ÙÀÌ¿ÀÀÎÁõ ±¸Çö ¹× ¼º´É Æò°¡ Àü¼ºÀ±£¬ ÀÓÁ¾Çõ£¬ À̹®±Ô Çѱ¹Åë½ÅÇÐȸ Çмú´ëȸ³í¹®Áý, 778-779, 2019 | | 2019 |
ȸ±Í ºÐ¼®À» ÀÌ¿ëÇÑ Intel SGX »óÀÇ ¾ÈÀüÇÑ Àü·Â ¼ö¿ä ¿¹Ãø À±¿¹Áø£¬ ÀÓÁ¾Çõ£¬ À̹®±Ô Çѱ¹Â÷¼¼´ëÄÄÇ»ÆÃÇÐȸ ³í¹®Áö 13 (4), 7-18, 2017 | | 2017 |
Password Authentication Using One-Time Key-Based Signature and Homomorphic Encryption JH Im, MK Lee International Conference on Broadband and Wireless Computing, Communication ¡¦, 2016 | | 2016 |
On-line Voting System with Illegal Ballot Filtering Using Homomorphic Encryption MK Lee, JH Im International Conference on Broadband and Wireless Computing, Communication ¡¦, 2016 | | 2016 |
Privacy-Preserving Blind Auction Protocol Using Fully Homomorphic Encryption JH Im, TY Youn, MK Lee Advanced Science Letters 22 (9), 2598-2600, 2016 | | 2016 |
½º¸¶Æ®Æù »óÀÇ ¾ÈÀüÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä ½Ã½ºÅÛ ¼³°è¸¦ À§ÇÑ ÇÁ·¹ÀÓ¿öÅ© ÀÓÁ¾Çõ£¬ ±ÇÈñ¿ë£¬ À̹®±Ô Á¤º¸Ã³¸®ÇÐȸ³í¹®Áö. ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ 5 (2), 41-46, 2016 | | 2016 |
Framework for Secure Biometric System Design on Smartphones JH Im, HY Kwon, MK Lee KIPS Transactions on Computer and Communication Systems 5 (2), 41-46, 2016 | | 2016 |
Á¤¼ö ±â¹Ý Àϰý µ¿Çü ¾ÏÈ£ ÀÀ¿ëÀÇ ±¸Çö ¹× ¼º´É ºñ±³ ÀÓÁ¾Çõ£¬ À̹®±Ô Çѱ¹Â÷¼¼´ëÄÄÇ»ÆÃÇÐȸ ³í¹®Áö 11 (6), 19-28, 2015 | | 2015 |
¼Ò¼È ³×Æ®¿öÅ© ¼ºñ½º »ó¿¡¼ÀÇ Ãֱ٠Ŭ¸¯ÀçÅ· °ø°Ý µ¿Ç⠺м® Àü¼ºÀ±£¬ Á¶°æ¹Î£¬ ÀÓÁ¾Çõ£¬ À̹®±Ô Çѱ¹Á¤º¸°úÇÐȸ Çмú¹ßÇ¥³í¹®Áý, 2120-2122, 2015 | | 2015 |
Á¤¼ö »óÀÇ ºÎºÐ µ¿Çü ¾ÏÈ£¸¦ À§ÇÑ ¾ÏÈ£È ¿¬»ê °¡¼ÓÈ ÀÓÁ¾Çõ£¬ ¼ÛÁ¤Àº£¬ À̹®±Ô Çѱ¹Â÷¼¼´ëÄÄÇ»ÆÃÇÐȸ ³í¹®Áö 10 (2), 6-18, 2014 | | 2014 |
´ÙÁß Å¬¶óÀÌ¾ðÆ® È¯°æ¿¡¼ µ¿Çü ¾ÏÈ£¸¦ ÀÌ¿ëÇÑ ÇÁ¶óÀ̹ö½Ã º¸ÀåÇü K-Æò±Õ Ŭ·¯½ºÅ͸µ ±ÇÈñ¿ë£¬ ÀÓÁ¾Çõ£¬ À̹®±Ô Çѱ¹Â÷¼¼´ëÄÄÇ»ÆÃÇÐȸ ³í¹®Áö 15 (4), 7-17, 0 | | |