Dong Hoon Lee
TitleCited byYear
Efficient authentication for low-cost RFID systems
SM Lee, YJ Hwang, DH Lee, JI Lim
International Conference on Computational Science and Its Applications, 619-627, 2005
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
JW Byun, HS Rhee, HA Park, DH Lee
Workshop on Secure Data Management, 75-83, 2006
An efficient algorithm for fuzzy weighted average
DH Lee, D Park
Fuzzy sets and systems 87 (1), 39-45, 1997
Trapdoor security in a searchable public-key encryption scheme with a designated tester
HS Rhee, JH Park, W Susilo, DH Lee
Journal of Systems and Software 83 (5), 763-771, 2010
Efficient ID-based group key agreement with bilinear maps
KY Choi, JY Hwang, DH Lee
International Workshop on Public Key Cryptography, 130-144, 2004
Constant-round authenticated group key exchange for dynamic groups
HJ Kim, SM Lee, DH Lee
International Conference on the Theory and Application of Cryptology and íŽ, 2004
A practical wireless attack on the connected car and security protocol for in-vehicle CAN
S Woo, HJ Jo, DH Lee
IEEE Transactions on intelligent transportation systems 16 (2), 993-1006, 2014
Efficient certificateless signature schemes
KY Choi, JH Park, JY Hwang, DH Lee
International Conference on Applied Cryptography and Network Security, 443-458, 2007
Improved searchable public key encryption with designated tester.
HS Rhee, JH Park, W Susilo, DH Lee
AsiaCCS, 376-379, 2009
Password-authenticated key exchange between clients with different passwords
JW Byun, IR Jeong, DH Lee, CS Park
International Conference on Information and Communications Security, 134-146, 2002
One-round protocols for two-party authenticated key exchange
IR Jeong, J Katz, DH Lee
International Conference on Applied Cryptography and Network Security, 220-232, 2004
Efficient RFID authentication protocol for ubiquitous computing environment
EY Choi, SM Lee, DH Lee
International Conference on Embedded and Ubiquitous Computing, 945-954, 2005
Constructing PEKS schemes secure against keyword guessing attacks is possible?
IR Jeong, JO Kwon, D Hong, DH Lee
Computer communications 32 (2), 394-396, 2009
Efficient conjunctive keyword search on encrypted data storage system
JW Byun, DH Lee, J Lim
European Public Key Infrastructure Workshop, 184-196, 2006
An anonymous buyer-seller watermarking protocol with anonymity control
HS Ju, HJ Kim, DH Lee, JI Lim
International Conference on Information Security and Cryptology, 421-432, 2002
One-way chain based broadcast encryption schemes
NS Jho, JY Hwang, JH Cheon, MH Kim, DH Lee, ES Yoo
Annual International Conference on the Theory and Applications of íŽ, 2005
A new provably secure certificateless short signature scheme
KY Choi, JH Park, DH Lee
Computers & Mathematics with Applications 61 (7), 1760-1768, 2011
A remote user authentication scheme without using smart cards
HS Rhee, JO Kwon, DH Lee
Computer Standards & Interfaces 31 (1), 6-13, 2009
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement
JW Byun, DH Lee, JI Lim
Information Sciences 177 (19), 3995-4013, 2007
Signcryption schemes with forward secrecy
HY Jung, DH Lee, JI Lim, KS Chang
Proceeding of Information Security Application-WISA 1, 403-475, 2001
The system can't perform the operation now. Try again later.
Articles 1–20