Dong Hoon Lee
제목인용연도
Efficient authentication for low-cost RFID systems
SM Lee, YJ Hwang, DH Lee, JI Lim
International Conference on Computational Science and Its Applications, 619-627, 2005
311*2005
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
JW Byun, HS Rhee, HA Park, DH Lee
Workshop on Secure Data Management, 75-83, 2006
2062006
An efficient algorithm for fuzzy weighted average
DH Lee, D Park
Fuzzy sets and systems 87 (1), 39-45, 1997
1931997
Trapdoor security in a searchable public-key encryption scheme with a designated tester
HS Rhee, JH Park, W Susilo, DH Lee
Journal of Systems and Software 83 (5), 763-771, 2010
1792010
Efficient ID-based group key agreement with bilinear maps
KY Choi, JY Hwang, DH Lee
International Workshop on Public Key Cryptography, 130-144, 2004
1652004
Constant-round authenticated group key exchange for dynamic groups
HJ Kim, SM Lee, DH Lee
International Conference on the Theory and Application of Cryptology and …, 2004
1392004
Efficient certificateless signature schemes
KY Choi, JH Park, JY Hwang, DH Lee
International Conference on Applied Cryptography and Network Security, 443-458, 2007
1372007
Improved searchable public key encryption with designated tester.
HS Rhee, JH Park, W Susilo, DH Lee
AsiaCCS, 376-379, 2009
1242009
A practical wireless attack on the connected car and security protocol for in-vehicle CAN
S Woo, HJ Jo, DH Lee
IEEE Transactions on intelligent transportation systems 16 (2), 993-1006, 2014
1212014
Password-authenticated key exchange between clients with different passwords
JW Byun, IR Jeong, DH Lee, CS Park
International Conference on Information and Communications Security, 134-146, 2002
1212002
One-round protocols for two-party authenticated key exchange
IR Jeong, J Katz, DH Lee
International Conference on Applied Cryptography and Network Security, 220-232, 2004
1152004
Efficient RFID authentication protocol for ubiquitous computing environment
EY Choi, SM Lee, DH Lee
International Conference on Embedded and Ubiquitous Computing, 945-954, 2005
1112005
Constructing PEKS schemes secure against keyword guessing attacks is possible?
IR Jeong, JO Kwon, D Hong, DH Lee
Computer communications 32 (2), 394-396, 2009
1012009
An anonymous buyer-seller watermarking protocol with anonymity control
HS Ju, HJ Kim, DH Lee, JI Lim
International Conference on Information Security and Cryptology, 421-432, 2002
892002
Efficient conjunctive keyword search on encrypted data storage system
JW Byun, DH Lee, J Lim
European Public Key Infrastructure Workshop, 184-196, 2006
872006
One-way chain based broadcast encryption schemes
NS Jho, JY Hwang, JH Cheon, MH Kim, DH Lee, ES Yoo
Annual International Conference on the Theory and Applications of …, 2005
832005
A new provably secure certificateless short signature scheme
KY Choi, JH Park, DH Lee
Computers & Mathematics with Applications 61 (7), 1760-1768, 2011
802011
A remote user authentication scheme without using smart cards
HS Rhee, JO Kwon, DH Lee
Computer Standards & Interfaces 31 (1), 6-13, 2009
802009
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement
JW Byun, DH Lee, JI Lim
Information Sciences 177 (19), 3995-4013, 2007
792007
Signcryption schemes with forward secrecy
HY Jung, DH Lee, JI Lim, KS Chang
Proceeding of Information Security Application-WISA 1, 403-475, 2001
732001
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20