Dong Hoon Lee
TitleCited byYear
Efficient authentication for low-cost RFID systems
SM Lee, YJ Hwang, DH Lee, JI Lim
International Conference on Computational Science and Its Applications, 619-627, 2005
2972005
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
JW Byun, HS Rhee, HA Park, DH Lee
Workshop on Secure Data Management, 75-83, 2006
2112006
An efficient algorithm for fuzzy weighted average
DH Lee, D Park
Fuzzy sets and systems 87 (1), 39-45, 1997
1951997
Trapdoor security in a searchable public-key encryption scheme with a designated tester
HS Rhee, JH Park, W Susilo, DH Lee
Journal of Systems and Software 83 (5), 763-771, 2010
1812010
Efficient ID-based group key agreement with bilinear maps
KY Choi, JY Hwang, DH Lee
International Workshop on Public Key Cryptography, 130-144, 2004
1692004
Constant-round authenticated group key exchange for dynamic groups
HJ Kim, SM Lee, DH Lee
International Conference on the Theory and Application of Cryptology and†…, 2004
1432004
A practical wireless attack on the connected car and security protocol for in-vehicle CAN
S Woo, HJ Jo, DH Lee
IEEE Transactions on intelligent transportation systems 16 (2), 993-1006, 2014
1392014
Efficient certificateless signature schemes
KY Choi, JH Park, JY Hwang, DH Lee
International Conference on Applied Cryptography and Network Security, 443-458, 2007
1382007
Improved searchable public key encryption with designated tester.
HS Rhee, JH Park, W Susilo, DH Lee
AsiaCCS, 376-379, 2009
1252009
Password-authenticated key exchange between clients with different passwords
JW Byun, IR Jeong, DH Lee, CS Park
International Conference on Information and Communications Security, 134-146, 2002
1222002
One-round protocols for two-party authenticated key exchange
IR Jeong, J Katz, DH Lee
International Conference on Applied Cryptography and Network Security, 220-232, 2004
1212004
Efficient RFID authentication protocol for ubiquitous computing environment
EY Choi, SM Lee, DH Lee
International Conference on Embedded and Ubiquitous Computing, 945-954, 2005
1112005
Constructing PEKS schemes secure against keyword guessing attacks is possible?
IR Jeong, JO Kwon, D Hong, DH Lee
Computer communications 32 (2), 394-396, 2009
1042009
Efficient conjunctive keyword search on encrypted data storage system
JW Byun, DH Lee, J Lim
European Public Key Infrastructure Workshop, 184-196, 2006
912006
An anonymous buyer-seller watermarking protocol with anonymity control
HS Ju, HJ Kim, DH Lee, JI Lim
International Conference on Information Security and Cryptology, 421-432, 2002
892002
One-way chain based broadcast encryption schemes
NS Jho, JY Hwang, JH Cheon, MH Kim, DH Lee, ES Yoo
Annual International Conference on the Theory and Applications of†…, 2005
852005
A new provably secure certificateless short signature scheme
KY Choi, JH Park, DH Lee
Computers & Mathematics with Applications 61 (7), 1760-1768, 2011
832011
A remote user authentication scheme without using smart cards
HS Rhee, JO Kwon, DH Lee
Computer Standards & Interfaces 31 (1), 6-13, 2009
812009
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement
JW Byun, DH Lee, JI Lim
Information Sciences 177 (19), 3995-4013, 2007
782007
Signcryption schemes with forward secrecy
HY Jung, DH Lee, JI Lim, KS Chang
Proceeding of Information Security Application-WISA 1, 403-475, 2001
732001
The system can't perform the operation now. Try again later.
Articles 1–20