A practical wireless attack on the connected car and security protocol for in-vehicle CAN S Woo, HJ Jo, DH Lee IEEE Transactions on intelligent transportation systems 16 (2), 993-1006, 2014 | 404 | 2014 |
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data JW Byun, HS Rhee, HA Park, DH Lee Workshop on secure data management, 75-83, 2006 | 349 | 2006 |
Efficient authentication for low-cost RFID systems SM Lee, YJ Hwang, DH Lee, JI Lim International Conference on Computational Science and Its Applications, 619-627, 2005 | 299 | 2005 |
Trapdoor security in a searchable public-key encryption scheme with a designated tester HS Rhee, JH Park, W Susilo, DH Lee Journal of Systems and Software 83 (5), 763-771, 2010 | 279 | 2010 |
An efficient algorithm for fuzzy weighted average DH Lee, D Park Fuzzy sets and systems 87 (1), 39-45, 1997 | 207 | 1997 |
Efficient ID-based group key agreement with bilinear maps KY Choi, JY Hwang, DH Lee International Workshop on Public Key Cryptography, 130-144, 2004 | 194 | 2004 |
Voltageids: Low-level communication characteristics for automotive intrusion detection system W Choi, K Joo, HJ Jo, MC Park, DH Lee IEEE Transactions on Information Forensics and Security 13 (8), 2114-2129, 2018 | 173 | 2018 |
Improved searchable public key encryption with designated tester HS Rhee, JH Park, W Susilo, DH Lee Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 168 | 2009 |
Efficient certificateless signature schemes KY Choi, JH Park, JY Hwang, DH Lee International Conference on Applied Cryptography and Network Security, 443-458, 2007 | 164 | 2007 |
Constant-round authenticated group key exchange for dynamic groups HJ Kim, SM Lee, DH Lee International Conference on the Theory and Application of Cryptology and …, 2004 | 157 | 2004 |
Constructing PEKS schemes secure against keyword guessing attacks is possible? IR Jeong, JO Kwon, D Hong, DH Lee Computer communications 32 (2), 394-396, 2009 | 149 | 2009 |
Identifying ecus using inimitable characteristics of signals in controller area networks W Choi, HJ Jo, S Woo, JY Chun, J Park, DH Lee IEEE Transactions on Vehicular Technology 67 (6), 4757-4770, 2018 | 147 | 2018 |
Password-authenticated key exchange between clients with different passwords JW Byun, IR Jeong, DH Lee, CS Park International Conference on Information and Communications Security, 134-146, 2002 | 135 | 2002 |
One-round protocols for two-party authenticated key exchange IR Jeong, J Katz, DH Lee International conference on applied cryptography and network security, 220-232, 2004 | 133 | 2004 |
Efficient conjunctive keyword search on encrypted data storage system JW Byun, DH Lee, J Lim European Public Key Infrastructure Workshop, 184-196, 2006 | 122 | 2006 |
Efficient RFID authentication protocol for ubiquitous computing environment EY Choi, SM Lee, DH Lee International Conference on Embedded and Ubiquitous Computing, 945-954, 2005 | 121 | 2005 |
A practical security architecture for in-vehicle CAN-FD S Woo, HJ Jo, IS Kim, DH Lee IEEE Transactions on Intelligent Transportation Systems 17 (8), 2248-2261, 2016 | 114 | 2016 |
A new provably secure certificateless short signature scheme KY Choi, JH Park, DH Lee Computers & Mathematics with Applications 61 (7), 1760-1768, 2011 | 101 | 2011 |
An anonymous buyer-seller watermarking protocol with anonymity control HS Ju, HJ Kim, DH Lee, JI Lim International Conference on Information Security and Cryptology, 421-432, 2002 | 95 | 2002 |
A remote user authentication scheme without using smart cards HS Rhee, JO Kwon, DH Lee Computer standards & interfaces 31 (1), 6-13, 2009 | 92 | 2009 |