팔로우
Jae Woo Seo
Jae Woo Seo
Samsung Research
samsung.com의 이메일 확인됨
제목
인용
인용
연도
Andro-simnet: Android malware family classification using social network analysis
HM Kim, HM Song, JW Seo, HK Kim
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-8, 2018
372018
Single-layer fractal hash chain traversal with almost optimal complexity
DH Yum, JW Seo, S Eom, PJ Lee
Cryptographers’ Track at the RSA Conference, 325-339, 2009
242009
User terminal, service providing apparatus, driving method of user terminal, driving method of service providing apparatus, and encryption indexing-based search system
YN Kim, JW Seo, HJ Lee, H Kang, S Ga-Jin, JB Chun, C Gyu-Cheol
US Patent App. 14/962,580, 2016
222016
Trapdoor sanitizable signatures made easy
DH Yum, JW Seo, PJ Lee
Applied Cryptography and Network Security: 8th International Conference …, 2010
222010
Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
JW Seo, DH Yum, PJ Lee
Theoretical Computer Science 491, 83-93, 2013
202013
검색 가능 암호 기술의 연구 동향
SY Kim, JW Seo, PJ Lee
Review of KIISC 19 (2), 63-73, 2009
192009
Method and apparatus for encrypting data
JW Seo, YH Hwang, S Kim
US Patent 10,177,906, 2019
182019
Cybersecurity event detection with new and re-emerging words
H Shin, WC Shim, J Moon, JW Seo, S Lee, YH Hwang
Proceedings of the 15th ACM asia conference on computer and communications …, 2020
162020
Apparatus and method for processing query
JW Seo, YN Kim, HJ Lee, H Kang, S Ga-Jin, JB Chun, C Gyu-Cheol, ...
US Patent 10,482,082, 2019
132019
Encryption apparatus, method for encryption and computer-readable recording medium
JW Seo, JH Cheon, YH Hwang, J Kim
US Patent 10,211,974, 2019
132019
Encrypted keyword search mechanism based on bitmap index for personal storage services
YH Hwang, JW Seo, IJ Kim
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
122014
Comments on “unidirectional chosen-ciphertext secure proxy re-encryption”
JW Seo, DH Yum, PJ Lee
IEEE Transactions on Information Theory 59 (5), 3256-3256, 2012
112012
Fast order-preserving encryption from uniform distribution sampling
YH Hwang, S Kim, JW Seo
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 41-52, 2015
102015
Generalized combinatoric accumulator
DH Yum, JW Seo, PJ Lee
IEICE transactions on information and systems 91 (5), 1489-1491, 2008
82008
Generalized hash chain traversal with selective output
DH Yum, JW Seo, K Cho, PJ Lee
IEICE TRANSACTIONS on Information and Systems 93 (5), 1303-1306, 2010
62010
A visibility-based upper bound for android unlock patterns
J Lee, JW Seo, K Cho, PJ Lee, J Kim, SH Choi, DH Yum
IEICE TRANSACTIONS on Information and Systems 99 (11), 2814-2816, 2016
52016
TARD: Temporary Access Rights Delegation for guest network devices
J Lee, JW Seo, H Ko, H Kim
Journal of Computer and System Sciences 86, 59-69, 2017
42017
Identity-based signcryption from identity-based cryptography
W Lee, JW Seo, PJ Lee
Information Security Applications: 12th International Workshop, WISA 2011 …, 2012
42012
Energy-efficient hash chain traversal
DH Yum, JW Seo, PJ Lee
IEICE transactions on fundamentals of electronics, communications and …, 2011
32011
A visibility-based lower bound for android unlock patterns
J Lee, JW Seo, K Cho, PJ Lee, DH Yum
IEICE TRANSACTIONS on Information and Systems 100 (3), 578-581, 2017
22017
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20