• 3773 Citations
  • 31 h-Index
1993 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks

Jo, H. J., Kim, J. H., Choi, H. Y., Choi, W., Lee, D. H. & Lee, I., 2020 Feb, In : IEEE Transactions on Vehicular Technology. 69, 2, p. 2204-2218 15 p., 8939382.

Research output: Contribution to journalArticle

Parallelly Running k-Nearest Neighbor Classification over Semantically Secure Encrypted Data in Outsourced Environments

Park, J. & Lee, D. H., 2020 Jan 1, In : IEEE Access. 8, p. 64617-64633 17 p., 9051788.

Research output: Contribution to journalArticle

Open Access
2019

Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network

Sun, H., Lee, S. Y., Joo, K., Jin, H. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 158237-158249 13 p., 8886494.

Research output: Contribution to journalArticle

Open Access

CCA security for self-updatable encryption:Protecting cloud data when clients read/write ciphertexts

Lee, K., Lee, D. H., Park, J. H. & Yung, M., 2019 Apr 1, In : Computer Journal. 62, 4, p. 545-562 18 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method

Seo, M., Kim, S., Lee, D. H. & Park, J. H., 2019 Jan 1, In : International Journal of Information Security.

Research output: Contribution to journalArticle

Enhanced android app-repackaging attack on in-vehicle network

Lee, Y., Woo, S., Lee, J., Song, Y., Moon, H., Lee, D. H. & Andersson, K., 2019 Jan 1, In : Wireless Communications and Mobile Computing. 2019, 5650245.

Research output: Contribution to journalArticle

Open Access

Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication

Seo, M., Hwang, J. Y., Lee, D. H., Kim, S., Kim, S. H. & Park, J. H., 2019 Jan 1, In : IEEE Access. 7, p. 69892-69906 15 p., 8723318.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

New technique for chosen-ciphertext security based on non-interactive zero-knowledge

Seo, M., Abdalla, M., Lee, D. H. & Park, J. H., 2019 Jul 1, In : Information Sciences. 490, p. 18-35 18 p.

Research output: Contribution to journalArticle

Physical layer security of autonomous driving: Secure vehicle-to-vehicle communication in a security cluster

Ahn, N. Y. & Lee, D. H., 2019 Jan 1, In : Ad-Hoc and Sensor Wireless Networks. 45, 3-4, p. 293-336 44 p.

Research output: Contribution to journalArticle

Poster: How to securely record logs based on ARM trust zone

Lee, S., Jo, H. J., Choi, W. & Lee, D. H., 2019 Jul 2, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 664-666 3 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Citation (Scopus)

Schemes for Privacy Data Destruction in a NAND Flash Memory

Ahn, N. Y. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 181305-181313 9 p., 8930558.

Research output: Contribution to journalArticle

Open Access

Securing Ultrasonic Sensors against Signal Injection Attacks Based on a Mathematical Model

Lee, S., Choi, W. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 107716-107729 14 p., 8786810.

Research output: Contribution to journalArticle

Open Access

T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method

Lee, S., Choi, W., Jo, H. J. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 49738-49755 18 p., 8689029.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Vehicle communication using secrecy capacity

Ahn, N. Y., Lee, D. H. & Oh, S-J., 2019 Jan 1, Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2. Kapoor, S., Arai, K. & Bhatia, R. (eds.). Springer Verlag, p. 158-172 15 p. (Advances in Intelligent Systems and Computing; vol. 881).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

VODKA: Virtualization obfuscation using dynamic key approach

Lee, J. Y., Suk, J. H. & Lee, D. H., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

A privacy-preserving data sharing solution for mobile healthcare

Huang, C., Yan, K., Wei, S. & Lee, D. H., 2018 May 15, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 260-265 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Construction of a New Biometric-Based Key Derivation Function and Its Application

Seo, M., Park, J. H., Kim, Y., Cho, S., Lee, D. H. & Hwang, J. Y., 2018 Jan 1, In : Security and Communication Networks. 2018, 6107912.

Research output: Contribution to journalArticle

Efficient anonymous attribute-based encryption with access policy hidden for cloud computing

Huang, C., Yan, K., Wei, S., Zhang, G. & Lee, D. H., 2018 May 15, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 266-270 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Energy-aware key exchange for securing implantable medical devices

Choi, W., Lee, Y., Lee, D., Kim, H., Park, J. H., Kim, I-S. & Lee, D. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 1809302.

Research output: Contribution to journalArticle

Open Access

Forward secure searchable encryption using key-based blocks chain technique

Lv, S., Huang, Y., Li, B., Wei, Y., Liu, Z., Liu, J. K. & Lee, D. H., 2018 Jan 1, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Vaidya, J. & Li, J. (eds.). Springer Verlag, p. 85-97 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11337 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks

Choi, W., Jo, H. J., Woo, S., Chun, J. Y., Park, J. & Lee, D. H., 2018 Jun 1, In : IEEE Transactions on Vehicular Technology. 67, 6, p. 4757-4770 14 p.

Research output: Contribution to journalArticle

28 Citations (Scopus)

Multi-Client Order-Revealing Encryption

Eom, J., Lee, D. H. & Lee, K., 2018 Aug 11, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Privacy preserving k-nearest neighbor for medical diagnosis in e-health cloud

Park, J. & Lee, D. H., 2018 Jan 1, In : Journal of Healthcare Engineering. 2018, 4073103.

Research output: Contribution to journalArticle

Open Access
3 Citations (Scopus)

Recipient revocable broadcast encryption with dealership

Kim, J. S., Lee, Y., Eom, J. & Lee, D. H., 2018 Jan 1, Information Security and Cryptology - ICISC 2017 - 20th International Conference, Revised Selected Papers. Springer Verlag, p. 214-228 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10779 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security Architecture for a Secure Database on Android

Park, J. H., Yoo, S. M., Kim, I-S. & Lee, D. H., 2018 Jan 26, In : IEEE Access. 6, p. 11482-11501 20 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Sound-Proximity: 2-Factor Authentication against Relay Attack on Passive Keyless Entry and Start System

Choi, W., Seo, M. & Lee, D. H., 2018 Jan 1, In : Journal of Advanced Transportation. 2018, 1935974.

Research output: Contribution to journalArticle

7 Citations (Scopus)

UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program

Suk, J. H., Lee, J. Y., Jin, H., Kim, I-S. & Lee, D. H., 2018 Jan 1, (Accepted/In press) In : Software - Practice and Experience.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Update state tampering: A novel adversary post-compromise technique on cyber threats

Kim, S. J., Kim, B. J., Kim, H. C. & Lee, D. H., 2018 Jan 1, Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Proceedings. Springer Verlag, p. 141-161 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10885 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System

Choi, W., Joo, K., Jo, H. J., Park, M. C. & Lee, D. H., 2018 Mar 3, (Accepted/In press) In : IEEE Transactions on Information Forensics and Security.

Research output: Contribution to journalArticle

35 Citations (Scopus)

WheelLogger: Driver Tracing Using Smart Watch

Park, J. Y., Yun, J. P. & Lee, D. H., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, p. 87-100 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

E2PKA: An Energy-Efficient and PV-Based Key Agreement Scheme for Body Area Networks

Choi, W., Kim, I-S. & Lee, D. H., 2017 May 31, (Accepted/In press) In : Wireless Personal Communications. p. 1-22 22 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

POSTER: Secure infotainment infrastructure of connected car

Eun, C., Moon, J., Jung, I. Y., Lee, D. H., Park, J. & Kim, E., 2017 Jul 18, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 267-268 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reliable Cooperative Authentication for Vehicular Networks

Jo, H. J., Kim, I-S. & Lee, D. H., 2017 Jun 20, (Accepted/In press) In : IEEE Transactions on Intelligent Transportation Systems.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

Lee, K., Choi, S. G., Lee, D. H., Park, J. H. & Yung, M., 2017 Mar 8, In : Theoretical Computer Science. 667, p. 51-92 42 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2016

An efficient IBE scheme with tight security reduction in the random oracle model

Park, J. H. & Lee, D. H., 2016 Apr 1, In : Designs, Codes, and Cryptography. 79, 1, p. 63-85 23 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

A practical security architecture for in-vehicle CAN-FD

Woo, S., Jo, H. J., Kim, I-S. & Lee, D. H., 2016 Aug 1, In : IEEE Transactions on Intelligent Transportation Systems. 17, 8, p. 2248-2261 14 p., 7435304.

Research output: Contribution to journalArticle

39 Citations (Scopus)

A variant of Park-Lee identity-based encryption system

Park, J. H. & Lee, D. H., 2016 Mar 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E99A, 3, p. 720-732 13 p.

Research output: Contribution to journalArticle

BadVoice: Soundless voice-control replay attack on modern smartphones

Young, P. J., Jin, J. H., Woo, S. & Lee, D. H., 2016 Aug 9, ICUFN 2016 - 8th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, Vol. 2016-August. p. 882-887 6 p. 7537163

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Bidirectional transfer of quantum information for unknown photons via cross-Kerr nonlinearity and photon-number-resolving measurement

Heo, J., Hong, C. H., Lee, D. H. & Yang, H. J., 2016 Jan 10, In : Chinese Physics B. 25, 2, 020306.

Research output: Contribution to journalArticle

10 Citations (Scopus)

Client cloud Web service: Reducing traffic consumption

Paik, J. H., Cho, K., Jung, B. G. & Lee, D. H., 2016 Feb 1, In : Security and Communication Networks. 9, 3, p. 248-261 14 p.

Research output: Contribution to journalArticle

Efficient and Privacy-Preserving Metering Protocols for Smart Grid Systems

Jo, H. J., Kim, I-S. & Lee, D. H., 2016 May 1, In : IEEE Transactions on Smart Grid. 7, 3, p. 1732-1742 11 p., 7163628.

Research output: Contribution to journalArticle

37 Citations (Scopus)

Efficient revocable identity-based encryption via subset difference methods

Lee, K., Lee, D. H. & Park, J. H., 2016 Oct 17, (Accepted/In press) In : Designs, Codes, and Cryptography. p. 1-38 38 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)

Keyword updatable PEKS

Rhee, H. S. & Lee, D. H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 96-109 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

No safety without security

Lee, Y., Woo, S., Wollinger, T. & Lee, D. H., 2016 Jan 1.

Research output: Contribution to conferencePaper

Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System

Eom, J., Lee, D. H. & Lee, K., 2016 Dec 1, In : Journal of Medical Systems. 40, 12, 253.

Research output: Contribution to journalArticle

7 Citations (Scopus)

SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform

Jeong, E. S., Kim, I-S. & Lee, D. H., 2016 Dec 6, (Accepted/In press) In : Multimedia Tools and Applications. p. 1-21 21 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Security of cloud-based revocable identity-based proxy re-encryption scheme

Park, S. & Lee, D. H., 2016 Jul 1, In : IEICE Transactions on Information and Systems. E99D, 7, p. 1933-1936 4 p.

Research output: Contribution to journalArticle

Selectively chosen ciphertext security in threshold public-key encryption

Kim, K., Park, J. H. & Lee, D. H., 2016 Feb 1, In : Security and Communication Networks. 9, 3, p. 189-200 12 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Two-stage tamper response in tamper-resistant software

Park, M. C., Koo, W. K., Suh, D. G., Kim, I-S. & Lee, D. H., 2016 Jun 1, In : IET Software. 10, 3, p. 81-88 8 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Unbounded hierarchical identity-based encryption with efficient revocation

Ryu, G., Lee, K., Park, S. & Lee, D. H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 122-133 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)