If you made any changes in Pure these will be visible here soon.

Research Output 1993 2019

2019

Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network

Sun, H., Lee, S. Y., Joo, K., Jin, H. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 158237-158249 13 p., 8886494.

Research output: Contribution to journalArticle

Open Access
Controllers
Authentication
Cryptography
Virtualization
1 Citation (Scopus)

CCA security for self-updatable encryption:Protecting cloud data when clients read/write ciphertexts

Lee, K., Lee, D. H., Park, J. H. & Yung, M., 2019 Apr 1, In : Computer Journal. 62, 4, p. 545-562 18 p.

Research output: Contribution to journalArticle

Cryptography
Servers
Cloud computing
Access control

EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method

Seo, M., Kim, S., Lee, D. H. & Park, J. H., 2019 Jan 1, In : International Journal of Information Security.

Research output: Contribution to journalArticle

Encapsulation
Cryptography
Gaussian distribution
Decoding
Concretes

Enhanced android app-repackaging attack on in-vehicle network

Lee, Y., Woo, S., Lee, J., Song, Y., Moon, H., Lee, D. H. & Andersson, K., 2019 Jan 1, In : Wireless Communications and Mobile Computing. 2019, 5650245.

Research output: Contribution to journalArticle

Open Access
Application programs
Railroad cars
Automobiles
Communication
Android (operating system)
1 Citation (Scopus)

Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication

Seo, M., Hwang, J. Y., Lee, D. H., Kim, S., Kim, S. H. & Park, J. H., 2019 Jan 1, In : IEEE Access. 7, p. 69892-69906 15 p., 8723318.

Research output: Contribution to journalArticle

Open Access
Authentication
Biometrics
Bandwidth
Dust
Processing

New technique for chosen-ciphertext security based on non-interactive zero-knowledge

Seo, M., Abdalla, M., Lee, D. H. & Park, J. H., 2019 Jul 1, In : Information Sciences. 490, p. 18-35 18 p.

Research output: Contribution to journalArticle

Chosen-ciphertext Security
Zero-knowledge
Encapsulation
Zero-knowledge Proof
Discrete Logarithm
1 Citation (Scopus)

Poster: How to securely record logs based on ARM trust zone

Lee, S., Jo, H. J., Choi, W. & Lee, D. H., 2019 Jul 2, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 664-666 3 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Embedded systems
Communication
Big data

Schemes for Privacy Data Destruction in a NAND Flash Memory

Ahn, N. Y. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 181305-181313 9 p., 8930558.

Research output: Contribution to journalArticle

Open Access
Data privacy
Flash memory
Data storage equipment
Costs

Securing Ultrasonic Sensors against Signal Injection Attacks Based on a Mathematical Model

Lee, S., Choi, W. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 107716-107729 14 p., 8786810.

Research output: Contribution to journalArticle

Open Access
Ultrasonic sensors
Mathematical models
Jamming
Sensors
Distance measurement
1 Citation (Scopus)

T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method

Lee, S., Choi, W., Jo, H. J. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 49738-49755 18 p., 8689029.

Research output: Contribution to journalArticle

Data recording
Accidents
Insurance
Authentication
Automobiles
2 Citations (Scopus)

Vehicle communication using secrecy capacity

Ahn, N. Y., Lee, D. H. & Oh, S-J., 2019 Jan 1, Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2. Kapoor, S., Arai, K. & Bhatia, R. (eds.). Springer Verlag, p. 158-172 15 p. (Advances in Intelligent Systems and Computing; vol. 881).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Power transmission
Wireless networks

VODKA: Virtualization obfuscation using dynamic key approach

Lee, J. Y., Suk, J. H. & Lee, D. H., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Obfuscation
Virtualization
Software Security
Debugging
Instrumentation
2018
1 Citation (Scopus)

A privacy-preserving data sharing solution for mobile healthcare

Huang, C., Yan, K., Wei, S. & Lee, D. H., 2018 May 15, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 260-265 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Health
mHealth
Biometrics
Access control

Construction of a New Biometric-Based Key Derivation Function and Its Application

Seo, M., Park, J. H., Kim, Y., Cho, S., Lee, D. H. & Hwang, J. Y., 2018 Jan 1, In : Security and Communication Networks. 2018, 6107912.

Research output: Contribution to journalArticle

Biometrics
Authentication
Cryptography
Servers
3 Citations (Scopus)

Efficient anonymous attribute-based encryption with access policy hidden for cloud computing

Huang, C., Yan, K., Wei, S., Zhang, G. & Lee, D. H., 2018 May 15, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 266-270 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Cryptography
Access control
Security of data
Information technology

Energy-aware key exchange for securing implantable medical devices

Choi, W., Lee, Y., Lee, D., Kim, H., Park, J. H., Kim, I-S. & Lee, D. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 1809302.

Research output: Contribution to journalArticle

Open Access
Medical problems
Communication

Forward secure searchable encryption using key-based blocks chain technique

Lv, S., Huang, Y., Li, B., Wei, Y., Liu, Z., Liu, J. K. & Lee, D. H., 2018 Jan 1, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Vaidya, J. & Li, J. (eds.). Springer Verlag, p. 85-97 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11337 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encryption
Cryptography
Privacy
Range Query
Tree Structure
18 Citations (Scopus)

Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks

Choi, W., Jo, H. J., Woo, S., Chun, J. Y., Park, J. & Lee, D. H., 2018 Jun 1, In : IEEE Transactions on Vehicular Technology. 67, 6, p. 4757-4770 14 p.

Research output: Contribution to journalArticle

Electronics
Controller
Controllers
Unit
Attack
2 Citations (Scopus)

Multi-Client Order-Revealing Encryption

Eom, J., Lee, D. H. & Lee, K., 2018 Aug 11, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

Cryptography
2 Citations (Scopus)

Privacy preserving k-nearest neighbor for medical diagnosis in e-health cloud

Park, J. & Lee, D. H., 2018 Jan 1, In : Journal of Healthcare Engineering. 2018, 4073103.

Research output: Contribution to journalArticle

Open Access
Privacy
Health
Cloud computing
Servers
Network protocols

Recipient revocable broadcast encryption with dealership

Kim, J. S., Lee, Y., Eom, J. & Lee, D. H., 2018 Jan 1, Information Security and Cryptology - ICISC 2017 - 20th International Conference, Revised Selected Papers. Springer Verlag, p. 214-228 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10779 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Broadcast Encryption
Cryptography
Revocation
Random Oracle
Security Model
2 Citations (Scopus)

Security Architecture for a Secure Database on Android

Park, J. H., Yoo, S. M., Kim, I-S. & Lee, D. H., 2018 Jan 26, In : IEEE Access. 6, p. 11482-11501 20 p.

Research output: Contribution to journalArticle

Application programs
Access control
Android (operating system)
Data privacy
Application programming interfaces (API)
7 Citations (Scopus)

Sound-Proximity: 2-Factor Authentication against Relay Attack on Passive Keyless Entry and Start System

Choi, W., Seo, M. & Lee, D. H., 2018 Jan 1, In : Journal of Advanced Transportation. 2018, 1935974.

Research output: Contribution to journalArticle

Authentication
Railroad cars
Acoustic waves
Audio systems
Factors
2 Citations (Scopus)

UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program

Suk, J. H., Lee, J. Y., Jin, H., Kim, I-S. & Lee, D. H., 2018 Jan 1, (Accepted/In press) In : Software - Practice and Experience.

Research output: Contribution to journalArticle

Flow control
Application programming interfaces (API)
Flow patterns
Data structures
Engineers

Update state tampering: A novel adversary post-compromise technique on cyber threats

Kim, S. J., Kim, B. J., Kim, H. C. & Lee, D. H., 2018 Jan 1, Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Proceedings. Springer Verlag, p. 141-161 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10885 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Update
Servers
Vulnerability
Target
Countermeasures
26 Citations (Scopus)

VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System

Choi, W., Joo, K., Jo, H. J., Park, M. C. & Lee, D. H., 2018 Mar 3, (Accepted/In press) In : IEEE Transactions on Information Forensics and Security.

Research output: Contribution to journalArticle

Intrusion detection
Communication
Network protocols
Authentication
Controllers

WheelLogger: Driver Tracing Using Smart Watch

Park, J. Y., Yun, J. P. & Lee, D. H., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, p. 87-100 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watches
Tracing
Driver
Apple
Leakage
2017
1 Citation (Scopus)

E2PKA: An Energy-Efficient and PV-Based Key Agreement Scheme for Body Area Networks

Choi, W., Kim, I-S. & Lee, D. H., 2017 May 31, (Accepted/In press) In : Wireless Personal Communications. p. 1-22 22 p.

Research output: Contribution to journalArticle

Sensors
Electric power utilization
Health
Authentication
Cryptography

POSTER: Secure infotainment infrastructure of connected car

Eun, C., Moon, J., Jung, I. Y., Lee, D. H., Park, J. & Kim, E., 2017 Jul 18, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 267-268 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Railroad cars
Hazards
Internet
Industry
8 Citations (Scopus)

Reliable Cooperative Authentication for Vehicular Networks

Jo, H. J., Kim, I-S. & Lee, D. H., 2017 Jun 20, (Accepted/In press) In : IEEE Transactions on Intelligent Transportation Systems.

Research output: Contribution to journalArticle

Authentication
Vehicular ad hoc networks
Packet loss
Synchronization
Communication
2 Citations (Scopus)

Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

Lee, K., Choi, S. G., Lee, D. H., Park, J. H. & Yung, M., 2017 Mar 8, In : Theoretical Computer Science. 667, p. 51-92 42 p.

Research output: Contribution to journalArticle

Constrained Control
Access Control
Access control
Encryption
Cryptography
2016
8 Citations (Scopus)

An efficient IBE scheme with tight security reduction in the random oracle model

Park, J. H. & Lee, D. H., 2016 Apr 1, In : Designs, Codes, and Cryptography. 79, 1, p. 63-85 23 p.

Research output: Contribution to journalArticle

Identity-based Encryption
Random Oracle Model
Cryptography
Revocation
Tightness
33 Citations (Scopus)

A practical security architecture for in-vehicle CAN-FD

Woo, S., Jo, H. J., Kim, I-S. & Lee, D. H., 2016 Aug 1, In : IEEE Transactions on Intelligent Transportation Systems. 17, 8, p. 2248-2261 14 p., 7435304.

Research output: Contribution to journalArticle

Controllers
Communication
Microcontrollers
Standardization
Specifications

A variant of Park-Lee identity-based encryption system

Park, J. H. & Lee, D. H., 2016 Mar 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E99A, 3, p. 720-732 13 p.

Research output: Contribution to journalArticle

Identity-based Encryption
Cryptography
Hash functions
Hash Function
Anonymity
7 Citations (Scopus)

BadVoice: Soundless voice-control replay attack on modern smartphones

Young, P. J., Jin, J. H., Woo, S. & Lee, D. H., 2016 Aug 9, ICUFN 2016 - 8th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, Vol. 2016-August. p. 882-887 6 p. 7537163

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Mobile devices
Speech recognition
Authentication
10 Citations (Scopus)

Bidirectional transfer of quantum information for unknown photons via cross-Kerr nonlinearity and photon-number-resolving measurement

Heo, J., Hong, C. H., Lee, D. H. & Yang, H. J., 2016 Jan 10, In : Chinese Physics B. 25, 2, 020306.

Research output: Contribution to journalArticle

nonlinearity
photons
detectors

Client cloud Web service: Reducing traffic consumption

Paik, J. H., Cho, K., Jung, B. G. & Lee, D. H., 2016 Feb 1, In : Security and Communication Networks. 9, 3, p. 248-261 14 p.

Research output: Contribution to journalArticle

Web services
Internet protocols
Availability
Transmission control protocol
HTTP
35 Citations (Scopus)

Efficient and Privacy-Preserving Metering Protocols for Smart Grid Systems

Jo, H. J., Kim, I-S. & Lee, D. H., 2016 May 1, In : IEEE Transactions on Smart Grid. 7, 3, p. 1732-1742 11 p., 7163628.

Research output: Contribution to journalArticle

Authentication
Industrial research
Electricity
Communication
17 Citations (Scopus)

Efficient revocable identity-based encryption via subset difference methods

Lee, K., Lee, D. H. & Park, J. H., 2016 Oct 17, (Accepted/In press) In : Designs, Codes, and Cryptography. p. 1-38 38 p.

Research output: Contribution to journalArticle

Identity-based Encryption
Difference Method
Cryptography
Subset
Revocation
2 Citations (Scopus)

Keyword updatable PEKS

Rhee, H. S. & Lee, D. H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 96-109 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Keyword Search
Public Key Encryption
Cryptography
Receiver
Privacy

No safety without security

Lee, Y., Woo, S., Wollinger, T. & Lee, D. H., 2016 Jan 1.

Research output: Contribution to conferencePaper

Automobile electronic equipment
Malware
7 Citations (Scopus)

Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System

Eom, J., Lee, D. H. & Lee, K., 2016 Dec 1, In : Journal of Medical Systems. 40, 12, 253.

Research output: Contribution to journalArticle

Electronic Health Records
Cryptography
Health
Access control
Emergencies
1 Citation (Scopus)

SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform

Jeong, E. S., Kim, I-S. & Lee, D. H., 2016 Dec 6, (Accepted/In press) In : Multimedia Tools and Applications. p. 1-21 21 p.

Research output: Contribution to journalArticle

Smartphones
Application programming interfaces (API)
Viruses
Servers
Monitoring

Security of cloud-based revocable identity-based proxy re-encryption scheme

Park, S. & Lee, D. H., 2016 Jul 1, In : IEICE Transactions on Information and Systems. E99D, 7, p. 1933-1936 4 p.

Research output: Contribution to journalArticle

Cryptography
1 Citation (Scopus)

Selectively chosen ciphertext security in threshold public-key encryption

Kim, K., Park, J. H. & Lee, D. H., 2016 Feb 1, In : Security and Communication Networks. 9, 3, p. 189-200 12 p.

Research output: Contribution to journalArticle

Cryptography
Computer systems
Semantics
2 Citations (Scopus)

Two-stage tamper response in tamper-resistant software

Park, M. C., Koo, W. K., Suh, D. G., Kim, I-S. & Lee, D. H., 2016 Jun 1, In : IET Software. 10, 3, p. 81-88 8 p.

Research output: Contribution to journalArticle

Reverse engineering
Software design
Flow control
7 Citations (Scopus)

Unbounded hierarchical identity-based encryption with efficient revocation

Ryu, G., Lee, K., Park, S. & Lee, D. H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 122-133 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identity-based Encryption
Revocation
Cryptography
Binary trees
Binary Tree
10 Citations (Scopus)

Vulnerabilities of Android OS-Based Telematics System

Jo, H. J., Choi, W., Na, S. Y., Woo, S. & Lee, D. H., 2016 Aug 26, (Accepted/In press) In : Wireless Personal Communications. p. 1-20 20 p.

Research output: Contribution to journalArticle

Firmware
Intelligent vehicle highway systems
Reverse engineering
Websites
Signal processing
2015
3 Citations (Scopus)

Adaptively secure broadcast encryption under standard assumptions with better efficiency

Lee, K. & Lee, D. H., 2015 May 1, In : IET Information Security. 9, 3, p. 149-157 9 p.

Research output: Contribution to journalArticle

Cryptography
Water
2 Citations (Scopus)

An efficient ID-based mutual authentication secure against privileged-insider attack

Kim, S. Y., Kim, H. & Lee, D. H., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292941

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Network protocols
Cryptography
Internet