• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1993 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Chapter

Search results

  • Chapter

    Constant-round authenticated group key exchange for dynamic groups

    Kim, H. J., Lee, S. M. & Lee, D. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lee, P. J. & Lee, P. J. (eds.). Springer Verlag, p. 245-259 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3329).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    92 Citations (Scopus)
  • Covert channel detection in the ICMP payload using support vector machine

    Sohn, T., Moon, J., Lee, S., Lee, D. H. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Yazici, A. & Sener, C. (eds.). Springer Verlag, p. 828-835 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2869).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    20 Citations (Scopus)
  • Efficient ID-based group key agreement with bilinear maps

    Choi, K. Y., Hwang, J. Y. & Lee, D. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bao, F., Deng, R. & Zhou, J. (eds.). Springer Verlag, p. 130-144 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2947).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    111 Citations (Scopus)
  • Efficient password-based group key exchange

    Lee, S. M., Hwang, J. Y. & Lee, D. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Katsikas, S., Lopez, J. & Pernul, G. (eds.). Springer Verlag, p. 191-199 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3184).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    40 Citations (Scopus)
  • One-round protocols for two-party authenticated key exchange

    Jeong, I. R., Katz, J. & Lee, D. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jakobsson, M., Yung, M. & Zhou, J. (eds.). Springer Verlag, p. 220-232 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3089).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    68 Citations (Scopus)