• 3832 Citations
  • 31 h-Index
1993 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2019

Poster: How to securely record logs based on ARM trust zone

Lee, S., Jo, H. J., Choi, W. & Lee, D. H., 2019 Jul 2, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 664-666 3 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2 Citations (Scopus)

Vehicle communication using secrecy capacity

Ahn, N. Y., Lee, D. H. & Oh, S-J., 2019 Jan 1, Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2. Kapoor, S., Arai, K. & Bhatia, R. (eds.). Springer Verlag, p. 158-172 15 p. (Advances in Intelligent Systems and Computing; vol. 881).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

VODKA: Virtualization obfuscation using dynamic key approach

Lee, J. Y., Suk, J. H. & Lee, D. H., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

A privacy-preserving data sharing solution for mobile healthcare

Huang, C., Yan, K., Wei, S. & Lee, D. H., 2018 May 15, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 260-265 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Efficient anonymous attribute-based encryption with access policy hidden for cloud computing

Huang, C., Yan, K., Wei, S., Zhang, G. & Lee, D. H., 2018 May 15, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 266-270 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Forward secure searchable encryption using key-based blocks chain technique

Lv, S., Huang, Y., Li, B., Wei, Y., Liu, Z., Liu, J. K. & Lee, D. H., 2018 Jan 1, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Vaidya, J. & Li, J. (eds.). Springer Verlag, p. 85-97 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11337 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recipient revocable broadcast encryption with dealership

Kim, J. S., Lee, Y., Eom, J. & Lee, D. H., 2018 Jan 1, Information Security and Cryptology - ICISC 2017 - 20th International Conference, Revised Selected Papers. Springer Verlag, p. 214-228 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10779 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Update state tampering: A novel adversary post-compromise technique on cyber threats

Kim, S. J., Kim, B. J., Kim, H. C. & Lee, D. H., 2018 Jan 1, Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Proceedings. Springer Verlag, p. 141-161 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10885 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

WheelLogger: Driver Tracing Using Smart Watch

Park, J. Y., Yun, J. P. & Lee, D. H., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, p. 87-100 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

POSTER: Secure infotainment infrastructure of connected car

Eun, C., Moon, J., Jung, I. Y., Lee, D. H., Park, J. & Kim, E., 2017 Jul 18, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 267-268 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

BadVoice: Soundless voice-control replay attack on modern smartphones

Young, P. J., Jin, J. H., Woo, S. & Lee, D. H., 2016 Aug 9, ICUFN 2016 - 8th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, Vol. 2016-August. p. 882-887 6 p. 7537163

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Keyword updatable PEKS

Rhee, H. S. & Lee, D. H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 96-109 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Unbounded hierarchical identity-based encryption with efficient revocation

Ryu, G., Lee, K., Park, S. & Lee, D. H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 122-133 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)
2015

An efficient ID-based mutual authentication secure against privileged-insider attack

Kim, S. Y., Kim, H. & Lee, D. H., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292941

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

An improved fuzzy attribute-based authentication

Yun, J. P., Kim, H. & Lee, D. H., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292946

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Forward secure non-interactive key exchange from indistinguishability obfuscation

Lee, Y. K. & Lee, D. H., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292984

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Self-certified privacy-preserving scheme for vehicle-to-vehicle communications

Cho, K., Lee, B. G. & Lee, D. H., 2015 Jan 1, Lecture Notes in Electrical Engineering. Springer Verlag, Vol. 330. p. 335-341 7 p. (Lecture Notes in Electrical Engineering; vol. 330).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

Public-key revocation and tracing schemes with subset difference methods revisited

Lee, K., Koo, W. K., Lee, D. H. & Park, J. H., 2014 Jan 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Springer Verlag, Vol. 8713 LNCS. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8713 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)
2013

A framework for anomaly pattern recognition in electronic financial transaction using moving average method

Kim, A. C., Park, W. H. & Lee, D. H., 2013 Feb 26, IT Convergence and Security 2012. p. 93-99 7 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Aggregating CL-signatures revisited: Extended functionality and better efficiency

Lee, K., Lee, D. H. & Yung, M., 2013 Sep 5, Financial Cryptography and Data Security - 17th International Conference, FC 2013, Revised Selected Papers. p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Attribute-based encryption for commercial content distribution

Kim, H., Park, S., Park, J. H. & Lee, D. H., 2013 Feb 26, Lecture Notes in Electrical Engineering. Vol. 215 LNEE. p. 205-213 9 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Predictability of Android OpenSSL's pseudo random number generator

Kim, S. H., Han, D. & Lee, D. H., 2013 Dec 9, Proceedings of the ACM Conference on Computer and Communications Security. p. 659-668 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Citations (Scopus)

Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

Lee, K., Choi, S. G., Lee, D. H., Park, J. H. & Yung, M., 2013 Dec 1, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 1 ed. p. 235-254 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8269 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Citations (Scopus)

Sequential aggregate signatures made shorter

Lee, K., Lee, D. H. & Yung, M., 2013 Jul 12, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7954 LNCS. p. 202-217 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7954 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Sequential aggregate signatures with short public keys: Design, analysis and implementation studies

Lee, K., Lee, D. H. & Yung, M., 2013 Feb 21, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7778 LNCS. p. 423-442 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7778 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)
2012

A study on static analysis model of mobile application for privacy protection

Kim, S., Cho, J. I., Myeong, H. W. & Lee, D. H., 2012 Jan 1, Lecture Notes in Electrical Engineering. Vol. 114 LNEE. p. 529-540 12 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks

Cho, K. & Lee, D. H., 2012 Mar 15, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7115 LNCS. p. 203-218 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7115 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Threshold identity-based broadcast encryption from identity-based encryption

Kim, K., Kim, M., Kim, H., Park, J. H. & Lee, D. H., 2012 Dec 17, Computer Applications for Database, Education, and Ubiquitous Computing - Int. Conferences, EL, DTA and UNESST 2012, Held as Part of the Future Generation Information Technol. Conf., FGIT 2012, Proc.. p. 99-102 4 p. (Communications in Computer and Information Science; vol. 352 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

An efficient implementation of block cipher in Android platform

Paik, J. H., Seo, S. C., Kim, Y., Lee, H. J., Jung, H. C. & Lee, D. H., 2011 Sep 14, Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011. p. 173-176 4 p. 5992211. (Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

An efficient implementation of KCDSA on Graphic Processing Units

Seo, S. C., Paik, J. H., Lee, D. H., Hong, S., Lee, H. J. & Jung, H. C., 2011 Sep 14, Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011. p. 167-172 6 p. 5992210

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Extended fingerprint-based user authentication scheme using smart cards in education IPTV

Jun, E. A., Kim, J. G., Jung, S. W. & Lee, D. H., 2011 Jul 18, 2011 International Conference on Information Science and Applications, ICISA 2011. 5772392. (2011 International Conference on Information Science and Applications, ICISA 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

On a security model for a retrieval system over encrypted database

Park, H. A., Byun, J. W., Park, J. H. & Lee, D. H., 2011 Dec 1, Proceedings - 7th International Conference on Information Processing and Management, ICIPM 2011. p. 76-82 7 p. 6222138

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy-enhanced deniable authentication e-mail service

Ki, J., Yeong Hwang, J., Nyang, D., Lee, D. H. & Lim, J. I., 2011 Sep 2, Communications in Computer and Information Science. Vol. 194 CCIS. p. 16-29 14 p. (Communications in Computer and Information Science; vol. 194 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2010

A fingerprint-based user authentication scheme using smart cards in IPTV environments

Jun, E. A., Rhee, H. S., Jung, S. W. & Lee, D. H., 2010 Jul 15, 2010 International Conference on Information Science and Applications, ICISA 2010. 5480301. (2010 International Conference on Information Science and Applications, ICISA 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Toward an integrated system between cloud computing and smartcard application

Park, H. A., Park, J. H., Choi, J. T. & Lee, D. H., 2010 Dec 1, Proceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010. p. 580-587 8 p. 5711122

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2009

Developing a multi-protocol mobility manager for SIP/SS7 networks

Park, H. S., Lee, H. W., Park, S. J. & Lee, D. H., 2009 Oct 13, Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009. p. 565-570 6 p. 5066842

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Improved searchable public key encryption with designated tester

Rhee, H. S., Park, J. H., Susilo, W. & Lee, D. H., 2009 Dec 1, Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09. p. 376-379 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

98 Citations (Scopus)

Practical access control protocol for secure sensor networks

Hwaseong, L., Kilho, S. & Dong, H. L., 2009 Oct 27, 2009 IEEE 13th International Symposium on Consumer Electronics, ISCE 2009. p. 806-809 4 p. 5157056. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Security authentication for U-health application services

Ahn, B. H., Hong, J. & Lee, D. H., 2009 Dec 1, Communications in Computer and Information Science. Vol. 56. p. 17-24 8 p. (Communications in Computer and Information Science; vol. 56).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security enhancing compiler for localization schemes in pervasive sensor networks

Chun, J. Y., Kim, Y. H., Hwang, J. Y. & Lee, D. H., 2009 Nov 10, Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009. p. 307-312 6 p. 5222880

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Universal forgery of the identity-based sequential aggregate signature scheme

Hwang, J. Y., Lee, D. H. & Yung, M., 2009 Dec 1, Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09. p. 157-160 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Citations (Scopus)
2008

A3RP: Anonymous and authenticated ad hoc routing protocol

Paik, J. H., Kim, B. H. & Lee, D. H., 2008 Sep 15, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 67-72 6 p. 4511536

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Citations (Scopus)

A key distribution scheme for wireless sensor networks

Kim, Y. H., Lee, H. & Lee, D. H., 2008 Aug 15, 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008. p. 572-577 6 p. 4517458

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

An efficient key establishment scheme for self-organizing sensor networks

Kim, Y. H., Choi, K. Y., Lim, J. I. & Lee, D. H., 2008 Feb 21, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4904 LNCS. p. 345-349 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4904 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A new public key broadcast encryption using Boneh-Boyen-Goh's HIBE scheme

Park, J. H. & Lee, D. H., 2008 Apr 7, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4991 LNCS. p. 101-115 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Anonymous and traceable authentication scheme using smart cards

Kim, S., Rhee, H. S., Chun, J. Y. & Lee, D. H., 2008 Sep 15, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 162-165 4 p. 4511555

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Attribute-based access control using combined authentication technologies

Park, H. A., Lee, D. H. & Zhan, J., 2008 Dec 30, 2008 IEEE International Conference on Granular Computing, GRC 2008. p. 518-523 6 p. 4664774

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Auditable and privacy-preserving authentication in vehicular networks

Sung, H. K., Bum, H. K., Young, K. K. & Lee, D. H., 2008 Dec 1, Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008. p. 19-24 6 p. 4641307

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Authenticated group key distribution for unreliable sensor networks

Lee, H., Kim, Y. H. & Lee, D. H., 2008 Sep 16, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 285-288 4 p. 4511578

Research output: Chapter in Book/Report/Conference proceedingConference contribution

CADE: Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks*

Kim, Y. K., Lee, H., Cho, K. & Lee, D. H., 2008 Dec 29, Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. Vol. 2. p. 416-422 7 p. 4682277

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)