• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1993 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2017

    A privacy-preserving data sharing solution for mobile healthcare

    Huang, C., Yan, K., Wei, S. & Lee, D. H., 2017, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 260-265 6 p. (Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Efficient anonymous attribute-based encryption with access policy hidden for cloud computing

    Huang, C., Yan, K., Wei, S., Zhang, G. & Lee, D. H., 2017, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 266-270 5 p. (Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • POSTER: Secure infotainment infrastructure of connected car

    Eun, C., Moon, J., Jung, I. Y., Lee, D., Park, J. & Kim, E., 2017 Jul 18, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 267-268 2 p. (Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Forward secure searchable encryption using key-based blocks chain technique

    Lv, S., Huang, Y., Li, B., Wei, Y., Liu, Z., Liu, J. K. & Lee, D. H., 2018, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Vaidya, J. & Li, J. (eds.). Springer Verlag, p. 85-97 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11337 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Recipient revocable broadcast encryption with dealership

    Kim, J. S., Lee, Y., Eom, J. & Lee, D. H., 2018, Information Security and Cryptology - ICISC 2017 - 20th International Conference, Revised Selected Papers. Kim, D-C. & Kim, H. (eds.). Springer Verlag, p. 214-228 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10779 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Update state tampering: A novel adversary post-compromise technique on cyber threats

    Kim, S. J., Kim, B. J., Kim, H. C. & Lee, D. H., 2018 Jan 1, Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Proceedings. Springer Verlag, p. 141-161 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10885 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • WheelLogger: Driver Tracing Using Smart Watch

    Park, J. Y., Yun, J. P. & Lee, D. H., 2018, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 87-100 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2019

    Poster: How to securely record logs based on ARM trust zone

    Lee, S., Jo, H. J., Choi, W. & Lee, D. H., 2019 Jul 2, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 664-666 3 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Citations (Scopus)
  • Vehicle communication using secrecy capacity

    Ahn, N. Y., Lee, D. & Oh, S. J., 2019, Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2. Kapoor, S., Arai, K. & Bhatia, R. (eds.). Springer Verlag, p. 158-172 15 p. (Advances in Intelligent Systems and Computing; vol. 881).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • VODKA: Virtualization obfuscation using dynamic key approach

    Lee, J. Y., Suk, J. H. & Lee, D. H., 2019, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)