• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1993 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • A3RP: Anonymous and authenticated ad hoc routing protocol

    Paik, J. H., Kim, B. H. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 67-72 6 p. 4511536. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    26 Citations (Scopus)
  • A diffie-hellman key exchange protocol without random oracles

    Jeong, I. R., Kwon, J. O. & Lee, D. H., 2006, Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings. Springer Verlag, p. 37-54 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • A fingerprint-based user authentication scheme using smart cards in IPTV environments

    Jun, E. A., Rhee, H. S., Jung, S. W. & Lee, D. H., 2010, 2010 International Conference on Information Science and Applications, ICISA 2010. 5480301. (2010 International Conference on Information Science and Applications, ICISA 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A framework for anomaly pattern recognition in electronic financial transaction using moving average method

    Kim, A. C., Park, W. H. & Lee, D. H., 2013, IT Convergence and Security 2012. p. 93-99 7 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Aggregating CL-signatures revisited: Extended functionality and better efficiency

    Lee, K., Lee, D. H. & Yung, M., 2013, Financial Cryptography and Data Security - 17th International Conference, FC 2013, Revised Selected Papers. p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • A key distribution scheme for wireless sensor networks

    Kim, Y. H., Lee, H. & Lee, D. H., 2008, 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008. p. 572-577 6 p. 4517458. (6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A key management scheme for commodity sensor networks

    Kim, Y. H., Kim, M. H., Lee, D. H. & Kim, C., 2005, Ad-Hoc, Mobile, and Wireless Networks - 4th International Conference, ADHOC-NOW 2005, Proceedings. Springer Verlag, p. 113-126 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3738 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • A key management scheme for large scale distributed sensor networks

    Kim, Y. H., Lee, H., Lee, D. H. & Lim, J., 2006, Personal Wireless Communications - IFIP TC6 11th International Conference, PWC 2006, Proceedings. Cuenca, P. & Orozco-Barbosa, L. (eds.). Springer Verlag, p. 437-446 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4217 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Citations (Scopus)
  • A model for security vulnerability pattern

    Kang, H., Kim, K., Hong, S. & Lee, D. H., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Springer Verlag, p. 385-394 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3982 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • An anonymous asymmetric public key traitor tracing scheme

    Choi, E. Y., Hwang, J. Y. & Lee, D. H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer Verlag, p. 104-114 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2738).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • An efficient ID-based mutual authentication secure against privileged-insider attack

    Kim, S. Y., Kim, H. & Lee, D. H., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292941

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • An efficient implementation of block cipher in Android platform

    Paik, J. H., Seo, S. C., Kim, Y., Lee, H. J., Jung, H. C. & Lee, D. H., 2011, Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011. p. 173-176 4 p. 5992211. (Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An efficient implementation of KCDSA on Graphic Processing Units

    Seo, S. C., Paik, J. H., Lee, D. H., Hong, S., Lee, H. J. & Jung, H. C., 2011, Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011. p. 167-172 6 p. 5992210. (Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • An efficient key establishment scheme for self-organizing sensor networks

    Kim, Y. H., Choi, K. Y., Lim, J. & Lee, D. H., 2008, Distributed Computing and Networking - 9th International Conference, ICDCN 2008, Proceedings. Springer Verlag, p. 345-349 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4904 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An efficient password-based e-mail protocol for encrypted e-mail transmissions on mobile equipment

    Kwon, J. O., Jeong, I. R., Sakurai, K. & Lee, D. H., 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146128. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A new public key broadcast encryption using Boneh-Boyen-Goh's HIBE scheme

    Park, J. H. & Lee, D. H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. p. 101-115 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An improved fuzzy attribute-based authentication

    Yun, J. P., Kim, H. & Lee, D. H., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292946. (2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Anonymity control in multi-bank E-cash system

    Jeong, I. R. & Lee, D. H., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1977. p. 104-116 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1977).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Anonymous and traceable authentication scheme using smart cards

    Kim, S., Rhee, H. S., Chun, J. Y. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 162-165 4 p. 4511555. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Anonymous and traceable communication using tamper-proof device for vehicular Ad hoc Networks

    Kim, B. H., Choi, K. Y., Lee, J. H. & Lee, D. H., 2007, 2007 International Conference on Convergence Information Technology, ICCIT 2007. p. 681-686 6 p. 4420338. (2007 International Conference on Convergence Information Technology, ICCIT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • A practical approach defeating blackmailing

    Han, D. G., Park, H. Y., Park, Y. H., Lee, S., Lee, D. H. & Yang, H. J., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 464-481 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A practical inter-sensor broadcast authentication scheme

    Kim, J. W., Kim, Y. H., Lee, H. & Lee, D. H., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 399-405 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A privacy-preserving data sharing solution for mobile healthcare

    Huang, C., Yan, K., Wei, S. & Lee, D. H., 2017, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 260-265 6 p. (Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A secure and efficient key management scheme for wireless sensor networks

    Kim, Y. H., Lee, H. & Lee, D. H., 2007, Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. p. 162-167 6 p. 4550324. (Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A study on static analysis model of mobile application for privacy protection

    Kim, S., Cho, J. I., Myeong, H. W. & Lee, D. H., 2012, Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings. p. 529-540 12 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Attribute-based access control using combined authentication technologies

    Park, H. A., Dong, H. L. & Zhan, J., 2008, 2008 IEEE International Conference on Granular Computing, GRC 2008. p. 518-523 6 p. 4664774. (2008 IEEE International Conference on Granular Computing, GRC 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Attribute-based encryption for commercial content distribution

    Kim, H., Park, S., Park, J. H. & Lee, D. H., 2013, IT Convergence and Security 2012. p. 205-213 9 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Auditable and privacy-preserving authentication in vehicular networks

    Sung, H. K., Bum, H. K., Young, K. K. & Dong, H. L., 2008, Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008. p. 19-24 6 p. 4641307. (Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Authenticated group key distribution for unreliable sensor networks

    Lee, H., Kim, Y. H. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 285-288 4 p. 4511578. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Authenticated public key distribution scheme without trusted third party

    Koo, J. H., Kim, B. H. & Lee, D. H., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 926-935 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • BadVoice: Soundless voice-control replay attack on modern smartphones

    Young, P. J., Jin, J. H., Woo, S. & Lee, D. H., 2016 Aug 9, ICUFN 2016 - 8th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 882-887 6 p. 7537163. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2016-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks

    Cho, K. & Lee, D. H., 2012, Information Security Applications - 12th International Workshop, WISA 2011, Revised Selected Papers. p. 203-218 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7115 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Bogus data filtering in sensor networks

    Kim, Y. H., Park, J. H., Lee, D. H. & Lim, J., 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. Springer Verlag, p. 629-635 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • CADE: Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks*

    Kim, Y. K., Lee, H., Cho, K. & Lee, D. H., 2008, Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. p. 416-422 7 p. 4682277. (Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Certificateless public key encryption in the selective-ID security model (without random oracles)

    Park, J. H., Choi, K. Y., Hwang, J. Y. & Lee, D. H., 2007, Pairing-Based Cryptography - Pairing 2007 - First International Conference, Proceedings. p. 60-82 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4575 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • Classification of key management schemes for wireless sensor networks

    Lee, H., Kim, Y. H., Lee, D. H. & Lim, J., 2007, Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings. Springer Verlag, p. 664-673 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4537 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06

    Park, J. H., Kim, K. T. & Lee, D. H., 2008, Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08. p. 373-380 8 p. (Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Cryptanalysis of two improved remote user authentication schemes preserving user anonymity

    Kim, S., Chun, J. Y. & Lee, D. H., 2008, Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. p. 2235-2239 5 p. 4709320. (Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1233-1238 6 p. 4197448. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 21st International Conference on Advanced Information Networking and Applications, AINA 2007. p. 311-316 6 p. 4220909. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design reviews of health care system

    Ahn, B. H. & Lee, D., 2008, ICCC 2008 - IEEE 6th International Conference on Computational Cybernetics, Proceedings. p. 253-257 5 p. 4721416. (ICCC 2008 - IEEE 6th International Conference on Computational Cybernetics, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Developing a multi-protocol mobility manager for SIP/SS7 networks

    Park, H. S., Lee, H. W., Park, S. J. & Lee, D. H., 2009, Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009. p. 565-570 6 p. 5066842. (Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Difference set attacks on conjunctive keyword search schemes

    Rhee, H. S., Jeong, I. R., Byun, J. W. & Lee, D. H., 2006, Secure Data Management - Third VLDB Workshop, SDM 2006, Proceedings. Springer Verlag, p. 64-74 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4165 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Direct chosen-ciphertext secure hierarchical ID-based encryption schemes

    Park, J. H. & Lee, D. H., 2007, Public Key Infrastructure - 4th European PKI Workshop: Theory and Practice, EuroPKl 2007, Proceedings. Springer Verlag, p. 94-109 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4582 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Efficient and provably secure client-to-client password-based key exchange protocol

    Byun, J. W., Lee, D. H. & Lim, J. I., 2006, Frontiers of WWW Research and Development - APWeb 2006 - 8th Asia-Pacific Web Conference, Proceedings. p. 830-836 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Efficient and secure communication between set-top box and smart card in IPTV broadcasting

    Lee, J. S., Rhee, H. S. & Lee, D. H., 2008, Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008. p. 307-310 4 p. 4622843. (Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Efficient and secure member deletion in group signature schemes

    Kim, H. J., Lim, J. I. & Lee, D. H., 2001, Information Security and Cryptology - ICISC 2000 - 3rd International Conference, Proceedings. Won, D. (ed.). Springer Verlag, p. 150-161 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Citations (Scopus)
  • Efficient and secure remote authenticated key agreement scheme for multi-server using mobile equipment

    Jun, H. L. & Dong, H. L., 2008, 2008 Digest of Technical Papers International Conference on Consumer Electronics, The Mobile Consumer, ICCE 2008. 4588089. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Efficient anonymous attribute-based encryption with access policy hidden for cloud computing

    Huang, C., Yan, K., Wei, S., Zhang, G. & Lee, D. H., 2017, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 266-270 5 p. (Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Efficient certificateless signature schemes

    Choi, K. Y., Park, J. H., Hwang, J. Y. & Lee, D. H., 2007, Applied Cryptography and Network Security - 5th International Conference, ACNS 2007, Proceedings. Springer Verlag, p. 443-458 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4521 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    86 Citations (Scopus)