• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1993 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • WheelLogger: Driver Tracing Using Smart Watch

    Park, J. Y., Yun, J. P. & Lee, D. H., 2018, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 87-100 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • VODKA: Virtualization obfuscation using dynamic key approach

    Lee, J. Y., Suk, J. H. & Lee, D. H., 2019, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Vehicle communication using secrecy capacity

    Ahn, N. Y., Lee, D. & Oh, S. J., 2019, Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2. Kapoor, S., Arai, K. & Bhatia, R. (eds.). Springer Verlag, p. 158-172 15 p. (Advances in Intelligent Systems and Computing; vol. 881).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Update state tampering: A novel adversary post-compromise technique on cyber threats

    Kim, S. J., Kim, B. J., Kim, H. C. & Lee, D. H., 2018 Jan 1, Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Proceedings. Springer Verlag, p. 141-161 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10885 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Universal forgery of the identity-based sequential aggregate signature scheme

    Hwang, J. Y., Lee, D. H. & Yung, M., 2009, Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09. p. 157-160 4 p. (Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Citations (Scopus)
  • Unbounded hierarchical identity-based encryption with efficient revocation

    Ryu, G., Lee, K., Park, S. & Lee, D. H., 2016, Information Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers. Choi, D. & Kim, H-W. (eds.). Springer Verlag, p. 122-133 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Trapdoor-based mutual authentication scheme without cryptographic primitives in RFID tags

    Lee, H., Eun, Y. C., Lee, S. M. & Dong, H. L., 2007, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007. p. 73-78 6 p. 4279774. (Proceedings - 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Toward an integrated system between cloud computing and smartcard application

    Park, H. A., Park, J. H., Choi, J. T. & Lee, D. H., 2010, Proceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010. p. 580-587 8 p. 5711122. (Proceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Threshold identity-based broadcast encryption from identity-based encryption

    Kim, K., Kim, M., Kim, H., Park, J. H. & Lee, D. H., 2012, Computer Applications for Database, Education, and Ubiquitous Computing - Int. Conferences, EL, DTA and UNESST 2012, Held as Part of the Future Generation Information Technol. Conf., FGIT 2012, Proc.. p. 99-102 4 p. (Communications in Computer and Information Science; vol. 352 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Strong authentication protocol for secure RFID tag search without help of central database

    Won, T. Y., Chun, J. Y. & Lee, D. H., 2008, Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. p. 153-158 6 p. 4755222. (Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • Sequential aggregate signatures with short public keys: Design, analysis and implementation studies

    Lee, K., Lee, D. H. & Yung, M., 2013, Public-Key Cryptography, PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. p. 423-442 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7778 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • Sequential aggregate signatures made shorter

    Lee, K., Lee, D. H. & Yung, M., 2013, Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Proceedings. p. 202-217 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7954 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Self-updating: Strong privacy protection protocol for RFID-tagged banknotes

    Choi, E. Y., Lee, S. M. & Lee, D. H., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 1171-1180 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

    Lee, K., Choi, S. G., Lee, D. H., Park, J. H. & Yung, M., 2013, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 1 ed. p. 235-254 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8269 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Citations (Scopus)
  • Self-certified privacy-preserving scheme for vehicle-to-vehicle communications

    Cho, K., Lee, B. G. & Lee, D. H., 2015 Jan 1, Lecture Notes in Electrical Engineering. Springer Verlag, Vol. 330. p. 335-341 7 p. (Lecture Notes in Electrical Engineering; vol. 330).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security enhancing compiler for localization schemes in pervasive sensor networks

    Chun, J. Y., Kim, Y. H., Hwang, J. Y. & Lee, D. H., 2009, Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009. p. 307-312 6 p. 5222880. (Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security authentication for U-health application services

    Ahn, B. H., Hong, J. & Lee, D., 2009, Communication and Networking: International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Pro. Slezak, D., Kim, T., Chang, A. C-C., Vasilakos, T., Li, M. & Sakurai, K. (eds.). p. 17-24 8 p. (Communications in Computer and Information Science; vol. 56).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security assessment for application network services using fault injection

    Kang, H. & Lee, D. H., 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. Springer Verlag, p. 172-183 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Security and handover designs for VoWLAN system

    Kim, M. Y., Lim, M., Sohn, J. S. & Lee, D. H., 2007, Managing Next Generation Networks and Services - 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Proceedings. Springer Verlag, p. 447-456 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4773 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure similarity search

    Park, H. A., Kim, B. H., Lee, D. H., Chung, Y. D. & Zhan, J., 2007, Proceedings - 2007 IEEE International Conference on Granular Computing, GrC 2007. p. 598-604 7 p. 4403170. (Proceedings - 2007 IEEE International Conference on Granular Computing, GrC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Citations (Scopus)
  • Secure password pocket for distributed web services

    Koo, J. H. & Lee, D. H., 2005, Network and Parallel Computing - IFIP International Conference, NPC 2005, Proceedings. p. 327-334 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3779 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Secure mutual authentication and fair billing for roaming service in wireless mobile networks

    Im, T. R., Lee, H., Cho, K. T. & Lee, D. H., 2008, Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. p. 466-471 6 p. 4682285. (Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Secure Mobile RFID system against privacy and security problems

    Il, J. K., Eun, Y. C. & Dong, H. L., 2007, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007. p. 67-72 6 p. 4279773. (Proceedings - 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Secure and efficient password-based authenticated key exchange protocol for two-server architecture

    Jun, H. L. & Dong, H. L., 2007, 2007 International Conference on Convergence Information Technology, ICCIT 2007. p. 2102-2107 6 p. 4420564. (2007 International Conference on Convergence Information Technology, ICCIT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • SARC: A street-based anonymous vehicular ad hoc routing protocol for city environments

    Kim, H., Paik, J., Lee, B. & Lee, D., 2008, Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. p. 324-329 6 p. 4755247. (Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Recipient revocable broadcast encryption with dealership

    Kim, J. S., Lee, Y., Eom, J. & Lee, D. H., 2018, Information Security and Cryptology - ICISC 2017 - 20th International Conference, Revised Selected Papers. Kim, D-C. & Kim, H. (eds.). Springer Verlag, p. 214-228 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10779 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Public-key revocation and tracing schemes with subset difference methods revisited

    Lee, K., Koo, W. K., Lee, D. H. & Park, J. H., 2014 Jan 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Springer Verlag, Vol. 8713 LNCS. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8713 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Provably-secure two-round password-authenticated group key exchange in the standard model

    Kwon, J. O., Jeong, I. R. & Lee, D. H., 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer Verlag, p. 322-336 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Privacy preserving SQL queries

    Park, H. A., Zhan, J. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 549-554 6 p. 4511626. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Privacy-enhanced deniable authentication e-mail service

    Ki, J. H., Yeong Hwang, J., Nyang, D. H., Hoon Lee, D. & Lim, J., 2011, Digital Enterprise and Information Systems - International Conference, DEIS 2011, Proceedings. p. 16-29 14 p. (Communications in Computer and Information Science; vol. 194 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Privacy-aware access control through negotiation in daily life service

    Park, H. A., Zhan, J. & Lee, D. H., 2008, Intelligence and Security Informatics - IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Proceedings. p. 514-519 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5075 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Privacy against piracy: Protecting two-level revocable P-K traitor tracing

    Kim, H. J., Lee, D. H. & Yung, M., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 482-496 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Predictability of Android OpenSSL's pseudo random number generator

    Kim, S. H., Han, D. & Lee, D. H., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 659-668 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Citations (Scopus)
  • Practical security testing using file fuzzing

    Kim, H., Choi, Y., Lee, D. & Lee, D., 2008, 10th International Conference on Advanced Communication Technology, ICACT 2008 - Proceedings. p. 1304-1307 4 p. 4494003. (International Conference on Advanced Communication Technology, ICACT; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Practical access control protocol for secure sensor networks

    Hwaseong, L., Kilho, S. & Dong, H. L., 2009, 2009 IEEE 13th International Symposium on Consumer Electronics, ISCE 2009. p. 806-809 4 p. 5157056. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • PPIDS: Privacy preserving intrusion detection system

    Park, H. A., Lee, D. H., Lim, J. & Cho, S. H., 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. Springer Verlag, p. 269-274 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • POSTER: Secure infotainment infrastructure of connected car

    Eun, C., Moon, J., Jung, I. Y., Lee, D., Park, J. & Kim, E., 2017 Jul 18, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 267-268 2 p. (Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Poster: How to securely record logs based on ARM trust zone

    Lee, S., Jo, H. J., Choi, W. & Lee, D. H., 2019 Jul 2, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 664-666 3 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Citations (Scopus)
  • Password-based group key exchange secure against insider guessing attacks

    Byun, J. W., Lee, D. H. & Lim, J., 2005, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. p. 143-148 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3802 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Password-authenticated key exchange between clients with different passwords

    Byun, J. W., Jeong, I. R., Lee, D. H. & Park, C. S., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2513. p. 134-146 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2513).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    92 Citations (Scopus)
  • One-round protocol for two-party verifier-based password-authenticated key exchange

    Kwon, J. O., Sakurai, K. & Lee, D. H., 2006, Communications and Multimedia Security - 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Proceedings. Leitold, H. & Markatos, E. (eds.). Springer Verlag, p. 87-96 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4237 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Citations (Scopus)
  • On a security model for a retrieval system over encrypted database

    Park, H. A., Byun, J. W., Park, J. H. & Lee, D. H., 2011, Proceedings - 7th International Conference on Information Processing and Management, ICIPM 2011. p. 76-82 7 p. 6222138. (Proceedings - 7th International Conference on Information Processing and Management, ICIPM 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Off-line keyword guessing attacks on recent keyword search schemes over encrypted data

    Byun, J. W., Rhee, H. S., Park, H. A. & Lee, D. H., 2006, Secure Data Management - Third VLDB Workshop, SDM 2006, Proceedings. Springer Verlag, p. 75-83 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4165 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    214 Citations (Scopus)
  • Oblivious conjunctive keyword search

    Rhee, H. S., Byun, J. W., Lee, D. H. & Lim, J., 2005, Information Security Applications - 6th International Workshop, WISA 2005, Revised Selected Papers. p. 318-327 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3786 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Modified ID-based threshold decryption and its application to mediated ID-based encryption

    Ju, H. S., Kim, D. Y., Lee, D. H., Park, H. & Chun, K., 2006, Frontiers of WWW Research and Development - APWeb 2006 - 8th Asia-Pacific Web Conference, Proceedings. p. 720-725 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Location-aware random pair-wise keys scheme for wireless sensor networks

    Ji, Y. C., Yong, H. K., Lim, J. & Dong, H. L., 2007, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007. p. 31-36 6 p. 4279767. (Proceedings - 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Keyword updatable PEKS

    Rhee, H. S. & Lee, D. H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 96-109 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Key establishment scheme for sensor networks with low communication cost

    Kim, Y. H., Lee, H., Park, J. H., Yang, L. T. & Lee, D. H., 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. Springer Verlag, p. 441-448 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Improved searchable public key encryption with designated tester

    Rhee, H. S., Park, J. H., Susilo, W. & Lee, D. H., 2009, Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09. p. 376-379 4 p. (Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    112 Citations (Scopus)
  • Implementation and analysis of new lightweight cryptographic algorithm suitable for wireless sensor networks

    Koo, W. K., Lee, H., Kim, Y. H. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 73-76 4 p. 4511537. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    38 Citations (Scopus)