• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1993 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • Improved searchable public key encryption with designated tester

    Rhee, H. S., Park, J. H., Susilo, W. & Lee, D. H., 2009, Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09. p. 376-379 4 p. (Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    112 Citations (Scopus)
  • Implementation and analysis of new lightweight cryptographic algorithm suitable for wireless sensor networks

    Koo, W. K., Lee, H., Kim, Y. H. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 73-76 4 p. 4511537. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    38 Citations (Scopus)
  • Generic transformation for scalable broadcast encryption schemes

    Hwang, J. Y., Lee, D. H. & Lim, J., 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. p. 276-292 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • Forward secure searchable encryption using key-based blocks chain technique

    Lv, S., Huang, Y., Li, B., Wei, Y., Liu, Z., Liu, J. K. & Lee, D. H., 2018, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Vaidya, J. & Li, J. (eds.). Springer Verlag, p. 85-97 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11337 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Forward secure non-interactive key exchange from indistinguishability obfuscation

    Lee, Y. K. & Lee, D. H., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292984. (2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Extended fingerprint-based user authentication scheme using smart cards in education IPTV

    Jun, E. A., Kim, J. G., Jung, S. W. & Lee, D. H., 2011, 2011 International Conference on Information Science and Applications, ICISA 2011. 5772392. (2011 International Conference on Information Science and Applications, ICISA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Enhanced non-disjoint multi-path source routing protocol for wireless ad-hoc networks

    Kim, M. J., Lee, D. H. & Eom, Y. I., 2007, Computational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings. PART 3 ed. Springer Verlag, p. 1187-1196 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4707 LNCS, no. PART 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Efficient transferable cash with group signatures

    Jeong, I. R., Lee, D. H. & Lim, J. I., 2001, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2200. p. 462-474 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2200).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Efficient RFID authentication protocol for ubiquitous computing environment

    Choi, E. Y., Lee, S. M. & Lee, D. H., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y. & Yang, L. T. (eds.). Springer Verlag, p. 945-954 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    53 Citations (Scopus)
  • Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

    Kwon, J. O., Sakurai, K. & Lee, D. H., 2006, Computational Science - ICCS 2006: 6th International Conference, Proceedings. Springer Verlag, p. 977-980 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3991 LNCS - I).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Efficient group key agreement for dynamic TETRA networks

    Su, M. L., Su, Y. L. & Dong, H. L., 2007, SOFSEM 2007: Theory and Practice of Computer Science - 33rd Conference on Current Trends in Theory and Practice of Computer Science, Proceedings. p. 400-409 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4362 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Efficient conjunctive keyword search on encrypted data storage system

    Byun, J. W., Lee, D. H. & Lim, J., 2006, Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings. Springer Verlag, p. 184-196 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4043 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    71 Citations (Scopus)
  • Efficient certificateless signature schemes

    Choi, K. Y., Park, J. H., Hwang, J. Y. & Lee, D. H., 2007, Applied Cryptography and Network Security - 5th International Conference, ACNS 2007, Proceedings. Springer Verlag, p. 443-458 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4521 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    90 Citations (Scopus)
  • Efficient anonymous attribute-based encryption with access policy hidden for cloud computing

    Huang, C., Yan, K., Wei, S., Zhang, G. & Lee, D. H., 2017, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 266-270 5 p. (Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Efficient and secure remote authenticated key agreement scheme for multi-server using mobile equipment

    Jun, H. L. & Dong, H. L., 2008, 2008 Digest of Technical Papers International Conference on Consumer Electronics, The Mobile Consumer, ICCE 2008. 4588089. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Efficient and secure member deletion in group signature schemes

    Kim, H. J., Lim, J. I. & Lee, D. H., 2001, Information Security and Cryptology - ICISC 2000 - 3rd International Conference, Proceedings. Won, D. (ed.). Springer Verlag, p. 150-161 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Citations (Scopus)
  • Efficient and secure communication between set-top box and smart card in IPTV broadcasting

    Lee, J. S., Rhee, H. S. & Lee, D. H., 2008, Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008. p. 307-310 4 p. 4622843. (Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Efficient and provably secure client-to-client password-based key exchange protocol

    Byun, J. W., Lee, D. H. & Lim, J. I., 2006, Frontiers of WWW Research and Development - APWeb 2006 - 8th Asia-Pacific Web Conference, Proceedings. p. 830-836 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • Direct chosen-ciphertext secure hierarchical ID-based encryption schemes

    Park, J. H. & Lee, D. H., 2007, Public Key Infrastructure - 4th European PKI Workshop: Theory and Practice, EuroPKl 2007, Proceedings. Springer Verlag, p. 94-109 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4582 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Difference set attacks on conjunctive keyword search schemes

    Rhee, H. S., Jeong, I. R., Byun, J. W. & Lee, D. H., 2006, Secure Data Management - Third VLDB Workshop, SDM 2006, Proceedings. Springer Verlag, p. 64-74 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4165 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Developing a multi-protocol mobility manager for SIP/SS7 networks

    Park, H. S., Lee, H. W., Park, S. J. & Lee, D. H., 2009, Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009. p. 565-570 6 p. 5066842. (Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Design reviews of health care system

    Ahn, B. H. & Lee, D., 2008, ICCC 2008 - IEEE 6th International Conference on Computational Cybernetics, Proceedings. p. 253-257 5 p. 4721416. (ICCC 2008 - IEEE 6th International Conference on Computational Cybernetics, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1233-1238 6 p. 4197448. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 21st International Conference on Advanced Information Networking and Applications, AINA 2007. p. 311-316 6 p. 4220909. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Cryptanalysis of two improved remote user authentication schemes preserving user anonymity

    Kim, S., Chun, J. Y. & Lee, D. H., 2008, Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. p. 2235-2239 5 p. 4709320. (Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06

    Park, J. H., Kim, K. T. & Lee, D. H., 2008, Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08. p. 373-380 8 p. (Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Classification of key management schemes for wireless sensor networks

    Lee, H., Kim, Y. H., Lee, D. H. & Lim, J., 2007, Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings. Springer Verlag, p. 664-673 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4537 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Certificateless public key encryption in the selective-ID security model (without random oracles)

    Park, J. H., Choi, K. Y., Hwang, J. Y. & Lee, D. H., 2007, Pairing-Based Cryptography - Pairing 2007 - First International Conference, Proceedings. p. 60-82 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4575 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • CADE: Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks*

    Kim, Y. K., Lee, H., Cho, K. & Lee, D. H., 2008, Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. p. 416-422 7 p. 4682277. (Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Bogus data filtering in sensor networks

    Kim, Y. H., Park, J. H., Lee, D. H. & Lim, J., 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. Springer Verlag, p. 629-635 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks

    Cho, K. & Lee, D. H., 2012, Information Security Applications - 12th International Workshop, WISA 2011, Revised Selected Papers. p. 203-218 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7115 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • BadVoice: Soundless voice-control replay attack on modern smartphones

    Young, P. J., Jin, J. H., Woo, S. & Lee, D. H., 2016 Aug 9, ICUFN 2016 - 8th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 882-887 6 p. 7537163. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2016-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Authenticated public key distribution scheme without trusted third party

    Koo, J. H., Kim, B. H. & Lee, D. H., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 926-935 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Authenticated group key distribution for unreliable sensor networks

    Lee, H., Kim, Y. H. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 285-288 4 p. 4511578. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Auditable and privacy-preserving authentication in vehicular networks

    Sung, H. K., Bum, H. K., Young, K. K. & Dong, H. L., 2008, Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008. p. 19-24 6 p. 4641307. (Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Attribute-based encryption for commercial content distribution

    Kim, H., Park, S., Park, J. H. & Lee, D. H., 2013, IT Convergence and Security 2012. p. 205-213 9 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Attribute-based access control using combined authentication technologies

    Park, H. A., Dong, H. L. & Zhan, J., 2008, 2008 IEEE International Conference on Granular Computing, GRC 2008. p. 518-523 6 p. 4664774. (2008 IEEE International Conference on Granular Computing, GRC 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A study on static analysis model of mobile application for privacy protection

    Kim, S., Cho, J. I., Myeong, H. W. & Lee, D. H., 2012, Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings. p. 529-540 12 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • A secure and efficient key management scheme for wireless sensor networks

    Kim, Y. H., Lee, H. & Lee, D. H., 2007, Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. p. 162-167 6 p. 4550324. (Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A privacy-preserving data sharing solution for mobile healthcare

    Huang, C., Yan, K., Wei, S. & Lee, D. H., 2017, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 260-265 6 p. (Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A practical inter-sensor broadcast authentication scheme

    Kim, J. W., Kim, Y. H., Lee, H. & Lee, D. H., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 399-405 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A practical approach defeating blackmailing

    Han, D. G., Park, H. Y., Park, Y. H., Lee, S., Lee, D. H. & Yang, H. J., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 464-481 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Anonymous IBE from PEKS: A Generic Construction

    Rhee, H. S. & Lee, D. H., 2021, Information Security Applications - 22nd International Conference, WISA 2021, Revised Selected Papers. Kim, H. (ed.). Springer Science and Business Media Deutschland GmbH, p. 105-118 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13009 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Anonymous and traceable communication using tamper-proof device for vehicular Ad hoc Networks

    Kim, B. H., Choi, K. Y., Lee, J. H. & Lee, D. H., 2007, 2007 International Conference on Convergence Information Technology, ICCIT 2007. p. 681-686 6 p. 4420338. (2007 International Conference on Convergence Information Technology, ICCIT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Anonymous and traceable authentication scheme using smart cards

    Kim, S., Rhee, H. S., Chun, J. Y. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 162-165 4 p. 4511555. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • Anonymity control in multi-bank E-cash system

    Jeong, I. R. & Lee, D. H., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1977. p. 104-116 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1977).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • An improved fuzzy attribute-based authentication

    Yun, J. P., Kim, H. & Lee, D. H., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292946. (2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A new public key broadcast encryption using Boneh-Boyen-Goh's HIBE scheme

    Park, J. H. & Lee, D. H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. p. 101-115 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An efficient password-based e-mail protocol for encrypted e-mail transmissions on mobile equipment

    Kwon, J. O., Jeong, I. R., Sakurai, K. & Lee, D. H., 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146128. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • An efficient key establishment scheme for self-organizing sensor networks

    Kim, Y. H., Choi, K. Y., Lim, J. & Lee, D. H., 2008, Distributed Computing and Networking - 9th International Conference, ICDCN 2008, Proceedings. Springer Verlag, p. 345-349 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4904 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution