If you made any changes in Pure these will be visible here soon.

Research Output 1993 2019

Filter
Article
2019

Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network

Sun, H., Lee, S. Y., Joo, K., Jin, H. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 158237-158249 13 p., 8886494.

Research output: Contribution to journalArticle

Open Access
Controllers
Authentication
Cryptography
Virtualization
1 Citation (Scopus)

CCA security for self-updatable encryption:Protecting cloud data when clients read/write ciphertexts

Lee, K., Lee, D. H., Park, J. H. & Yung, M., 2019 Apr 1, In : Computer Journal. 62, 4, p. 545-562 18 p.

Research output: Contribution to journalArticle

Cryptography
Servers
Cloud computing
Access control

EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method

Seo, M., Kim, S., Lee, D. H. & Park, J. H., 2019 Jan 1, In : International Journal of Information Security.

Research output: Contribution to journalArticle

Encapsulation
Cryptography
Gaussian distribution
Decoding
Concretes

Enhanced android app-repackaging attack on in-vehicle network

Lee, Y., Woo, S., Lee, J., Song, Y., Moon, H., Lee, D. H. & Andersson, K., 2019 Jan 1, In : Wireless Communications and Mobile Computing. 2019, 5650245.

Research output: Contribution to journalArticle

Open Access
Application programs
Railroad cars
Automobiles
Communication
Android (operating system)
1 Citation (Scopus)

Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication

Seo, M., Hwang, J. Y., Lee, D. H., Kim, S., Kim, S. H. & Park, J. H., 2019 Jan 1, In : IEEE Access. 7, p. 69892-69906 15 p., 8723318.

Research output: Contribution to journalArticle

Open Access
Authentication
Biometrics
Bandwidth
Dust
Processing

New technique for chosen-ciphertext security based on non-interactive zero-knowledge

Seo, M., Abdalla, M., Lee, D. H. & Park, J. H., 2019 Jul 1, In : Information Sciences. 490, p. 18-35 18 p.

Research output: Contribution to journalArticle

Chosen-ciphertext Security
Zero-knowledge
Encapsulation
Zero-knowledge Proof
Discrete Logarithm

Schemes for Privacy Data Destruction in a NAND Flash Memory

Ahn, N. Y. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 181305-181313 9 p., 8930558.

Research output: Contribution to journalArticle

Open Access
Data privacy
Flash memory
Data storage equipment
Costs

Securing Ultrasonic Sensors against Signal Injection Attacks Based on a Mathematical Model

Lee, S., Choi, W. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 107716-107729 14 p., 8786810.

Research output: Contribution to journalArticle

Open Access
Ultrasonic sensors
Mathematical models
Jamming
Sensors
Distance measurement
1 Citation (Scopus)

T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method

Lee, S., Choi, W., Jo, H. J. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 49738-49755 18 p., 8689029.

Research output: Contribution to journalArticle

Data recording
Accidents
Insurance
Authentication
Automobiles
2018

Construction of a New Biometric-Based Key Derivation Function and Its Application

Seo, M., Park, J. H., Kim, Y., Cho, S., Lee, D. H. & Hwang, J. Y., 2018 Jan 1, In : Security and Communication Networks. 2018, 6107912.

Research output: Contribution to journalArticle

Biometrics
Authentication
Cryptography
Servers

Energy-aware key exchange for securing implantable medical devices

Choi, W., Lee, Y., Lee, D., Kim, H., Park, J. H., Kim, I-S. & Lee, D. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 1809302.

Research output: Contribution to journalArticle

Open Access
Medical problems
Communication
19 Citations (Scopus)

Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks

Choi, W., Jo, H. J., Woo, S., Chun, J. Y., Park, J. & Lee, D. H., 2018 Jun 1, In : IEEE Transactions on Vehicular Technology. 67, 6, p. 4757-4770 14 p.

Research output: Contribution to journalArticle

Electronics
Controller
Controllers
Unit
Attack
2 Citations (Scopus)

Multi-Client Order-Revealing Encryption

Eom, J., Lee, D. H. & Lee, K., 2018 Aug 11, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

Cryptography
2 Citations (Scopus)

Privacy preserving k-nearest neighbor for medical diagnosis in e-health cloud

Park, J. & Lee, D. H., 2018 Jan 1, In : Journal of Healthcare Engineering. 2018, 4073103.

Research output: Contribution to journalArticle

Open Access
Privacy
Health
Cloud computing
Servers
Network protocols
2 Citations (Scopus)

Security Architecture for a Secure Database on Android

Park, J. H., Yoo, S. M., Kim, I-S. & Lee, D. H., 2018 Jan 26, In : IEEE Access. 6, p. 11482-11501 20 p.

Research output: Contribution to journalArticle

Application programs
Access control
Android (operating system)
Data privacy
Application programming interfaces (API)
7 Citations (Scopus)

Sound-Proximity: 2-Factor Authentication against Relay Attack on Passive Keyless Entry and Start System

Choi, W., Seo, M. & Lee, D. H., 2018 Jan 1, In : Journal of Advanced Transportation. 2018, 1935974.

Research output: Contribution to journalArticle

Authentication
Railroad cars
Acoustic waves
Audio systems
Factors
2 Citations (Scopus)

UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program

Suk, J. H., Lee, J. Y., Jin, H., Kim, I-S. & Lee, D. H., 2018 Jan 1, (Accepted/In press) In : Software - Practice and Experience.

Research output: Contribution to journalArticle

Flow control
Application programming interfaces (API)
Flow patterns
Data structures
Engineers
26 Citations (Scopus)

VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System

Choi, W., Joo, K., Jo, H. J., Park, M. C. & Lee, D. H., 2018 Mar 3, (Accepted/In press) In : IEEE Transactions on Information Forensics and Security.

Research output: Contribution to journalArticle

Intrusion detection
Communication
Network protocols
Authentication
Controllers
2017
1 Citation (Scopus)

E2PKA: An Energy-Efficient and PV-Based Key Agreement Scheme for Body Area Networks

Choi, W., Kim, I-S. & Lee, D. H., 2017 May 31, (Accepted/In press) In : Wireless Personal Communications. p. 1-22 22 p.

Research output: Contribution to journalArticle

Sensors
Electric power utilization
Health
Authentication
Cryptography
8 Citations (Scopus)

Reliable Cooperative Authentication for Vehicular Networks

Jo, H. J., Kim, I-S. & Lee, D. H., 2017 Jun 20, (Accepted/In press) In : IEEE Transactions on Intelligent Transportation Systems.

Research output: Contribution to journalArticle

Authentication
Vehicular ad hoc networks
Packet loss
Synchronization
Communication
2 Citations (Scopus)

Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

Lee, K., Choi, S. G., Lee, D. H., Park, J. H. & Yung, M., 2017 Mar 8, In : Theoretical Computer Science. 667, p. 51-92 42 p.

Research output: Contribution to journalArticle

Constrained Control
Access Control
Access control
Encryption
Cryptography
2016
8 Citations (Scopus)

An efficient IBE scheme with tight security reduction in the random oracle model

Park, J. H. & Lee, D. H., 2016 Apr 1, In : Designs, Codes, and Cryptography. 79, 1, p. 63-85 23 p.

Research output: Contribution to journalArticle

Identity-based Encryption
Random Oracle Model
Cryptography
Revocation
Tightness
33 Citations (Scopus)

A practical security architecture for in-vehicle CAN-FD

Woo, S., Jo, H. J., Kim, I-S. & Lee, D. H., 2016 Aug 1, In : IEEE Transactions on Intelligent Transportation Systems. 17, 8, p. 2248-2261 14 p., 7435304.

Research output: Contribution to journalArticle

Controllers
Communication
Microcontrollers
Standardization
Specifications

A variant of Park-Lee identity-based encryption system

Park, J. H. & Lee, D. H., 2016 Mar 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E99A, 3, p. 720-732 13 p.

Research output: Contribution to journalArticle

Identity-based Encryption
Cryptography
Hash functions
Hash Function
Anonymity
10 Citations (Scopus)

Bidirectional transfer of quantum information for unknown photons via cross-Kerr nonlinearity and photon-number-resolving measurement

Heo, J., Hong, C. H., Lee, D. H. & Yang, H. J., 2016 Jan 10, In : Chinese Physics B. 25, 2, 020306.

Research output: Contribution to journalArticle

nonlinearity
photons
detectors

Client cloud Web service: Reducing traffic consumption

Paik, J. H., Cho, K., Jung, B. G. & Lee, D. H., 2016 Feb 1, In : Security and Communication Networks. 9, 3, p. 248-261 14 p.

Research output: Contribution to journalArticle

Web services
Internet protocols
Availability
Transmission control protocol
HTTP
35 Citations (Scopus)

Efficient and Privacy-Preserving Metering Protocols for Smart Grid Systems

Jo, H. J., Kim, I-S. & Lee, D. H., 2016 May 1, In : IEEE Transactions on Smart Grid. 7, 3, p. 1732-1742 11 p., 7163628.

Research output: Contribution to journalArticle

Authentication
Industrial research
Electricity
Communication
17 Citations (Scopus)

Efficient revocable identity-based encryption via subset difference methods

Lee, K., Lee, D. H. & Park, J. H., 2016 Oct 17, (Accepted/In press) In : Designs, Codes, and Cryptography. p. 1-38 38 p.

Research output: Contribution to journalArticle

Identity-based Encryption
Difference Method
Cryptography
Subset
Revocation
7 Citations (Scopus)

Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System

Eom, J., Lee, D. H. & Lee, K., 2016 Dec 1, In : Journal of Medical Systems. 40, 12, 253.

Research output: Contribution to journalArticle

Electronic Health Records
Cryptography
Health
Access control
Emergencies
1 Citation (Scopus)

SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform

Jeong, E. S., Kim, I-S. & Lee, D. H., 2016 Dec 6, (Accepted/In press) In : Multimedia Tools and Applications. p. 1-21 21 p.

Research output: Contribution to journalArticle

Smartphones
Application programming interfaces (API)
Viruses
Servers
Monitoring

Security of cloud-based revocable identity-based proxy re-encryption scheme

Park, S. & Lee, D. H., 2016 Jul 1, In : IEICE Transactions on Information and Systems. E99D, 7, p. 1933-1936 4 p.

Research output: Contribution to journalArticle

Cryptography
1 Citation (Scopus)

Selectively chosen ciphertext security in threshold public-key encryption

Kim, K., Park, J. H. & Lee, D. H., 2016 Feb 1, In : Security and Communication Networks. 9, 3, p. 189-200 12 p.

Research output: Contribution to journalArticle

Cryptography
Computer systems
Semantics
2 Citations (Scopus)

Two-stage tamper response in tamper-resistant software

Park, M. C., Koo, W. K., Suh, D. G., Kim, I-S. & Lee, D. H., 2016 Jun 1, In : IET Software. 10, 3, p. 81-88 8 p.

Research output: Contribution to journalArticle

Reverse engineering
Software design
Flow control
10 Citations (Scopus)

Vulnerabilities of Android OS-Based Telematics System

Jo, H. J., Choi, W., Na, S. Y., Woo, S. & Lee, D. H., 2016 Aug 26, (Accepted/In press) In : Wireless Personal Communications. p. 1-20 20 p.

Research output: Contribution to journalArticle

Firmware
Intelligent vehicle highway systems
Reverse engineering
Websites
Signal processing
2015
3 Citations (Scopus)

Adaptively secure broadcast encryption under standard assumptions with better efficiency

Lee, K. & Lee, D. H., 2015 May 1, In : IET Information Security. 9, 3, p. 149-157 9 p.

Research output: Contribution to journalArticle

Cryptography
Water
117 Citations (Scopus)

A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN

Woo, S., Jo, H. J. & Lee, D. H., 2015 Apr 1, In : IEEE Transactions on Intelligent Transportation Systems. 16, 2, p. 993-1006 14 p., 6894181.

Research output: Contribution to journalArticle

Railroad cars
Network protocols
Controllers
Smartphones
Microcontrollers

New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem

Park, J. H., Lee, K. & Lee, D. H., 2015 Dec 20, In : Information Sciences. 325, p. 256-270 15 p.

Research output: Contribution to journalArticle

Identity-based Encryption
Diffie-Hellman
Cryptography
Tightness
Security systems
23 Citations (Scopus)

New constructions of revocable identity-based encryption from multilinear maps

Park, S., Lee, K. & Lee, D. H., 2015 Aug 1, In : IEEE Transactions on Information Forensics and Security. 10, 8, p. 1564-1577 14 p., 7078906.

Research output: Contribution to journalArticle

Cryptography
Water
1 Citation (Scopus)

Practical effect of the predictability of android openSSL PRNG

Kim, S. H., Han, D. & Lee, D. H., 2015 Aug 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E98A, 8, p. 1806-1813 8 p.

Research output: Contribution to journalArticle

Pseudorandom number Generator
Predictability
Application programs
Key Exchange
Cryptography
8 Citations (Scopus)

Scalable signaling protocol for Web real-time communication based on a distributed hash table

Paik, J. H. & Lee, D. H., 2015 Oct 1, In : Computer Communications. 70, p. 28-39 12 p., 5101.

Research output: Contribution to journalArticle

Network protocols
Communication
Servers
Joining
Scalability

Security analysis of the unrestricted identity-based aggregate signature scheme

Lee, K. & Lee, D. H., 2015 May 18, In : PLoS One. 10, 5, e0128081.

Research output: Contribution to journalArticle

Agglomeration
Defects
1 Citation (Scopus)

Sequential aggregate signatures with short public keys without random oracles

Lee, K., Lee, D. H. & Yung, M., 2015 May 10, In : Theoretical Computer Science. 579, p. 100-125 26 p.

Research output: Contribution to journalArticle

Random Oracle
Public key
Signature
Signature Scheme
Standard Model
3 Citations (Scopus)

STROP: Static approach for detection of return-oriented programming attack in network

Choi, Y. H. & Lee, D. H., 2015 Jan 1, In : IEICE Transactions on Communications. E98B, 1, p. 242-251 10 p.

Research output: Contribution to journalArticle

Web browsers
Static analysis
Dynamic analysis
Experiments
2014
2 Citations (Scopus)

An enhanced (t,n) threshold directed signature scheme

Hwang, J. Y., Kim, H. J., Lee, D. H. & Song, B., 2014 Aug 10, In : Information Sciences. 275, p. 284-292 9 p.

Research output: Contribution to journalArticle

Signature Scheme
Network protocols
Signature
Attack
Public key
25 Citations (Scopus)

Data-mining based SQL injection attack detection using internal query trees

Kim, M. Y. & Lee, D. H., 2014 Sep 1, In : Expert Systems with Applications. 41, 11, p. 5416-5430 15 p.

Research output: Contribution to journalArticle

Query languages
Data mining
Syntactics
Feature extraction
Websites
46 Citations (Scopus)

Efficient privacy-preserving authentication in wireless mobile networks

Jo, H. J., Paik, J. H. & Lee, D. H., 2014 Jan 1, In : IEEE Transactions on Mobile Computing. 13, 7, p. 1469-1481 13 p., 6636293.

Research output: Contribution to journalArticle

Authentication
Wireless networks
Network protocols
Servers
Communication
4 Citations (Scopus)

Fraud and financial crime detection model using malware forensics

Kim, A. C., Kim, S., Park, W. H. & Lee, D. H., 2014 Jan 1, In : Multimedia Tools and Applications. 68, 2, p. 479-496 18 p.

Research output: Contribution to journalArticle

Crime
Communication
Malware
Digital forensics

Low-priced and efficient replica detection framework for wireless sensor networks

Cho, K. & Lee, D. H., 2014 Jan 1, In : Peer-to-Peer Networking and Applications. 7, 4, p. 743-749 7 p.

Research output: Contribution to journalArticle

Wireless sensor networks
Network protocols
Global positioning system
Energy conservation
Costs
4 Citations (Scopus)

Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks

Cho, K., Lee, B. G. & Lee, D. H., 2014 Sep 1, In : IEEE Transactions on Dependable and Secure Computing. 11, 5, p. 454-466 13 p., 6616549.

Research output: Contribution to journalArticle

Wireless sensor networks
Sensor nodes
Hardware
Global positioning system
Experiments
2 Citations (Scopus)

MvSERS: A Secure Emergency Response Solution for Mobile Healthcare in Vehicular Environments

Huang, C., Lee, H., Kim, H. & Lee, D. H., 2014 Dec 1, In : Computer Journal. 58, 10, p. 2461-2475 15 p.

Research output: Contribution to journalArticle

Communication
Computational complexity
Monitoring
Costs
Experiments