• 3878 Citations
  • 31 h-Index
1993 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
2020

AI-IDS: Application of Deep Learning to Real-Time Web Intrusion Detection

Kim, A., Park, M. & Lee, D. H., 2020 Jan 1, In : IEEE Access. 8, p. 70245-70261 17 p., 9063416.

Research output: Contribution to journalArticle

Open Access

Fine-grained access control-enabled logging method on ARM TrustZone

Lee, S., Jo, H. J., Choi, W., Kim, H., Park, J. H. & Lee, D. H., 2020 Jan 1, In : IEEE Access. 8, p. 81348-81364 17 p., 9082664.

Research output: Contribution to journalArticle

Open Access

IBV-CFI: Efficient fine-grained control-flow integrity preserving CFG precision

Jang, H., Park, M. C. & Lee, D. H., 2020 Jul, In : Computers and Security. 94, 101828.

Research output: Contribution to journalArticle

Improving the security of direct anonymous attestation under host corruptions

Kim, H., Lee, K., Park, J. H. & Lee, D. H., 2020, (Accepted/In press) In : International Journal of Information Security.

Research output: Contribution to journalArticle

MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks

Jo, H. J., Kim, J. H., Choi, H. Y., Choi, W., Lee, D. H. & Lee, I., 2020 Feb, In : IEEE Transactions on Vehicular Technology. 69, 2, p. 2204-2218 15 p., 8939382.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Parallelly Running k-Nearest Neighbor Classification over Semantically Secure Encrypted Data in Outsourced Environments

Park, J. & Lee, D. H., 2020 Jan 1, In : IEEE Access. 8, p. 64617-64633 17 p., 9051788.

Research output: Contribution to journalArticle

Open Access

Privacy Enhanced Location Sharing for Mobile Online Social Networks

Son, J., Kim, D., Bhuiyan, M. Z. A., Tashakkori, R., Seo, J. & Lee, D. H., 2020 Apr 1, In : IEEE Transactions on Sustainable Computing. 5, 2, p. 279-290 12 p., 8370740.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2019

Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network

Sun, H., Lee, S. Y., Joo, K., Jin, H. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 158237-158249 13 p., 8886494.

Research output: Contribution to journalArticle

Open Access

CCA security for self-updatable encryption:Protecting cloud data when clients read/write ciphertexts

Lee, K., Lee, D. H., Park, J. H. & Yung, M., 2019 Apr 1, In : Computer Journal. 62, 4, p. 545-562 18 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method

Seo, M., Kim, S., Lee, D. H. & Park, J. H., 2019 Jan 1, In : International Journal of Information Security.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Enhanced android app-repackaging attack on in-vehicle network

Lee, Y., Woo, S., Lee, J., Song, Y., Moon, H., Lee, D. H. & Andersson, K., 2019 Jan 1, In : Wireless Communications and Mobile Computing. 2019, 5650245.

Research output: Contribution to journalArticle

Open Access
2 Citations (Scopus)

Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication

Seo, M., Hwang, J. Y., Lee, D. H., Kim, S., Kim, S. H. & Park, J. H., 2019 Jan 1, In : IEEE Access. 7, p. 69892-69906 15 p., 8723318.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

New technique for chosen-ciphertext security based on non-interactive zero-knowledge

Seo, M., Abdalla, M., Lee, D. H. & Park, J. H., 2019 Jul 1, In : Information Sciences. 490, p. 18-35 18 p.

Research output: Contribution to journalArticle

Physical layer security of autonomous driving: Secure vehicle-to-vehicle communication in a security cluster

Ahn, N. Y. & Lee, D. H., 2019 Jan 1, In : Ad-Hoc and Sensor Wireless Networks. 45, 3-4, p. 293-336 44 p.

Research output: Contribution to journalArticle

Schemes for Privacy Data Destruction in a NAND Flash Memory

Ahn, N. Y. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 181305-181313 9 p., 8930558.

Research output: Contribution to journalArticle

Open Access

Securing Ultrasonic Sensors against Signal Injection Attacks Based on a Mathematical Model

Lee, S., Choi, W. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 107716-107729 14 p., 8786810.

Research output: Contribution to journalArticle

Open Access

T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method

Lee, S., Choi, W., Jo, H. J. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 49738-49755 18 p., 8689029.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2018

Construction of a New Biometric-Based Key Derivation Function and Its Application

Seo, M., Park, J. H., Kim, Y., Cho, S., Lee, D. H. & Hwang, J. Y., 2018 Jan 1, In : Security and Communication Networks. 2018, 6107912.

Research output: Contribution to journalArticle

Energy-aware key exchange for securing implantable medical devices

Choi, W., Lee, Y., Lee, D., Kim, H., Park, J. H., Kim, I-S. & Lee, D. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 1809302.

Research output: Contribution to journalArticle

Open Access

Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks

Choi, W., Jo, H. J., Woo, S., Chun, J. Y., Park, J. & Lee, D. H., 2018 Jun 1, In : IEEE Transactions on Vehicular Technology. 67, 6, p. 4757-4770 14 p.

Research output: Contribution to journalArticle

29 Citations (Scopus)

Multi-Client Order-Revealing Encryption

Eom, J., Lee, D. H. & Lee, K., 2018 Aug 11, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Privacy preserving k-nearest neighbor for medical diagnosis in e-health cloud

Park, J. & Lee, D. H., 2018 Jan 1, In : Journal of Healthcare Engineering. 2018, 4073103.

Research output: Contribution to journalArticle

Open Access
4 Citations (Scopus)

Security Architecture for a Secure Database on Android

Park, J. H., Yoo, S. M., Kim, I-S. & Lee, D. H., 2018 Jan 26, In : IEEE Access. 6, p. 11482-11501 20 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Sound-Proximity: 2-Factor Authentication against Relay Attack on Passive Keyless Entry and Start System

Choi, W., Seo, M. & Lee, D. H., 2018 Jan 1, In : Journal of Advanced Transportation. 2018, 1935974.

Research output: Contribution to journalArticle

8 Citations (Scopus)

UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program

Suk, J. H., Lee, J. Y., Jin, H., Kim, I-S. & Lee, D. H., 2018 Jan 1, (Accepted/In press) In : Software - Practice and Experience.

Research output: Contribution to journalArticle

3 Citations (Scopus)

VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System

Choi, W., Joo, K., Jo, H. J., Park, M. C. & Lee, D. H., 2018 Mar 3, (Accepted/In press) In : IEEE Transactions on Information Forensics and Security.

Research output: Contribution to journalArticle

39 Citations (Scopus)
2017

E2PKA: An Energy-Efficient and PV-Based Key Agreement Scheme for Body Area Networks

Choi, W., Kim, I-S. & Lee, D. H., 2017 May 31, (Accepted/In press) In : Wireless Personal Communications. p. 1-22 22 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Reliable Cooperative Authentication for Vehicular Networks

Jo, H. J., Kim, I-S. & Lee, D. H., 2017 Jun 20, (Accepted/In press) In : IEEE Transactions on Intelligent Transportation Systems.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

Lee, K., Choi, S. G., Lee, D. H., Park, J. H. & Yung, M., 2017 Mar 8, In : Theoretical Computer Science. 667, p. 51-92 42 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2016

An efficient IBE scheme with tight security reduction in the random oracle model

Park, J. H. & Lee, D. H., 2016 Apr 1, In : Designs, Codes, and Cryptography. 79, 1, p. 63-85 23 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

A practical security architecture for in-vehicle CAN-FD

Woo, S., Jo, H. J., Kim, I-S. & Lee, D. H., 2016 Aug 1, In : IEEE Transactions on Intelligent Transportation Systems. 17, 8, p. 2248-2261 14 p., 7435304.

Research output: Contribution to journalArticle

42 Citations (Scopus)

A variant of Park-Lee identity-based encryption system

Park, J. H. & Lee, D. H., 2016 Mar 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E99A, 3, p. 720-732 13 p.

Research output: Contribution to journalArticle

Bidirectional transfer of quantum information for unknown photons via cross-Kerr nonlinearity and photon-number-resolving measurement

Heo, J., Hong, C. H., Lee, D. H. & Yang, H. J., 2016 Jan 10, In : Chinese Physics B. 25, 2, 020306.

Research output: Contribution to journalArticle

10 Citations (Scopus)

Client cloud Web service: Reducing traffic consumption

Paik, J. H., Cho, K., Jung, B. G. & Lee, D. H., 2016 Feb 1, In : Security and Communication Networks. 9, 3, p. 248-261 14 p.

Research output: Contribution to journalArticle

Efficient and Privacy-Preserving Metering Protocols for Smart Grid Systems

Jo, H. J., Kim, I-S. & Lee, D. H., 2016 May 1, In : IEEE Transactions on Smart Grid. 7, 3, p. 1732-1742 11 p., 7163628.

Research output: Contribution to journalArticle

38 Citations (Scopus)

Efficient revocable identity-based encryption via subset difference methods

Lee, K., Lee, D. H. & Park, J. H., 2016 Oct 17, (Accepted/In press) In : Designs, Codes, and Cryptography. p. 1-38 38 p.

Research output: Contribution to journalArticle

20 Citations (Scopus)

Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System

Eom, J., Lee, D. H. & Lee, K., 2016 Dec 1, In : Journal of Medical Systems. 40, 12, 253.

Research output: Contribution to journalArticle

9 Citations (Scopus)

SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform

Jeong, E. S., Kim, I-S. & Lee, D. H., 2016 Dec 6, (Accepted/In press) In : Multimedia Tools and Applications. p. 1-21 21 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Security of cloud-based revocable identity-based proxy re-encryption scheme

Park, S. & Lee, D. H., 2016 Jul 1, In : IEICE Transactions on Information and Systems. E99D, 7, p. 1933-1936 4 p.

Research output: Contribution to journalArticle

Selectively chosen ciphertext security in threshold public-key encryption

Kim, K., Park, J. H. & Lee, D. H., 2016 Feb 1, In : Security and Communication Networks. 9, 3, p. 189-200 12 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Two-stage tamper response in tamper-resistant software

Park, M. C., Koo, W. K., Suh, D. G., Kim, I-S. & Lee, D. H., 2016 Jun 1, In : IET Software. 10, 3, p. 81-88 8 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Vulnerabilities of Android OS-Based Telematics System

Jo, H. J., Choi, W., Na, S. Y., Woo, S. & Lee, D. H., 2016 Aug 26, (Accepted/In press) In : Wireless Personal Communications. p. 1-20 20 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)
2015

Adaptively secure broadcast encryption under standard assumptions with better efficiency

Lee, K. & Lee, D. H., 2015 May 1, In : IET Information Security. 9, 3, p. 149-157 9 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN

Woo, S., Jo, H. J. & Lee, D. H., 2015 Apr 1, In : IEEE Transactions on Intelligent Transportation Systems. 16, 2, p. 993-1006 14 p., 6894181.

Research output: Contribution to journalArticle

152 Citations (Scopus)

New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem

Park, J. H., Lee, K. & Lee, D. H., 2015 Dec 20, In : Information Sciences. 325, p. 256-270 15 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

New constructions of revocable identity-based encryption from multilinear maps

Park, S., Lee, K. & Lee, D. H., 2015 Aug 1, In : IEEE Transactions on Information Forensics and Security. 10, 8, p. 1564-1577 14 p., 7078906.

Research output: Contribution to journalArticle

28 Citations (Scopus)

Practical effect of the predictability of android openSSL PRNG

Kim, S. H., Han, D. & Lee, D. H., 2015 Aug 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E98A, 8, p. 1806-1813 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Scalable signaling protocol for Web real-time communication based on a distributed hash table

Paik, J. H. & Lee, D. H., 2015 Oct 1, In : Computer Communications. 70, p. 28-39 12 p., 5101.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Security analysis of the unrestricted identity-based aggregate signature scheme

Lee, K. & Lee, D. H., 2015 May 18, In : PloS one. 10, 5, e0128081.

Research output: Contribution to journalArticle

Sequential aggregate signatures with short public keys without random oracles

Lee, K., Lee, D. H. & Yung, M., 2015 May 10, In : Theoretical Computer Science. 579, p. 100-125 26 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)