• 497 Citations
  • 10 h-Index
20002020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 497 Citations
  • 10 h-Index
  • 41 Article
  • 8 Conference contribution
  • 1 Review article
2020

On the Unlinkability of Fingerprint Shell

Lee, S. & Jeong, I. R., 2020 Jan 1, In : Security and Communication Networks. 2020, 8256929.

Research output: Contribution to journalArticle

Open Access
2019

A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices

Lee, S., Jeong, I. R. & Araujo, A., 2019 Jan 1, In : Security and Communication Networks. 2019, 4202671.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)
1 Citation (Scopus)

Efficient cancelable iris template generation for wearable sensors

Jeong, J. Y. & Jeong, I. R., 2019 Jan 1, In : Security and Communication Networks. 2019, 7473591.

Research output: Contribution to journalArticle

Open Access

Transitive signature schemes for undirected graphs from lattices

Noh, G. & Jeong, I. R., 2019 Jun 30, In : KSII Transactions on Internet and Information Systems. 13, 6, p. 3316-3332 17 p.

Research output: Contribution to journalArticle

2017

Certificateless public auditing protocol with constant verification time

Kim, D. & Jeong, I. R., 2017, In : Security and Communication Networks. 2017, 6758618.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Provably-secure public auditing with deduplication

Kim, D. & Jeong, I. R., 2017, In : KSII Transactions on Internet and Information Systems. 11, 4, p. 2219-2236 18 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2016

Collusion-resistant unidirectional proxy re-encryption scheme from lattices

Kim, K. S. & Jeong, I. R., 2016 Feb 1, In : Journal of Communications and Networks. 18, 1, p. 1-7 7 p., 000003.

Research output: Contribution to journalArticle

10 Citations (Scopus)

Strong designated verifier signature scheme from lattices in the standard model

Noh, G. & Jeong, I. R., 2016 Dec 1, In : Security and Communication Networks. 9, 18, p. 6202-6214 13 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)
2015

A new certificateless signature scheme under enhanced security models

Kim, K. S. & Jeong, I. R., 2015 Mar 25, In : Security and Communication Networks. 8, 5, p. 801-810 10 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Efficient verifiable data streaming

Kim, K. S. & Jeong, I. R., 2015 Dec 1, In : Security and Communication Networks. 8, 18, p. 4013-4018 6 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)
2014

Efficient verifiably encrypted signatures from lattices

Kim, K. S. & Jeong, I. R., 2014 Jan 1, In : International Journal of Information Security. 13, 4, p. 305-314 10 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Relations among security models for authenticated key exchange

Kwon, J. O. & Jeong, I. R., 2014 Oct 1, In : ETRI Journal. 36, 5, p. 856-864 9 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Sharing privacy protected and statistically sound clinical research data using outsourced data storage

Noh, G., Chun, J. Y. & Jeong, I. R., 2014, In : Journal of Applied Mathematics. 2014, 381361.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Strongly unforgeable ring signature scheme from lattices in the standard model

Noh, G., Chun, J. Y. & Jeong, I. R., 2014, In : Journal of Applied Mathematics. 2014, 371924.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2013

Identity-based proxy signature from lattices

Kim, K. S., Hong, D. & Jeong, I. R., 2013 Feb, In : Journal of Communications and Networks. 15, 1, p. 1-7 7 p.

Research output: Contribution to journalArticle

23 Citations (Scopus)

Privacy-preserving disjunctive normal form operations on distributed sets

Chun, J. Y., Hong, D., Jeong, I. R. & Lee, D. H., 2013 May 10, In : Information Sciences. 231, p. 113-122 10 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Scalable hierarchical identity-based signature scheme from lattices

Noh, G. & Jeong, I. R., 2013, In : KSII Transactions on Internet and Information Systems. 7, 12, p. 3261-3273 13 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2012

A strong binding encryption scheme from lattices for secret broadcast

Noh, G., Hong, D., Kwon, J. O. & Jeong, I. R., 2012 Jun, In : IEEE Communications Letters. 16, 6, p. 781-784 4 p., 6188494.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2011

How to treat strict preference information in multicriteria decision analysis

Park, K. S. & Jeong, I., 2011 Oct, In : Journal of the Operational Research Society. 62, 10, p. 1771-1783 13 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)
2009

A forward-secure e-mail protocol without certificated public keys

Kwon, J. O., Jeong, I. R. & Lee, D. H., 2009 Dec 15, In : Information Sciences. 179, 24, p. 4227-4231 5 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Analysis of revocable-iff-linked ring signature scheme

Jeong, I. R., Kwon, J. O. & Lee, D. H., 2009 Jan, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 1, p. 322-325 4 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Constructing PEKS schemes secure against keyword guessing attacks is possible?

Jeong, I. R., Kwon, J. O., Hong, D. & Lee, D. H., 2009 Feb 12, In : Computer Communications. 32, 2, p. 394-396 3 p.

Research output: Contribution to journalArticle

80 Citations (Scopus)

Efficient secret broadcast in the broadcasting networks

Jeong, I., Kwon, J. O. & Lee, D. H., 2009 Dec, In : IEEE Communications Letters. 13, 12, p. 1001-1003 3 p., 5353290.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Light-weight key exchange with different passwords in the standard model

Kwon, J. O., Jeong, I. R. & Lee, D. H., 2009, In : Journal of Universal Computer Science. 15, 5, p. 1042-1064 23 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Searchable encryption with keyword-recoverability

Jeong, I. R., Kwon, J. O., Hong, D. & Lee, D. H., 2009, In : IEICE Transactions on Information and Systems. E92-D, 5, p. 1200-1203 4 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)
1 Citation (Scopus)
2008

Analysis of some keyword search schemes in encrypted data

Jeong, I. R. & Kwon, J. O., 2008 Mar, In : IEEE Communications Letters. 12, 3, p. 213-215 3 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Data randomization for lightweight secure data aggregation in sensor network

Mohaisen, A., Jeong, I. R., Hong, D., Jho, N. S. & Nyang, D., 2008, Ubiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings. p. 338-351 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5061 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Parallel key exchange

Jeong, I. R. & Lee, D. H., 2008, In : Journal of Universal Computer Science. 14, 3, p. 377-396 20 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Practical password-authenticated three-party key exchange

Kwon, J. O., Jeong, I. R. & Lee, D. H., 2008 Dec, In : KSII Transactions on Internet and Information Systems. 2, 6, p. 312-332 21 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Ring signature with weak linkability and its applications

Jeong, I. R., Kwon, J. O. & Lee, D. H., 2008 Aug, In : IEEE Transactions on Knowledge and Data Engineering. 20, 8, p. 1145-1148 4 p., 4433993.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Strong ID-based key distribution

Jeong, I. R., Kwon, J. O. & Lee, D. H., 2008, In : IEICE Transactions on Communications. E91-B, 1, p. 306-308 3 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2007

An efficient password-based e-mail protocol for encrypted e-mail transmissions on mobile equipment

Kwon, J. O., Jeong, I. R., Sakurai, K. & Lee, D. H., 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146128. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Efficient verifier-based password-authenticated key exchange in the three-party setting

Kwon, J. O., Jeong, I. R., Sakurai, K. & Lee, D. H., 2007 Jul, In : Computer Standards and Interfaces. 29, 5, p. 513-520 8 p.

Research output: Contribution to journalReview article

24 Citations (Scopus)

Key agreement for key hypergraph

Jeong, I. R. & Lee, D. H., 2007 Dec, In : Computers and Security. 26, 7-8, p. 452-458 7 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2 Citations (Scopus)

Strong Diffie-Hellman-DSA key exchange

Jeong, I. R., Kwon, J. O. & Lee, D. H., 2007 May, In : IEEE Communications Letters. 11, 5, p. 432-433 2 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Three-round smart card-based key exchange scheme

Kwon, J. O., Jeong, I. R. & Lee, D. H., 2007, In : IEICE Transactions on Communications. E90-B, 11, p. 3255-3258 4 p.

Research output: Contribution to journalArticle

10 Citations (Scopus)
2006

A diffie-hellman key exchange protocol without random oracles

Jeong, I. R., Kwon, J. O. & Lee, D. H., 2006, Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings. p. 37-54 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4301 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)

Difference set attacks on conjunctive keyword search schemes

Rhee, H. S., Jeong, I. R., Byun, J. W. & Lee, D. H., 2006, Secure Data Management - Third VLDB Workshop, SDM 2006, Proceedings. Springer Verlag, p. 64-74 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4165 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Provably-secure two-round password-authenticated group key exchange in the standard model

Kwon, J. O., Jeong, I. R. & Lee, D. H., 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer Verlag, p. 322-336 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)
2004
64 Citations (Scopus)
2003
12 Citations (Scopus)
2002

Password-authenticated key exchange between clients with different passwords

Byun, J. W., Jeong, I. R., Lee, D. H. & Park, C. S., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2513. p. 134-146 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2513).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

86 Citations (Scopus)
2001

Efficient transferable cash with group signatures

Jeong, I. R., Lee, D. H. & Lim, J. I., 2001, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2200. p. 462-474 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2200).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)
2000

Anonymity control in multi-bank E-cash system

Jeong, I. R. & Lee, D. H., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1977. p. 104-116 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1977).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)