• 497 Citations
  • 10 h-Index
20002020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 497 Citations
  • 10 h-Index
  • 41 Article
  • 8 Conference contribution
  • 1 Review article
Filter
Conference contribution
2008

Data randomization for lightweight secure data aggregation in sensor network

Mohaisen, A., Jeong, I. R., Hong, D., Jho, N. S. & Nyang, D., 2008, Ubiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings. p. 338-351 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5061 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2007

An efficient password-based e-mail protocol for encrypted e-mail transmissions on mobile equipment

Kwon, J. O., Jeong, I. R., Sakurai, K. & Lee, D. H., 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146128. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2006

A diffie-hellman key exchange protocol without random oracles

Jeong, I. R., Kwon, J. O. & Lee, D. H., 2006, Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings. p. 37-54 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4301 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)

Difference set attacks on conjunctive keyword search schemes

Rhee, H. S., Jeong, I. R., Byun, J. W. & Lee, D. H., 2006, Secure Data Management - Third VLDB Workshop, SDM 2006, Proceedings. Springer Verlag, p. 64-74 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4165 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Provably-secure two-round password-authenticated group key exchange in the standard model

Kwon, J. O., Jeong, I. R. & Lee, D. H., 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer Verlag, p. 322-336 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)
2002

Password-authenticated key exchange between clients with different passwords

Byun, J. W., Jeong, I. R., Lee, D. H. & Park, C. S., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2513. p. 134-146 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2513).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

86 Citations (Scopus)
2001

Efficient transferable cash with group signatures

Jeong, I. R., Lee, D. H. & Lim, J. I., 2001, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2200. p. 462-474 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2200).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)
2000

Anonymity control in multi-bank E-cash system

Jeong, I. R. & Lee, D. H., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1977. p. 104-116 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1977).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)