• 497 Citations
  • 10 h-Index
20002020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 497 Citations
  • 10 h-Index
  • 41 Article
  • 8 Conference contribution
  • 1 Review article
Filter
Article
2020

On the Unlinkability of Fingerprint Shell

Lee, S. & Jeong, I. R., 2020 Jan 1, In : Security and Communication Networks. 2020, 8256929.

Research output: Contribution to journalArticle

Open Access
2019

A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices

Lee, S., Jeong, I. R. & Araujo, A., 2019 Jan 1, In : Security and Communication Networks. 2019, 4202671.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)
1 Citation (Scopus)

Efficient cancelable iris template generation for wearable sensors

Jeong, J. Y. & Jeong, I. R., 2019 Jan 1, In : Security and Communication Networks. 2019, 7473591.

Research output: Contribution to journalArticle

Open Access

Transitive signature schemes for undirected graphs from lattices

Noh, G. & Jeong, I. R., 2019 Jun 30, In : KSII Transactions on Internet and Information Systems. 13, 6, p. 3316-3332 17 p.

Research output: Contribution to journalArticle

2017

Certificateless public auditing protocol with constant verification time

Kim, D. & Jeong, I. R., 2017, In : Security and Communication Networks. 2017, 6758618.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Provably-secure public auditing with deduplication

Kim, D. & Jeong, I. R., 2017, In : KSII Transactions on Internet and Information Systems. 11, 4, p. 2219-2236 18 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2016

Collusion-resistant unidirectional proxy re-encryption scheme from lattices

Kim, K. S. & Jeong, I. R., 2016 Feb 1, In : Journal of Communications and Networks. 18, 1, p. 1-7 7 p., 000003.

Research output: Contribution to journalArticle

10 Citations (Scopus)

Strong designated verifier signature scheme from lattices in the standard model

Noh, G. & Jeong, I. R., 2016 Dec 1, In : Security and Communication Networks. 9, 18, p. 6202-6214 13 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)
2015

A new certificateless signature scheme under enhanced security models

Kim, K. S. & Jeong, I. R., 2015 Mar 25, In : Security and Communication Networks. 8, 5, p. 801-810 10 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Efficient verifiable data streaming

Kim, K. S. & Jeong, I. R., 2015 Dec 1, In : Security and Communication Networks. 8, 18, p. 4013-4018 6 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)
2014

Efficient verifiably encrypted signatures from lattices

Kim, K. S. & Jeong, I. R., 2014 Jan 1, In : International Journal of Information Security. 13, 4, p. 305-314 10 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Relations among security models for authenticated key exchange

Kwon, J. O. & Jeong, I. R., 2014 Oct 1, In : ETRI Journal. 36, 5, p. 856-864 9 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Sharing privacy protected and statistically sound clinical research data using outsourced data storage

Noh, G., Chun, J. Y. & Jeong, I. R., 2014, In : Journal of Applied Mathematics. 2014, 381361.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Strongly unforgeable ring signature scheme from lattices in the standard model

Noh, G., Chun, J. Y. & Jeong, I. R., 2014, In : Journal of Applied Mathematics. 2014, 371924.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2013

Identity-based proxy signature from lattices

Kim, K. S., Hong, D. & Jeong, I. R., 2013 Feb, In : Journal of Communications and Networks. 15, 1, p. 1-7 7 p.

Research output: Contribution to journalArticle

23 Citations (Scopus)

Privacy-preserving disjunctive normal form operations on distributed sets

Chun, J. Y., Hong, D., Jeong, I. R. & Lee, D. H., 2013 May 10, In : Information Sciences. 231, p. 113-122 10 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Scalable hierarchical identity-based signature scheme from lattices

Noh, G. & Jeong, I. R., 2013, In : KSII Transactions on Internet and Information Systems. 7, 12, p. 3261-3273 13 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2012

A strong binding encryption scheme from lattices for secret broadcast

Noh, G., Hong, D., Kwon, J. O. & Jeong, I. R., 2012 Jun, In : IEEE Communications Letters. 16, 6, p. 781-784 4 p., 6188494.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2011

How to treat strict preference information in multicriteria decision analysis

Park, K. S. & Jeong, I., 2011 Oct, In : Journal of the Operational Research Society. 62, 10, p. 1771-1783 13 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)
2009

A forward-secure e-mail protocol without certificated public keys

Kwon, J. O., Jeong, I. R. & Lee, D. H., 2009 Dec 15, In : Information Sciences. 179, 24, p. 4227-4231 5 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Analysis of revocable-iff-linked ring signature scheme

Jeong, I. R., Kwon, J. O. & Lee, D. H., 2009 Jan, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 1, p. 322-325 4 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Constructing PEKS schemes secure against keyword guessing attacks is possible?

Jeong, I. R., Kwon, J. O., Hong, D. & Lee, D. H., 2009 Feb 12, In : Computer Communications. 32, 2, p. 394-396 3 p.

Research output: Contribution to journalArticle

80 Citations (Scopus)

Efficient secret broadcast in the broadcasting networks

Jeong, I., Kwon, J. O. & Lee, D. H., 2009 Dec, In : IEEE Communications Letters. 13, 12, p. 1001-1003 3 p., 5353290.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Light-weight key exchange with different passwords in the standard model

Kwon, J. O., Jeong, I. R. & Lee, D. H., 2009, In : Journal of Universal Computer Science. 15, 5, p. 1042-1064 23 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Searchable encryption with keyword-recoverability

Jeong, I. R., Kwon, J. O., Hong, D. & Lee, D. H., 2009, In : IEICE Transactions on Information and Systems. E92-D, 5, p. 1200-1203 4 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)
1 Citation (Scopus)
2008

Analysis of some keyword search schemes in encrypted data

Jeong, I. R. & Kwon, J. O., 2008 Mar, In : IEEE Communications Letters. 12, 3, p. 213-215 3 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Parallel key exchange

Jeong, I. R. & Lee, D. H., 2008, In : Journal of Universal Computer Science. 14, 3, p. 377-396 20 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Practical password-authenticated three-party key exchange

Kwon, J. O., Jeong, I. R. & Lee, D. H., 2008 Dec, In : KSII Transactions on Internet and Information Systems. 2, 6, p. 312-332 21 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Ring signature with weak linkability and its applications

Jeong, I. R., Kwon, J. O. & Lee, D. H., 2008 Aug, In : IEEE Transactions on Knowledge and Data Engineering. 20, 8, p. 1145-1148 4 p., 4433993.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Strong ID-based key distribution

Jeong, I. R., Kwon, J. O. & Lee, D. H., 2008, In : IEICE Transactions on Communications. E91-B, 1, p. 306-308 3 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2007

Key agreement for key hypergraph

Jeong, I. R. & Lee, D. H., 2007 Dec, In : Computers and Security. 26, 7-8, p. 452-458 7 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2 Citations (Scopus)

Strong Diffie-Hellman-DSA key exchange

Jeong, I. R., Kwon, J. O. & Lee, D. H., 2007 May, In : IEEE Communications Letters. 11, 5, p. 432-433 2 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Three-round smart card-based key exchange scheme

Kwon, J. O., Jeong, I. R. & Lee, D. H., 2007, In : IEICE Transactions on Communications. E90-B, 11, p. 3255-3258 4 p.

Research output: Contribution to journalArticle

10 Citations (Scopus)
2004
64 Citations (Scopus)
2003
12 Citations (Scopus)