A full list of publication
[2024]
Parallelly Running and Privacy-Preserving Agglomerative Hierarchical Clustering in Outsourced Cloud Computing Environments
Jeongsu Park, and Dong Hoon Lee
IEEE Transactions on Big Data, 2024 (IF 7.5, 상위 5%이내)
ChatDEOB: An Effective Deobfuscation Method based on Large Language Model
Byunggeon Choi, Hongjoo Jin, Dong Hoon Lee, and Wonsuk Choi
WISA 2024
Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages
Hongjoo Jin, Sumin Yang, Moon Chan Park, Haehyun Cho, and Dong Hoon Lee
IFIP International Conference on ICT Systems Security and Privacy Protection, 2024 (BK21+ 인정 IF 1)
A Framework to Quantify the Quality of Source Code Obfuscation
Hongjoo Jin, Jiwon Lee, Sumin Yang, Kijoong Kim and Dong Hoon Lee
Applied Sciences, 2024 (IF 2.5)
CatchFuzz: Reliable active anti-fuzzing techniques against coverage-guided fuzzer
Hee Yeon Kim, and Dong Hoon Lee
Computers & Security, 2024 (IF 5.6)
DROPSYS: Detection of ROP attacks using system information
Seon Kwon Kim, Hongjoo Jin, Kyungho Joo, Jiwon Lee, and Dong Hoon Lee
Computers & Security, 2024 (IF 5.6)
Securing EV Charging System against Physical-layer Signal Injection Attack (ETAS Best Paper Award)
Soyeon Son, Kyungho Joo, Wonsuk Choi, and Dong Hoon Lee
VehicleSec 2024, co-located with NDSS'24
[2023]
Protecting HRP UWB Ranging System Against Distance Reduction Attacks
Kyungho Joo, Dong Hoon Lee, Yeonseon Jeong, and Wonsuk Choi
ACM CCS 2023 (BK21+ 인정 IF 4)
Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth Estimation
Gyungeun Yun, Kyungho Joo, Wonsuk Choi, and Dong Hoon Lee
ACM CCS 2023 (Poster)
In-vehicle Network Intrusion Detection System Using CAN Frame-Aware Features
Yeonseon Jeong, Hyunghoon Kim, Seyoung Lee, Wonsuk Choi, Dong Hoon Lee, and Hyo Jin Jo
IEEE Trans. Intell. Transp. Syst., 2023 (IF 8.5, 상위 10%이내)
SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring
Sangbin Park, Youngjoon Kim, and Dong Hoon Lee
RAID 2023 (BK21+ 인정 IF 2)
Detecting Risky Authentication Using the OpenID Connect Token Exchange Time
Alex Heunhe Han, and Dong Hoon Lee
MDPI Sensors, 2023 (IF 3.9)
A Comprehensive Analysis of Datasets for Automotive Intrusion Detection Systems
Seyoung Lee, Wonsuk Choi, Insup Kim, Ganggyu Lee, and Dong Hoon Lee
Computers Materials & Continua, 2023 (IF 3.1)
IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliances
Na Young Ahn, and Dong Hoon Lee
Computers & Security, 2023 (IF 5.6)
PE-detector: Intrusion Detection of Periodic and Event Message Attacks on Controller Area Networks
Hyunghoon Kim Wonsuk Choi, and Hyo Jin Jo
IEEE Trans. Veh. Technol., 2023 (IF 6.8)
ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive Intrusion Detection System
Seyoung Lee*, Wonsuk Choi*, Hyo Jin Jo, and Dong Hoon Lee (*co-first author)
IEEE Trans. Intell. Transp. Syst., 2023 (IF 8.5, 상위 10%이내)
Protecting some/ip communication via authentication ticket
Seulhui Lee, Wonsuk Choi, and Dong Hoon Lee
MDPI Sensors, 2023 (IF 3.9)
RIDAS: Real-time identification of attack sources on controller area networks
Jiwoo Shin, Hyunghoon Kim, Seyoung Lee, Wonsuk Choi, Dong Hoon Lee, and Hyo Jin Jo
Usenix Security 2023 (BK21+ 인정 IF 3)
NTRU+: Compact Construction of NTRU Using Simple Encoding Method
Jonghyun Kim, and Jong Hwan Park
IEEE Trans. Inf. Forensics Secur., 2023 (IF 6.8, 상위 15%이내)
G-IDCS: Graph-Based Intrusion Detection and Classification System for CAN Protocol
Sung Bum Park, Hyo Jin Jo*, and Dong Hoon Lee* (*co-corresponding)
IEEE Access, 2023 (IF 3.9)
Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol
Sung Bum Park, Hyo Jin Jo*, and Dong Hoon Lee* (*co-corresponding)
Computers & Security, 2023 (IF 5.6)
Privacy-Preserving Identity Management System on Blockchain Using Zk-SNARK
Duc Anh Luong, and Jong Hwan Park
IEEE Access, 2023 (IF 3.9)
The vibration knows who you are! A further analysis on usable authentication for smartwatch users
Sunwoo Lee, Wonsuk Choi, and Dong Hoon Lee
Computers & Security, 2023 (IF 5.6)
BGCFI: Efficient Verification in Fine-Grained Control-Flow Integrity Based on Bipartite Graph
Moon Chan Park, and Dong Hoon Lee
IEEE Access, 2023 (IF 3.9)
Practical dynamic group signatures without knowledge extractors
Hyoseung Kim, Olivier Sanders, Michel Abdalla, and Jong Hwan Park
Des. Codes Cryptogr., 2023 (IF 1.6)
A Study on Safety Verification Methods and Procedures for Self-Driving Demonstration
Dae Kug Lee, Dong Hoon Lee, Eun Young Cho, and Chong Ho Cho
ICUFN 2023
Sustainable Smart City Building-energy Management Based on Reinforcement Learning and Sales of ESS Power
Dae-Kug Lee, Seok-Ho Yoon, Jae-Hyeok Kwak, Choong-Ho Cho, and Dong-Hoon Lee
KSII Transactions on Internet & Information Systems 17
TB-Logger: Secure Vehicle Data Logging Method using Trusted Execution Environment and Blockchain
Dongwoo Kang, and Hyo Jin Jo
IEEE Access, 2023
CAN 네트워크에서의 악의적인 ECU 식별 기술 연구 동향
Seyoung Lee, Wonsuk Choi, and Dong Hoon Lee
Review of KIISC 2023
IoT 자동화 시스템의 지연 공격 탐지
Youngduk Kim, Wonsuk Choi, and Dong hoon Lee
Journal of the Korea Institute of Information Security & Cryptology, 2023
자동차 스마트키 시스템 보안 연구 동향
Youngduk Kim, Wonsuk Choi, and Dong hoon Lee
Review of KIISC, 2023
Apple의 사이드로딩 허용이 사이버 보안에 미치는 영향
Wonsuk Choi, and Dong hoon Lee
Review of KIISC, 2023
[2022]
TTIDS: Transmission-resuming Time-based Intrusion Detection System for Controller Area Network (CAN)
Se Young Lee, Hyojin Jo, Dong Hoon Lee, and Wonsuk Choi
IEEE Access, 2022 (IF 3.9)
Privacy-Preserving Blockchain-Based Healthcare System for IoT Devices Using zk-SNARK
Duc Anh Luong and Jong Hwan Park
IEEE Access, 2022 (IF 3.9)
An Efficient Open Vote Network for Multiple Candidates
Sangsoo Seol, Hyoseung Kim, and Jong Hwan Park
IEEE Access, 2022 (IF 3.9)
Parallelly Running and Privacy-Preserving k-Nearest Neighbor Classification in Outsourced Cloud Computing Environments
Jeongsu Park, and Dong Hoon Lee
Electronics, 2022 (IF 2.9)
Recovering Yaw Rate from Signal Injection Attack to Protect RV’s Direction
Hyunsu Cho, Sunwoo Lee, Wonsuk Choi, and Dong Hoon Lee
WISA 2022
From Attack to Identification: MEMS Sensor Fingerprinting using Acoustic Signals
Sunwoo Lee, and Dong Hoon Lee
IEEE Internet of Things Journal, 2022 (IF 10.6, 상위 3%이내)
Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory
Nayoung Ahn, and Dong Hoon Lee
IEEE Access, 2022 (IF 3.9)
Cyberattack Models for Ship Equipment Based on the MITRE ATT&CK Framework
Yonghyun Jo, Oongjae Choi, Jiwoon You, Youngkyun Cha, and Dong Hoon Lee
MDPI Sensors, 2022 (IF 3.9)
N-gram Opcode를 활용한 머신러닝 기반의 분석 방지 보호 기법 탐지 방안 연구
Hee Yeon Kim, and Dong Hoon Lee
Journal of the Korea Institute of Information Security & Cryptology, 2022
효율적인 LWE 기반 재사용 가능한 퍼지 추출기
Juon Kim, Kwangsu Lee, and Dong Hoon Lee
Journal of the Korea Institute of Information Security & Cryptology, 2022
[2021]
Forensic Issues and Techniques to Improve Security in SSD With Flex Capacity Feature
Nayoung Ahn, Dong Hoon Lee
IEEE Access, 2021 (IF 3.476)
Improving the security of direct anonymous attestation under host corruptions
Hyoseung Kim, Kwangsu Lee, Jong Hwan Park, and Dong Hoon Lee
International Journal of Information Security, 2021 (IF 2.427)
Anonymous IBE from PEKS: A Generic Construction
Hyun Sook Rhee, and Dong Hoon Lee
International Conference on Information Security Applications 2021
Prof-gen: Practical Study on System Call Whitelist Generation for Container Attack Surface Reduction
Sungjin Kim, Byung Joon Kim, and Dong Hoon Lee
IEEE International Conference on Cloud Computing (CLOUD) 2021 (BK+ 인정 IF 1)Secure Privacy-Preserving V2V Communication in 5G-V2X Supporting Network Slicing
Hyeran Mun, Minhye Seo, and Dong Hoon Lee
IEEE Trans. Intell. Transp. Syst., 2021 (IF 9.551, 상위 15%이내)Practical dynamic group signature with efficient concurrent joins and batch verifications
Hyoseung Kim, Youngkyung Lee, Michel Abdalla, and Jong Hwan Park
Journal of Information Security and Applications, 2021 (IF 4.960)
Usable User Authentication on a Smartwatch using Vibration
Sunwoo Lee, Wonsuk Choi, and Dong Hoon Lee
ACM CCS 2021 (BK+ 인정 IF 4)
A Survey of Attacks on Controller Area Networks and Corresponding Countermeasures
Hyo Jin Jo, and Wonsuk Choi
IEEE Trans. Intell. Transp. Syst., 2021 (IF 9.551, 상위 15%이내)
Revisiting NIZK-Based Technique for Chosen-Ciphertext Security: Security Analysis and Corrected Proofs
Youngkyung Lee, Dong Hoon Lee, and Jong Hwan Park
MDPI Applied Sciences, 2021 (IF 2.9)
An Enhanced Method for Reverse Engineering CAN Data Payload
Wonsuk Choi, Seyoung Lee, Kyungho Joo, Hyo Jin Jo, and Dong Hoon Lee
IEEE Trans. Veh. Technol., 2021 (IF 6.239)
Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective
Nayoung Ahn, and Dong Hoon Lee
IEEE Access, 2021 (IF 3.476)Bypassing Anti-Analysis of Commercial Protector Methods Using DBI Tools
Youngbi Lee, Jaehyuk Suk, and Dong Hoon Lee
IEEE Access, 2021 (IF 3.476)
[2020]
SOTPM: Software One-Time Programmable Memory to Protect Shared Memory on ARM Trustzone
Dongwook Shim, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
HS-Pilot: Heap Security Evaluation Tool Model Based on Atomic Heap Interaction
Sumin Chae, Hongjoo Jin, Moon Chan Park, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
Analysis of Threats and Countermeasures for Odomter Protection
Seil Kim, Aram CHo, and Dong Hoon Lee
International Journal of Automotive Technology, 2020 (IF 1.269)
An Improved Fuzzy Vector Signature with Reusability
Ilhwan Lim, Minhye Seo, Dong Hoon Lee, and Jong Hwan Park
MDPI Applied Sciences, 2020 (IF 2.9)
Balancing Personal Privacy and Public Safety During COVID-19: The Case of South Korea
Na Young Ahn, JunEun Park, Dong Hoon Lee, and Paul C. Hong
IEEE Access, 2020 (IF 3.367)
Tight security for the generic construction of identity-based signature (in the multi-instance setting)
Youngkyung Lee, Jong Hwan Park, Kwangsu Lee, and Dong Hoon Lee
Theoretical Computer Science, 2020 (IF 0.827)
Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
Youngkyung Lee, Dong Hoon Lee, and Jong Hwan Park
Des. Codes Cryptogr., 2020 (IF 1.492)
VCF: Virtual Code Folding to Enhance Virtualization Obfuscation
Jae Hyuk Suk, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials
So Hyun Park, Suhri Kim, Dong Hoon Lee, and Jong Hwan Park
IEEE Access, 2020 (IF 3.367)SCORE: Source Code Optimization & REconstruction
Jea Hyuk Suk, Young Bi Lee, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)AI-IDS: Application of Deep Learning to Real-Time Web Intrusion Detection
Ae Chan Kim, Mohyun Park, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks
Hyo Jin Jo, Jin Hyun Kim, Hyon-Young Choi, Wonsuk Choi, Dong Hoon Lee, and Insup Lee
IEEE Trans. Veh. Technol., 2020 (IF 5.978)Random CFI (RCFI): Efficient fine-grained Control-Flow Integrity through random verification
Moon Chan Park, and Dong Hoon Lee
IEEE Transactions on Computers, 2020 (IF 2.663)
Fine-Grained Access Control-Enabled Logging Method on ARM TrustZone
Seungho Lee, Hyo Jin Jo, Wonsuk Choi, Hyoseung Kim, Jong Hwan Park, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
Ensuring Safety and Security in CAN-based Automotive Embedded Systems: A Combination of Design Optimization and Secure Communication
Hyeran Mun, Kyusuk Han, and Dong Hoon Lee
IEEE Trans. Veh. Technol., 2020 (IF 5.978)
Practical Vulnerability-Information-Sharing Architecture for Automotive Security-Risk Analysis
Yousik Lee, Samuel Woo, Yunkeun Song, Jungho Lee, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
IBV-CFI: Efficient Fine-grained Control-Flow Integrity Preserving CFG Precision
Hyerean Jang, Moon Chan Park, and Dong Hoon Lee
Computers & Security, 2020 (IF 4.438)
Parallelly Running k-Nearest Neighbor Classification over Semantically Secure Encrypted Data in Outsourced Environments
Jeongsu Park, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft
Kyuong Ho Joo, Wonsuk Choi, and Dong Hoon Lee
NDSS Symposium 2020 (BK+ 인정 IF 2)
[Poster] Secure Logging Infrastructure Employing Heterogeneous Trusted Execution Environments
Seungho Lee, Wonsuk Choi, Hyo Jin Jo, and Dong Hoon Lee
NDSS Symposium 2020 (Poster)Privacy Enhanced Location Sharing for Mobile Online Social Networks
Seungho Lee, Wonsuk Choi, Hyo Jin Jo, Dong Hoon Lee
IEEE Trans. Sust. Comp. 2020영지식 증명을 활용한 복원 기능을 가진 검증 가능한 클라우드 기반의 개인 건강기록
Hunki Kim, Jonghyun Kim, and Dong Hoon Lee
Journal of the Korea Institute of Information Security & Cryptology, 2020
[2019]
Schemes for Privacy Data Destruction in a NAND Flash Memory
Na Young Ahn, and Dong Hoon Lee
IEEE Access, 2019 (IF 3.745)
Securing Ultrasonic Sensors against Signal Injection Attacks based on a Mathematical Model
Sunwoo Lee, Wonsuk Choi, and Dong Hoon Lee
IEEE Access, 2019 (IF 3.745)
Physical layer security of autonomous driving: Secure vehicle-to-vehicle communication in a security cluster
Na Young Ahn, and Dong Hoon Lee
Ad-Hoc and Sensor Wireless Networks, 2019 (IF 0.979)
Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network
Hyunjin Sun, Se Young Lee, Kyungho Joo, Hongjoo Jin, and Dong Hoon Lee
IEEE Access, 2019 (IF 3.745)
CCA security for self-updatable encryption: Protecting cloud data when clients read/write ciphertexts
Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung, and Yi Mu
The Computer Journal, 2019 (IF 1.077)
Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication
Minhye Seo, Jung Yeon Hwang, Dong Hoon Lee, Soohyung Kim, Seung-Hyun Kim, and Jong Hwan Park
IEEE Access, 2019 (IF 3.745)
[POSTER] How to Securely Record Logs based on ARM TrustZone
Seungho Lee, Wonsuk Choi, Hyo Jin Jo, and Dong Hoon Lee
ACM ASIACCS 2019 (Poster)
T-Box: A forensics-enabled trusted automotive data recording method
Seungho Lee, Wonsuk Choi, Hyo Jin Jo, and Dong Hoon Lee
IEEE Access, 2019 (IF 3.745)
New Technique for Chosen-Ciphertext Security Based on Non-Interactive Zero-Knowledge
Minhye Seo, Michel Abdalla, Dong Hoon Lee, and Jong Hwan Park
Information Sciences, 2019 (IF 5.910, 상위 5%이내)
EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method
Minhye Seo, Suhri Kim, Dong Hoon Lee, and Jong Hwan Park
International Journal of Information Security, 2019 (IF 1.494)
Enhanced Android App-Repackaging Attack on In-Vehicle Network
Yousik Lee, Samuel Woo, Jungho Lee, Yunkeun Song, Heeseok Moon, and Dong Hoon Lee
Wireless Communications and Mobile Computing, 2019 (IF 1.819)
영지식 증명을 활용한 프라이버시 보장 신용평가방법
Chul Park, Jonghyun Kim, and Dong Hoon Lee
Journal of the Korea Institute of Information Security & Cryptology, 2019
[2018]
UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program
Jae Hyuk Suk, Jae‐Yung Lee, Hongjoo Jin, In Seok Kim, and Dong Hoon Lee
Software-Practice and Experience, 2018.12.Construction of a New Biometric-Based Key Derivation Function and Its Application
Minhye Seo, Jong Hwan Park, Youngsam Kim, Sangrae Cho, Dong Hoon Lee, and Jung Yeon Hwang
Security and Communication Networks, Volume 2018, Article ID 6107912, 2018.12.암호화된 데이터에 대한 프라이버시를 보존하는 k-means 클러스터링 기법
Yunsong Jeong, Joon Sik Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, Vol.28, NO.6, pp. 1401-1414, Dec. 2018FACE: Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data
Jin Hyung Park and Dong Hoon Lee
IACR Transactions on Cryptographic Hardware and Embedded Systems(CHES 2018), Vol. 2018, No. 03, 2018.08.Privacy Preserving k-Nearest Neighbor for Medical Diagnosis in e-Health Cloud
Jeongsu Park and Dong Hoon Lee
Journal of Healthcare Engineering, Volume 2018, Article ID 4073103, 2018.10.Multi-Client Order-Revealing Encryption
Jieun Eom, Kwangsu Lee, and Dong Hoon Lee
IEEE Access, Vol. 6, pp. 45458-45472, 2018.08.VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System
Wonsuk Choi, Kyungho Joo, Hyo Jin Jo, Moon Chan Park and Dong Hoon Lee
IEEE Transactions on Information Forensics and Security, Vol. 13, No. 8, 2018.08.VODKA: Virtualization Obfuscation using Dynamic Key Approach
Jae Yung Lee, Jae Hyuk Suk, and Dong Hoon Lee
World Conference on Information Security Applications (WISA 2018), vol. 11402, pp. 131-145, 2018.08.Two-Input Functional Encryption for Inner Products from Bilinear Maps
Kwangsu Lee and Dong Hoon Lee
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E101-A, No. 6, pp. 915-928, 2018.06.Identifying ECUs through Inimitable Characteristics of Signals in Controller Area Networks
Wonsuk Choi, Hyo Jin Jo, Samuel Woo, Ji Young Chun, Jooyoung Park and Dong Hoon Lee
IEEE Transactions on Vehicular Technology, 2018.06Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats
Sung-Jin Kim, Byung-Joon Kim, Hyoung-Chun Kim, and Dong Hoon Lee
Detection of Intrusions and Malware, and Vulnerability Assessment(DIMVA 2018), vol. 10885, pp. 141-161, 2018.06소스 코드 난독화 기법에 의한 Clang 정적 분석 도구의 성능 영향 분석
Hongjoo Jin, Moon Chan Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, Vol.28, NO.3, pp. 605-615, Jun. 2018VANET 환경을 위한 계층적 구조의 익명 인증 기술
Kyungjin Bae, Youngkyung Lee, Jonghyun Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, Vol.28, NO.3, pp. 563-557, Jun. 2018Energy-Aware Key Exchange for Securing Implantable Medical Devices
Wonsuk Choi, Youngkyung Lee, Duhyeong Lee, Hyoseung Kim, Jin Hyung Park, Dong Hoon Lee and In Seok Kim
Security and Communication Networks, 2018.05Reliable Cooperative Authentication for Vehicular Networks
Hyo Jin Jo, In Seok Kim, Dong Hoon Lee
IEEE Transactions on Intelligent Transportation Systems, vol. 19, No. 4, pp. 1065-1079, 2018.04.Security Architecture for a Secure Database on Android
Jin Hyung Park, Seok Man Yoo, In Seok Kim and Dong Hoon Lee
IEEE Access, Vol. 6, pp. 11482-11501, 2018.01.Sound-Proximity: 2-Factor Authentication against Relay Attack on Passive Keyless Entry and Start System
Wonsuk Choi, Minhye Seo, and Dong Hoon Lee
Journal of Advanced Transportation, 2018.01
[2017]
사용자 폐기를 지원하는 책임 기관 ID 기반 암호
Suri Choi, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology Vol.27, NO.6, pp. 1281-1293, Dec. 2017지문 인증과 동적 로딩을 이용한 안드로이드 애플리케이션 코드 보호 기법
Hwahn Il, Jae Hyuk Suk, Jin Hyung Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology Vol.27, NO.6, pp. 1316-1372, Dec. 2017Recipient Revocable Broadcast Encryption with Dealership
Joon Sik Kim, Youngkyung Lee, Jieun Eom and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology Vol.27, NO.6, Dec. 2017E2PKA: An Energy-Efficient and PV-Based Key Agreement Scheme for Body Area Networks
Wonsuk Choi, In Seok Kim, and Dong Hoon Lee
Wireless Personal Communications, Vol. 97, No. 1, pp. 997-998, 2017.11.Efficient revocable identity-based encryption via subset difference methods
Kwangsu Lee, Dong Hoon Lee, and Jong Hwan Park
Designs, Codes and Cryptography, Vol. 85, No. 1, pp. 39-76, 2017.10.SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform
Eun Su Jeong, In-Seok Kim, and Dong Hoon Lee
Multimedia Tools and Applications, Vol. 76, No. 17, pp. 18153-18173, 2017.09.[Poster] Ulrera!: Securing Ultrasonic Sensor based on Signal Relation and Randomness
Sunwoo Lee, Wonsuk Choi, and Dong Hoon Lee
USENIX Security(Poster Session). 2017.08[Poster] Hold The Door!: RF Fingerprint extraction in keyless entry system
Kyungho Joo, Wonsuk Choi, and Dong Hoon Lee
USENIX Security(Poster Session). 2017.08실행 파일 형태로 복원하기 위한 Themida 자동 역난독화 도구 구현
Youjin Kang, Moonchan Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology Vol.27, NO.4, pp. 785-802, Aug. 2017걸음걸이 비디오를 활용한 웨어러블 기기 사용자 걸음걸이 가속도 신호 추정
Duhyeong Lee, Wonsuk Choi, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, Vol.28, NO.3, pp. 1405-1417, Jun. 2018Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency
Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, and Moti Yung
Theoretical Computer Science, Vol. 667, pp. 51-92, 2017.03.Vulnerabilities of Android OS-Based Telematics System
Hyo Jin Jo, Wonsuk Choi, Seoung Yeop Na, Samuel Woo, and Dong Hoon Lee
Wireless Personal Communications, Vol. 92, No. 4, pp. 1511-1530, 2017.02.WBAN 환경에서의 개선된 ID 기반 익명 인증 기법
Minsoo Jeong, Jaehyuk Suk, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, Vol. 21, No. 2 : 322~332 Feb. 2017
[2016]
Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System
Jieun Eom, Dong Hoon Lee, and Kwangsu Lee
Journal of Medical Systems, vol. 40 : 253, pp. 1-16, 2016.12.효율적인 ID 기반 인증 및 키 교환 프로토콜
Jieun Eom, Minhye Seo, Jong Hwan Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, Vol.26, No.6, Dec. 2016안드로이드 시스템 하에서의 SEAndroid 정책 보호 기법 설계 및 구현
Seokman Yoo, Jinhyung Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, VOL.26, NO.5, Oct. 2016A Practical Security Architecture for In-Vehicle CAN-FD
Samuel Woo, Hyo Jin Jo, In-Seok Kim, and Dong Hoon Lee
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, Vol. 17, No. 8, pp. 2248-2261, 2016.08.Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme
Seunghwan Park and Dong Hoon Lee
IEICE TRANSACTIONS on Information and Systems, Vol. E99-D, No.7, pp.1933-1936. 2016.07.Two-stage tamper response in tamper-resistant software
Moon Chan Park, Woo Kwon Koo, Dong Geun Suh, In-Seok Kim, and Dong Hoon Lee
IET Software, Vol. 10, No. 3, pp. 81-88, 2016.06.WheelLogger: Driver Tracing Using Smart Watch
Joon Young Park, Jong Pil Yun and Dong Hoon
International Workshop on Information Security Applications(WISA 2017), Lecture Notes in Computer Science 10763, pp. 87-100, 2016.06무인증서 공개키 암호 기법의 재고: 안전성 모델 및 설계: 안전성 모델 및 설계
김송이, 박승환, 이광수
Journal of the Korea Institute of Information and Communication Engineering, 2016. 06.커넥티드 카 환경에서 안드로이드 앱 리패키징을 이용한 자동차 강제 제어 공격
Jungho Lee, Samuel Woo, Seyoung Lee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, VOL.26, NO.3, Jun. 2016Efficient and Privacy-Preserving Metering Protocols for Smart Grid Systems
Hyo Jin Jo, In-Seok Kim, and Dong Hoon Lee
IEEE Transactions on Smart Grid, Vol. 7, No. 3, pp. 1732-1742, 2016.05.Enhancing Identity Privacy Using Identity-Based Encryption in Access Networks of 3GPP
Yonghyun Jung, and Dong hoon Lee
KIPS Tr. Comp. and Comm. Sys., Vol.5, No.10 pp.361~372 pISSN: 2287-5891
An efficient IBE scheme with tight security reduction in the random oracle model
Jong Hwan Park and Dong Hoon Lee
Designs, Codes and Cryptography, Vol. 79, No. 1, pp. 63-85, 2016.04.A Variant of Park-Lee Identity-Based Encryption System
Jong Hwan Park and Dong Hoon Lee
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, Vol. 99-A No. 3, pp. 720-732, 2016.03.Client Cloud Web Service: Reducing Traffic Consumption
Jung Ha Paik, Kwantae Cho, Boo Geum Jung, and Dong Hoon Lee
Security and Communication Networks, Vol. 9, No. 3, pp. 248-261, 2016.02.Selectively Chosen Ciphertext Security in Threshold Public-key Encryption
Ki tak Kim, Jong Hwan Park, and Dong Hoon Lee
SECURITY AND COMMUNICATION NETWORKS, Vol. 9, No. 3, pp. 189-200, 2016.02.효과적인 사이버위협 정보공유체계 수립을 위한 요구사항의 우선순위 도출에 관한 연구
Ae chan Kim, and Dong hoon Lee
Review of KIISC, 2016
Bidirectional transfer of quantum information for unknown photons via cross-Kerr nonlinearity and photon-number-resolving measurement
Jino Heo, Chang-Ho Hong, Dong-Hoon Lee, and Hyung-Jin Yang
Chinese Physics B, Vol. 25, No. 2, pp. 020306-1-11, 2016.01.Verification of the performance of respiratory synchronisation radiation switchgear by using imaging technique
Mun-Kyu Park, Seung Woo Park, Jae-Hwan Bae, and Dong Hoon Lee
International Journal of Advanced Media and Communication, Vol. 6, No. 1, pp. 93-101, 2016.01.
[2015]
New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
Jong Hwan Park, Kwangsu Lee, and Dong Hoon Lee
Information Sciences, vol. 325, pp. 256-270, 2015.12.빅데이터 로그를 이용한 실시간 예측분석시스템 설계 및 구현
Sangjun Lee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, VOL.25, NO.6, Dec. 2015Scalable signaling protocol for Web real-time communication based on a distributed hash table
Jungha Paik and Dong Hoon Lee
Computer Communications, vol. 70, pp. 28-39, 2015.10.mvSERS: A Secure Emergency Response Solution for Mobile Healthcare in Vehicular Environments
Chanying Huang, Hwaseong Lee, Hyoseung Kim, and Dong Hoon Lee
The Computer Journal, Vol. 58, No. 10, pp. 2461-2475, 2015.10.IoT환경에서 프라이버시를 보장하는 의료데이터 이상치 탐색 기법
Boyoung Lee, Wonsuk Choi, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, VOL.25, NO.5, Oct. 2015APK에 적용된 난독화 기법 역난독화 방안 연구 및 자동화 분석 도구 구현
Seyoung Lee, JinHyung Park, Moonchan Park, Jaehyuk Suk, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, VOL.25, NO.5, Oct. 2015New constructions of revocable identity-based encryption from multilinear maps
Seunghwan Park, Kwangsu Lee, and Dong Lee
IEEE Transactions on Information Forensics and Security, Vol. 10, No. 8, 2015.08.Practical Effect of the Predictability of Android OpenSSL PRNG
Soo Hyeon KIM, Daewan HAN, and Dong Hoon Lee
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E98-A, No. 8, pp. 1806-1813, 2015.08.An Efficient ID-Based Mutual Authentication Secure against Privileged-Insider Attack
Song Yi Kim, Hyoseung Kim, and Dong Hoon Lee
2015 5th International Conference on IT Convergence and Security (ICITCS 2015), IEEE, pp. 1-4, 2015.08.Forward Secure Non-Interactive Key Exchange from Indistinguishability Obfuscation
Young Kyung Lee, and Dong Hoon Lee
2015 5th International Conference on IT Convergence and Security (ICITCS 2015), IEEE, pp. 1-4, 2015.08.An Improved Fuzzy Attribute-Based Authentication
Jong Pil Yun, Hyoseung Kim, and Dong Hoon Lee
2015 5th International Conference on IT Convergence and Security (ICITCS 2015), IEEE, pp. 1-5, 2015.08.Keyword Updatable PEKS
Hyun Sook Rhee and Dong Hoon Lee
International Workshop on Information Security Applications(WISA 2015), Lecture Notes in Computer Science 9503, pp. 96-109, 2015.08.Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation
Geumsook Ryu, Kwangsu Lee, Seunghwan Park, and Dong Hoon Lee
International Workshop on Information Security Applications(WISA 2015), Lecture Notes in Computer Science 9503, pp. 122-133, 2015.08.전방향 안전성을 만족하며 인증서 기반이 아닌 비대화형 키 교환 프로토콜
Youngkyung Lee, Jieun Eom, Seunghyun Seo, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, VOL.25, NO.3, Jun. 2015Sequential Aggregate Signatures with Short Public Keys without Random Oracles
Kwangsu Lee, Dong Hoon Lee, and Moti Yung
Theoretical Computer Science, Vol. 579, pp. 100-125, 2015.05.Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency
Kwangsu Lee and Dong Hoon Lee
IET Information Security, Vol. 9, No. 3, pp. 149-157, 2015.05.A practical wireless attack on the connected car and security protocol for in-vehicle can
Samuel Woo, Hyo Jin Jo, and Dong Hoon Lee
IEEE Transactions on Intelligent Transportation Systems, Vol. 16, No. 2, pp. 993-1006, 2015.04.Anonymous HIBE with Short Ciphertexts: Full Security in Prime Order Groups
Kwangsu Lee, Jong Hwan Park, and Dong Hoon Lee
Designs, Codes and Cryptography, vol. 74, no. 2, pp. 395-425, 2015.02.안전하고 효율적인 클라이언트 사이드 중복 제거 기술
Kyungsu Park, Jieun Eom, Jeongsu Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, VOL.25, NO.1, Feb. 2015STROP: Static Approach for Detection of Return-Oriented Programming Attack in Network
YoungHan CHOI and DongHoon LEE
IEICE TRANSACTIONS on Communications, Vol. E98-B, No. 1, pp. 242-251, 2015.01.
[2014]
Low-priced and efficient replica detection framework for wireless sensor networks
Kwantae Cho and Dong Hoon Lee
PEER-TO-PEER NETWORKING AND APPLICATIONS, Vil. 7 No. 4, pp. 743-479, 2014.12.Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme
Kwangsu Lee and Dong Hoon Lee
Information Sciences, vol. 286, pp. 29-34, 2014.12.Fingerprint-based access control using smart cards in IPTV
Eun-A Jun, Hyun Sook Rhee, Jeom Goo Kim, Seok Won Jung, and Dong Hoon Lee
Multimedia Tools and Applications, Vol. 73, No. 2, pp. 647-661, 2014.11.서명용 개인키 노출 탐지 기법
Moonchan Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, VOL.24, NO.5, Oct. 2014Data-mining based SQL injection attack detection using internal query trees
Mi-Yeon Kim and Dong Hoon Lee
Expert Systems with Applications. Vol. 41, No. 11, pp. 5416-5430, 2014.09.Low-priced and Energy-efficient Detection of Replicas for Wireless Sensor Networks
Kwantae Cho, Byung-Gil Lee, and Dong Hoon Lee
IEEE Transactions on Dependable and Secure Computing, Vol. 11, No. 5, pp. 454-466, 2014.09.Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, and Jong Hwan Park
European Symposium on Research in Computer Security(ESORICS 2014), Lecture Notes in Computer Science 8713, pp. 1-18, 2014.09.An Enhanced (t,n) Threshold Directed Signature Scheme
Jung Yeon Hwang, Hyoung Joong Kim, Dong Hoon Lee, and Boyeon Song
Information Sciences, vol. 275, pp. 284-292, 2014.08.A generic partial encryption scheme for low-power mobile devices
Eun Su Jeong, Bum Han Kim, and Dong Hoon Lee
Multimedia Tools and Applications, Vol. 72, No. 3, pp. 2087-2106, 2014.08.스마트폰 데이터베이스 환경에서 암호화된 데이터에 대한 효율적인 키워드검색 기법
Jongseok Kim, Wonsuk Choi Jinhyung Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, VOL.24, NO.4, Aug. 2014Efficient Privacy-Preserving Authentication in Wireless Mobile Networks
Hyo Jin Jo, Jung Ha Paik, and Dong Hoon Lee
IEEE Transactions on Mobile Computing, Vol. 13, No. 7, pp. 1469-1481, 2014.07.Prevention Schemes Against Phishing Attacks on Internet Banking Systems
Seoung Yeop Na, Hyun Kim and Dong Hoon Lee
International Journal of Advances in Soft Computing & Its Applications, Vol. 6, No. 1, 2014.03.인증서와 개인키 유출 방지를 위한 보안키 저장소 Secure Key Store
Youngjin Park, Seonjong Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, VOL.24, NO.1, Feb. 2014사용자 입력 패턴 및 전자 금융 거래 패턴을 이용한 모바일 뱅킹 이상치 탐지 방법
Heeyeon Min, Jinghyung Park, Dong Hoon Lee, and In Seok Kim
Journal of Internet Computing and Services, pp.157-170, 2014. 02.Fraud and Financial Crime Detection Model using Malware Forensics
Ae Chan Kim, Seong Kon Kim, Won Hyung Park, and Dong Hoon Lee
Multimedia Tools and Applications, Vol. 68, No. 2, pp. 479-496, Apr 2014. 01.
[2013]
SVM을 이용한 스미싱 탐지기법
Jiwon Lee, Dong Hoon Lee, and In Seok Kim
Journal of Security Engineering, Vol.10 No.6, 2013.12.Energy-efficient Replica Detection for Resource-limited Mobile Devices in the Internet of Things
Kwantae Cho, Byung-Gil Lee, Kyungho Lee, and Dong Hoon Lee
IET Communications, Vol. 7, No. 18, pp. 2141-2150, 2013.12.Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, and Moti Yung
In ASIACRYPT 2013, Vol. 8259, pp. 235-254, 2013.12.Phishing prevention scheme verifying personal identification message on SSL/TLS
SeoungYeop Na, Hyun Kim and Dong Hoon Lee
The 5th International Conference on Internet(ICONI 2013), 2013.12.Predictability of Android OpenSSL's pseudo random number generator
Soo Hyeon Kim, Daewan Han, and Dong Hoon Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security(CCS’ 13), pp. 659-668, 2013.11.운전 패턴을 이용한 운전자 보조 인증방법
Jongmyoung Jeong, Hyungchul Kang, Hyo Jin Jo, Jiwon Yoon, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(KIISC), VOL.23, NO.5, October 2013사용자 편의성을 강화한 모바일 메신저 기반의 two-factor 인증 기법
Sanghyuk Lee, Hyun Kim, and Dong Hoon Lee
Journal of Security Engineering, Vol.10, No.5, pp.549-566, 2013.10.복호화 위임을 제공하는 효율적인 브로드캐스트 암호시스템
Su Min Han, Seung Hawn Park, Jong Hwan Park, and Dong Hoon Lee
JOURNAL OF BROADCAST ENGINEERING(JBE), Vol. 18, No. 5, September 2013ECU간 기기인증을 위한 HB-Family 경량인증기법의 적용 방법
Tae Su Kin, Hyoseung Kim, Samuel Woo, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.23, NO.4, August 2013안드로이드 스마트폰 뱅킹 앱 무결성 검증 기능의 취약점 연구
Soonil Kim, Sunghoon Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.23, NO.4, August 2013개인정보 유출 탐지 및 차단에 관한 연구: 안드로이드 플랫폼 환경
Youngseok Choi, Sunghoon Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.23, NO.4, August 2013가상화 난독화 기법이 적용된 실행 파일 분석 및 자동화 분석 도구 구현
Jae Hyuk Suk, Sunghoon Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.23, NO.4, August 2013Sequential Aggregate Signatures Made Shorter
Kwangsu Lee, Dong Hoon Lee, and Moti Yung
International Conference on Applied Cryptography and Network Security(ACNS 2013), Lecture Notes in Computer Science 7954, pp. 202-217, 2013.06.Privacy-preserving disjunctive normal form operations on distributed sets
Ji Young Chun, Dowon Hong, Ik Rae Jeong, and Dong Hoon Lee
Information Sciences, vol. 231, pp. 113-122, 2013.05.Fully secure hidden vector encryption under standard assumptions
Jong Hwan Park, Kwangsu Lee, Willy Susilo, and Dong Hoon Lee
Information Sciences, Vol 232, pp. 188-207, 2013.05.Anonymous HIBE: Compact Construction Over Prime-Order Groups
Jong Hwan Park, and Dong Hoon Lee
IEEE Transactions on Information Theory, Vol. 59, No. 4, pp. 2531-2541, 2013.04.Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages
Jin Ho Han, Jong Hwan Park, and Dong Hoon Lee
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol. 96-A, No. 4, pp. 796-806, 2013.04.Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
Kwangsu Lee, Dong Hoon Lee, and Moti Yung
International Conference on Financial Cryptography and Data Security(FC 2013), Lecture Notes in Computer Science 7778, pp. 171-188, 2013.04.Classification and Experimental Analysis for Clones Detection Approaches in Wireless Sensor Networks
Kwantae Cho, Minho Jo, Taekyoung Kwon, Hsiao Hwa Chen, and Dong Hoon Lee
IEEE Systems Journal, Vol. 7, No. 1, pp. 26-35, 2013.03.Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
Kwangsu Lee, Dong Hoon Lee, and Moti Yung
Public-Key Cryptography(PKC 2013), Lecture Notes in Computer Science 7778, pp. 423-442, 2013.02.MAC함수와 동적 링크키를 이용한 소프트웨어 변조 방지 기법
Jaehong Park, Sunghoon Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.23, NO.1, Feb. 2013홈트레이딩 시스템의 취약점 분석과 휴대전화 인증을 이용한 대응방안 제시
Min Keun Choi, Kwan Tae Cho, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.23, NO.1, Feb. 2013A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals
Ae Chan Kim, Won Hyung Park, and Dong Hoon Lee
International Journal of Security and Its Applications (IJSIA), Vol. 7, No. 1, pp. 181-188, 2013.01.
[2012]
Privacy-preserving Range Set union for rare cases in healthcare data
Ji Young Chun, Dong Hoon Lee, and Ik Rae Jeong
IET Communications, Volume 6, Issue 18, pp. 3288 – 3293, 2012.12.Scalable Privacy-Preserving t-Repetition Protocol with Distributed Medical Data
Ji Young Chun, Dowon Hong, Dong Hoon Lee, and Ik Rae Jeong
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. , Vol.E95-A, No.12, pp. 1631-1636, 2012.12.Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
Kitak Kim, Hyoseung Kim, Miryoung Kim, Jong Hwan Park, and Dong Hoon Lee
Computer Applications for Database, Education, and Ubiquitous Computing, Communications in Computer and Information Science 352, pp. 99-102, 2012.12.A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction using Moving Average method
Ae Chan Kim, Won Hyung Park, and Dong Hoon Lee
IT Convergence and Security 2012, Lecture Notes in Electrical Engineering 215, pp.93-99, 2012.12.Anomaly electronic financial transactions detection Applying Box Whisker plot System
HeeYeon Min, Su Mi Lee, and Dong Hoon Lee
The 4th International Conference on Internet(ICONI 2012), pp.117-120, 2012.12.Improved procedure to guarantee the digital evidence’s integrity through certificate authority
Young Seok Choi, Dong Hoon Lee
The 4th International Conference on Internet(ICONI 2012), pp.113-116, 2012.12.Risk Assessment Model of Personal Information Disclosure in the Social Network Service
GiSeong Lee, and Dong Hoon Lee
The 4th International Conference on Internet(ICONI 2012), pp.99-103, 2012.12.Enhanced Control Flow Flattening Scheme
Sunghoon Kim and Dong Hoon Lee
The 4th International Conference on Internet(ICONI 2012), pp. 51-54, 2012.12.A Study on Virtualization Obfuscation Technique
Jae Hyuk Suk, Sunghoon Kim, and Dong Hoon Lee
The 4th International Conference on Internet(ICONI 2012), pp. 55-58, 2012.12.Improved Information Security Risk Analysis for Implementation
MinHye Seo, Kitak Kim, and Dong Hoon Lee
The 4th International Conference on Internet(ICONI 2012), pp. 75-78, 2012.12.Full-ID Secure Dual System Broadcast Encryption with Personalized Messages
Jin Ho Han, Jong Hwan Park, and Dong Hoon Lee
The 4th International Conference on Internet(ICONI 2012), pp. 83-86, 2012.12.Attribute-Based Encryption for Commercial Content Distribution
Hyoseung Kim, Seunghwan Park, Jong Hwan Park
IT Convergence and Security 2012, Lecture Notes in Electrical Engineering 218, pp. 205-213, 2012.12.A New CCA-secure Public Key Encryption Scheme from the Linear Assumption
Jong Hwan Park and Dong Hoon Lee
Information Science and Technology(IST) 2012, pp.365-368, 2012.12.A Chosen Ciphertext Secure Ciphertext-Policy Attribute-Based Encryption with Constant Ciphertext Length and Threshold
Kitak Kim, Woo Kwon Koo, Jong Hwan Park, and Dong Hoon Lee
Information Science and Technology(IST) 2012, pp.265-269, 2012.12.Collusion-Resistant Identity-based Proxy Reencryption
Woo Kwon Koo, Jung Yeon Hwang, and Dong Hoon Lee
Information Science and Technology(IST) 2012, pp.288-292, 2012.12.프라이버시 보호 및 부인방지를 제공하는 택배 시스템 제안
Min Seok Choi, Kwan Tae Cho, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.22, NO.6, Dec. 2012서버 접근 통제를 위한 위치기반 인증 기법
Jung Min Choi, Kwan Tae Cho, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.22, NO.6, Dec. 2012Generic Construction of Designated Tester Public-Key Encryption with Keyword Search
Hyun Sook Rhee, Jong Hwan Park, and Dong Hoon
Information Sciences, Vol.205, pp.93-109, 2012.11.A Secure and Practical ePrescription Issu Scheme in Telemedicine
Wonsuk Choi, Hwaseong Lee, and Dong Hoon Lee
The 2012 FTRA World Convergence Conference(FTRA WCC2012), 2012.11.POS시스템 내 소프트웨어 무결성 검증 방안
Sung A Cho, Sung Hoon Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.22, NO.5, Oct. 2012CAN 버스 공격에 안전한 메시지 인증 및 키 분배 메커니즘
A Ram Cho, Hyo Jin Jo, Samuel Woo, Young Dong Son, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.22, NO.5, Oct. 2012On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme
Kwangsu Lee, Jong Hwan Park, and Dong Hoon Lee
IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E95-A, No. 9, pp. 1631-1636, 2012.09.시뮬레이션을 이용한 DDoS 공격 대응기술 효과성평가방법
Ae Chan Kim, Dong Hoon Lee, and Seong Yong Jang
Journal of the Korea Society for Simulation, Vol. 21, No. 3, pp. 17-24 (2012. 9)A Privacy-Strengthened Scheme for E-Healthcare MonitoringA System
Chanying Huang, Hwaseong Lee, and Dong Hoon Lee
Journal of Medical Systems, Vol. 36, No. 5, pp. 2959-2971, 2012.08.Identity-Based Ring Signature Schemes for Multiple Domains
JuHee Ki, Jung Yeon Hwang, and Dong Hoon Lee
KSII Transactions on Internet and Information Systems, Vol. 6, No. 10, pp. 2692-2707, 2012.08.Compliance Risk Assessment Measures of Financial Information Security using System Dynamics
Ae Chan Kim, Su Mi Lee, and Dong Hoon Lee
International Journal of Security and Its Applications(IJSIA), Vol. 6, No. 4, pp.191-200, 2012.08.안전한 HTML5 로컬 스토리지 구현에 대한 연구
Hee Won Myeong, Jung Ha Paik, and Dong Hoon Lee
Journal of Korean Socieity for Internet Information 2012. Aug: 13(4): 83-93스마트워크 환경에서 이상접속탐지를 위한 의사결정지원 시스템 연구
Jae Ho Lee, Dong Hoon Lee, and Huy Kang Kim
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.22, NO.4, Aug. 2012ID기반 암호시스템을 이용하여 ID기반 동적 임계 암호시스템으로 변환하는 방법
Milyoung Kim, Hyoseung Kim, Youngdong Son, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.22, NO.4, Aug. 2012PACPs: Practical Access Control Protocols for Wireless Sensor Networks
Hwaseong Lee, Kilho Shin, and Dong Hoon Lee
IEEE Transactions on Consumer Electronics, Vol. 58, No. 2, pp.491-499, 2012.05.Detecting Heap-Spraying Code Injection Attacks in Malicious Web
Young Han Choi and Dong Hoon Lee
IEICE TRANSACTIONS on Communications, Vol.E95-B, No.05, pp. 1711-1721, 2012.05.Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability
JuHee Ki, Jung Yeon Hwang, DaeHun Nyang, Beom-Hwan Chang, Dong Hoon Lee, and Jong-in Lim
ETRI Journal, Vol.34, No.2, pp.235-244, 2012.04.JsSandbox: A Framework for Analyzing the Behavior of Malicious JavaScript Code using Internal Function Hooking
Hyoung Chun Kim, Young Han Choi, and Dong Hoon Lee
KSII Transactions on Internet and Information Systems, Vol. 6, No.2, pp. 766-783, 2012. 02.Infrastructure Design for Efficient Replica Detection in Large-scale Wireless Sensor Networks
Kwantae Cho and Dong Hoon Lee
The FTRA International Symposium on Advances in Cryptography, Security and Applications (ACSA-Summer 2012), 2012.Lite-AKA: Lightweight Authentication Key Agreement for Pervasive Computing
Hwaseong Lee and Dong Hoon Lee
The FTRA International Symposium on Advances in Cryptography, Security and Applications (ACSA-Summer 2012), 2012.
[2011]
A Study on Static Analysis Model of Mobile Application for Privacy Protection
Seil Kim, Jae Ik Cho, Hee Won Myeong, and Dong Hoon Lee
Computer Science and Convergence, Lecture Notes in Electrical Engineering 114, 99. 529-540, 2011.12.On a security model for a retrieval system over encrypted database
Hyun-A Park, Jin Wook Byun, Jae Hyun Park, and Dong Hoon Lee
2011 7th International Conference on Advanced Information Management and Service (ICIPM), IEEE, pp. 76-82, 2011.12.Intermediary service program based on encryption or encoding of address and name on mail or parcel delivery service
Minseok Choi, Jeungho Byun, MinKeun Choi, and Dong Hoon Lee
The 3rd International Conference on Internet(ICONI 2011), pp.439-442, 2011.12.Security Risk and Countermeasures in Cloud computing Environment
Sung-A Cho, Won Gil Lee, and Dong Hoon Lee
The 3rd International Conference on Internet(ICONI 2011), pp.123-126, 2011.12.User’s Password Complexity enhancement on Mobile Using QR code
YouChul Jang, Youhyun Yang, Heewon Myeong, and Dong Hoon Lee,
The 3rd International Conference on Internet(ICONI 2011), pp.7-9, 2011.12.Proposal of Security Process using Password-based Encryption for Local Storage in HTML5
Heewon Myeong, Youchul Jang, Youhyun Yang, Dong Hoon Lee
The 3rd International Conference on Internet(ICONI 2011), pp.443-446, 2011.12.Vulnerability Analysis for SmartPhones
Kim Myeonghwan, Taeheung Kim, Jeongmin Hong, and Dong Hoon Lee
ICONI 2011, pp.339-342, 2011.12.Secure Serverless RFID Tag search Protocol
Ji Young Chun, Geontae Noh, Dong Hoon Lee, and Ik Rae Jeong
The 3rd International Conference on Internet(ICONI 2011), pp. 533-537, 2011.12.Privacy Preserving Keyword Search with Access Control
Geontae Noh, Ji Young Chun, Ik Rae Jeong, and Dong Hoon Lee
The 3rd International Conference on Internet(ICONI 2011), pp. 513-517, 2011.12.Hierarchical Group Key Distribution for Secure Wireless Mobile Networks
Hwaseong Lee and Dong Hoon Lee
The 3rd International Conference on Internet (ICONI 2011), pp.427-431, 2011.12.Efficient Authentication Protocol between Home Devices and Smart Meter for Smart Grid Networks
Kwantae Cho and Dong Hoon Lee
The 3rd International Conference on Internet(ICONI 2011), pp.433-437, 2011.12.Identity-Based Online/Offline Signcryption with Batch Verification
Seunghwan Park, Kitak Kim, Woo Kwon Koo, and Dong Hoon Lee
The 3rd International Conference on Internet(ICONI 2011), pp.539-543, 2011.12.Fully collusion-resistant trace-and-revoke scheme in prime-order groups
Jong Hwan Park, Hyun Sook Rhee, and Dong Hoon Lee
Journal of Communications and Networks, Vol.13, No.5, pp.428-441, 2011.10.ID기반 암호시스템을 이용하여 ID기반 동적 임계 암호시스템으로 변환하는 방법
Milyoung Kim, Hyoseung Kim, Youngdong Son, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.22, NO.4, Aug. 2012모바일 환경을 위한 AES CTR Mode의 효율적 구현
Jin Hyung Park, Jung Ha Paik, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.21, NO.5, Oct. 2011OTP에 기반한 비연결성을 보장하는 온라인 본인확인에 대한 연구
Jung Dong Kim, Kwan Tae Cho, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.21, NO.5, Oct. 2011고정된 검사자를 고려한 메시지 동일성 검사 공개키 암호시스템
Young Min Lee, Woo Kwon Koo, Hyun Sook Rhee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.21, NO.5, Oct. 2011Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
Jong Hwan Park, and Dong Hoon Lee
Designs, Codes and Cryptography, Vol.60, No.3, pp. 255-276, 2011.09.PKIS: practical keyword index search on cloud datacenter
Hyun-A Park, Jae Hyun Park, and Dong Hoon Lee
EURASIP Journal on Wireless Communications and Networking 2011, pp.1-16, 2011.08.On a security model of conjunctive keyword search over encrypted relational database
Jin Wook Byun and Dong Hoon Lee
Journal of Systems and Software, Vol.84, Issue.8, pp.1364-1372, 2011.08.Biometric based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks
Kwantae Cho and Dong Hoon Lee
International Workshop on Information Security Applications(WISA 2011), Lecture Notes in Computer Science 7115, pp. 203-218, 2011.08.검증 능력이 제한된 검색 가능한 공개키 암호시스템
Ji Eun Eom, Hyun Sook Rhee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.21, NO.4, Aug. 2011An Efficient Implementation of Block Cipher in Android Platform
Jung Ha Paik, Seog Chung SEO, Yungyu Kim, HwanJin Lee, Hyun-Chul Jung, and Dong Hoon Lee
2011 Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering, IEEE, pp.173-176, 2011.06.An Efficient Implementation of KCDSA on Graphic Processing Units
Seog Chung SEO, Jung Ha Paik, HwanJin Lee, Seokhie Hong, and Dong Hoon Lee
2011 Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering, IEEE, pp. 167-172, 2011.06.스마트카드를 이용한 프록시 재 암호화 기법 기반 콘텐츠 공유 메커니즘에 관한 연구
Seunghwan Park, Woo Kwon Koo, Kitak Kim, Hyeran Mun, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.21, NO.3, Jun. 2011무선센서네트워크 환경에서 안전한 멀티캐스트를 지원하는 신속한 그룹키 갱신 기법
Wan Nam Goong, Kwan Tae Cho, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.21, NO.3, Jun. 2011Improved hidden vector encryption with short ciphertexts and tokens
Kwangsu Lee and Dong Hoon Lee
Designs Codes and Cryptography, Vol.58, No.3, pp. 297-319, 2011.05.스마트기기 보호를 위한 스마트기기 보안취약점과 보안방안 검토
Ki Young Kim, and Dong Hoon Lee
Review of KIISC, VOL.21, NO.3, May. 2011Anonymous Authentication with Unlinkability for Wireless Environments
Li Kun, Xiu Anna, He Fei, and Dong Hoon Lee
IEICE Electronics Express, Vol.8, No. 8, pp. 536-541, 2011.04.A New Provably Secure Certificateless Short Signature Scheme
Kyu Young Choi, Jong Hwan Park, and Dong Hoon Lee
Computers & Mathematics with Applications, Vol. 61, Issue 7, pp. 1760-1768, 2011.04.Extended Fingerprint-based User Authentication Scheme using Smart Cards in Education IPTV
Eun-A Jun, Jeom Goo Kim, Seok Won Jung, and Dong Hoon Lee
2011 International Conference on Information Science and Applications, IEEE, pp. 1-8, 2011.04.Efficient file fuzz testing using automated analysis of binary file format
Hyoung Chun Kim, Young Han Choi, and Dong Hoon Lee
Journal of Systems Architecture, Vol. 57, No. 3, pp. 259-268, 2011.03.피싱 방지 및 가용성 개선을 위한 PKI기반의 모바일 OTP 메커니즘 연구
Tae Hyung Kim, Jun Ho Lee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.21, NO.1, Feb. 2011국내·외 스마트폰 어플리케이션 마켓 동향분석
Yungyu Kim, and Dong Hoon Lee
Review of KIISC , VOL.21, NO.1, Feb. 2011RFID tag search protocol preserving privacy of mobile reader holders
Ji Young Chun, Jung Yeon Hwang, and Dong Hoon Lee
IEICE Electronics Express, Vol. 8, No. 2, pp. 50-56, 2011.01.
[2010]
A Study on the Analysis and the Countermeasure of P2P-based Systems
Chan Hong Jeong, Yonng Sun Jun, Seung Hyeon Choi, Kang Seok Kim, and Dong Hoon Lee
ICONI 2010, pp.269-270, 2010.12.A Comparison Study on Intrusion Detection Systems Using Data Mining
Eun Ji Na, Bum Suk Seo, Ji Won Eom, Ji Young You, Sook Hyun Yoo, and Dong Hoon Lee
The 2nd International Conference on Internet(ICONI 2010), pp.735-738, 2010.12.A study on User Authentication in IPTV banking by IC card and OTP
Jae Ho Lee, Na Rae Kim, Sang Gak Jung, Tae Hyung Kim, and Dong Hoon Lee
ICONI 2010, pp.279-281, 2010.12.A study on the DDoS attack to find a suitable response by Support Vector Machine
Yong Hoon Kang, Hee Kyung Seol, Boo Hyun Hwang, and Dong Hoon Lee
The 2nd International Conference on Internet(ICONI 2010), pp.723-727, 2010.12.Client Cloud Web Service: Avoiding Traffic Consumption Attack
Jung Ha Paik and Dong Hoon Lee
The 2nd International Conference on Internet(ICONI 2010), pp.793-796, 2010.12.Chosen Ciphertext Secure Dynamic Threshold Public-key Encryption
Kitak Kim, Jong Hwan Park, and Dong Hoon Lee
The 2nd International Conference on Internet(ICONI 2010), pp.709-713, 2010.12.Robust Identity-based Proxy Re-encryption
Woo Kwon Koo, Jung Yeon Hwang, and Dong Hoon Lee
The 2nd International Conference on Internet(ICONI 2010), pp. 839-840, 2010.12.스마트폰 전자 금융거래 보호를 위한 법제적 문제점 분석
Seung Hyeon Choi, Kang Seok Kim, Hee Kyung Seol, Dae Wook Yang, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.20, NO.6, Dec. 2010개인건강정보의 2차이용 보호에 관한 국내외 법안 연구
Han Na Park, Boo Geum Jung, Dong Hoon Lee, and Kyo Il Chung
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.20, NO.6, Dec. 2010New techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups
Kwangsu Lee and Dong Hoon Lee
KSII Transactions on Internet and Information Systems, Vol. 4, No. 5, pp. 968-988, 2010.10.ID기반 온라인/오프라인 사인크립션(Signcryption) 기법
Seunghwan Park, Kitak Kim, Woo Kwon Koo, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.20, NO.5, Oct. 2010스마트미터 보안 연구
Wan Nam Goong, Hyo Jin Jo, and Dong Hoon Lee
Review of KIISC, VOL.20, NO.5, Oct. 2010A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations
Jong Hwan Park, and Dong Hoon Lee
IEICE TRANSACTIONS on Fundamentals of Electronics Communications and Computer Sciences, Vol. E93-A(9), No. 9, pp. 1620-1631, 2010.09.Forgery attacks on Kang et al.’s identity-based strong designated verifier signature scheme and its improvement with security proof
Ji-Seon Lee, Jik Hyun Chang, and Dong Hoon Lee
Computers & Electrical Engineering, Vol. 36, No. 5, pp. 948-954, 2010.09.신뢰 RSU 세팅이 필요 없는 VANET 보안통신 기법
He Fei, Li Kun, Bum Han Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.20, NO.4, Aug. 2010차량 밀집환경에서 안전하고 효율적인 V2V 메시지 인증기법
Seock Jae Jung, Young Jun Yoo, Jung Ha Paik, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.20, NO.4, Aug. 2010Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme
Jong Hwan Park and Dong Hoon LEE
IEICE TRANSACTIONS on Fundamentals of Electronics Communications and Computer Sciences, Vol. E93-A, No. 6, pp. 1269-1273, 2010.06.Combined Authentication based Multi-Level Access Control in Mobile Application for DailyLifeService
Hyun-A Park, Jong Wook Hong, Jae Hyun Park, Justin Zhan, and Dong Hoon Lee
IEEE Transactions on Mobile Computing, Vol. 9, No. 6, pp. 824-837, 2010.06.A fingerprint-based user authentication scheme using smart cards in IPTV Environments
Eun-A Jun, Hyun Sook Rhee, Seok Won Jung, and Dong Hoon Lee
2010 International Conference on Information Science and Applications, IEEE, pp. 1-8, 2010.04.Trapdoor security in a searchable public-key encryption scheme with a designated tester
Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, and Dong Hoon Lee
Journal of Systems and Software, Vol. 83, No. 5, pp. 763-771, 2010.03.온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜
Tae Youn Won, Young Jun Yu, Ji Young Chun, Jin Wook Byun, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.20, NO.1, Feb. 2010
[2009]
A Forward-Secure E-mail Protocol without Certificated Public Keys
Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee
Information Sciences, Vol. 179, No. 24, pp. 4227-4231, 2009.12.Efficient Secret Broadcast in the Broadcasting Networks
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee
IEEE Communications Letters, Vol. 13, No. 12, pp. 1001-1003, 2009.12.Weaknesses in the Hur-Shin-Yoon Decentralized Group Key Management
Jung Yeon Hwang, Ji Young Chun, and Dong Hoon Lee
Wireless Communications & Mobile Computing, Vol. 9, Issue 12, pp. 1565-1571, 2009.12.Effective Distributed Detection of Clones in Mobile Wireless Sensor Networks
Kwan Tae Cho, Minho Jo, and Dong Hoon Lee
The first International Conference on Internet(ICONI 2009), pp.299-304, 2009.12.차량 애드혹 네트워크 환경에서 효율적인 메시지 인증 기법
Young Jun Yoo, Jun Ho Lee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.19, NO.6, Dec. 2009차량용 블랙박스 시스템을 위한 실시간 무결성 보장기법
Yungyu Kim, Bun Han Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.19, NO.6, Dec. 2009정보 자산 보안 위험 추정-정량적, 정성적 방법을 절충한 퍼지 숫자의 활용
Ro Jin Pak, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.19, NO.6, Dec. 2009Anti-Cloning Protocol Suitable to EPCglobal Class-1 Generation-2 RFID Systems
Eun Young Choi, Dong Hoon Lee, and Jong-In Lim
Computer Standards & Interfaces, Vol. 31, No. 6, pp. 1124-1130, 2009.11.Security Vulnerability in a Non-Interactive ID-Based Proxy Re-encryption Scheme
Woo Kwon Koo, Jung Yeon Hwang, and Dong Hoon Lee
Information Processing Letters, Vol. 109, No. 23-24, pp. 1260-1262, 2009.11.이동형 리더 소지자의 프라이버시를 보호하는 RFID 태그 검색 프로토콜
Ji Young Chun, Jung Yeon Hwang, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.19, NO.5, Oct. 2009키 노출 공격에 안전한 ID-기반의 강한 지정된 검증자 서명 기법
Ji Seon Lee, Jik Hyun Chang, and Dong Hoon Lee
The Journal of the Korea Contents Association '09 Vol. 9 No. 10프라이버시를 보호하는 접근제어가 가능한 키워드 검색 기법
Geon Tae Noh, Ji Young Chun, Ik Rae Jeong, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.19, NO.5, Oct. 2009Security authentication based position for U-Health application services
Byeong Ho Ahn, Jinkeun Hong, and Dong Hoon Lee, Ki Hong Kim
IEICE Electronics Express, Vol. 6, No. 15, pp. 1125-1130, 2009.08.차량네트워크를 위한 프라이버시 보장 인증 기술 동향 분석
Youngjoon You , Yungyu Kim, Bun Han Kim, and Dong Hoon Lee
Review of KIISC, VOL.19, NO.4, Aug. 2009ID 기반의 그룹 키 교환 기법에 대한 연구 동향
Jae Tak Choi, and Dong Hoon Lee
Review of KIISC, VOL.19, NO.4, Aug. 2009Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06
Jong Hwan Park and Dong Hoon Lee
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No.7, pp. 1724-1726, 2009.07.The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure
Seung Geol Choi, Javier Herranz, Dennis Hofheinz, Jung Yeon Hwang, Eike Kiltz, and Dong Hoon Lee, Moti Yung
Information Processing Letters, Vol. 109, No. 16, pp. 897-901, 2009.07.Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks
Ji Young Chun, Yong Ho Kim, Jung Yeon Hwang, and Dong Hoon Lee
2009 Eighth IEEE/ACIS International Conference on Computer and Information Science, IEEE, pp. 307-312, 2009.06.RFID를 위한 이차잉여 기반의 개선된 상호인증 기법
Hannah Park, Seil Kim, Ji Young Chun, and Dong Hoon Lee
KIISE Transactions on Computing Practices (KTCP), 2009.06A Note on Leakage-Resilient Authenticated Key Exchange
Ji Young Chun, Jung Yeon Hwang, and Dong Hoon Lee
IEEE Transactions on Wireless Communications, Vol.8, No. 5, pp. 2274-2279, 2009.05.Searchable Encryption with Keyword-Recoverability
Ik Rae Jeong, Jeong Ok Kwon, Dowon Hong, and Dong Hoon Lee
IEICE Transactions on Information and Systems, E92-D, No. 5, pp.1200-1203, 2009.05.Security Flaw of Authentication Scheme with Anonymity for Wireless Communications
Ji-Seon Lee, Jik Hyun Chang, and Dong Hoon Lee
IEEE Communications Letters. Volume 13, Issue 5, pp. 292-293, 2009.05.Stronger Chikazawa-Yamagishi ID-Based Key Distribution
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No.5, pp. 1379-1382, 2009.05.Practical Access Control Protocol for Secure Sensor Networks
Hwaseong Lee, Kilho Shin, and Dong Hoon Lee
The 13th IEEE International Symposium on Consumer Electronics(ISCE2009), IEEE, pp.806-809, 2009.05.다중 수신자 환경에서 키워드 검색 가능한 공개키 암호시스템
Hyun Sook Rhee, Jong Hwan Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.19, NO.2, Apr. 2009Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No.3, pp. 932-934, 2009.03.Light-Weight Key Exchange with Different Passwords in the Standard Model
Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee
Journal of Universal Computer Science, Vol. 15, no. 5, pp. 1042-1064, 2009.03.Developing a Multi-Protocol Mobility Manager for SIP/SS7 Networks
Hyung-Soo Park, Hyung-Woo Lee, Seong-Jin Park, and Dong Hoon Lee
2009 International Conference on Complex, Intelligent and Software Intensive Systems, IEEE, pp. 565-570, 2009.03.Improved Searchable Public Key Encryption with Designated Tester
Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, and Dong Hoon Lee
ASIAN ACM Symposium on Information, Computer and Communications Security(ASIACCS '09), pp. 376-379, 2009.03.Universal Forgery of the Identity-based Sequential Aggregate Signature Scheme
Jung Yeon Hwang, Dong Hoon Lee, and Moti Yung
ASIAN ACM Symposium on Information, Computer and Communications Security(ASIACCS '09), pp. 157-160, 2009.03.Constructing PEKS Schemes Secure against Keyword Guessing Attacks Is Possible?
Ik Rae Jeong, Jeong Ok Kwon, Dowon Hong, and Dong Hoon Lee
Computer Communications, Vol. 32, no. 2, pp. 394-396, 2009.02.모바일 RFID 시스템의 Private Zone에 적용 가능한 프라이버시 보호 기법
Dong Chul Kim, Ji Young Chun, Eun Young Choi, and Dong Hoon Lee
The KIPS Transactions : Part C, pp. 189-198, 2009.02.공개키 인증서를 사용하지 않는 전방향 안전성을 보장하는 E-mail 프로토콜
Jeong Ok Kwon, Young Ju Koo, Ik Rae Jeong, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.19, NO.1, Feb. 2009A Remote User Authentication Scheme Without Using Smart Cards
Hyun Sook Rhee, Jeong Ok Kwon, and Dong Hoon Lee
Computer Standards & Interfaces, Vol. 31, no. 1, pp. 6-13, 2009.01.Analysis of Revocable-iff-Linked Ring Signature Scheme
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No. 1, pp. 322-325, 2009.01.Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism
Jong Hwan Park and Dong Hoon Lee
IEICE transactions on fundamentals of electronics, communications and computer sciences, vol. E92-A, no. 1, pp.329-331, 2009.01.CCA 안전성을 제공하는 ID기반 프락시 재암호화 기법
Woo Kwon Koo, Jung Yeon Hwang, Hyoung-Joong Kim, and Dong Hoon Lee
Journal of the Institute of Electronics and Information Engineers, Vol.46, No.1 Jan. 2009DNF 정책을 가지는 속성 기반 서명
Kwangsu Lee, Jung Yeon Hwang, Hyoung-Joong Kim, and Dong Hoon Lee
Journal of the Institute of Electronics and Information Engineers, Vol.46, No.1 Jan. 2009
[2008]
Practical Password-Authenticated Three-Party Key Exchange
Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee
KSII Transactions on Internet and Information Systems, Vol. 2, No. 6 pp. 312-332, 2008.12.SARC: A Street-Based Anoymous Vehicular Ad Hoc Routing Protocol for City Environments
Hyuncheol Kim, Jungha Paik, Bumhan Kim, and Dong Hoon Lee
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, IEEE, pp. 324-329, 2008.12.Strong Authentication Protocol for Secure RFID Tag Search Without Help of Central Database
Tae Youn Won, Ji Young Chun, and Dong Hoon Lee
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, IEEE, pp. 153-158, 2008.12.Non-Interactive Identity-Based DNF Signature and Its Extensions
Kwangsu Lee, Jung Yeon Hwang, and Dong Hoon Lee
International Conference on Information Security and Cryptology(ICISC 2008), Lecture Notes in Computer Science 5461, pp. 166-183, 2008.12.Non-interactive identity-based DNF signature scheme and its extensions
Kwangsu Lee, Jung Yeon Hwang, and Dong Hoon Lee
International Conference on Information Security and Cryptology, ICISC 2008, Lecture Notes in Computer Science 5461, pp. 166-183, 2008.12.수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계
Tae Youn Won, Ji Young Chun, Coon Sik Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.18, NO.6, Dec. 2008인증서가 없는 강한 지정된 검증자 서명기법
Young Ju Koo, Ji Young Chen, Kyu Young Choi, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.18, NO.6, Dec. 2008표준 모델에서 안전한 Diffie-Hellman 키 교환 프로토콜
Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee, and Dowon Hong
Journal of Korean Institute of Information Scientists and Engineers, VOL.35, NO.6, Dec. 2008An authentication scheme for filtering injected bogus data in sensor networks
Yong Ho Kim and Dong Hoon Lee
Computer Communications, Vol. 31, No. 17, pp. 3929-3932. 2008.11.Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity
Seil Kim, Ji Young Chun, and Dong Hoon Lee
TrustCom 2008, IEEE, pp. 2235-2239, 2008.11.Efficient and Secure Communication between Set-top Box and Smart Card in IPTV Broadcasting
Ji-Seon Lee, Hyun Sook Rhee, and Dong Hoon Lee
2008 The 9th International Conference for Young Computer Scientists, IEEE, pp. 2235-2239, 2008.11.Secure Mutual Authentication and Fair Billing for Roaming Service in Wireless Mobile Networks
Tae Ryung Im, Hwaseong Lee, Kwantae Cho, and Dong Hoon Lee
2008 Third International Conference on Convergence and Hybrid Information Technology, IEEE, pp. 466-471, 2008.11.CADE: Cumulative Acknowledgement based Detection of Selective Forwarding Attacks in Wireless Sensor Networks
Young Ki Kim, Hwaseong Lee, Kwantae Cho, and Dong Hoon Lee
2008 Third International Conference on Convergence and Hybrid Information Technology, IEEE, pp. 416-422, 2008.11.VANET 환경에서 프라이버시를 보호하면서 사고 발생 시 추적 가능한 인증 프로토콜
Sung Hoon Kim, Bum Han Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.18, NO.5, Oct. 2008서로 다른 패스워드를 사용하는 두 사용자를 위한 경량 패스워드 기반 키 교환 프로토콜
Jeong Ok Kwon, Ki Tak Kim, Ik Rae Jeong, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.18, NO.5, Oct. 2008추적이 가능한 스마트카드 사용자 인증 기법
Seil Kim, Ji Young Chun, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.18, NO.5, Oct. 2008Security weakness in an authenticated group key agreement protocol in two rounds
Jung Yeon Hwang, Kyu Young Cho, and Dong Hoon Lee
Computer Communications, Vol. 31, Issue. 15, pp. 3719-3724, 2008.09.Public Key Broadcast Encryption Schemes With Shorter Transmissions
Jong Hwan Park, Hee Jean Kim, Maeng Hee Sung, and Dong Hoon Lee
IEEE Transactions on Broadcasting, Vol. 54, No.3, pp.401-411, 2008.09.Impersonation Attack on a Strong ID-Based Key Distribution
Jung Yeon Hwang, Jongin Lim, and Dong Hoon Lee
IEICE Transactions on Communications, Vol. E91-B, No. 8, 2008.08.Ring Signature with Weak Linkability and Its Applications
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee
IEEE Transactions on Knowledge and Data Engineering, Vol. 20, No. 8, pp. 1145-1148, 2008.08.Auditable and Privacy-Preserving Authentication in Vehicular Networks
Sung Hoon Kim, Bum Han Kim, Young Ki Kim, and Dong Hoon Lee
8 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, IEEE, pp. 19-24, 2008.08.Attribute-Based Access Control using Combined Authentication Technologies
Hyun-A Park, Justin Zhan, and Dong Hoon Lee
2008 IEEE International Conference on Granular Computing, IEEE Computer Society Press, pp. 1-6, 2008.08.ID-based authenticated group key agreement secure against insider attacks
Kyu Young Choi, Jung Yeon Hwang, and Dong Hoon Lee
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E91-A, No.7, pp.1828-1830, 2008.07.Identity-Based Universal Designated Multi-Verifiers Signature Schemes
Seung-Hyun Seo, Jung Yeon Hwang, Kyu Young Choi, and Dong Hoon Lee
Computer Standards & Interfaces, Vol.30, no.5, pp. 288-295, 2008.07.Multi-Protocol Authentication for SIP/SS7 Mobile Network
Hyung-Soo Park , Hyung-Woo Lee , Dong Hoon Lee, and Hong-Ki Ko
Computer Communications, Vol 31, no. 11, pp. 2755-2763, 2008.07.Web Site Credibility Evaluation Framework for Negotiation of Personal Information
Hyun Cheol Kim, Young Ju Goo, Ji Young Chun, Hae Ryong Park, Yeon Jung Kang, and Dong Hoon Lee
The 3rd Joint Workshop on Information Security (JWIS), pp.129-135, 2008.07.Efficient Keyword Index Search over Encrypted Data of Groups
Hyun-A Park, Justin Zhan, Gary Blosser, and Dong Hoon Lee
2008 IEEE International Conference on Intelligence and Security Informatics, IEEE Computer Society Press, pp. 225-229, 2008.06.Privacy-Aware Access Control Through Negotiation in DailyLifeService
Hyun-A Park, Justin Zhan and Dong Hoon Lee
International Conference on Intelligence and Security Informatics(ISI 2008), Lecture Notes in Computer Science 5075, pp. 514-519, 2008.06.세션상태 정보 노출 공격에 안전한 개선된 그룹 키 교환 프로토콜
Ki Tak Kim, Jeong Ok Kwon, Dowon Hong, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.18, NO.3, Jun. 2008A3RP : Anonymous and Authenticated Ad Hoc Routing Protocol
Jung Ha Paik, Bum Han Kim, and Dong Hoon Lee
International Conference on Information Security and Assurance (ISA 2008), pp. 67 -72, 2008.04.Anonymous and Traceable Authentication Scheme using Smart Cards
Seil Kim, Hyun Sook Rhee, Ji Young Chun, and Dong Hoon Lee
International Conference on Information Security and Assurance (ISA 2008), pp. 162 -165, 2008.04.Authenticated Group Key Distribution for Unreliable Sensor Networks
Hwaseong Lee, Yong Ho Kim, and Dong Hoon Lee
International Conference on Information Security and Assurance (ISA 2008), IEEE, pp. 285 -288, 2008.04.Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks
Woo Kwon Koo, Hwaseong Lee, Yong Ho Kim, and Dong Hoon Lee
International Conference on Information Security and Assurance (ISA 2008), IEEE, pp. 73 -76, 2008.04.Privacy Preserving SQL Queries
Hyun-A Park, Justin Zhan, and Dong Hoon Lee
The 2nd International Conference on Information Security and Assurance (ISA 2008), pp.549-554, 2008.04.A New Public Key Broadcast Encryption Using the Boneh-Boyen-Goh's HIBE Scheme
Jong Hwan Park and Dong Hoon Lee
4Th Information Security Practice and Experience Conference (ISPEC `08), Lecture Notes in Computer Science 4991, pp.101-115, 2008.04.Authenticated Group Key Distribution for Wireless Sensor Networks
Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, and Jongin Lim
International Conference on Information Security and Assurance, pp. 285-288, 2008.04.Cryptanalysis and Improvement of a Multi-receiver Identity-Based Key Encapsulation at INDOCRYPT 06
Jong Hwan Park, Ki Tak Kim, and Dong Hoon Lee
ACM Symposium on Information, Computer and Communications Security(ASIACCS'08), pp.373-380, 2008.03.그룹 사용자간 안전한 콘텐츠 전송을 위한 검증자를 이용한 패스워드 기반 다자간 키 교환 프로토콜
Jeong Ok Kwon, Ik Rae Jeong, Jae Tark Choi, and Dong Hoon Lee
JOURNAL OF BROADCAST ENGINEERING, VOL.13, NO.2, pp.251-261, 2008.03.무선 애드-혹 네트워크를 위한 효율적인 서비스 검색 기법
Moon jeong Kim, and Dong Hoon Lee
JOURNAL OF BROADCAST ENGINEERING, VOL.13, NO.2, pp.245-253, 2008.03.Parallel Key Exchange
Ik Rae Jeong and Dong Hoon Lee
Journal of Universal Computer Science, Vol.14, No.3, pp. 377-396, 2008.02.A Survey of Attribute-Based Encryptions
Kwangsu Lee and Dong Hoon Lee
The 3rd International Joint Workshop on Information Security and Applications (IJWISA 2008), 2008.02.A Survey of Keyword Search on Encrypted Data
Hyun Sook Rhee, Se-il Kim, and Dong Hoon Lee
The 3rd International Joint Workshop on Information Security and Applications (IJWISA 2008), pp.49-58, 2008.02.Three-Party Password-Authenticated Key Exchange under Standard Assumptions
Jeong Ok Kwon, Ik Rae Jeong, Ki Tak Kim, and Dong Hoon Lee
The 3rd International Joint Workshop on Information Security and Applications (IJWISA 2008), pp.146-155, 2008.02.A Proxy Multi-Signature scheme
Choi Jae Tark and Dong Hoon Lee
The 3rd International Joint Workshop on Information Security and Applications (IJWISA 2008), 2008.02.Gen2 기반 RFID 시스템에 적합한 암호 기법 설계
Tae Youn Won, Il Jung Kim, Eun Young Choi, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.18, NO.1, Feb. 2008Strong ID-Based Key Distribution
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee
IEICE Transactions on Communications, Vol. E91-B, No.1, pp. 306-308, 2008.01.Certificateless Autenticated Key Agreement for Low-Power Mobile Device
Kyu Young Choi and Dong Hoon Lee
International Ubiquitous Workshop 2008, pp.58-60, 2008.01.Efficient One-Time Password Authentication Scheme Based on USIM
Bum Han Kim, Jung Ha Paik, and Dong Hoon Lee
International Ubiquitous Workshop 2008, 2008.01.End-to-End Location Privacy Routing for Ubiquitous Computing
Kwantae Cho, Hwaseong Lee, Yong Ho Kim, and Dong Hoon Lee
International Ubiquitous Workshop 2008, pp.21-22, 2008.01.Identity-based universal re-encryptions and its extension to the multi-recipient setting
Jin Wook Byun, Bum Han Kim, and Dong Hoon Lee
International Ubiquitous Workshop 2008, pp.23-25, 2008.01.Improved Identification and Key Agreement Protocols
Young Ju Goo, Ki Tak Kim, Jung Yeon Hwang, and Dong Hoon Lee
International Ubiquitous Workshop 2008, pp.26-29, 2008.01.An Efficient Key Establishment Scheme for Self-organizing Sensor Networks
Yong Ho Kim, Kyu Young Cho, Jongin Lim, and Dong Hoon Lee
International Conference on Distributed Computing and Networking(ICDCN 2008), Lecture Notes in Computer Science 4904, pp. 345-349, 2008.01.Efficient and Secure Remote Authenticated Key Agreement Scheme for Multi-server Using Mobile Equipment
Jun Ho Lee and Dong Hoon Lee
The 2008 IEEE International Conference on Consumer Electronics, 9.1-3, 2008.01.암호화된 데이터에서의 OT를 이용한 효율적인 검색 기술
Hyun Sook Rhee, Jong Hwan Park, and Dong Hoon Lee
JOURNAL OF BROADCAST ENGINEERING, VOL.13, NO.1, pp. 43-52, 2008.01.
[2007]
Key Agreement for Key Hypergraph
Ik Rae Jeong and Dong Hoon Lee
Computers & Security, Vol. 26, Issues 7-8, pp. 452-458, 2007.12.Efficient Oblivious Keyword Search
Hyun Sook Rhee, Hyun Jeong Kim, Jong Hwan Park, and Dong Hoon Lee
The 2nd International Conference on Ubiquitous Information Technologies & Applications, pp. 602~607, 2007.12.Forward-Secure and Chosen-Ciphertext Secure Public Key Broadcast Encryption
Jong Hwan Park, Seok Koo Yoon, and Dong Hoon Lee
The 2nd International Conference on Ubiquitous Information Technologies & Applications, 631~637, 2007.12.랜덤 워크 기반의 P2P 익명 프로토콜
Jun Ha Cho, Hyun Sook Rhee, Hyun A Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.17, NO.6, Dec. 2007On the Strong Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing
Ik Rae Jeong, Jeong, Ok Kwon, and Dong Hoon Lee
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E90-A, No. 11, pp. 2626-2628, 2007.11.Three-Round Smart Card-Based Key Exchange Scheme
Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee
IEICE Transactions on Communications, Vol. E90-B, No. 11, pp. 3255-3258, 2007.11.A Remote User Authenticated Key Agreement Scheme for Multi-server Using Mobile Equipment
Sang Pil Yun, Jun Ho Lee, and Dong Hoon Lee
2007 International Conference on Convergence Information Technology(ICCIT 2007), pp. 337-342, 2007.11.Secure and Efficient Password-based Authenticated Key Exchange Protocol for Two-Server Architecture
Jun Ho Lee and Dong Hoon Lee
International Conference on Convergence Information Technology(ICCIT 2007), pp.687-692, 2007.11.Anonymous and Traceable Communication Using Tamper-Proof Device for Vehicular Ad Hoc Networks
Bum Han Kim, Kyu Young Choi, Jun Ho Lee, and Dong Hoon Lee
International Conference on Convergence Information Technology(ICCIT 2007), pp. 681-686, 2007.11.Attack on Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings
Jae Tark Choi, Jeong Ok Kwon, Seok Koo Yoon, and Dong Hoon Lee
ICUCT' 07, pp. 98-102, 2007.11.Cross-Layer Service Discovery using Non-Disjoint Multi-Path Source Routing Protocol
Moon Jeong Kim and Dong Hoon Lee
IWUCT' 07, pp. 99-103, 2007.11.Multi-Party Password-Authenticated Key Exchange with Different Passwords Secure Against Server Compromise
Jeong Ok Kwon, Ik Rae Jeong, Jae Tark Choi, and Dong Hoon Lee
IWUCT' 07, pp. 170-175, 2007.11.Secure Similarity Search
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, and Justin Zhan
International Conference on Granular Computing(GrC 2007), pp.598-604, 2007.11.EC2C-PAKA: An Efficient Client-to-Client Password-Authenticated Key Agreement
Jin Wook Byun, Dong Hoon, and Jong In Lim
Information Sciences, Elsevier, Vol. 177, No. 19, pp. 3995-4013, 2007.10.Security and Handover Designs for VoWLAN System
Mi-Yeon Kim, Misook Lim, Jin-Soo Sohn, and Dong Hoon Lee
Asia-Pacific Network Operations and Management Symposium(APNOMS 2007), Lecture Notes in Computer Science 4773, pp.447-456, 2007.10.그룹서명에 기반한 익명성을 제공하는 애드 혹 라우팅 프로토콜
Jung Ha Paik, Bum Han Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.17, NO.5, Oct. 2007복제 공격 저항성을 갖는 전자봉인 보안 모델
Joo Hae Kim, Eun Young Choi, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.17, NO.5, Oct. 2007위 · 변조에 안전한 RFID 지급결제시스템
In Seok Kim, Eun Young Choi, Dong Hoon Lee, Jong In Lim
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.17, NO.5, Oct. 2007A Secure and Efficient Key Management Scheme for Wireless Sensor Networks
Yong Ho Kim, Hwaseong Lee, and Dong Hoon Lee
International Conference on Security and Privacy in Communications Networks and the Workshops, ieee, 2007.09.객체지향 지리정보시스템에서의 역할 기반 접근 제어
Mi Yeon Kim, Cheol Min Lee, Chang Joo Moon, and Dong Hoon Lee
JOURNAL OF INFORMATION TECHNOLOGY APPLICATIONS & MANAGEMENT, VOL.14, NO.3, Sep. 2007Triple-Stack Authentication Server on All-IP Network with Backward Compatibility
Hyung-Soo Park, Hyung-Woo Lee, Dong Hoon Lee, and Hong-Ki Ko
8th International Workshop on Information Security Applications(WISA 2007), pp. 507-519, 2007.08.Certificateless Proxy Signature Sheme
Kyu Young Choi and Dong Hoon Lee
The 3rd International Conference on Multimedia Information Technology and its Applications (MITA 2007), pp. 437-440, 2007.08.Efficient Certificateless Public Key Encryption Secure Against Chosen Plaintext Attacks (Without Random Oracles)
Jong Hwan Park and Dong Hoon Lee
The 3rd International Conference on Multimedia Information Technology and its Applications (MITA 2007), pp. 433-436, 2007.08.모바일 환경에서의 개인정보 위협 분석 연구
Hyun-A Park, Jae Tark Choi, Jong In Lim, and Dong Hoon Lee
Review of KIISC, VOL.17, NO.4, Aug. 2007센서 네트워크 내의 위조된 데이터 삽입 공격 방지를 위한 인증 방법
Kwan Tae Cho, Young Ho Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.17, NO.4, Aug. 2007모바일 환경에서의 개인정보 위협 분석 연구
Hyun-A Park, Jae Tark Choi, Jong In Lim, and Dong Hoon Lee
JIPS(Journal of Information Processing Systems), VOL.14, NO.5, Aug. 2007Efficient Verifier-Based Password-Authenticated Key Exchange in the Three-Party Setting
Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, and Dong Hoon Lee
Computer Standards & Interfaces, Vol 29, No. 5, pp. 513-520, 2007.07.A Practical Inter-sensor Broadcast Authentication Scheme
Joon Wan Kim, Yong Ho Kim, Hwaseong Lee, and Dong Hoon Lee
12th International Conference on Human-Computer Interaction(UAHCI 2007), Lecture Notes in Computer Science 4554, pp. 399-405, 2007.07.Trapdoor-based Mutual Authentication Scheme without Cryptographic Primitives in RFID Tags
Hwaseong Lee, Eun Young Choi, Su-Mi Lee, and Dong Hoon Lee
International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing(SecPerU 2007), IEEE CS P2863, pp.73-78. 2007.07.Location-aware random pair-wise key scheme for wireless sensor networks
Ji Young Chun, Yong Ho Kim, Jongin Lim, and Dong Hoon Lee
International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing(SecPerU 2007), IEEE CS P2863, pp. 31-36, 2007.07.Secure Mobile RFID system against privacy and security problems
Il Jung Kim, Eun Young Choi, and Dong Hoon Lee
International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing(SecPerU 2007), IEEE CS P2863, 2007.07.Key Establishment Scheme for Sensor Networks with Low Communication Cost
Yong Ho Kim, Hwaseong Lee, and Dong Hoon Lee
International Conference on Autonomic and Trusted Computing (ATC-07), Lecture Notes in Computer Science 4610, pp. 441-448, 2007.07.Self-updating : Strong Privacy Protection Protocol for RFID-tagged Banknotes
Eun Young Choi, Su Mi Lee, and Dong Hoon Lee
International Conference on Ubiquitous Intelligence and Computing, Lecture Notes in Computer Science 4611, pp. 1171-1180, 2007.07.Certificateless Public Key Encryption in the Selective-ID Security Model(Without Random Oracles)
Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, and Dong Hoon Lee
International Conference on Pairing-based Cryptography (Pairing 2007), Lecture Notes in Computer Science 4575, pp60-82, 2007.07.Enhanced Non-Disjoint Multi-Path Source Routing Protocol for Wireless Ad-hoc Networks
Moon Jeong Kim, Dong Hoon Lee, and Young Ik Eom
International Conference on Computational Science and Its Applications, ICCSA 2007, Lecture Notes in Computer Science 4707 pp. 1187-1196, 2007.07.Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes
Jong Hwan Park and Dong Hoon Lee
European Public Key Infrastructure Workshop (EuroPKI 2007), Lecture Notes in Computer Science 4852, pp. 94-109, 2007.06.A Transformation Scheme for Interconnection Networks
Moon Jeong Kim, Dong Hoon Lee, and Young Ik Eom
International Conference on Communications in Computing(CIC), pp. 36-42, 2007.06.Classification of Key Management Schemes for Wireless Sensor Networks
Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, and Jong In Lim
Advances in Web and Network Technologies, and Information Management, ASWAN 2007, Lecture Notes in Computer Science 4537, pp. 664-673, 2007.06.Efficient Certificateless Signature Schemes
Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, and Dong Hoon Lee
5th International Conference on Applied Cryptography and Network Security(ACNS 2007), Lecture Notes in Computer Science 4521, pp. 443-458, 2007.06.Strong Diffie-Hellman-DSA Key Exchange
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee
IEEE Communications letters, Vol. 11, No. 5, pp. 432-433, 2007.05.Bogus data filtering in sensor networks
Yong Ho Kim, Jong Hwan Park, Dong Hoon Lee, and Jongin Lim
Pacific-Asia Conference on Knowledge Discovery and Data Mining(PAKDD 2007), Lecture Notes in Computer Science 4819, pp. 629-635, 2007.05.Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home
Jong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, and Laurence T. Yang
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07), IEEE, pp.311-316, 2007.04.PPIDS : Privacy Preserving Intrusion Detection System
Hyun-A Park, Dong Hoon Lee, Jong In Lim, and Sang Hyun Cho
Pacific Asia Workshops on Intelligence and Security Informatics(PAISI 2007), Lecture Notes in Computer Science 4430, pp. 269-274 , 2007.04.Security Assessment for Application Network Service using Fault Injection
Hyungwoo Kang and Dong Hoon Lee
Pacific Asia Workshops on Intelligence and Security Informatics(PAISI 2007), Lecture Notes in Computer Science 7730, pp. 172-183, 2007.04.Yang-Yang-Wang의 스마트카드를 이용한 인증 스킴 공격의 오류
Jeong Ok Kwon, Jung Yeon Hwang, and Dong Hoon Lee
The Journal of The Institute of Internet, Broadcasting and Communication, VOL.7, NO.2, pp. 43-47, Apr. 2007익명성을 제공하는 스마트카드 사용자 인증 프로토콜
Seil Kim, Hyun Sook Rhee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.17, NO.2, Apr. 2007Direct Chosen-Ciphertext Secure ID-Based Encryption Schemes in the Selective-ID Security Model
Jong Hwan Park and Dong Hoon Lee
International Workshop on Logistics and Manufacturing Networks, pp. 324-334, 2007.02.Practical Group Key Scheme via Local Collaboration for Wireless Sensor Networks
Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee
International Workshop on Logistics and Manufacturing Networks, pp. 391-400, 2007.02.An Efficient Smart Card-Based Key Exchange Scheme
Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee
International Workshop on Logistics and Manufacturing Networks, pp. 305-315, 2007.02.Scalable and Fast Object Identification Protocol for RFID Tag System
Joo Hae Kim, Eun Young Choi, Su Mi Lee, and Dong Hoon Lee
International Conference on Ubiquitous Information Technologies & Application, pp. 163-172, 2007.02.An Efficient Key Management Scheme for Wireless Sensor Networks
Yong Ho Kim, Hwaseong Lee, Kwan Tae Cho, and Dong Hoon Lee
International Conference on Ubiquitous Information Technologies & Application, pp. 183-192, 2007.02.Efficient and Dynamic Keying Mechanism for IEEE 802.15.4 Networks
Bum Han Kim, Yong Ho Kim, Dong Hoon Lee, and Jongin Lim
International Conference on Ubiquitous Information Technologies & Application, pp. 202-211, 2007.02.Secure Verifiable Localization Scheme in Wireless Sensor Networks
Ji Young Chun, Hwaseong Lee, Jung Yeon Hwang, and Dong Hoon Lee
International Conference on Ubiquitous Information Technologies & Application, pp. 137-145, 2007.02.Non-Disjoint Multi-Path Source Routing Protocol for Ubiquitous Network
Moon Jeong Kim, Bum Han Kim, Dong Hoon Lee, and Young Ik Eom
International Conference on Ubiquitous Information Technologies & Application, pp. 424-433, 2007.02.One-time Signature Based Broadcast Authentication Schemes in Wireless Sensor Networks
Junho Lee, Jung Yeon Hwang, and Dong Hoon Lee
International Conference on Ubiquitous Information Technologies & Application, pp. 212-221, 2007.02.모바일 기반의 RFID 프라이버시 보호 기법
Il Jung Kim, Eun Young Choi, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.17, NO.1, Feb. 2007무선센서네트워크 환경에서 서명 기반 브로드캐스트 인증
Woo Kwon Koo, Hwaseong Lee, Yong Ho Kim, Jung Yeon Hwang, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.17, NO.1, Feb. 2007증명 가능한 안전성을 가지는 2라운드 패스워드 기반 그룹 키 교환 프로토콜
Jeong Ok Kwon, Ki Tak Kim, Ik Rae Jeong, and Dong Hoon Lee
Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), VOL.7, NO.1, pp. 1-9, Feb. 2007Oblivious 기반 공통의 키워드 검색 프로토콜 설계
Hyun Sook Rhee, Jin Wook Byun, Hyun A Park, Dong Hoon Lee, and Jong In Lim
Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), VOL.7, NO.1, pp. 11-20, Feb. 2007Efficient Group Key Agreement for Dynamic TETRA Networks
Su Mi Lee, Su Youn Lee, and Dong Hoon Lee
SOFSEM 2007, Lecture Notes in Computer Science 4362, pp. 400-409, 2007.01.An Efficient Password-Based E-mail Protocol for Encrypted E-mail Transmissions on Mobile Equipment
Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, and Dong Hoon Lee
The 2007 IEEE International Conference on Consumer Electronics. pp.1-2, 2007.01.
[2006]
A Diffie-Hellman Key Exchange Protocol without Random Oracles
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee
International Conference on Cryptology and Network Security(CANS 2006), Lecture Notes in Computer Science 4301, pp. 37-54, 2006.12.TETRA 망을 위한 사용자 키 관리 기법
Su Mi Lee, Su Youn Lee, Eun Young Choi, Jong In Lim, and Dong Hoon Lee
Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), VOL.6, NO.4, pp.49-57, Dec. 2006다수의 수신자를 위한 효율적이고 증명가능한 Universal Re-Encryption
Jin Wook Byun, Jun Ha Cho, and Dong Hoon Lee
Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), VOL.6, NO.4, pp.39-48, Dec. 2006분산시스템 환경에 적합한 효율적인 RFID 인증 시스템
Eun Young Choi, Su Mi Lee, Jong In Lim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.16, NO.6, Dec. 2006프라이버시를 보장하는 침입 탐지 시스템의 Audit log
Hyun A Park, Dong Hoon Lee, Jong In Lim, and Sang Hyun Cho
Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), VOL.6, NO.4, pp.59-70, Dec. 2006Security Analysis and Improvement of a Gateway-oriented Password-based Authenticated Key Exchange Protocol
Jin Wook Byun, Dong Hoon Lee, and Jong In Lim
IEEE Communications Letters, Vol. 10, No. 9, pp. 683-685, 2006.10.Disaster coverable PKI model utilizing the existing PKI structure
Bo Man Kim, Kyu Young Choi, and Dong Hoon Lee
"On the Move to Meaningful Internet Systems"(OTM 2006), Lecture Notes in Computer Science 4277, pp. 537-545, 2006.10.One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange
Jeong Ok Kwon, Kouichi Sakurai, and Dong Hoon Lee
IFIP International Conference on Communications and Multimedia Security(CMS 2006), Lecture Notes in Computer Science 4237, pp. 87-96, 2006.10.Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model
Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee
International Workshop on Security(IWSEC 2006), Lecture Notes in Computer Science 4266, pp. 322-336, 2006.10.Secure EPCglobal Class-1 Gen-2 RFID System against Security and Privacy Problems
Kyoung Hyun Kim, Eun Young Choi, Su Mi Lee, and Dong Hoon Lee
OTM Confederated International Conferences, Lecture Notes in Computer Science 4277, pp. 362-371, 2006.10.A Key Management Scheme for Large Scale Distributed Sensor Networks
Yong Ho Kim, Hwa Seong Lee, and Dong Hoon Lee, Jongin Lim
IFIP Conference on Personal Wireless Communications(PWC 2006), Lecture Notes in Computer Science 4217, pp.437-446, 2006.09.Difference Set Attacks on Conjunctive Keyword Search Schemes
Hyun Suk Rhee, Ik Rae Jeong, Jin Wook Byun, and Dong Hoon Lee
Workshop on Secure Data Management(SDM2006), Lecture Notes in Computer Science 4165, pp. 64-74, 2006.09.Off-line Keyword Guessing Attacks on Recent Keyword Search Schemes Over Encrypted Data
Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, and Dong Hoon Lee
Workshop on Secure Data Management(SDM2006), Lecture Notes in Computer Science 4165, pp. 75-83, 2006.09.Analysis of an Efficient Group Key Agreement Protocol
Su Mi Lee and Dong Hoon Lee
IEEE Communications Letters, Vol. 10, No. 8, pp. 638-639, 2006.08.Provably Secure Two-Round Password-Authenticated Group Key Exchange
Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, and Dong Hoon Lee
International Workshop on Security (IWSEC), Lecture Notes in Computer Science 4266, pp. 322-326, 2006.08저가형 RFID 시스템에 강한 프라이버시를 제공하는 자체 재암호화 프로토콜
Jeong Su Park, Eun Young Choi, Su Mi Lee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.16, NO.4, Aug. 2006이기종 무선 이동망간 통합 인증 및 키관리 기법
Hyung Soo Park, Hyung Woo Lee, and Dong Hoon Lee
Journal of The Korea Institute of Electronics and Infromation Engineers, VOL.43, NO.7, Jul. 2006Robust E-Mail Protocols with Perfect Forward Secrecy
Bum Han Kim, Jae Hyung Koo, and Dong Hoon Lee
IEEE Communications Letters, Vol. 10, No. 6, pp. 510-512, 2006.06.Efficient Conjunctive Keyword Search On Encrypted Data Storage System
Jin Wook Byun, Dong Hoon Lee, and Jongin Lim
European Public Key Infrastructure Workshop(EuroPKI 2006), Lecture Notes in Computer Science 4043, pp. 184-196, 2006.06.A Model for Security Vulnerability Pattern
Hyoung Woo Kang, Kibom Kim, Soon Jwa Hong, and Dong Hoon Lee
International Conference on Computational Science and Its Applications(ICCSA 2006), Lecture Notes in Computer Science 3982, pp. 385-394, 2006.05.Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks
Jeong Ok Kwon, Kouichi Sakurai, and Dong Hoon Lee
International Conference on Computational Science(ICCS 2006), Lecture Notes in Computer Science 3991, pp. 977-980, 2006.05.Self Re-Encryption Protocol providing strong Privacy for Low Cost RFID system
Jeong Su Park, Su Mi Lee, Eun Young Choi, and Dong Hoon Lee
International Conference on Computational Science and Its Applications(ICCSA 2006), Lecture Notes in Computer Science 3983, pp. 316-325, 2006.05.Directions in Password-Authenticated Key Exchange
Jeong Ok Kwon, Ik Rae Jeong, Kouchi Sakurai, and Dong Hoon Lee
Communications of the CCISA, 2006.04.Constant-Round Password-based Group Session-Key Generation for Multi-layer Ad-hoc Networks
Jin Wook Byun, Su Mi Lee, Dong Hoon Lee, and Do-Won Hong
International Conference on Security in Pervasive Computing(SPC 2006), Lecture Notes in Computer Science 3934, pp. 3-17, 2006.04.소모형 센서 네트워크 환경에 적합한 키 관리 스킴
Young Ho Kim, Hwa Seong Lee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.16, NO.2, Apr. 20061-라운드 양자간 키교환 프로토콜
Ik Rae Jeong, and Dong Hoon Lee
Journal of Korean Institute of Information Scientists and Engineers, VOL.32, NO.1.2, Feb. 2006비대칭 컴퓨팅 환경을 위한 ID-기반의 인증된 키 동의 프로토콜
Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, and Do Won Hong
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.16, NO.1, Feb. 2006Efficient and Provably Secure Client-to-Client Password-based Key Exchange Protocol
Jin Wook Byun, Dong Hoon Lee, and Jongin Lim
Asia-Pacific Web Conference(APWEB 06), Lecture Notes in Computer Science 3841, pp. 830-836, 2006.01.Modified ID-based Threshold Decryption and its application to Mediated ID-based Encryption
Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Haeryong Park, and Kilsoo Chun
Asia-Pacific Web Conference(APWEB 06), Lecture Notes in Computer Science 3841, pp. 720-725, 2006.01.
[2005]
Authenticated Public Key Distribution Scheme without Trusted Third Party
Jae Hyung Koo, Bum Han Kim, and Dong Hoon Lee
International Conference on Embedded and Ubiquitous Computing(ECU 2005), Lecture Notes in Computer Science 3823, pp. 926-935, 2005.12.Efficient RFID Authentication protocol for Ubiquitous Computing Environment
Eun Young Choi, Su Mi Lee, and Dong Hoon Lee
International Conference on Embedded and Ubiquitous Computing(ECU 2005), Lecture Notes in Computer Science 3823, pp. 945-954, 2005.12.Password-Based Group Key Exchange Secure Against Insider Guessing Attacks
Jin Wook Byun, Dong Hoon Lee, and Jongin Lim
International Conference on Computational and Information Science(CIS 2005), Lecture Notes in Computer Science 3802, pp. 143-148, 2005.12.Secure Password Pocket for Distributed Web Services
Jae Hyung Koo and Dong Hoon Lee
IFIP International Conference on Network and Parallel Computing(NPC 2005), Lecture Notes in Computer Science 3779, pp. 327 - 334, 2005.12.A Key Management Scheme for Commodity Sensor Networks
Yong Ho Kim, Mu Hyun Kim, Dong Hoon Lee, Changwook Kim
International Conference on Ad-Hoc Networks and Wireless(ADHOC-NOW 2005), Lecture Notes in Computer Science 3738, pp. 113-126, 2005.10.Efficient Revocation of Security Capability in Certificateless Public Key Cryptography
Hak Soo Ju, Dae Youb KIM,Dong Hoon Lee
International Conference on Knowledge-Based and Intelligent Information and Engineering Systems(KES 2005), pp.453-459, 2005.10.저가형 RFID 시스템을 위한 효율적인 인증 프로토콜
Eun Young Choi, Dong Hee Choi, Jong In Lim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.15, NO.5, Oct. 2005인터넷선거 정보보호기술 동향 연구
Jong Uk Hong, Geon Uk Kim, Dong Hoon Lee, and Jong In Lim
Review of KIISC, VOL.15, NO.5, Oct. 2005VoWLAN 보안 및 로밍 설계
Mi Yeon Kim, Gye Jin Kim, and Dong Hoon Lee
Review of KIISC, VOL.15, NO.5, Oct. 2005Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme
Jeong Ok Kwon. Jung Yeon Hwang, Changwook Kim, and Dong Hoon Lee
Applied Mathematics and Computation, Vol. 168, Issue 2, pp. 858-865, 2005.09.Efficient Member Revocation in Group Signature Schemes
Eun Young Choi, Hyun-Jeong Kim, Dong Hoon Lee
International Conference on Trust, Privacy and Security in Digital Business(TrustBus 2005), pp. 195-205, 2005.08.Generic Transformation for Scalable Broadcast Encryption Schemes
Jung Yeon Hwang, Dong Hoon Lee, and JongIn Lim
Annual International Cryptology Conference(CRYPTO 2005), Lecture Notes in Computer Science 3621. pp. 276-292, 2005.08.Oblivious Conjunctive Keyword Search
Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, and Jongin Lim
International Workshop on Information Security Applications( WISA 2005), Lecture Notes in Computer Science 3786, pp. 318-327, 2005.08.Secure Index Search for Groups
Hyun-A Park, Jin Wook Byun, and Dong Hoon Lee
International Conference on Trust, Privacy and Security in Digital Business(TrustBus 2005), Lecture Notes in Computer Science 3592 pp. 128-140, 2005.08.난수 재사용 기법을 이용한 다중 키 교환 프로토콜
Ik Rae Jeong, and Dong Hoon Lee
Journal of The Korea Information Processing Society, VOL.12, NO.7, Jul. 2005Parallel Pairwise Key Agreement Protocols
Ik Rae Jeong, Chang Seop Park, and Dong Hoon Lee
4th International Conference on Advanced Language Processing and Information Technology(ALPIT2005), KIPS, 2005.06.ID-based Authenticated Key Agreement for Low-Power Mobile Devices
Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, and In Seog Seo
Australasian Conference on Information Security and Privacy(ACISP 2005), Lecture Notes in Computer Science 3574, pp. 494–505, 2005.06.N-party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
Jin Wook Byun and Dong Hoon Lee
International Conference on Applied Cryptography and Network Security(ACNS 2005), Lecture Notes in Computer Science 3531 pp. 75-90, 2005.05.One-Way Chain Based Broadcast Encryption Schemes
Nam-Su Jho, Jung Yeon Hwang, Jung Hee Chun, Myung Hwan Kim, Dong Hoon Lee, and Eun Sun Yoo
Annual International Conference on the Theory and Applications of Cryptographic Techniques(Eurocrypt 2005), pp. 559-574, 2005.05.Efficient Authentication for Low-Cost RFID systems
Su Mi Lee, Young Ju Hwang, Dong Hoon Lee, and Jong In Lim
International Conference on Computational Science and Its Applications(ICCSA 2005), Lecture Notes in Computer Science 3480, pp. 619-627, 2005.04.Fine grained control of security capability and forward security in a pairing based signature scheme
Hak Soo Ju, Dae-Youb Kim, Dong Hoon Lee, Jong in Lim, and Kilsoo Chun
International Conference on Computational Science and Its Applications(ICCSA 2005), Lecture Notes in Computer Science 3481, pp. 381-390, 2005.04.그룹 환경을 위한 안전한 인덱스 검색 스킴
Hyun A Park, Jin Uk Byun, Hyun Suk Lee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.15, NO.1, Feb. 2005A Dynamic Path Identification Mechanism to Defend Against DDoS Attacks
GangShin Lee, Heeran Lim, Manpyo Hong, and Dong Hoon Lee
International Conference on Information Networking(ICOIN 2005), Lecture Notes in Computer Science 3391, pp. 806-813, 2005.01.프라이버시 보호 기술 및 정책에 관한 연구
Yu Jeong Lee, Jin Uk Byun, and Dong Hoon Lee
Journal of The Korean Institute of Information Scientists and Engineers, VOL.23, NO.1, Jan. 2005
[2004]
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
Hyun Jeong Kim, Su Mi Lee, and Dong Hoon Lee
International Conference on the Theory and Application of Cryptology and Information Security(Asiacrypt 2004), pp. 245-259, 2004.12.증명 가능한 트리기반 중앙 분배 방식의 그룹키 기법 : 안전성 모델 및 변환모듈
Hyun Jeong Kim, Su Mi Lee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.14, NO.6, Dec. 2004익명 통신로에 관한 최근 연구 동향
Hyun Suk Lee, Jin Uk Byun, Hyun A Park, Dong Hoon Lee, and Jong In Lim
Review of KIISC, VOL.14, NO.6, Dec. 2004SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability
GangShin Lee, Chaetae Im, TaeJin Lee, HyungJong Kim, and Dong Hoon Lee
Pacific-Rim Conference on Multimedia(PCM 2004), Lecture Notes in Computer Science 3331, pp. 564-571, 2004.10.서비스 현실화에 중점을 둔 인터넷 전자 투표 시스템
Rae Lee, and Dong Hoon Lee
Review of KIISC, VOL.14, NO.5, Oct. 2004Efficient Password-Based Group Key Exchange
Su Mi Lee, Jung Yeon Hwang, and Dong Hoon Lee
International Conference on Trust, Privacy and Security in Digital Business(TrustBus 2004), Lecture Notes in Computer Science 3184, pp. 191-199, 2004.08.Matching Connection Pairs
Hyung Woo Kang, Soon Jwa Hong, and Dong Hoon Lee
Parallel and Distributed Computing: Applications and Technologies(PDCAT 2004), Lecture Notes in Computer Science 3320, pp. 642-649, 2004.08.Scalable key exchange transformation : from two-party to group
Jung Yeon Hwang, Su Mi Lee, and Dong Hoon Lee
Electronics Letters, Vol. 40, No. 12, pp. 728-729, 2004.06.One-Round Protocols for Two-Party Authenticated Key Exchange
Ik Rae Jeong, Jonathan Katz, and Dong Hoon Lee
International Conference on Applied Cryptography and Network Security(ACNS 2004), Lecture Notes in Computer Science 3089, pp. 220-232, 2004.06.익명성을 보장하는 비대칭 공개키 공모자 추적 기법
Eun Young Choi, Dong Hoon Lee, and Dowon Hong
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.14, NO.3, Jun. 2004코드 서명 기술의 국내 PKI 적용 방안 비교 연구
Rae Lee, and Dong Hoon Lee
Review of KIISC, VOL.14, NO.3, Jun. 2004Efficient ID-based Group Key Agreement with Bilinear Maps
Kyu Young Choi, Jung Yeon Hwang, and Dong Hoon Lee
International Workshop on Public Key Cryptography(PKC 2004), Lecture Notes in Computer Science 2947, pp. 130-144, 2004.03.그룹서명을 이용하여 익명성이 보장되는 디지털 권한 전달 시스템
Hak Soo Ju, Dae Youb Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.14, NO.1, Feb. 2004
[2003]
Covert Channel Detection in the ICMP Payload Using Support Vector Machine
Taeshik Sohn, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim
International Symposium on Computer and Information Sciences(ISCIS 2003), Lecture Notes in Computer Science 2869, pp. 828-835, 2003.10.An anonymous asymmetric public key traitor tracing scheme
Eun Young Choi, Jung Yeon Hwang, and Dong Hoon Lee
International Conference on Electronic Commerce and Web Technologies(EC-Web 2003), Lecture Notes in Computer Science 2738, pp. 104-114, 2003.09.Scalable Group Key Management with Minimally Trusted Third Party
Su Mi Lee, Hyun Jeong Kim, Dong Hoon Lee, Jong In Lim, and Chang Seop Park
In 4th International Workshop on Information Security Applications, KIISC, pp. 575-583, 2003.08.상호인증서를 이용한 국제상호인증 모델 설계
Jae Jung Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.13, NO.4, Aug. 2003Digital Signature Schemes with Restriction on Signing Capability
Jung Yeon Hwang, Dong Hoon Lee, Hyun-Jeong Kim, and JongIn Lim
Australasian Conference on Information Security and Privacy(ACISP 2003), Lecture Notes in Computer Science 2727, pp. 324-335, 2003.06.공동으로만 Unsigncrypt할 수 있는 Signcryption 기법
Jae Hyung Koo, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.13, NO.2, Apr. 2003다중서버를 이용한 인증된 키교환 프로토콜
Jung Hyun Lee, Hyun Jeong Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.13, NO.1, Feb. 2003메시지 복구형 양자 서명 기법
Hwayean Lee, HyungJin Yang, Dong Hoon Lee, Sangjin Lee, and Jong In Lim
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.13, NO.1, Feb. 2003서로 다른 패스워드를 가진 사용자간의 패스워드 인증 키 교환 프로토콜
Jin Wook Byun, Ik Rae Jeong, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.13, NO.1, Feb. 2003
[2002]
Password Authenticated Key Exchange between Clients with Different Passwords
Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, and Chang-Seop Park
International Conference on Information and Communications Security(ICICS 2002), Lecture Notes in Computer Science 2513, pp. 134-146, 2002.12.블라인드 XTR-DSA 스킴을 이용해 블랙메일링을 막는 효율적인 방법
Hye Young Park, Dong Guk Han, Dong Hoon Lee, Sangjin Lee, and Jong In Lim
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.12, NO.6, Dec. 2002서명 능력을 제한하는 전자 서명 스킴
Jung Yeon Hwang, Dong Hoon Lee, and Jong In Lim
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.12, NO.6, Dec. 2002일방향 함수와 XOR을 이용한 효율적인 그룹키 관리 프로토콜: ELKH
Joung Ok Kwon, Jung Yeon Hwang, Hyun Jeong Kim, Dong Hoon Lee, and Jong In Lim
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.12, NO.6, Dec. 2002An anonymous buyer seller watermarking protocol with anonymity control
Hak Soo Ju, Hyun Jeong Kim, Dong Hoon Lee, and Jong In Lim
International Conference on Information Security and Cryptology(ICISC 2002), Lecture Notes in Computer Science 2587, pp. 421-432, 2002.11.Efficient Multicast Key Management for Stateless Receivers
Ju Hee Ki, Hyun Jeong Kim, Dong Hoon Lee, and Chang Seop Park
International Conference on Information Security and Cryptology(ICISC 2002), Lecture Notes in Computer Science 2587, pp. 497-509, 2002.11.Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption
Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, and Jong In Lim
International Conference on Information Security and Cryptology(ICISC 2002), Lecture Notes in Computer Science 2587, pp. 16-34, 2002.11.(online. 2003.03.)대학교를 대상으로 한 위협에 따른 손실의 수치화
Hyun Sook Rhee, Jin Wook Byun, Ju Hee Ki, Dong Hoon Lee, Jong In Lim, Young Woo park, Jae Suk Yun
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.12, NO.4, Aug. 2002Single machine MAD/Tmax problem with common due date
Sung A Cho, Chae-Bogk Kim, and Dong Hoon Lee
COMPUTERS & OPERATIONS RESEARCH, Vol.29 No.8, pp.1099-1113, 2002.07.Privacy Against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing
Hyun Jeong Kim, Dong Hoon Lee, and Moti Yung
Australasian Conference on Information Security and Privacy(ACISP 2002), Lecture Notes in Computer Science 2384, pp. 482-496, 2002.06.A Practical Approach Defeating Blackmailing
Dong-Guk Han, Hye-Young Park, Yong-Ho Park, Sangjin Lee, Dong Hoon Lee, and Hyung-Jing Yang
Australasian Conference on Information Security and Privacy(ACISP 2002), Lecture Notes in Computer Science 2384, pp. 464-481, 2002.06.FORTEZZA 카드의 사용자관리를 위한 보안정책
Hun No Lee, Su Mi Lee, Jung Hyun Lee, Yong Soo Kim, Tae Joo Jang, Dong Hoon Lee, and Jong In Lim
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.12, NO.1, Feb. 2002
[2001]
그룹 서명 기법에서의 효율적이고 안전한 구성원 탈퇴 방법
Hyun Jeong Kim, Jong In Lim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.11, NO.6, Dec. 2001Efficient Transferable Cash with Group Signatures
Ik Rae Jeong, Dong Hoon Lee, and Jong In Lim
International Conference on Information Security(ISC 2001), Lecture Notes in Computer Science 2200. pp. 462-474, 2001.11.Jointly Unsigncryptable Signcryption
Jae Hyung Koo, Hyun Jeong Kim, Ik Rae jeong, Dong Hoon Lee, and Jong In Lim
WISA2001 Vol 13, No. 2, pp. 397-407, 2001.11.Signcrpytion Schemes with Forward Secrecy
Hee Yun Jung, Dong Hoon Lee, Jong In Lim, and Kisik Chang
WISA2001 Vol. 2, pp. 463-475, 2001.11.Secure and Efficient Key management for Dynamic Multicast Groups
Chang-Seop Park, and Dong Hoon Lee
ACM SIGOPS Operating Systems Review, Vol. 35, No. 4, pp.32-38, 2001.10.무제한 사용자 탈퇴를 제공하는 효율적인 공모자 추적 기법
Hyun Jeong Kim, Jong In Lim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.11, NO.5, Oct. 2001Forward Secrecy를 제공하는 Signcryption 기법들
Hee Yun Jung, Dong Hoon Lee, and Jong In Lim
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.11, NO.5, Oct. 2001Efficient and secure member deletion in group signature schemes
Hyun Jeong Kim, Jong In Lim, and Dong Hoon Lee
International Conference on Information Security and Cryptology(ICISC 2000), Lecture Notes in Computer Science 2015, pp. 150-161, 2001.03.Minimizing Mean Squared Deviation of Completion Times with Maximum Tardiness Constraint
JongHwa Seo, Chae-Bogk Kim, and Dong Hoon Lee
European Journal of Operational Research, Vol. 129, No. 1, pp. 95-104, 2001.02.키 복구 기능을 가지는 키 공유 프로토콜의 안전성에 관한 연구
Dae Ho Kim, Sang Woo Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.11, NO.3, Jun. 2001
[2000]
Anonymity control in Multi-bank E-cash system
Ik Rae Jeong and Dong Hoon Lee
International Conference on Cryptology in India(INDOCRYPT 2000), Lecture Notes in Computer Science 1977, pp. 104-112, 2000.12.Witness Hiding Protocol
Dong Hoon Lee
한국정보과학회 컴퓨터이론연구회지, VOL.12, NO.1, Feb. 2000상호 증명 시스템
Dong Hoon Lee
한국정보과학회 컴퓨터이론연구회지, VOL.11, NO.1, Feb. 2000
[1999]
IMT-2000 인증 프로토콜 설계
Hyung Woo Kang, E Joong Yoon, Su Yoon Lee, Chang Seop Park, and Dong Hoon Lee
Journal of the Korea Information Processing Society, VOL.6, NO.8, pp. 2133-2144, 1999
[1998]
CDPD 무선 데이터 통신 시스템의 인증 프로토콜과 가입자 익명성
So Youn Lee, Hyobeom Ahn, Dong Hoon Lee, and Chang Seop Park
The Journal of Korean Institute of Communications and Information Sciences, VOL.23, NO.5, pp. 1260-1269, 1998최대 지연시간을 고려한 ET 모델에서의 단일 기계 일정계획
Sunga Cho, Coongho Cho, Dong Hoon Lee, and Chae Bogk Kim
Journal of The Korean Operations Research and Management Science Society, VOL.23, NO.1, pp. 29-41, 1998
[1997]
Minimizing Mean Squared Deviation of Completion Times with Maximum Tardiness Constraint
Dong Hoon Lee
1997 Japan-Korea Joint Workshop on Algorithms and Computation(WAAC 1997), 1997.07.An Efficient Algorithm for Fuzzy Weighted Average
Dae Hee Park and Dong Hoon Lee
Fuzzy Sets and System, Vol. 87, No. 1, pp. 39-45, 1997.04.제약을 가한 BNLC 그래프 문법들
Dong Hoon Lee
한국정보과학회 논문지(A), 24권, 11호, pp. 1137-1144, 1997.11.Lin-NLC 변형들
Dong Hoon Lee
한국정보과학회 논문지(A), 24권, 10호, pp. 961-970, 1997.안전한 Kerberos 인증메커니즘 설계
Sung A Jo, Tae Chang Han, Su Yeon Lee, and Dong Hoon Lee
Journal of the Korea Information Processing Society, VOL.4, NO.2, pp. 66-73, 1997ET 모델에서 절대 편차를 최소화하는 스케쥴링
Dong Hoon Lee
한국정보과학회 컴퓨터이론연구회지, VOL.8, NO.1, 1997
[1996]
Branch and bound algorithm for the facility layout problem without shape distortion
Chae Bogk Kim, Yunsik Kim, and Dong Hoon Lee
Journal of the Korean OR/ MS Society, Vol. 21, No. 2, Aug. 1996
[1995]
Properties of NLC Graph Languages Squeezed with Bipartite Graphs
Dong Hoon Lee
Information Processing Society of Japan(IPSJ), Notes Vol. 46, No. 2, pp. 9-15, 1995.12.Node Replacement Graph Languages Squeezed with Chains, Trees, and Forests
Changwook Kim and Dong Hoon Lee
Information and Computation, Vol. 117, No. 1, pp. 63-77, 1995.02.노드 대체 그래프 언어들의 그래프 이론적 성질들
Dong Hoon Lee
Journal of the Korean Institute of Information Scientists and Engineers, VOL.22, NO.7, 1995
[1993]
Separating k-separated eNCE graph languages
Changwook Kim and Dong Hoon Lee
Theoretical Computer Science, Vol. 120, pp. 247-259, 1993.11.그래프 문법에 대하여
Dong Hoon Lee
한국정보과학회 컴퓨터이론연구회지, VOL.4, NO.3, 1993