Calculated based on number of publications stored in Pure and citations from Scopus
1993 …2023

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2023

    Recovering Yaw Rate from Signal Injection Attack to Protect RV’s Direction

    Cho, H., Lee, S., Choi, W. & Lee, D. H., 2023, Information Security Applications - 23rd International Conference, WISA 2022, Revised Selected Papers. You, I. & Youn, T-Y. (eds.). Springer Science and Business Media Deutschland GmbH, p. 171-184 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13720 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2021

    Anonymous IBE from PEKS: A Generic Construction

    Rhee, H. S. & Lee, D. H., 2021, Information Security Applications - 22nd International Conference, WISA 2021, Revised Selected Papers. Kim, H. (ed.). Springer Science and Business Media Deutschland GmbH, p. 105-118 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13009 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Prof-gen: Practical Study on System Call Whitelist Generation for Container Attack Surface Reduction

    Kim, S., Kim, B. J. & Lee, D. H., 2021 Sept, Proceedings - 2021 IEEE 14th International Conference on Cloud Computing, CLOUD 2021. Ardagna, C. A., Chang, C. K., Daminai, E., Ranjan, R., Wang, Z., Ward, R., Zhang, J. & Zhang, W. (eds.). IEEE Computer Society, p. 278-287 10 p. (IEEE International Conference on Cloud Computing, CLOUD; vol. 2021-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Usable User Authentication on a Smartwatch using Vibration

    Lee, S., Choi, W. & Lee, D. H., 2021 Nov 12, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 304-319 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Citations (Scopus)
  • 2019

    Poster: How to securely record logs based on ARM trust zone

    Lee, S., Jo, H. J., Choi, W. & Lee, D. H., 2019 Jul 2, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 664-666 3 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Citations (Scopus)
  • Vehicle communication using secrecy capacity

    Ahn, N. Y., Lee, D. & Oh, S. J., 2019, Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2. Kapoor, S., Arai, K. & Bhatia, R. (eds.). Springer Verlag, p. 158-172 15 p. (Advances in Intelligent Systems and Computing; vol. 881).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • VODKA: Virtualization obfuscation using dynamic key approach

    Lee, J. Y., Suk, J. H. & Lee, D. H., 2019, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2018

    Forward secure searchable encryption using key-based blocks chain technique

    Lv, S., Huang, Y., Li, B., Wei, Y., Liu, Z., Liu, J. K. & Lee, D. H., 2018, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Vaidya, J. & Li, J. (eds.). Springer Verlag, p. 85-97 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11337 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Recipient revocable broadcast encryption with dealership

    Kim, J. S., Lee, Y., Eom, J. & Lee, D. H., 2018, Information Security and Cryptology - ICISC 2017 - 20th International Conference, Revised Selected Papers. Kim, D-C. & Kim, H. (eds.). Springer Verlag, p. 214-228 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10779 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Update state tampering: A novel adversary post-compromise technique on cyber threats

    Kim, S. J., Kim, B. J., Kim, H. C. & Lee, D. H., 2018 Jan 1, Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Proceedings. Springer Verlag, p. 141-161 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10885 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • WheelLogger: Driver Tracing Using Smart Watch

    Park, J. Y., Yun, J. P. & Lee, D. H., 2018, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 87-100 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2017

    A privacy-preserving data sharing solution for mobile healthcare

    Huang, C., Yan, K., Wei, S. & Lee, D. H., 2017, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 260-265 6 p. (Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Efficient anonymous attribute-based encryption with access policy hidden for cloud computing

    Huang, C., Yan, K., Wei, S., Zhang, G. & Lee, D. H., 2017, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 266-270 5 p. (Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • POSTER: Secure infotainment infrastructure of connected car

    Eun, C., Moon, J., Jung, I. Y., Lee, D., Park, J. & Kim, E., 2017 Jul 18, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 267-268 2 p. (Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2016

    BadVoice: Soundless voice-control replay attack on modern smartphones

    Young, P. J., Jin, J. H., Woo, S. & Lee, D. H., 2016 Aug 9, ICUFN 2016 - 8th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 882-887 6 p. 7537163. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2016-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Keyword updatable PEKS

    Rhee, H. S. & Lee, D. H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 96-109 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Unbounded hierarchical identity-based encryption with efficient revocation

    Ryu, G., Lee, K., Park, S. & Lee, D. H., 2016, Information Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers. Choi, D. & Kim, H-W. (eds.). Springer Verlag, p. 122-133 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • 2015

    An efficient ID-based mutual authentication secure against privileged-insider attack

    Kim, S. Y., Kim, H. & Lee, D. H., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292941

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • An improved fuzzy attribute-based authentication

    Yun, J. P., Kim, H. & Lee, D. H., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292946. (2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Forward secure non-interactive key exchange from indistinguishability obfuscation

    Lee, Y. K. & Lee, D. H., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292984. (2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Self-certified privacy-preserving scheme for vehicle-to-vehicle communications

    Cho, K., Lee, B. G. & Lee, D. H., 2015 Jan 1, Lecture Notes in Electrical Engineering. Springer Verlag, Vol. 330. p. 335-341 7 p. (Lecture Notes in Electrical Engineering; vol. 330).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2014

    Public-key revocation and tracing schemes with subset difference methods revisited

    Lee, K., Koo, W. K., Lee, D. H. & Park, J. H., 2014 Jan 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Springer Verlag, Vol. 8713 LNCS. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8713 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • 2013

    A framework for anomaly pattern recognition in electronic financial transaction using moving average method

    Kim, A. C., Park, W. H. & Lee, D. H., 2013, IT Convergence and Security 2012. p. 93-99 7 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Aggregating CL-signatures revisited: Extended functionality and better efficiency

    Lee, K., Lee, D. H. & Yung, M., 2013, Financial Cryptography and Data Security - 17th International Conference, FC 2013, Revised Selected Papers. p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • Attribute-based encryption for commercial content distribution

    Kim, H., Park, S., Park, J. H. & Lee, D. H., 2013, IT Convergence and Security 2012. p. 205-213 9 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Predictability of Android OpenSSL's pseudo random number generator

    Kim, S. H., Han, D. & Lee, D. H., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 659-668 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    41 Citations (Scopus)
  • Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

    Lee, K., Choi, S. G., Lee, D. H., Park, J. H. & Yung, M., 2013, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 1 ed. p. 235-254 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8269 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Citations (Scopus)
  • Sequential aggregate signatures made shorter

    Lee, K., Lee, D. H. & Yung, M., 2013, Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Proceedings. p. 202-217 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7954 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Sequential aggregate signatures with short public keys: Design, analysis and implementation studies

    Lee, K., Lee, D. H. & Yung, M., 2013, Public-Key Cryptography, PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. p. 423-442 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7778 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • 2012

    A study on static analysis model of mobile application for privacy protection

    Kim, S., Cho, J. I., Myeong, H. W. & Lee, D. H., 2012, Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings. p. 529-540 12 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks

    Cho, K. & Lee, D. H., 2012, Information Security Applications - 12th International Workshop, WISA 2011, Revised Selected Papers. p. 203-218 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7115 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Threshold identity-based broadcast encryption from identity-based encryption

    Kim, K., Kim, M., Kim, H., Park, J. H. & Lee, D. H., 2012, Computer Applications for Database, Education, and Ubiquitous Computing - Int. Conferences, EL, DTA and UNESST 2012, Held as Part of the Future Generation Information Technol. Conf., FGIT 2012, Proc.. p. 99-102 4 p. (Communications in Computer and Information Science; vol. 352 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    An efficient implementation of block cipher in Android platform

    Paik, J. H., Seo, S. C., Kim, Y., Lee, H. J., Jung, H. C. & Lee, D. H., 2011, Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011. p. 173-176 4 p. 5992211. (Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An efficient implementation of KCDSA on Graphic Processing Units

    Seo, S. C., Paik, J. H., Lee, D. H., Hong, S., Lee, H. J. & Jung, H. C., 2011, Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011. p. 167-172 6 p. 5992210. (Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Extended fingerprint-based user authentication scheme using smart cards in education IPTV

    Jun, E. A., Kim, J. G., Jung, S. W. & Lee, D. H., 2011, 2011 International Conference on Information Science and Applications, ICISA 2011. 5772392. (2011 International Conference on Information Science and Applications, ICISA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • On a security model for a retrieval system over encrypted database

    Park, H. A., Byun, J. W., Park, J. H. & Lee, D. H., 2011, Proceedings - 7th International Conference on Information Processing and Management, ICIPM 2011. p. 76-82 7 p. 6222138. (Proceedings - 7th International Conference on Information Processing and Management, ICIPM 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Privacy-enhanced deniable authentication e-mail service

    Ki, J. H., Yeong Hwang, J., Nyang, D. H., Hoon Lee, D. & Lim, J., 2011, Digital Enterprise and Information Systems - International Conference, DEIS 2011, Proceedings. p. 16-29 14 p. (Communications in Computer and Information Science; vol. 194 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2010

    A fingerprint-based user authentication scheme using smart cards in IPTV environments

    Jun, E. A., Rhee, H. S., Jung, S. W. & Lee, D. H., 2010, 2010 International Conference on Information Science and Applications, ICISA 2010. 5480301. (2010 International Conference on Information Science and Applications, ICISA 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Toward an integrated system between cloud computing and smartcard application

    Park, H. A., Park, J. H., Choi, J. T. & Lee, D. H., 2010, Proceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010. p. 580-587 8 p. 5711122. (Proceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2009

    Developing a multi-protocol mobility manager for SIP/SS7 networks

    Park, H. S., Lee, H. W., Park, S. J. & Lee, D. H., 2009, Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009. p. 565-570 6 p. 5066842. (Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Improved searchable public key encryption with designated tester

    Rhee, H. S., Park, J. H., Susilo, W. & Lee, D. H., 2009, Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09. p. 376-379 4 p. (Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    132 Citations (Scopus)
  • Practical access control protocol for secure sensor networks

    Hwaseong, L., Kilho, S. & Dong, H. L., 2009, 2009 IEEE 13th International Symposium on Consumer Electronics, ISCE 2009. p. 806-809 4 p. 5157056. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Security authentication for U-health application services

    Ahn, B. H., Hong, J. & Lee, D., 2009, Communication and Networking: International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Pro. Slezak, D., Kim, T., Chang, A. C-C., Vasilakos, T., Li, M. & Sakurai, K. (eds.). p. 17-24 8 p. (Communications in Computer and Information Science; vol. 56).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security enhancing compiler for localization schemes in pervasive sensor networks

    Chun, J. Y., Kim, Y. H., Hwang, J. Y. & Lee, D. H., 2009, Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009. p. 307-312 6 p. 5222880. (Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Universal forgery of the identity-based sequential aggregate signature scheme

    Hwang, J. Y., Lee, D. H. & Yung, M., 2009, Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09. p. 157-160 4 p. (Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    33 Citations (Scopus)
  • 2008

    A3RP: Anonymous and authenticated ad hoc routing protocol

    Paik, J. H., Kim, B. H. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 67-72 6 p. 4511536. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • A key distribution scheme for wireless sensor networks

    Kim, Y. H., Lee, H. & Lee, D. H., 2008, 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008. p. 572-577 6 p. 4517458. (6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • An efficient key establishment scheme for self-organizing sensor networks

    Kim, Y. H., Choi, K. Y., Lim, J. & Lee, D. H., 2008, Distributed Computing and Networking - 9th International Conference, ICDCN 2008, Proceedings. Springer Verlag, p. 345-349 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4904 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A new public key broadcast encryption using Boneh-Boyen-Goh's HIBE scheme

    Park, J. H. & Lee, D. H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. p. 101-115 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Anonymous and traceable authentication scheme using smart cards

    Kim, S., Rhee, H. S., Chun, J. Y. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 162-165 4 p. 4511555. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)