The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dong Hoon Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyungjin Yang
    A Practical Approach Defeating Blackmailing. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:464-481 [Conf]
  2. Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, In Seog Seo
    ID-based Authenticated Key Agreement for Low-Power Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:494-505 [Conf]
  3. Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim
    Digital Signature Schemes with Restriction on Signing Capability. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:324-335 [Conf]
  4. Hyun-Jeong Kim, Dong Hoon Lee, Moti Yung
    Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:482-496 [Conf]
  5. Jin Wook Byun, Dong Hoon Lee
    N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:75-90 [Conf]
  6. Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
    One-Round Protocols for Two-Party Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:220-232 [Conf]
  7. Yong Ho Kim, Mu Hyun Kim, Dong Hoon Lee, Changwook Kim
    A Key Management Scheme for Commodity Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2005, pp:113-126 [Conf]
  8. Jong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang
    Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. [Citation Graph (0, 0)][DBLP]
    AINA, 2007, pp:311-316 [Conf]
  9. Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Haeryong Park, Kilsoo Chun
    Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption. [Citation Graph (0, 0)][DBLP]
    APWeb, 2006, pp:720-725 [Conf]
  10. Jin Wook Byun, Dong Hoon Lee, Jongin Lim
    Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    APWeb, 2006, pp:830-836 [Conf]
  11. Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee
    Constant-Round Authenticated Group Key Exchange for Dynamic Groups. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:245-259 [Conf]
  12. Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee
    A Diffie-Hellman Key Exchange Protocol Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:37-54 [Conf]
  13. Sang Heon Han, Jung Hoon Kim, Tae Soo Yun, Dong Hoon Lee
    Extensible Interface Using Projector-Based Augmentation. [Citation Graph (0, 0)][DBLP]
    CGVR, 2006, pp:132-137 [Conf]
  14. Chang Ok Yun, Sang Heon Han, Tae Soo Yun, Dong Hoon Lee
    Development of Stereoscopic Image Editing Tool using Image-Based Modeling. [Citation Graph (0, 0)][DBLP]
    CGVR, 2006, pp:42-48 [Conf]
  15. Jin Wook Byun, Dong Hoon Lee, Jongin Lim
    Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:143-148 [Conf]
  16. Dong Hoon Lee, Kyung Ho Jang, Soon Ki Jung
    Intrinsic Camera Calibration Based on Radical Center Estimation. [Citation Graph (0, 0)][DBLP]
    CISST, 2004, pp:7-13 [Conf]
  17. Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee
    One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:87-96 [Conf]
  18. Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
    Generic Transformation for Scalable Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:276-292 [Conf]
  19. Dong Hoon Lee, Soon Ki Jung
    Capture Configuration for Image-Based Street Walkthroughs. [Citation Graph (0, 0)][DBLP]
    CW, 2003, pp:151-157 [Conf]
  20. Dong Hoon Lee, Soon Ki Jung
    Delaunay Triangles Model for Image-Based Motion Retargeting. [Citation Graph (0, 0)][DBLP]
    DEFORM/AVATARS, 2000, pp:158-168 [Conf]
  21. Eun Young Choi, Jung Yeon Hwang, Dong Hoon Lee
    An Anonymous Asymmetric Public Key Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2003, pp:104-114 [Conf]
  22. Eun Young Choi, Su-Mi Lee, Dong Hoon Lee
    Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:945-954 [Conf]
  23. Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee
    Authenticated Public Key Distribution Scheme Without Trusted Third Party. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:926-935 [Conf]
  24. Nam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo
    One-Way Chain Based Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:559-574 [Conf]
  25. Jin Wook Byun, Dong Hoon Lee, Jongin Lim
    Efficient Conjunctive Keyword Search on Encrypted Data Storage System. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:184-196 [Conf]
  26. Dong Hoon Lee, Soon Ki Jung
    Computer Vision-Assisted Interaction in X3D Virtual Environment on WWW. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet 2003, 2003, pp:332-340 [Conf]
  27. Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee
    Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (1), 2006, pp:977-980 [Conf]
  28. Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun
    Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:381-390 [Conf]
  29. Hyungwoo Kang, Kibom Kim, Soon Jwa Hong, Dong Hoon Lee
    A Model for Security Vulnerability Pattern. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:385-394 [Conf]
  30. Su-Mi Lee, Young Ju Hwang, Dong Hoon Lee, Jong In Lim
    Efficient Authentication for Low-Cost RFID Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2005, pp:619-627 [Conf]
  31. Jeong Su Park, Su-Mi Lee, Eun Young Choi, Dong Hoon Lee
    Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:316-325 [Conf]
  32. Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, Chang-Seop Park
    Password-Authenticated Key Exchange between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:134-146 [Conf]
  33. Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim
    Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:16-34 [Conf]
  34. Hak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim
    An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:421-432 [Conf]
  35. Ju Hee Ki, Hyun-Jeong Kim, Dong Hoon Lee, Chang-Seop Park
    Efficient Multicast Key Management for Stateless Receivers. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:497-509 [Conf]
  36. Hyun-Jeong Kim, Jong In Lim, Dong Hoon Lee
    Efficient and Secure Member Deletion in Group Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:150-161 [Conf]
  37. GangShin Lee, Heeran Lim, Manpyo Hong, Dong Hoon Lee
    A Dynamic Path Identification Mechanism to Defend Against DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:806-813 [Conf]
  38. Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee, Jongin Lim
    A Key Management Scheme for Large Scale Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PWC, 2006, pp:437-446 [Conf]
  39. Ik Rae Jeong, Dong Hoon Lee
    Anonymity Control in Multi-bank E-Cash System. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:104-116 [Conf]
  40. Taeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim
    Covert Channel Detection in the ICMP Payload Using Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2003, pp:828-835 [Conf]
  41. Ik Rae Jeong, Dong Hoon Lee, Jong In Lim
    Efficient Transferable Cash with Group Signatures. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:462-474 [Conf]
  42. Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee
    Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:322-336 [Conf]
  43. Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun
    Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:453-459 [Conf]
  44. Jae Hyung Koo, Dong Hoon Lee
    Secure Password Pocket for Distributed Web Services. [Citation Graph (0, 0)][DBLP]
    NPC, 2005, pp:327-334 [Conf]
  45. Bo Man Kim, Kyu Young Choi, Dong Hoon Lee
    Disaster Coverable PKI Model Utilizing the Existing PKI Structure. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:537-545 [Conf]
  46. Kyoung Hyun Kim, Eun Young Choi, Su-Mi Lee, Dong Hoon Lee
    Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:362-371 [Conf]
  47. GangShin Lee, Chaetae Im, TaeJin Lee, Hyungjong Kim, Dong Hoon Lee
    SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability. [Citation Graph (0, 0)][DBLP]
    PCM (1), 2004, pp:564-571 [Conf]
  48. Hyung Woo Kang, Soon Jwa Hong, Dong Hoon Lee
    Matching Connection Pairs. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:642-649 [Conf]
  49. Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee
    Efficient ID-based Group Key Agreement with Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:130-144 [Conf]
  50. Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, Dong Hoon Lee
    Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:75-83 [Conf]
  51. Hyun Sook Rhee, Ik Rae Jeong, Jin Wook Byun, Dong Hoon Lee
    Difference Set Attacks on Conjunctive Keyword Search Schemes. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:64-74 [Conf]
  52. Jin Wook Byun, Su-Mi Lee, Dong Hoon Lee, Dowon Hong
    Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:3-17 [Conf]
  53. Eun Young Choi, Hyun-Jeong Kim, Dong Hoon Lee
    Efficient Member Revocation in Group Signature Schemes. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:195-205 [Conf]
  54. Su-Mi Lee, Jung Yeon Hwang, Dong Hoon Lee
    Efficient Password-Based Group Key Exchange. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:191-199 [Conf]
  55. Hyun-A Park, Jin Wook Byun, Dong Hoon Lee
    Secure Index Search for Groups. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:128-140 [Conf]
  56. Sang-Hun Nam, Dong Hoon Lee, Jang-Hwan Im, Young-Ho Chai
    Dual projection-based VR system for the light weight motion-based driving simulator. [Citation Graph (0, 0)][DBLP]
    VRST, 2000, pp:195-198 [Conf]
  57. Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jongin Lim
    Oblivious Conjunctive Keyword Search. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:318-327 [Conf]
  58. Jong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang
    Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:1233-1238 [Conf]
  59. Sung A. Cho, Chae-Bogk Kim, Dong Hoon Lee
    Single machine MAD/Tmax problem with a common due date. [Citation Graph (0, 0)][DBLP]
    Computers & OR, 2002, v:29, n:8, pp:1099-1113 [Journal]
  60. Changwook Kim, Dong Hoon Lee
    Node Replacement Graph Languages Squeezed with Chains, Trees, and Forests [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1995, v:117, n:1, pp:63-77 [Journal]
  61. Kyung Ho Jang, Dong Hoon Lee, Soon Ki Jung
    A moving planar mirror based approach for cultural reconstruction. [Citation Graph (0, 0)][DBLP]
    Journal of Visualization and Computer Animation, 2004, v:15, n:3-4, pp:415-423 [Journal]
  62. Dong Hoon Lee, Soon Ki Jung
    Multiple path-based approach to image-based street walkthrough. [Citation Graph (0, 0)][DBLP]
    Journal of Visualization and Computer Animation, 2005, v:16, n:2, pp:85-95 [Journal]
  63. Chang-Seop Park, Dong Hoon Lee
    Secure and Efficient Key Management for Dynamic Multicast Groups. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2001, v:35, n:4, pp:32-38 [Journal]
  64. Jung Hee Cheon, Dong Hoon Lee
    Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2006, v:55, n:12, pp:1536-1542 [Journal]
  65. Changwook Kim, Dong Hoon Lee
    Separating k-Separated eNCE Graph Languages. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1993, v:120, n:2, pp:247-259 [Journal]
  66. Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee
    Efficient Certificateless Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:443-458 [Conf]
  67. Mi-Yeon Kim, Misook Lim, Jin-Soo Sohn, Dong Hoon Lee
    Security and Handover Designs for VoWLAN System. [Citation Graph (0, 0)][DBLP]
    APNOMS, 2007, pp:447-456 [Conf]
  68. Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jongin Lim
    Classification of Key Management Schemes for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM Workshops, 2007, pp:664-673 [Conf]
  69. Yong Ho Kim, Hwaseong Lee, Jong Hyuk Park, Laurence Tianruo Yang, Dong Hoon Lee
    Key Establishment Scheme for Sensor Networks with Low Communication Cost. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:441-448 [Conf]
  70. Jong Hwan Park, Dong Hoon Lee
    Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:94-109 [Conf]
  71. Joon Wan Kim, Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee
    A Practical Inter-sensor Broadcast Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    HCI (5), 2007, pp:399-405 [Conf]
  72. Moon Jeong Kim, Dong Hoon Lee, Young Ik Eom
    Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1187-1196 [Conf]
  73. Su-Mi Lee, Su Youn Lee, Dong Hoon Lee
    Efficient Group Key Agreement for Dynamic TETRA Networks. [Citation Graph (0, 0)][DBLP]
    SOFSEM (1), 2007, pp:400-409 [Conf]
  74. Eun Young Choi, Su-Mi Lee, Dong Hoon Lee
    Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:1171-1180 [Conf]
  75. Hyungwoo Kang, Dong Hoon Lee
    Security Assessment for Application Network Services Using Fault Injection. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:172-183 [Conf]
  76. Hyun-A Park, Dong Hoon Lee, Jongin Lim, Sang Hyun Cho
    PPIDS: Privacy Preserving Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:269-274 [Conf]
  77. Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee
    Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). [Citation Graph (0, 0)][DBLP]
    Pairing, 2007, pp:60-82 [Conf]
  78. Jin Wook Byun, Dong Hoon Lee, Jong In Lim
    EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:19, pp:3995-4013 [Journal]

  79. Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks. [Citation Graph (, )][DBLP]


  80. Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06. [Citation Graph (, )][DBLP]


  81. Improved searchable public key encryption with designated tester. [Citation Graph (, )][DBLP]


  82. Universal forgery of the identity-based sequential aggregate signature scheme. [Citation Graph (, )][DBLP]


  83. A Transformation Scheme for Interconnection Networks. [Citation Graph (, )][DBLP]


  84. Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database. [Citation Graph (, )][DBLP]


  85. Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. [Citation Graph (, )][DBLP]


  86. Privacy-Aware Access Control through Negotiation in Daily Life Service. [Citation Graph (, )][DBLP]


  87. Efficient keyword index search over encrypted documents of groups. [Citation Graph (, )][DBLP]


  88. A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. [Citation Graph (, )][DBLP]


  89. Bogus Data Filtering in Sensor Networks. [Citation Graph (, )][DBLP]


  90. A Key Distribution Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  91. Secure Similarity Search. [Citation Graph (, )][DBLP]


  92. Attribute-based Access Control using Combined Authentication Technologies. [Citation Graph (, )][DBLP]


  93. An Efficient Key Establishment Scheme for Self-organizing Sensor Networks. [Citation Graph (, )][DBLP]


  94. Developing a Multi-Protocol Mobility Manager for SIP/SS7 Networks. [Citation Graph (, )][DBLP]


  95. Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity. [Citation Graph (, )][DBLP]


  96. Multi-protocol authentication for SIP/SS7 mobile network. [Citation Graph (, )][DBLP]


  97. Security weakness in an authenticated group key agreement protocol in two rounds. [Citation Graph (, )][DBLP]


  98. An authentication scheme for filtering injected bogus data in sensor networks. [Citation Graph (, )][DBLP]


  99. Constructing PEKS schemes secure against keyword guessing attacks is possible? [Citation Graph (, )][DBLP]


  100. Key agreement for key hypergraph. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.612secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002