|
Search the dblp DataBase
Dong Hoon Lee:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyungjin Yang
A Practical Approach Defeating Blackmailing. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:464-481 [Conf]
- Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, In Seog Seo
ID-based Authenticated Key Agreement for Low-Power Mobile Devices. [Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:494-505 [Conf]
- Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim
Digital Signature Schemes with Restriction on Signing Capability. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:324-335 [Conf]
- Hyun-Jeong Kim, Dong Hoon Lee, Moti Yung
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:482-496 [Conf]
- Jin Wook Byun, Dong Hoon Lee
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:75-90 [Conf]
- Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
One-Round Protocols for Two-Party Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:220-232 [Conf]
- Yong Ho Kim, Mu Hyun Kim, Dong Hoon Lee, Changwook Kim
A Key Management Scheme for Commodity Sensor Networks. [Citation Graph (0, 0)][DBLP] ADHOC-NOW, 2005, pp:113-126 [Conf]
- Jong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang
Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. [Citation Graph (0, 0)][DBLP] AINA, 2007, pp:311-316 [Conf]
- Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Haeryong Park, Kilsoo Chun
Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption. [Citation Graph (0, 0)][DBLP] APWeb, 2006, pp:720-725 [Conf]
- Jin Wook Byun, Dong Hoon Lee, Jongin Lim
Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. [Citation Graph (0, 0)][DBLP] APWeb, 2006, pp:830-836 [Conf]
- Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee
Constant-Round Authenticated Group Key Exchange for Dynamic Groups. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2004, pp:245-259 [Conf]
- Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee
A Diffie-Hellman Key Exchange Protocol Without Random Oracles. [Citation Graph (0, 0)][DBLP] CANS, 2006, pp:37-54 [Conf]
- Sang Heon Han, Jung Hoon Kim, Tae Soo Yun, Dong Hoon Lee
Extensible Interface Using Projector-Based Augmentation. [Citation Graph (0, 0)][DBLP] CGVR, 2006, pp:132-137 [Conf]
- Chang Ok Yun, Sang Heon Han, Tae Soo Yun, Dong Hoon Lee
Development of Stereoscopic Image Editing Tool using Image-Based Modeling. [Citation Graph (0, 0)][DBLP] CGVR, 2006, pp:42-48 [Conf]
- Jin Wook Byun, Dong Hoon Lee, Jongin Lim
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:143-148 [Conf]
- Dong Hoon Lee, Kyung Ho Jang, Soon Ki Jung
Intrinsic Camera Calibration Based on Radical Center Estimation. [Citation Graph (0, 0)][DBLP] CISST, 2004, pp:7-13 [Conf]
- Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2006, pp:87-96 [Conf]
- Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
Generic Transformation for Scalable Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:276-292 [Conf]
- Dong Hoon Lee, Soon Ki Jung
Capture Configuration for Image-Based Street Walkthroughs. [Citation Graph (0, 0)][DBLP] CW, 2003, pp:151-157 [Conf]
- Dong Hoon Lee, Soon Ki Jung
Delaunay Triangles Model for Image-Based Motion Retargeting. [Citation Graph (0, 0)][DBLP] DEFORM/AVATARS, 2000, pp:158-168 [Conf]
- Eun Young Choi, Jung Yeon Hwang, Dong Hoon Lee
An Anonymous Asymmetric Public Key Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP] EC-Web, 2003, pp:104-114 [Conf]
- Eun Young Choi, Su-Mi Lee, Dong Hoon Lee
Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:945-954 [Conf]
- Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee
Authenticated Public Key Distribution Scheme Without Trusted Third Party. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:926-935 [Conf]
- Nam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo
One-Way Chain Based Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:559-574 [Conf]
- Jin Wook Byun, Dong Hoon Lee, Jongin Lim
Efficient Conjunctive Keyword Search on Encrypted Data Storage System. [Citation Graph (0, 0)][DBLP] EuroPKI, 2006, pp:184-196 [Conf]
- Dong Hoon Lee, Soon Ki Jung
Computer Vision-Assisted Interaction in X3D Virtual Environment on WWW. [Citation Graph (0, 0)][DBLP] Human.Society@Internet 2003, 2003, pp:332-340 [Conf]
- Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee
Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (1), 2006, pp:977-980 [Conf]
- Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun
Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:381-390 [Conf]
- Hyungwoo Kang, Kibom Kim, Soon Jwa Hong, Dong Hoon Lee
A Model for Security Vulnerability Pattern. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:385-394 [Conf]
- Su-Mi Lee, Young Ju Hwang, Dong Hoon Lee, Jong In Lim
Efficient Authentication for Low-Cost RFID Systems. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2005, pp:619-627 [Conf]
- Jeong Su Park, Su-Mi Lee, Eun Young Choi, Dong Hoon Lee
Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System. [Citation Graph (0, 0)][DBLP] ICCSA (4), 2006, pp:316-325 [Conf]
- Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, Chang-Seop Park
Password-Authenticated Key Exchange between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP] ICICS, 2002, pp:134-146 [Conf]
- Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. [Citation Graph (0, 0)][DBLP] ICISC, 2002, pp:16-34 [Conf]
- Hak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim
An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. [Citation Graph (0, 0)][DBLP] ICISC, 2002, pp:421-432 [Conf]
- Ju Hee Ki, Hyun-Jeong Kim, Dong Hoon Lee, Chang-Seop Park
Efficient Multicast Key Management for Stateless Receivers. [Citation Graph (0, 0)][DBLP] ICISC, 2002, pp:497-509 [Conf]
- Hyun-Jeong Kim, Jong In Lim, Dong Hoon Lee
Efficient and Secure Member Deletion in Group Signature Schemes. [Citation Graph (0, 0)][DBLP] ICISC, 2000, pp:150-161 [Conf]
- GangShin Lee, Heeran Lim, Manpyo Hong, Dong Hoon Lee
A Dynamic Path Identification Mechanism to Defend Against DDoS Attacks. [Citation Graph (0, 0)][DBLP] ICOIN, 2005, pp:806-813 [Conf]
- Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee, Jongin Lim
A Key Management Scheme for Large Scale Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP] PWC, 2006, pp:437-446 [Conf]
- Ik Rae Jeong, Dong Hoon Lee
Anonymity Control in Multi-bank E-Cash System. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2000, pp:104-116 [Conf]
- Taeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim
Covert Channel Detection in the ICMP Payload Using Support Vector Machine. [Citation Graph (0, 0)][DBLP] ISCIS, 2003, pp:828-835 [Conf]
- Ik Rae Jeong, Dong Hoon Lee, Jong In Lim
Efficient Transferable Cash with Group Signatures. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:462-474 [Conf]
- Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. [Citation Graph (0, 0)][DBLP] IWSEC, 2006, pp:322-336 [Conf]
- Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun
Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. [Citation Graph (0, 0)][DBLP] KES (2), 2005, pp:453-459 [Conf]
- Jae Hyung Koo, Dong Hoon Lee
Secure Password Pocket for Distributed Web Services. [Citation Graph (0, 0)][DBLP] NPC, 2005, pp:327-334 [Conf]
- Bo Man Kim, Kyu Young Choi, Dong Hoon Lee
Disaster Coverable PKI Model Utilizing the Existing PKI Structure. [Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2006, pp:537-545 [Conf]
- Kyoung Hyun Kim, Eun Young Choi, Su-Mi Lee, Dong Hoon Lee
Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems. [Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2006, pp:362-371 [Conf]
- GangShin Lee, Chaetae Im, TaeJin Lee, Hyungjong Kim, Dong Hoon Lee
SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability. [Citation Graph (0, 0)][DBLP] PCM (1), 2004, pp:564-571 [Conf]
- Hyung Woo Kang, Soon Jwa Hong, Dong Hoon Lee
Matching Connection Pairs. [Citation Graph (0, 0)][DBLP] PDCAT, 2004, pp:642-649 [Conf]
- Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee
Efficient ID-based Group Key Agreement with Bilinear Maps. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2004, pp:130-144 [Conf]
- Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, Dong Hoon Lee
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2006, pp:75-83 [Conf]
- Hyun Sook Rhee, Ik Rae Jeong, Jin Wook Byun, Dong Hoon Lee
Difference Set Attacks on Conjunctive Keyword Search Schemes. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2006, pp:64-74 [Conf]
- Jin Wook Byun, Su-Mi Lee, Dong Hoon Lee, Dowon Hong
Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP] SPC, 2006, pp:3-17 [Conf]
- Eun Young Choi, Hyun-Jeong Kim, Dong Hoon Lee
Efficient Member Revocation in Group Signature Schemes. [Citation Graph (0, 0)][DBLP] TrustBus, 2005, pp:195-205 [Conf]
- Su-Mi Lee, Jung Yeon Hwang, Dong Hoon Lee
Efficient Password-Based Group Key Exchange. [Citation Graph (0, 0)][DBLP] TrustBus, 2004, pp:191-199 [Conf]
- Hyun-A Park, Jin Wook Byun, Dong Hoon Lee
Secure Index Search for Groups. [Citation Graph (0, 0)][DBLP] TrustBus, 2005, pp:128-140 [Conf]
- Sang-Hun Nam, Dong Hoon Lee, Jang-Hwan Im, Young-Ho Chai
Dual projection-based VR system for the light weight motion-based driving simulator. [Citation Graph (0, 0)][DBLP] VRST, 2000, pp:195-198 [Conf]
- Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jongin Lim
Oblivious Conjunctive Keyword Search. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:318-327 [Conf]
- Jong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang
Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. [Citation Graph (0, 0)][DBLP] MUE, 2007, pp:1233-1238 [Conf]
- Sung A. Cho, Chae-Bogk Kim, Dong Hoon Lee
Single machine MAD/Tmax problem with a common due date. [Citation Graph (0, 0)][DBLP] Computers & OR, 2002, v:29, n:8, pp:1099-1113 [Journal]
- Changwook Kim, Dong Hoon Lee
Node Replacement Graph Languages Squeezed with Chains, Trees, and Forests [Citation Graph (0, 0)][DBLP] Inf. Comput., 1995, v:117, n:1, pp:63-77 [Journal]
- Kyung Ho Jang, Dong Hoon Lee, Soon Ki Jung
A moving planar mirror based approach for cultural reconstruction. [Citation Graph (0, 0)][DBLP] Journal of Visualization and Computer Animation, 2004, v:15, n:3-4, pp:415-423 [Journal]
- Dong Hoon Lee, Soon Ki Jung
Multiple path-based approach to image-based street walkthrough. [Citation Graph (0, 0)][DBLP] Journal of Visualization and Computer Animation, 2005, v:16, n:2, pp:85-95 [Journal]
- Chang-Seop Park, Dong Hoon Lee
Secure and Efficient Key Management for Dynamic Multicast Groups. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2001, v:35, n:4, pp:32-38 [Journal]
- Jung Hee Cheon, Dong Hoon Lee
Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2006, v:55, n:12, pp:1536-1542 [Journal]
- Changwook Kim, Dong Hoon Lee
Separating k-Separated eNCE Graph Languages. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1993, v:120, n:2, pp:247-259 [Journal]
- Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee
Efficient Certificateless Signature Schemes. [Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:443-458 [Conf]
- Mi-Yeon Kim, Misook Lim, Jin-Soo Sohn, Dong Hoon Lee
Security and Handover Designs for VoWLAN System. [Citation Graph (0, 0)][DBLP] APNOMS, 2007, pp:447-456 [Conf]
- Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jongin Lim
Classification of Key Management Schemes for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] APWeb/WAIM Workshops, 2007, pp:664-673 [Conf]
- Yong Ho Kim, Hwaseong Lee, Jong Hyuk Park, Laurence Tianruo Yang, Dong Hoon Lee
Key Establishment Scheme for Sensor Networks with Low Communication Cost. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:441-448 [Conf]
- Jong Hwan Park, Dong Hoon Lee
Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes. [Citation Graph (0, 0)][DBLP] EuroPKI, 2007, pp:94-109 [Conf]
- Joon Wan Kim, Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee
A Practical Inter-sensor Broadcast Authentication Scheme. [Citation Graph (0, 0)][DBLP] HCI (5), 2007, pp:399-405 [Conf]
- Moon Jeong Kim, Dong Hoon Lee, Young Ik Eom
Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2007, pp:1187-1196 [Conf]
- Su-Mi Lee, Su Youn Lee, Dong Hoon Lee
Efficient Group Key Agreement for Dynamic TETRA Networks. [Citation Graph (0, 0)][DBLP] SOFSEM (1), 2007, pp:400-409 [Conf]
- Eun Young Choi, Su-Mi Lee, Dong Hoon Lee
Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes. [Citation Graph (0, 0)][DBLP] UIC, 2007, pp:1171-1180 [Conf]
- Hyungwoo Kang, Dong Hoon Lee
Security Assessment for Application Network Services Using Fault Injection. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:172-183 [Conf]
- Hyun-A Park, Dong Hoon Lee, Jongin Lim, Sang Hyun Cho
PPIDS: Privacy Preserving Intrusion Detection System. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:269-274 [Conf]
- Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee
Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). [Citation Graph (0, 0)][DBLP] Pairing, 2007, pp:60-82 [Conf]
- Jin Wook Byun, Dong Hoon Lee, Jong In Lim
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:3995-4013 [Journal]
Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks. [Citation Graph (, )][DBLP]
Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06. [Citation Graph (, )][DBLP]
Improved searchable public key encryption with designated tester. [Citation Graph (, )][DBLP]
Universal forgery of the identity-based sequential aggregate signature scheme. [Citation Graph (, )][DBLP]
A Transformation Scheme for Interconnection Networks. [Citation Graph (, )][DBLP]
Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database. [Citation Graph (, )][DBLP]
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. [Citation Graph (, )][DBLP]
Privacy-Aware Access Control through Negotiation in Daily Life Service. [Citation Graph (, )][DBLP]
Efficient keyword index search over encrypted documents of groups. [Citation Graph (, )][DBLP]
A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. [Citation Graph (, )][DBLP]
Bogus Data Filtering in Sensor Networks. [Citation Graph (, )][DBLP]
A Key Distribution Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Secure Similarity Search. [Citation Graph (, )][DBLP]
Attribute-based Access Control using Combined Authentication Technologies. [Citation Graph (, )][DBLP]
An Efficient Key Establishment Scheme for Self-organizing Sensor Networks. [Citation Graph (, )][DBLP]
Developing a Multi-Protocol Mobility Manager for SIP/SS7 Networks. [Citation Graph (, )][DBLP]
Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity. [Citation Graph (, )][DBLP]
Multi-protocol authentication for SIP/SS7 mobile network. [Citation Graph (, )][DBLP]
Security weakness in an authenticated group key agreement protocol in two rounds. [Citation Graph (, )][DBLP]
An authentication scheme for filtering injected bogus data in sensor networks. [Citation Graph (, )][DBLP]
Constructing PEKS schemes secure against keyword guessing attacks is possible? [Citation Graph (, )][DBLP]
Key agreement for key hypergraph. [Citation Graph (, )][DBLP]
Search in 0.011secs, Finished in 0.016secs
|