|
Search the dblp DataBase
Byoungcheon Lee:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Joonsang Baek, Byoungcheon Lee, Kwangjo Kim
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:49-58 [Conf]
- Byoungcheon Lee, Heesun Kim, Kwangjo Kim
Secure Mobile Agent Using Strong Non-designated Proxy Signature. [Citation Graph (0, 0)][DBLP] ACISP, 2001, pp:474- [Conf]
- Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:494-508 [Conf]
- Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
Secure Key Issuing in ID-based Cryptography. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:69-74 [Conf]
- Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee
A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. [Citation Graph (0, 0)][DBLP] Cryptographic Algorithms and their Uses, 2004, pp:57-71 [Conf]
- Hwankoo Kim, Bongjoo Park, JaeCheol Ha, Byoungcheon Lee, DongGook Park
New Key Management Systems for Multilevel Security. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:245-253 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
Ciphertext Comparison, a New Solution to the Millionaire Problem. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:84-96 [Conf]
- Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:259-273 [Conf]
- Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
Providing Receipt-Freeness in Mixnet-Based Voting Protocols. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:245-258 [Conf]
- Byoungcheon Lee, Kwangjo Kim
Secure Matchmaking Protocol. [Citation Graph (0, 0)][DBLP] ICISC, 2000, pp:123-134 [Conf]
- Byoungcheon Lee, Kwangjo Kim
Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. [Citation Graph (0, 0)][DBLP] ICISC, 2002, pp:389-406 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
An Efficient and Verifiable Solution to the Millionaire Problem. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:51-66 [Conf]
- Byoungcheon Lee, Kwangjo Kim
Self-certified Signatures. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2002, pp:199-214 [Conf]
- Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma
Efficient Public Auction with One-Time Registration and Public Verifiability. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2001, pp:162-174 [Conf]
- Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee
Multiplicative Homomorphic E-Voting. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:61-72 [Conf]
- Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson
An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. [Citation Graph (0, 0)][DBLP] TrustBus, 2004, pp:152-161 [Conf]
- Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson
Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography. [Citation Graph (, )][DBLP]
Secret Signatures: How to Achieve Business Privacy Efficiently? [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|