The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Byoungcheon Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joonsang Baek, Byoungcheon Lee, Kwangjo Kim
    Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:49-58 [Conf]
  2. Byoungcheon Lee, Heesun Kim, Kwangjo Kim
    Secure Mobile Agent Using Strong Non-designated Proxy Signature. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:474- [Conf]
  3. Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
    Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:494-508 [Conf]
  4. Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
    Secure Key Issuing in ID-based Cryptography. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2004, pp:69-74 [Conf]
  5. Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee
    A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:57-71 [Conf]
  6. Hwankoo Kim, Bongjoo Park, JaeCheol Ha, Byoungcheon Lee, DongGook Park
    New Key Management Systems for Multilevel Security. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:245-253 [Conf]
  7. Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
    Ciphertext Comparison, a New Solution to the Millionaire Problem. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:84-96 [Conf]
  8. Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim
    Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:259-273 [Conf]
  9. Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
    Providing Receipt-Freeness in Mixnet-Based Voting Protocols. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:245-258 [Conf]
  10. Byoungcheon Lee, Kwangjo Kim
    Secure Matchmaking Protocol. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:123-134 [Conf]
  11. Byoungcheon Lee, Kwangjo Kim
    Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:389-406 [Conf]
  12. Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
    An Efficient and Verifiable Solution to the Millionaire Problem. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:51-66 [Conf]
  13. Byoungcheon Lee, Kwangjo Kim
    Self-certified Signatures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:199-214 [Conf]
  14. Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma
    Efficient Public Auction with One-Time Registration and Public Verifiability. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:162-174 [Conf]
  15. Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee
    Multiplicative Homomorphic E-Voting. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:61-72 [Conf]
  16. Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson
    An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:152-161 [Conf]
  17. Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson
    Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]

  18. Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography. [Citation Graph (, )][DBLP]


  19. Secret Signatures: How to Achieve Business Privacy Efficiently? [Citation Graph (, )][DBLP]


Search in 0.034secs, Finished in 0.035secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002