The SCEAS System
Navigation Menu

Search the dblp DataBase


Dae Hyun Yum: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee
    EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:452-463 [Conf]
  2. Dae Hyun Yum, Pil Joong Lee
    Generic Construction of Certificateless Signature. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:200-211 [Conf]
  3. Dae Hyun Yum, Pil Joong Lee
    Identity-Based Cryptography in Public Key Management. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:71-84 [Conf]
  4. Yevgeniy Dodis, Dae Hyun Yum
    Time Capsule Signature. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:57-71 [Conf]
  5. Dae Hyun Yum, Pil Joong Lee
    A Distributed Online Certificate Status Protocol Based on GQ Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:471-480 [Conf]
  6. Dae Hyun Yum, Pil Joong Lee
    Generic Construction of Certificateless Encryption. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:802-811 [Conf]
  7. Dae Hyun Yum, Pil Joong Lee
    New Signcryption Schemes Based on KCDSA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:305-317 [Conf]
  8. Dae Hyun Yum, Pil Joong Lee
    Separable Implicit Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:121-136 [Conf]
  9. Dae Hyun Yum, Pil Joong Lee
    Efficient Key Updating Signature Schemes Based on IBS. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:167-182 [Conf]
  10. Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee
    Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:344-358 [Conf]
  11. Dae Hyun Yum, Jae Eun Kang, Pil Joong Lee
    Advanced Certificate Status Protocol. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:229-240 [Conf]
  12. Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
    Optimistic Fair Exchange in a Multi-user Setting. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:118-133 [Conf]

  13. Trapdoor Sanitizable Signatures Made Easy. [Citation Graph (, )][DBLP]

  14. Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. [Citation Graph (, )][DBLP]

  15. On Fast Verification of Hash Chains. [Citation Graph (, )][DBLP]

  16. Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity. [Citation Graph (, )][DBLP]

  17. Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers. [Citation Graph (, )][DBLP]

Search in 0.192secs, Finished in 0.193secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002