dblp.uni-trier.dewww.uni-trier.de

Ik Rae Jeong

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
16EEIk Rae Jeong, Jeong Ok Kwon, Dowon Hong, Dong Hoon Lee: Constructing PEKS schemes secure against keyword guessing attacks is possible? Computer Communications 32(2): 394-396 (2009)
2008
15EEAbedelaziz Mohaisen, Ik Rae Jeong, Dowon Hong, Nam-Su Jho, DaeHun Nyang: Data Randomization for Lightweight Secure Data Aggregation in Sensor Network. UIC 2008: 338-351
14EEIk Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: Ring Signature with Weak Linkability and Its Applications. IEEE Trans. Knowl. Data Eng. 20(8): 1145-1148 (2008)
13EEIk Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: Strong ID-Based Key Distribution. IEICE Transactions 91-B(1): 306-308 (2008)
12 Ik Rae Jeong, Dong Hoon Lee: Parallel Key Exchange. J. UCS 14(3): 377-396 (2008)
2007
11EEIk Rae Jeong, Dong Hoon Lee: Key agreement for key hypergraph. Computers & Security 26(7-8): 452-458 (2007)
10EEIk Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: On the Strong Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing. IEICE Transactions 90-A(11): 2626-2628 (2007)
9EEJeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee: Three-Round Smart Card-Based Key Exchange Scheme. IEICE Transactions 90-B(11): 3255-3258 (2007)
2006
8EEIk Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: A Diffie-Hellman Key Exchange Protocol Without Random Oracles. CANS 2006: 37-54
7EEJeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee: Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. IWSEC 2006: 322-336
6EEHyun Sook Rhee, Ik Rae Jeong, Jin Wook Byun, Dong Hoon Lee: Difference Set Attacks on Conjunctive Keyword Search Schemes. Secure Data Management 2006: 64-74
2004
5EEIk Rae Jeong, Jonathan Katz, Dong Hoon Lee: One-Round Protocols for Two-Party Authenticated Key Exchange. ACNS 2004: 220-232
2002
4EEJin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, Chang-Seop Park: Password-Authenticated Key Exchange between Clients with Different Passwords. ICICS 2002: 134-146
3EEIk Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim: Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. ICISC 2002: 16-34
2001
2EEIk Rae Jeong, Dong Hoon Lee, Jong In Lim: Efficient Transferable Cash with Group Signatures. ISC 2001: 462-474
2000
1EEIk Rae Jeong, Dong Hoon Lee: Anonymity Control in Multi-bank E-Cash System. INDOCRYPT 2000: 104-116

Coauthor Index

1Jin Wook Byun [4] [6]
2Dowon Hong [15] [16]
3Hee Yun Jeong [3]
4Nam-Su Jho [15]
5Jonathan Katz [5]
6Jeong Ok Kwon [7] [8] [9] [10] [13] [14] [16]
7Dong Hoon Lee [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [16]
8Jongin Lim (Jong In Lim) [2] [3]
9Abedelaziz Mohaisen [15]
10DaeHun Nyang [15]
11Chang-Seop Park [4]
12Hyun Sook Rhee [3] [6]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)