dblp.uni-trier.dewww.uni-trier.de

Dong Hoon Lee

Korea University

List of publications from the DBLP Bibliography Server - FAQ

other persons with the same name:


Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
104EEJung Yeon Hwang, Dong Hoon Lee, Moti Yung: Universal forgery of the identity-based sequential aggregate signature scheme. ASIACCS 2009: 157-160
103EEHyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee: Improved searchable public key encryption with designated tester. ASIACCS 2009: 376-379
102EEIk Rae Jeong, Jeong Ok Kwon, Dowon Hong, Dong Hoon Lee: Constructing PEKS schemes secure against keyword guessing attacks is possible? Computer Communications 32(2): 394-396 (2009)
2008
101EEJong Hwan Park, Ki Tak Kim, Dong Hoon Lee: Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06. ASIACCS 2008: 373-380
100EEYong Ho Kim, Kyu Young Choi, Jongin Lim, Dong Hoon Lee: An Efficient Key Establishment Scheme for Self-organizing Sensor Networks. ICDCN 2008: 345-349
99EEKwangsu Lee, Jung Yeon Hwang, Dong Hoon Lee: Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. ICISC 2008: 166-183
98EESeil Kim, Ji Young Chun, Dong Hoon Lee: Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity. ICYCS 2008: 2235-2239
97EEHyun-A Park, Dong Hoon Lee, Justin Zhan, Gary Blosser: Efficient keyword index search over encrypted documents of groups. ISI 2008: 225-229
96EEHyun-A Park, Justin Zhan, Dong Hoon Lee: Privacy-Aware Access Control through Negotiation in Daily Life Service. ISI Workshops 2008: 514-519
95EEJong Hwan Park, Dong Hoon Lee: A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. ISPEC 2008: 101-115
94EEYong Ho Kim, Hwaseong Lee, Dong Hoon Lee: A Key Distribution Scheme for Wireless Sensor Networks. PerCom 2008: 572-577
93EEHyung-Soo Park, Hyung-Woo Lee, Dong Hoon Lee, Hong-Ki Ko: Multi-protocol authentication for SIP/SS7 mobile network. Computer Communications 31(11): 2755-2763 (2008)
92EEJung Yeon Hwang, Kyu Young Choi, Dong Hoon Lee: Security weakness in an authenticated group key agreement protocol in two rounds. Computer Communications 31(15): 3719-3724 (2008)
91EEYong Ho Kim, Dong Hoon Lee: An authentication scheme for filtering injected bogus data in sensor networks. Computer Communications 31(17): 3929-3932 (2008)
90EEIk Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: Ring Signature with Weak Linkability and Its Applications. IEEE Trans. Knowl. Data Eng. 20(8): 1145-1148 (2008)
89EEKyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee: ID-Based Authenticated Group Key Agreement Secure against Insider Attacks. IEICE Transactions 91-A(7): 1828-1830 (2008)
88EEIk Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: Strong ID-Based Key Distribution. IEICE Transactions 91-B(1): 306-308 (2008)
87EEDong Hoon Lee: Algebraic degree of the inverse of linearized polynomials. J. Symb. Comput. 43(6-7): 442-451 (2008)
86 Ik Rae Jeong, Dong Hoon Lee: Parallel Key Exchange. J. UCS 14(3): 377-396 (2008)
2007
85EEKyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee: Efficient Certificateless Signature Schemes. ACNS 2007: 443-458
84EEJong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang: Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. AINA 2007: 311-316
83EEMi-Yeon Kim, Misook Lim, Jin-Soo Sohn, Dong Hoon Lee: Security and Handover Designs for VoWLAN System. APNOMS 2007: 447-456
82EEHwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jongin Lim: Classification of Key Management Schemes for Wireless Sensor Networks. APWeb/WAIM Workshops 2007: 664-673
81EEYong Ho Kim, Hwaseong Lee, Jong Hyuk Park, Laurence Tianruo Yang, Dong Hoon Lee: Key Establishment Scheme for Sensor Networks with Low Communication Cost. ATC 2007: 441-448
80 Moon Jeong Kim, Dong Hoon Lee, Young Ik Eom: A Transformation Scheme for Interconnection Networks. Communications in Computing 2007: 36-42
79EEJong Hwan Park, Dong Hoon Lee: Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes. EuroPKI 2007: 94-109
78EEHyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, Justin Zhan: Secure Similarity Search. GrC 2007: 598-
77EEJoon Wan Kim, Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee: A Practical Inter-sensor Broadcast Authentication Scheme. HCI (5) 2007: 399-405
76EEMoon Jeong Kim, Dong Hoon Lee, Young Ik Eom: Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad-Hoc Networks. ICCSA (3) 2007: 1187-1196
75EEHyungwoo Kang, Dong Hoon Lee: Security Assessment for Application Network Services Using Fault Injection. PAISI 2007: 172-183
74EEHyun-A Park, Dong Hoon Lee, Jongin Lim, Sang Hyun Cho: PPIDS: Privacy Preserving Intrusion Detection System. PAISI 2007: 269-274
73EEYong Ho Kim, Jong Hwan Park, Dong Hoon Lee, Jongin Lim: Bogus Data Filtering in Sensor Networks. PAKDD Workshops 2007: 629-635
72EEJong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee: Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). Pairing 2007: 60-82
71EESu-Mi Lee, Su Youn Lee, Dong Hoon Lee: Efficient Group Key Agreement for Dynamic TETRA Networks. SOFSEM (1) 2007: 400-409
70EEEun Young Choi, Su-Mi Lee, Dong Hoon Lee: Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes. UIC 2007: 1171-1180
69EEIk Rae Jeong, Dong Hoon Lee: Key agreement for key hypergraph. Computers & Security 26(7-8): 452-458 (2007)
68EEIk Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: On the Strong Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing. IEICE Transactions 90-A(11): 2626-2628 (2007)
67EEJeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee: Three-Round Smart Card-Based Key Exchange Scheme. IEICE Transactions 90-B(11): 3255-3258 (2007)
66EEJin Wook Byun, Dong Hoon Lee, Jong In Lim: EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. Inf. Sci. 177(19): 3995-4013 (2007)
2006
65EEHak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Haeryong Park, Kilsoo Chun: Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption. APWeb 2006: 720-725
64EEJin Wook Byun, Dong Hoon Lee, Jongin Lim: Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. APWeb 2006: 830-836
63EEIk Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: A Diffie-Hellman Key Exchange Protocol Without Random Oracles. CANS 2006: 37-54
62 Sang Heon Han, Jung Hoon Kim, Tae Soo Yun, Dong Hoon Lee: Extensible Interface Using Projector-Based Augmentation. CGVR 2006: 132-137
61 Chang Ok Yun, Sang Heon Han, Tae Soo Yun, Dong Hoon Lee: Development of Stereoscopic Image Editing Tool using Image-Based Modeling. CGVR 2006: 42-48
60EEJeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee: One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. Communications and Multimedia Security 2006: 87-96
59EEJin Wook Byun, Dong Hoon Lee, Jongin Lim: Efficient Conjunctive Keyword Search on Encrypted Data Storage System. EuroPKI 2006: 184-196
58EEHyungwoo Kang, Kibom Kim, Soon Jwa Hong, Dong Hoon Lee: A Model for Security Vulnerability Pattern. ICCSA (3) 2006: 385-394
57EEJeong Su Park, Su-Mi Lee, Eun Young Choi, Dong Hoon Lee: Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System. ICCSA (4) 2006: 316-325
56EEJeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee: Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. IWSEC 2006: 322-336
55EEJeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee: Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks. International Conference on Computational Science (1) 2006: 977-980
54EEKyoung Hyun Kim, Eun Young Choi, Su-Mi Lee, Dong Hoon Lee: Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems. OTM Workshops (1) 2006: 362-371
53EEBo Man Kim, Kyu Young Choi, Dong Hoon Lee: Disaster Coverable PKI Model Utilizing the Existing PKI Structure. OTM Workshops (1) 2006: 537-545
52EEYong Ho Kim, Hwaseong Lee, Dong Hoon Lee, Jongin Lim: A Key Management Scheme for Large Scale Distributed Sensor Networks. PWC 2006: 437-446
51EEJin Wook Byun, Su-Mi Lee, Dong Hoon Lee, Dowon Hong: Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. SPC 2006: 3-17
50EEHyun Sook Rhee, Ik Rae Jeong, Jin Wook Byun, Dong Hoon Lee: Difference Set Attacks on Conjunctive Keyword Search Schemes. Secure Data Management 2006: 64-74
49EEJin Wook Byun, Hyun Suk Rhee, Hyun-A Park, Dong Hoon Lee: Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. Secure Data Management 2006: 75-83
2005
48EEKyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, In Seog Seo: ID-based Authenticated Key Agreement for Low-Power Mobile Devices. ACISP 2005: 494-505
47EEJin Wook Byun, Dong Hoon Lee: N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. ACNS 2005: 75-90
46EEYong Ho Kim, Mu Hyun Kim, Dong Hoon Lee, Changwook Kim: A Key Management Scheme for Commodity Sensor Networks. ADHOC-NOW 2005: 113-126
45EEJin Wook Byun, Dong Hoon Lee, Jongin Lim: Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. CIS (2) 2005: 143-148
44EEJung Yeon Hwang, Dong Hoon Lee, Jongin Lim: Generic Transformation for Scalable Broadcast Encryption Schemes. CRYPTO 2005: 276-292
43EEJae Hyung Koo, Bum Han Kim, Dong Hoon Lee: Authenticated Public Key Distribution Scheme Without Trusted Third Party. EUC Workshops 2005: 926-935
42EEEun Young Choi, Su-Mi Lee, Dong Hoon Lee: Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. EUC Workshops 2005: 945-954
41EENam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo: One-Way Chain Based Broadcast Encryption Schemes. EUROCRYPT 2005: 559-574
40EESu-Mi Lee, Young Ju Hwang, Dong Hoon Lee, Jong In Lim: Efficient Authentication for Low-Cost RFID Systems. ICCSA (1) 2005: 619-627
39EEHak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun: Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. ICCSA (2) 2005: 381-390
38EEGangShin Lee, Heeran Lim, Manpyo Hong, Dong Hoon Lee: A Dynamic Path Identification Mechanism to Defend Against DDoS Attacks. ICOIN 2005: 806-813
37EEHak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun: Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. KES (2) 2005: 453-459
36EEJae Hyung Koo, Dong Hoon Lee: Secure Password Pocket for Distributed Web Services. NPC 2005: 327-334
35EEHyun-A Park, Jin Wook Byun, Dong Hoon Lee: Secure Index Search for Groups. TrustBus 2005: 128-140
34EEEun Young Choi, Hyun-Jeong Kim, Dong Hoon Lee: Efficient Member Revocation in Group Signature Schemes. TrustBus 2005: 195-205
33EEHyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jongin Lim: Oblivious Conjunctive Keyword Search. WISA 2005: 318-327
32EEJeong Ok Kwon, Jung Yeon Hwang, Changwook Kim, Dong Hoon Lee: Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme. Applied Mathematics and Computation 168(2): 858-865 (2005)
31EEDong Hoon Lee, Soon Ki Jung: Multiple path-based approach to image-based street walkthrough. Journal of Visualization and Computer Animation 16(2): 85-95 (2005)
2004
30 Jong In Lim, Dong Hoon Lee: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers Springer 2004
29EEIk Rae Jeong, Jonathan Katz, Dong Hoon Lee: One-Round Protocols for Two-Party Authenticated Key Exchange. ACNS 2004: 220-232
28EEHyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee: Constant-Round Authenticated Group Key Exchange for Dynamic Groups. ASIACRYPT 2004: 245-259
27 Dong Hoon Lee, Kyung Ho Jang, Soon Ki Jung: Intrinsic Camera Calibration Based on Radical Center Estimation. CISST 2004: 7-13
26EEGangShin Lee, Chaetae Im, TaeJin Lee, HyungJong Kim, Dong Hoon Lee: SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability. PCM (1) 2004: 564-571
25EEHyung Woo Kang, Soon Jwa Hong, Dong Hoon Lee: Matching Connection Pairs. PDCAT 2004: 642-649
24EEKyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee: Efficient ID-based Group Key Agreement with Bilinear Maps. Public Key Cryptography 2004: 130-144
23EESu-Mi Lee, Jung Yeon Hwang, Dong Hoon Lee: Efficient Password-Based Group Key Exchange. TrustBus 2004: 191-199
22EEKyung Ho Jang, Dong Hoon Lee, Soon Ki Jung: A moving planar mirror based approach for cultural reconstruction. Journal of Visualization and Computer Animation 15(3-4): 415-423 (2004)
2003
21EEJung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim: Digital Signature Schemes with Restriction on Signing Capability. ACISP 2003: 324-335
20EEDong Hoon Lee, Soon Ki Jung: Capture Configuration for Image-Based Street Walkthroughs. CW 2003: 151-157
19EEEun Young Choi, Jung Yeon Hwang, Dong Hoon Lee: An Anonymous Asymmetric Public Key Traitor Tracing Scheme. EC-Web 2003: 104-114
18EEDong Hoon Lee, Soon Ki Jung: Computer Vision-Assisted Interaction in X3D Virtual Environment on WWW. Human.Society@Internet 2003 2003: 332-340
17EETaeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim: Covert Channel Detection in the ICMP Payload Using Support Vector Machine. ISCIS 2003: 828-835
2002
16EEDong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyungjin Yang: A Practical Approach Defeating Blackmailing. ACISP 2002: 464-481
15EEHyun-Jeong Kim, Dong Hoon Lee, Moti Yung: Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. ACISP 2002: 482-496
14EEJin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, Chang-Seop Park: Password-Authenticated Key Exchange between Clients with Different Passwords. ICICS 2002: 134-146
13EEIk Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim: Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. ICISC 2002: 16-34
12EEHak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim: An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. ICISC 2002: 421-432
11EEJu Hee Ki, Hyun-Jeong Kim, Dong Hoon Lee, Chang-Seop Park: Efficient Multicast Key Management for Stateless Receivers. ICISC 2002: 497-509
10EESung A. Cho, Chae-Bogk Kim, Dong Hoon Lee: Single machine MAD/Tmax problem with a common due date. Computers & OR 29(8): 1099-1113 (2002)
2001
9EEIk Rae Jeong, Dong Hoon Lee, Jong In Lim: Efficient Transferable Cash with Group Signatures. ISC 2001: 462-474
8 Chang-Seop Park, Dong Hoon Lee: Secure and Efficient Key Management for Dynamic Multicast Groups. Operating Systems Review 35(4): 32-38 (2001)
2000
7 Dong Hoon Lee, Soon Ki Jung: Delaunay Triangles Model for Image-Based Motion Retargeting. DEFORM/AVATARS 2000: 158-168
6EEHyun-Jeong Kim, Jong In Lim, Dong Hoon Lee: Efficient and Secure Member Deletion in Group Signature Schemes. ICISC 2000: 150-161
5EEIk Rae Jeong, Dong Hoon Lee: Anonymity Control in Multi-bank E-Cash System. INDOCRYPT 2000: 104-116
4EESang-Hun Nam, Dong Hoon Lee, Jang-Hwan Im, Young-Ho Chai: Dual projection-based VR system for the light weight motion-based driving simulator. VRST 2000: 195-198
1999
3EEChae-Bogk Kim, P. Simin Pulat, Bobbie L. Foote, Dong Hoon Lee: Least cost tolerance allocation and bicriteria extension. Int. J. Computer Integrated Manufacturing 12(5): 418-426 (1999)
1995
2 Changwook Kim, Dong Hoon Lee: Node Replacement Graph Languages Squeezed with Chains, Trees, and Forests Inf. Comput. 117(1): 63-77 (1995)
1993
1 Changwook Kim, Dong Hoon Lee: Separating k-Separated eNCE Graph Languages. Theor. Comput. Sci. 120(2): 247-259 (1993)

Coauthor Index

1Gary Blosser [97]
2Jin Wook Byun [14] [33] [35] [45] [47] [49] [50] [51] [59] [64] [66]
3Young-Ho Chai [4]
4Jung Hee Cheon [41]
5Sang Hyun Cho [74]
6Sung A. Cho [10]
7Eun Young Choi [19] [34] [42] [54] [57] [70]
8Kyu Young Choi [24] [48] [53] [72] [85] [89] [92] [100]
9Ji Young Chun [98]
10Kilsoo Chun [37] [39] [65]
11Yon Dohn Chung [78]
12Young Ik Eom [76] [80]
13Bobbie L. Foote [3]
14Dong-Guk Han [16]
15Sang Heon Han [61] [62]
16Dowon Hong [51] [102]
17In-Hwa Hong [84]
18Manpyo Hong [38]
19Soon Jwa Hong [25] [58]
20Jung Yeon Hwang [19] [21] [23] [24] [32] [41] [44] [48] [72] [85] [89] [92] [99] [104]
21Young Ju Hwang [40]
22Chaetae Im [26]
23Jang-Hwan Im [4]
24Kyung Ho Jang [22] [27]
25Hee Yun Jeong [13]
26Ik Rae Jeong [5] [9] [13] [14] [29] [50] [56] [63] [67] [68] [69] [86] [88] [90] [102]
27Nam-Su Jho [41]
28Hak Soo Ju [12] [37] [39] [65]
29Soon Ki Jung [7] [18] [20] [22] [27] [31]
30Hyung Woo Kang [25]
31Hyungwoo Kang [58] [75]
32Jonathan Katz [29]
33Ju Hee Ki [11]
34Bo Man Kim [53]
35Bum Han Kim [43] [78]
36Chae-Bogk Kim [3] [10]
37Changwook Kim [1] [2] [32] [46]
38Dae Youb Kim [37] [39] [65]
39Hyun-Jeong Kim [6] [11] [12] [15] [21] [28] [34]
40HyungJong Kim [26]
41Joon Wan Kim [77]
42Jung Hoon Kim [62]
43Ki Tak Kim [101]
44Kibom Kim [58]
45Kyoung Hyun Kim [54]
46Mi-Yeon Kim [83]
47Moon Jeong Kim [76] [80]
48Mu Hyun Kim [46]
49Myung-Hwan Kim [41]
50Seil Kim [98]
51Yong Ho Kim [46] [52] [73] [77] [81] [82] [91] [94] [100]
52Hong-Ki Ko [93]
53Jae Hyung Koo [36] [43]
54Jeong Ok Kwon [32] [55] [56] [60] [63] [67] [68] [88] [90] [102]
55GangShin Lee [26] [38]
56Hwaseong Lee [52] [77] [81] [82] [94]
57Hyung-Woo Lee [93]
58Kwangsu Lee [99]
59Sangjin Lee [16] [17] [84]
60Su Youn Lee [71]
61Su-Mi Lee [23] [28] [40] [42] [51] [54] [57] [70] [71]
62TaeJin Lee [26]
63Heeran Lim [38]
64Jongin Lim (Jong In Lim) [6] [9] [12] [13] [17] [21] [30] [33] [37] [39] [40] [44] [45] [52] [59] [64] [66] [73] [74] [82] [84] [100]
65Misook Lim [83]
66Jongsub Moon [17]
67Sang-Hun Nam [4]
68Chang-Seop Park [8] [11] [14]
69Haeryong Park [65]
70Hye-Young Park [16]
71Hyun-A Park [35] [49] [74] [78] [96] [97]
72Hyung-Soo Park [93]
73Jeong Su Park [57]
74Jong Hwan Park [72] [73] [79] [85] [95] [101] [103]
75Jong Hyuk Park [81] [84]
76Young-Ho Park [16]
77P. Simin Pulat [3]
78Hyun Sook Rhee [13] [33] [50] [103]
79Hyun Suk Rhee [49]
80Kouichi Sakurai [55] [60]
81In Seog Seo [48]
82Taeshik Shon [17]
83Jin-Soo Sohn [83]
84Willy Susilo [103]
85Hyungjin Yang [16]
86Laurence Tianruo Yang [81] [84]
87Eun Sun Yoo [41]
88Chang Ok Yun [61]
89Tae Soo Yun [61] [62]
90Moti Yung (Mordechai M. Yung) [15] [104]
91Justin Zhan [78] [96] [97]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)