Korea University
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
2009 | ||
---|---|---|
104 | EE | Jung Yeon Hwang, Dong Hoon Lee, Moti Yung: Universal forgery of the identity-based sequential aggregate signature scheme. ASIACCS 2009: 157-160 |
103 | EE | Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee: Improved searchable public key encryption with designated tester. ASIACCS 2009: 376-379 |
102 | EE | Ik Rae Jeong, Jeong Ok Kwon, Dowon Hong, Dong Hoon Lee: Constructing PEKS schemes secure against keyword guessing attacks is possible? Computer Communications 32(2): 394-396 (2009) |
2008 | ||
101 | EE | Jong Hwan Park, Ki Tak Kim, Dong Hoon Lee: Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06. ASIACCS 2008: 373-380 |
100 | EE | Yong Ho Kim, Kyu Young Choi, Jongin Lim, Dong Hoon Lee: An Efficient Key Establishment Scheme for Self-organizing Sensor Networks. ICDCN 2008: 345-349 |
99 | EE | Kwangsu Lee, Jung Yeon Hwang, Dong Hoon Lee: Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. ICISC 2008: 166-183 |
98 | EE | Seil Kim, Ji Young Chun, Dong Hoon Lee: Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity. ICYCS 2008: 2235-2239 |
97 | EE | Hyun-A Park, Dong Hoon Lee, Justin Zhan, Gary Blosser: Efficient keyword index search over encrypted documents of groups. ISI 2008: 225-229 |
96 | EE | Hyun-A Park, Justin Zhan, Dong Hoon Lee: Privacy-Aware Access Control through Negotiation in Daily Life Service. ISI Workshops 2008: 514-519 |
95 | EE | Jong Hwan Park, Dong Hoon Lee: A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. ISPEC 2008: 101-115 |
94 | EE | Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee: A Key Distribution Scheme for Wireless Sensor Networks. PerCom 2008: 572-577 |
93 | EE | Hyung-Soo Park, Hyung-Woo Lee, Dong Hoon Lee, Hong-Ki Ko: Multi-protocol authentication for SIP/SS7 mobile network. Computer Communications 31(11): 2755-2763 (2008) |
92 | EE | Jung Yeon Hwang, Kyu Young Choi, Dong Hoon Lee: Security weakness in an authenticated group key agreement protocol in two rounds. Computer Communications 31(15): 3719-3724 (2008) |
91 | EE | Yong Ho Kim, Dong Hoon Lee: An authentication scheme for filtering injected bogus data in sensor networks. Computer Communications 31(17): 3929-3932 (2008) |
90 | EE | Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: Ring Signature with Weak Linkability and Its Applications. IEEE Trans. Knowl. Data Eng. 20(8): 1145-1148 (2008) |
89 | EE | Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee: ID-Based Authenticated Group Key Agreement Secure against Insider Attacks. IEICE Transactions 91-A(7): 1828-1830 (2008) |
88 | EE | Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: Strong ID-Based Key Distribution. IEICE Transactions 91-B(1): 306-308 (2008) |
87 | EE | Dong Hoon Lee: Algebraic degree of the inverse of linearized polynomials. J. Symb. Comput. 43(6-7): 442-451 (2008) |
86 | Ik Rae Jeong, Dong Hoon Lee: Parallel Key Exchange. J. UCS 14(3): 377-396 (2008) | |
2007 | ||
85 | EE | Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee: Efficient Certificateless Signature Schemes. ACNS 2007: 443-458 |
84 | EE | Jong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang: Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. AINA 2007: 311-316 |
83 | EE | Mi-Yeon Kim, Misook Lim, Jin-Soo Sohn, Dong Hoon Lee: Security and Handover Designs for VoWLAN System. APNOMS 2007: 447-456 |
82 | EE | Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jongin Lim: Classification of Key Management Schemes for Wireless Sensor Networks. APWeb/WAIM Workshops 2007: 664-673 |
81 | EE | Yong Ho Kim, Hwaseong Lee, Jong Hyuk Park, Laurence Tianruo Yang, Dong Hoon Lee: Key Establishment Scheme for Sensor Networks with Low Communication Cost. ATC 2007: 441-448 |
80 | Moon Jeong Kim, Dong Hoon Lee, Young Ik Eom: A Transformation Scheme for Interconnection Networks. Communications in Computing 2007: 36-42 | |
79 | EE | Jong Hwan Park, Dong Hoon Lee: Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes. EuroPKI 2007: 94-109 |
78 | EE | Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, Justin Zhan: Secure Similarity Search. GrC 2007: 598- |
77 | EE | Joon Wan Kim, Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee: A Practical Inter-sensor Broadcast Authentication Scheme. HCI (5) 2007: 399-405 |
76 | EE | Moon Jeong Kim, Dong Hoon Lee, Young Ik Eom: Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad-Hoc Networks. ICCSA (3) 2007: 1187-1196 |
75 | EE | Hyungwoo Kang, Dong Hoon Lee: Security Assessment for Application Network Services Using Fault Injection. PAISI 2007: 172-183 |
74 | EE | Hyun-A Park, Dong Hoon Lee, Jongin Lim, Sang Hyun Cho: PPIDS: Privacy Preserving Intrusion Detection System. PAISI 2007: 269-274 |
73 | EE | Yong Ho Kim, Jong Hwan Park, Dong Hoon Lee, Jongin Lim: Bogus Data Filtering in Sensor Networks. PAKDD Workshops 2007: 629-635 |
72 | EE | Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee: Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). Pairing 2007: 60-82 |
71 | EE | Su-Mi Lee, Su Youn Lee, Dong Hoon Lee: Efficient Group Key Agreement for Dynamic TETRA Networks. SOFSEM (1) 2007: 400-409 |
70 | EE | Eun Young Choi, Su-Mi Lee, Dong Hoon Lee: Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes. UIC 2007: 1171-1180 |
69 | EE | Ik Rae Jeong, Dong Hoon Lee: Key agreement for key hypergraph. Computers & Security 26(7-8): 452-458 (2007) |
68 | EE | Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: On the Strong Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing. IEICE Transactions 90-A(11): 2626-2628 (2007) |
67 | EE | Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee: Three-Round Smart Card-Based Key Exchange Scheme. IEICE Transactions 90-B(11): 3255-3258 (2007) |
66 | EE | Jin Wook Byun, Dong Hoon Lee, Jong In Lim: EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. Inf. Sci. 177(19): 3995-4013 (2007) |
2006 | ||
65 | EE | Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Haeryong Park, Kilsoo Chun: Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption. APWeb 2006: 720-725 |
64 | EE | Jin Wook Byun, Dong Hoon Lee, Jongin Lim: Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. APWeb 2006: 830-836 |
63 | EE | Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee: A Diffie-Hellman Key Exchange Protocol Without Random Oracles. CANS 2006: 37-54 |
62 | Sang Heon Han, Jung Hoon Kim, Tae Soo Yun, Dong Hoon Lee: Extensible Interface Using Projector-Based Augmentation. CGVR 2006: 132-137 | |
61 | Chang Ok Yun, Sang Heon Han, Tae Soo Yun, Dong Hoon Lee: Development of Stereoscopic Image Editing Tool using Image-Based Modeling. CGVR 2006: 42-48 | |
60 | EE | Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee: One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. Communications and Multimedia Security 2006: 87-96 |
59 | EE | Jin Wook Byun, Dong Hoon Lee, Jongin Lim: Efficient Conjunctive Keyword Search on Encrypted Data Storage System. EuroPKI 2006: 184-196 |
58 | EE | Hyungwoo Kang, Kibom Kim, Soon Jwa Hong, Dong Hoon Lee: A Model for Security Vulnerability Pattern. ICCSA (3) 2006: 385-394 |
57 | EE | Jeong Su Park, Su-Mi Lee, Eun Young Choi, Dong Hoon Lee: Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System. ICCSA (4) 2006: 316-325 |
56 | EE | Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee: Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. IWSEC 2006: 322-336 |
55 | EE | Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee: Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks. International Conference on Computational Science (1) 2006: 977-980 |
54 | EE | Kyoung Hyun Kim, Eun Young Choi, Su-Mi Lee, Dong Hoon Lee: Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems. OTM Workshops (1) 2006: 362-371 |
53 | EE | Bo Man Kim, Kyu Young Choi, Dong Hoon Lee: Disaster Coverable PKI Model Utilizing the Existing PKI Structure. OTM Workshops (1) 2006: 537-545 |
52 | EE | Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee, Jongin Lim: A Key Management Scheme for Large Scale Distributed Sensor Networks. PWC 2006: 437-446 |
51 | EE | Jin Wook Byun, Su-Mi Lee, Dong Hoon Lee, Dowon Hong: Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. SPC 2006: 3-17 |
50 | EE | Hyun Sook Rhee, Ik Rae Jeong, Jin Wook Byun, Dong Hoon Lee: Difference Set Attacks on Conjunctive Keyword Search Schemes. Secure Data Management 2006: 64-74 |
49 | EE | Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, Dong Hoon Lee: Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. Secure Data Management 2006: 75-83 |
2005 | ||
48 | EE | Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, In Seog Seo: ID-based Authenticated Key Agreement for Low-Power Mobile Devices. ACISP 2005: 494-505 |
47 | EE | Jin Wook Byun, Dong Hoon Lee: N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. ACNS 2005: 75-90 |
46 | EE | Yong Ho Kim, Mu Hyun Kim, Dong Hoon Lee, Changwook Kim: A Key Management Scheme for Commodity Sensor Networks. ADHOC-NOW 2005: 113-126 |
45 | EE | Jin Wook Byun, Dong Hoon Lee, Jongin Lim: Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. CIS (2) 2005: 143-148 |
44 | EE | Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim: Generic Transformation for Scalable Broadcast Encryption Schemes. CRYPTO 2005: 276-292 |
43 | EE | Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee: Authenticated Public Key Distribution Scheme Without Trusted Third Party. EUC Workshops 2005: 926-935 |
42 | EE | Eun Young Choi, Su-Mi Lee, Dong Hoon Lee: Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. EUC Workshops 2005: 945-954 |
41 | EE | Nam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo: One-Way Chain Based Broadcast Encryption Schemes. EUROCRYPT 2005: 559-574 |
40 | EE | Su-Mi Lee, Young Ju Hwang, Dong Hoon Lee, Jong In Lim: Efficient Authentication for Low-Cost RFID Systems. ICCSA (1) 2005: 619-627 |
39 | EE | Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun: Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. ICCSA (2) 2005: 381-390 |
38 | EE | GangShin Lee, Heeran Lim, Manpyo Hong, Dong Hoon Lee: A Dynamic Path Identification Mechanism to Defend Against DDoS Attacks. ICOIN 2005: 806-813 |
37 | EE | Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun: Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. KES (2) 2005: 453-459 |
36 | EE | Jae Hyung Koo, Dong Hoon Lee: Secure Password Pocket for Distributed Web Services. NPC 2005: 327-334 |
35 | EE | Hyun-A Park, Jin Wook Byun, Dong Hoon Lee: Secure Index Search for Groups. TrustBus 2005: 128-140 |
34 | EE | Eun Young Choi, Hyun-Jeong Kim, Dong Hoon Lee: Efficient Member Revocation in Group Signature Schemes. TrustBus 2005: 195-205 |
33 | EE | Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jongin Lim: Oblivious Conjunctive Keyword Search. WISA 2005: 318-327 |
32 | EE | Jeong Ok Kwon, Jung Yeon Hwang, Changwook Kim, Dong Hoon Lee: Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme. Applied Mathematics and Computation 168(2): 858-865 (2005) |
31 | EE | Dong Hoon Lee, Soon Ki Jung: Multiple path-based approach to image-based street walkthrough. Journal of Visualization and Computer Animation 16(2): 85-95 (2005) |
2004 | ||
30 | Jong In Lim, Dong Hoon Lee: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers Springer 2004 | |
29 | EE | Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee: One-Round Protocols for Two-Party Authenticated Key Exchange. ACNS 2004: 220-232 |
28 | EE | Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee: Constant-Round Authenticated Group Key Exchange for Dynamic Groups. ASIACRYPT 2004: 245-259 |
27 | Dong Hoon Lee, Kyung Ho Jang, Soon Ki Jung: Intrinsic Camera Calibration Based on Radical Center Estimation. CISST 2004: 7-13 | |
26 | EE | GangShin Lee, Chaetae Im, TaeJin Lee, HyungJong Kim, Dong Hoon Lee: SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability. PCM (1) 2004: 564-571 |
25 | EE | Hyung Woo Kang, Soon Jwa Hong, Dong Hoon Lee: Matching Connection Pairs. PDCAT 2004: 642-649 |
24 | EE | Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee: Efficient ID-based Group Key Agreement with Bilinear Maps. Public Key Cryptography 2004: 130-144 |
23 | EE | Su-Mi Lee, Jung Yeon Hwang, Dong Hoon Lee: Efficient Password-Based Group Key Exchange. TrustBus 2004: 191-199 |
22 | EE | Kyung Ho Jang, Dong Hoon Lee, Soon Ki Jung: A moving planar mirror based approach for cultural reconstruction. Journal of Visualization and Computer Animation 15(3-4): 415-423 (2004) |
2003 | ||
21 | EE | Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim: Digital Signature Schemes with Restriction on Signing Capability. ACISP 2003: 324-335 |
20 | EE | Dong Hoon Lee, Soon Ki Jung: Capture Configuration for Image-Based Street Walkthroughs. CW 2003: 151-157 |
19 | EE | Eun Young Choi, Jung Yeon Hwang, Dong Hoon Lee: An Anonymous Asymmetric Public Key Traitor Tracing Scheme. EC-Web 2003: 104-114 |
18 | EE | Dong Hoon Lee, Soon Ki Jung: Computer Vision-Assisted Interaction in X3D Virtual Environment on WWW. Human.Society@Internet 2003 2003: 332-340 |
17 | EE | Taeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim: Covert Channel Detection in the ICMP Payload Using Support Vector Machine. ISCIS 2003: 828-835 |
2002 | ||
16 | EE | Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyungjin Yang: A Practical Approach Defeating Blackmailing. ACISP 2002: 464-481 |
15 | EE | Hyun-Jeong Kim, Dong Hoon Lee, Moti Yung: Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. ACISP 2002: 482-496 |
14 | EE | Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, Chang-Seop Park: Password-Authenticated Key Exchange between Clients with Different Passwords. ICICS 2002: 134-146 |
13 | EE | Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim: Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. ICISC 2002: 16-34 |
12 | EE | Hak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim: An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. ICISC 2002: 421-432 |
11 | EE | Ju Hee Ki, Hyun-Jeong Kim, Dong Hoon Lee, Chang-Seop Park: Efficient Multicast Key Management for Stateless Receivers. ICISC 2002: 497-509 |
10 | EE | Sung A. Cho, Chae-Bogk Kim, Dong Hoon Lee: Single machine MAD/Tmax problem with a common due date. Computers & OR 29(8): 1099-1113 (2002) |
2001 | ||
9 | EE | Ik Rae Jeong, Dong Hoon Lee, Jong In Lim: Efficient Transferable Cash with Group Signatures. ISC 2001: 462-474 |
8 | Chang-Seop Park, Dong Hoon Lee: Secure and Efficient Key Management for Dynamic Multicast Groups. Operating Systems Review 35(4): 32-38 (2001) | |
2000 | ||
7 | Dong Hoon Lee, Soon Ki Jung: Delaunay Triangles Model for Image-Based Motion Retargeting. DEFORM/AVATARS 2000: 158-168 | |
6 | EE | Hyun-Jeong Kim, Jong In Lim, Dong Hoon Lee: Efficient and Secure Member Deletion in Group Signature Schemes. ICISC 2000: 150-161 |
5 | EE | Ik Rae Jeong, Dong Hoon Lee: Anonymity Control in Multi-bank E-Cash System. INDOCRYPT 2000: 104-116 |
4 | EE | Sang-Hun Nam, Dong Hoon Lee, Jang-Hwan Im, Young-Ho Chai: Dual projection-based VR system for the light weight motion-based driving simulator. VRST 2000: 195-198 |
1999 | ||
3 | EE | Chae-Bogk Kim, P. Simin Pulat, Bobbie L. Foote, Dong Hoon Lee: Least cost tolerance allocation and bicriteria extension. Int. J. Computer Integrated Manufacturing 12(5): 418-426 (1999) |
1995 | ||
2 | Changwook Kim, Dong Hoon Lee: Node Replacement Graph Languages Squeezed with Chains, Trees, and Forests Inf. Comput. 117(1): 63-77 (1995) | |
1993 | ||
1 | Changwook Kim, Dong Hoon Lee: Separating k-Separated eNCE Graph Languages. Theor. Comput. Sci. 120(2): 247-259 (1993) |