dblp.uni-trier.dewww.uni-trier.de

Im-Yeong Lee

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
29EESoo-Young Kang, Im-Yeong Lee: A Study on New Low-Cost RFID System with Mutual Authentication Scheme in Ubiquitous. MUE 2008: 527-530
28EESoo-Young Kang, Deok-Gyu Lee, Im-Yeong Lee: A study on secure RFID mutual authentication scheme in pervasive computing environment. Computer Communications 31(18): 4248-4254 (2008)
2007
27EESoo-Young Kang, Im-Yeong Lee: A Study on Low-Cost RFID System Management with Mutual Authentication Scheme in Ubiquitous. APNOMS 2007: 492-502
26EEJong Sik Moon, Im-Yeong Lee: A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Ubiquitous Environment. ICCSA (1) 2007: 666-677
25EESeo-Il Kang, Deok-Gyu Lee, Im-Yeong Lee: A Study on Key Distribution and ID Registration in the AAA System for Ubiquitous Multimedia Environments. MMM (2) 2007: 487-493
24EEDae-Hee Seo, Jang-Mi Baek, Jiang Li, Soo-Young Kang, Im-Yeong Lee, Hyung-Geun Oh: A Study on Improved RFID Authentication Scheme. MUE 2007: 567-572
23EEDeok-Gyu Lee, Yun-kyung Lee, Jong Wook Han, Jong Hyuk Park, Im-Yeong Lee: Intelligent Home Network Authentication: Home Device Authentication Using Device Certification. OTM Conferences (2) 2007: 1688-1700
22EESoo-Young Kang, Im-Yeong Lee: Privacy Protection Scheme of RFID Using Random Number. PAKDD Workshops 2007: 596-607
2006
21EEDeok-Gyu Lee, Jang-Su Park, Im-Yeong Lee: Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments. EUC Workshops 2006: 721-730
20EEDeok-Gyu Lee, Jong Sik Moon, Jong Hyuk Park, Im-Yeong Lee: Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI. HPCC 2006: 515-524
19EEDeok-Gyu Lee, Seo-Il Kang, Dae-Hee Seo, Im-Yeong Lee: Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification. ICCSA (4) 2006: 326-335
18EEDeok-Gyu Lee, Jang-Su Park, Im-Yeong Lee, Yong-Seok Park, Jung-Chul Ahn: An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption. ICCSA (4) 2006: 370-379
17EEDeok-Gyu Lee, Seo-Il Kang, Im-Yeong Lee: An Intelligent and Efficient Traitor Tracing for Ubiquitous Environments. KES (2) 2006: 793-802
2005
16EEDae-Hee Seo, Deok-Gyu Lee, Im-Yeong Lee: A Study on Scalable Bluetooth Piconet for Secure Ubiquitous. Human.Society@Internet 2005: 45-56
15EEDae-Hee Seo, Im-Yeong Lee, Hee-Un Park: A Study on Secure SDP of RFID Using Bluetooth Communication. ICCSA (2) 2005: 117-126
14EESeo-Il Kang, Im-Yeong Lee: A Study on the E-Cash System with Anonymity and Divisibility. ICCSA (2) 2005: 177-186
2004
13EEDeok-Gyu Lee, Hyung-Geun Oh, Im-Yeong Lee: A Study on Contents Distribution Using Electronic Cash System. EEE 2004: 333-340
12EEDae-Hee Seo, Im-Yeong Lee, Hee-Un Park: A Study on Key Recovery Agent Protection Profile Having Composition Function. ICCSA (1) 2004: 557-566
11EEDae-Hee Seo, Im-Yeong Lee: A Study on Secure and Effcient Sensor Network Management Scheme Using PTD. ICCSA (3) 2004: 1020-1028
10EEDeok-Gyu Lee, Im-Yeong Lee: A Study on Efficient Key Distribution and Renewal in Broadcast Encryption. ICCSA (4) 2004: 66-76
2003
9EEHyung-Woo Lee, Im-Yeong Lee, Dong-Ik Oh: Smart Card Based Mobile Payment with Fairness Revocation Mechanism. EC-Web 2003: 62-71
8EEYong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee: New WAKE Key Recovery Protocol on M-commerce. ICWE 2003: 279-280
7EEHyung-Woo Lee, Im-Yeong Lee: Designated Verification of Digital Watermark for Network Based Image Distribution. International Conference on Computational Science 2003: 1069-1078
2002
6EEYu-Sug Chang, Hye-Jung Lee, Doo-Soon Park, Im-Yeong Lee: Interprocedural Transformations for Extracting Maximum Parallelism. ADVIS 2002: 415-424
5EEHyung-Woo Lee, Sung-Min Lee, Im-Yeong Lee: Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing. EC-Web 2002: 324-332
4EEDae-Hee Seo, Im-Yeong Lee, Dong-Ik Oh, Doo-Soon Park: Secure Bluetooth Piconet Using Non-anonymous Group Key. EurAsia-ICT 2002: 766-777
3EEDeok-Gyu Lee, Im-Yeong Lee, Jong-Keun Ahn, Yong-Hae Kong: The Illegal Copy Protection Using Hidden Agent. EurAsia-ICT 2002: 832-841
2EEYong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee: New Identity Escrow Scheme for Anonymity Authentication. INDOCRYPT 2002: 382-394
2001
1EEHee-Un Park, Im-Yeong Lee: A Digital Nominative Proxy Signature Scheme for Mobile Communication. ICICS 2001: 451-455

Coauthor Index

1Jong-Keun Ahn [3]
2Jung-Chul Ahn [18]
3Jang-Mi Baek [24]
4Yu-Sug Chang [6]
5Jong Wook Han [23]
6Seo-Il Kang [14] [17] [19] [25]
7Soo-Young Kang [22] [24] [27] [28] [29]
8Yong-Hae Kong [3]
9Deok-Gyu Lee [3] [10] [13] [16] [17] [18] [19] [20] [21] [23] [25] [28]
10Hye-Jung Lee [6]
11Hyung-Woo Lee [2] [5] [7] [8] [9]
12Sung-Min Lee [5]
13Yong-Ho Lee [2] [8]
14Yun-kyung Lee [23]
15Jiang Li [24]
16Jong Sik Moon [20] [26]
17Dong-Ik Oh [4] [9]
18Hyung-Geun Oh [13] [24]
19Doo-Soon Park [4] [6]
20Hee-Un Park [1] [12] [15]
21Jang-Su Park [18] [21]
22Jong Hyuk Park [20] [23]
23Yong-Seok Park [18]
24Dae-Hee Seo [4] [11] [12] [15] [16] [19] [24]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)